IOC Report
z1SWIFT_MT103_Payment_552016_cmd.bat

loading gif

Files

File Path
Type
Category
Malicious
z1SWIFT_MT103_Payment_552016_cmd.bat
Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 35 datablocks, 0 compression
initial sample
malicious
C:\Users\Public\Libraries\joedgvvL.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
malicious
C:\Users\Public\Libraries\joedgvvL.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\z1SWIFT_MT103_Payment_552016_cmd.bat" "
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\joedgvvL.cmd" "
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Users\Public\Libraries\joedgvvL.pif
C:\Users\Public\Libraries\joedgvvL.pif
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\cscript.exe
"C:\Windows\SysWOW64\cscript.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\Public\Libraries\joedgvvL.pif"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\extrac32.exe
extrac32 /y "C:\Users\user\Desktop\z1SWIFT_MT103_Payment_552016_cmd.bat" "C:\Users\user\AppData\Local\Temp\x.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://himalayastrek.com/stein/233_Lvvgdeojree
50.116.93.185
malicious
www.kimosskrupulslacker.cfd/f29s/
malicious
https://himalayastrek.com/
unknown
malicious
http://www.kimosskrupulslacker.cfd
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
http://www.acaxtecameralcarers.cfd/f29s/www.ound-qlhmm.xyz
unknown
http://www.specially-smou.xyz
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://www.zpp-at.xyz/f29s/www.byataltatweer.net
unknown
https://word.office.comM
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://www.duxrib.xyzReferer:
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
http://www.ound-qlhmm.xyz/f29s/www.idstream.xyz
unknown
http://www.kimosskrupulslacker.cfd/f29s/www.duxrib.xyz
unknown
http://www.byataltatweer.netReferer:
unknown
http://www.dnaqm-walk.xyz/f29s/
unknown
http://www.ixedcontainerlogistics.today/f29s/
unknown
http://www.byataltatweer.net
unknown
http://www.jdhfmq.live/f29s/
unknown
https://wns.windows.com/e
unknown
http://www.duxrib.xyz/f29s/
unknown
http://www.acaxtecameralcarers.cfd
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.iscussion-tjard.xyz/f29s/www.aomei517.top
unknown
http://www.idstream.xyz
unknown
http://www.iscussion-tjard.xyz
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://himalayastrek.com:443/stein/233_LvvgdeojreeP
unknown
http://www.ranxxletzz.xyz
unknown
http://www.ise-bjnh.xyz
unknown
http://www.byataltatweer.net/f29s/
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.idstream.xyzReferer:
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
http://www.ise-bjnh.xyzReferer:
unknown
http://www.dnaqm-walk.xyzReferer:
unknown
http://www.ndradesanches.shop/f29s/
unknown
http://www.ise-bjnh.xyz/f29s/
unknown
https://android.notify.windows.com/iOS
unknown
https://outlook.come
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.specially-smou.xyzReferer:
unknown
http://www.dnaqm-walk.xyz
unknown
http://www.ound-qlhmm.xyz/f29s/
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
http://www.ixedcontainerlogistics.today
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
http://www.zpp-at.xyz
unknown
http://www.acaxtecameralcarers.cfdReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.idstream.xyz/f29s/
unknown
https://api.msn.com/I
unknown
http://ocsp.sectigo.com0
unknown
http://www.ranxxletzz.xyz/f29s/
unknown
http://www.iscussion-tjard.xyzReferer:
unknown
http://www.ranxxletzz.xyzReferer:
unknown
http://www.aomei517.top
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://schemas.micro
unknown
http://www.iscussion-tjard.xyz/f29s/
unknown
http://www.kimosskrupulslacker.cfdReferer:
unknown
http://www.idstream.xyz/f29s/www.specially-smou.xyz
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.specially-smou.xyz/f29s/
unknown
http://www.ranxxletzz.xyz/f29s/www.ixedcontainerlogistics.today
unknown
http://www.byataltatweer.net/f29s/www.ranxxletzz.xyz
unknown
http://www.ixedcontainerlogistics.todayReferer:
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
http://www.ise-bjnh.xyz/f29s/www.jdhfmq.live
unknown
http://www.aomei517.top/f29s/
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
https://sectigo.com/CPS0
unknown
http://www.aomei517.topReferer:
unknown
http://www.ndradesanches.shopReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
http://www.ixedcontainerlogistics.today/f29s/www.kimosskrupulslacker.cfd
unknown
http://www.aomei517.top/f29s/www.dnaqm-walk.xyz
unknown
http://www.jdhfmq.liveReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
http://www.dnaqm-walk.xyz/f29s/www.ndradesanches.shop
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
http://www.kimosskrupulslacker.cfd/f29s/
unknown
http://www.specially-smou.xyz/f29s/www.zpp-at.xyz
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
http://www.ound-qlhmm.xyzReferer:
unknown
http://www.zpp-at.xyz/f29s/
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
http://www.duxrib.xyz/f29s/www.ise-bjnh.xyz
unknown
https://powerpoint.office.comEMd
unknown
http://www.ndradesanches.shop
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
himalayastrek.com
50.116.93.185
malicious
www.idstream.xyz
178.128.81.239
malicious
www.zpp-at.xyz
unknown
malicious
www.jdhfmq.live
unknown
malicious
www.ise-bjnh.xyz
unknown
malicious
www.byataltatweer.net
unknown
malicious
www.kimosskrupulslacker.cfd
unknown
malicious
www.ranxxletzz.xyz
unknown
malicious
www.ixedcontainerlogistics.today
unknown
malicious
www.ound-qlhmm.xyz
unknown
malicious
www.acaxtecameralcarers.cfd
unknown
malicious
www.specially-smou.xyz
unknown
malicious
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
50.116.93.185
himalayastrek.com
United States
malicious
178.128.81.239
www.idstream.xyz
Netherlands
malicious

Registry

Path
Value
Malicious
unknown
Unpacker
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
@explorerframe.dll,-13137
malicious
unknown
@explorerframe.dll,-13138
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
SlowContextMenuEntries
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
Outlook.File.msg.15
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
SlowContextMenuEntries
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
wdpfile
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
TaskbarStateLastRun
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 188 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
1DE60000
unclassified section
page execute and read and write
malicious
21C42000
direct allocation
page read and write
malicious
1DE30000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A30000
system
page execute and read and write
malicious
2C60000
unclassified section
page execute and read and write
malicious
2DD0000
trusted library allocation
page read and write
malicious
216FA000
direct allocation
page read and write
malicious
3371000
unkown
page read and write
EC70000
heap
page read and write
7FF5DF43C000
unkown
page readonly
7930000
unkown
page readonly
7FF5DF067000
unkown
page readonly
7FF5DF16B000
unkown
page readonly
7FF5DF4F7000
unkown
page readonly
7FF5DF126000
unkown
page readonly
7FF5DF1CD000
unkown
page readonly
215CF000
heap
page read and write
971A000
unkown
page read and write
7FBDF000
direct allocation
page read and write
1D9A4000
heap
page read and write
7FF5DF4D5000
unkown
page readonly
BF9D000
unkown
page read and write
7FF5DF458000
unkown
page readonly
1F0000
heap
page read and write
C461000
unkown
page read and write
7FF5DE9C3000
unkown
page readonly
950C000
stack
page read and write
7FF5DF029000
unkown
page readonly
9F3E000
unkown
page read and write
C39F000
unkown
page read and write
2EC0000
unkown
page readonly
D10000
unkown
page readonly
BD7F000
stack
page read and write
C159000
unkown
page read and write
28D0000
heap
page read and write
B09E000
stack
page read and write
7FC10000
direct allocation
page read and write
7FF5DF24E000
unkown
page readonly
9E1E000
stack
page read and write
1DACA000
heap
page read and write
C013000
unkown
page read and write
7FF5DF0CC000
unkown
page readonly
4AE4000
heap
page read and write
8390000
unkown
page read and write
1EBEB807000
heap
page read and write
C1A9000
unkown
page read and write
C4E2000
unkown
page read and write
4D9A000
heap
page read and write
7FF5DF0A5000
unkown
page readonly
98A1000
unkown
page read and write
7DF4E67A1000
unkown
page execute read
50D0000
heap
page read and write
C3D9000
unkown
page read and write
C1A9000
unkown
page read and write
EBA1000
unkown
page read and write
48B0000
unkown
page read and write
7FF5DF41B000
unkown
page readonly
CD0000
heap
page read and write
2E4E000
stack
page read and write
47F000
unkown
page readonly
7DF4E6761000
unkown
page execute read
7A01000
unkown
page read and write
2A10000
heap
page read and write
B830000
unkown
page readonly
95F0000
unkown
page read and write
BF82000
unkown
page read and write
A90000
heap
page read and write
BF10000
unkown
page readonly
7FF5DF25E000
unkown
page readonly
B90000
trusted library allocation
page read and write
11A0000
unkown
page readonly
9D9F000
stack
page read and write
7FF5DF5E9000
unkown
page readonly
7FF5DF3B9000
unkown
page readonly
25EE000
unkown
page read and write
EC7A000
heap
page read and write
83E0000
unkown
page read and write
B2DB000
stack
page read and write
7FF5DEFFC000
unkown
page readonly
A09A000
unkown
page read and write
B90000
trusted library allocation
page read and write
E263000
unkown
page execute and read and write
2F8D000
stack
page read and write
940C000
stack
page read and write
9EC000
stack
page read and write
A760000
unkown
page read and write
54A0000
heap
page read and write
7FF5DF017000
unkown
page readonly
217D3000
direct allocation
page read and write
C2E4000
unkown
page read and write
989F000
unkown
page read and write
A08A000
unkown
page read and write
21541000
heap
page read and write
215DD000
heap
page read and write
20FCC000
direct allocation
page read and write
96F5000
unkown
page read and write
BFA1000
unkown
page read and write
A098000
unkown
page read and write
BF9B000
unkown
page read and write
5070000
heap
page read and write
BFA5000
unkown
page read and write
C183000
unkown
page read and write
E70000
unkown
page readonly
B90000
trusted library allocation
page read and write
7FF5DEF06000
unkown
page readonly
7FF5DF2FE000
unkown
page readonly
7503000
unkown
page read and write
7FF5DF284000
unkown
page readonly
AF7E000
stack
page read and write
4EEC000
heap
page read and write
4ED5000
heap
page read and write
96C000
heap
page read and write
9F0000
heap
page read and write
980000
unkown
page readonly
4EEC000
heap
page read and write
2870000
unkown
page read and write
1EBEB81D000
heap
page read and write
AB0D000
stack
page read and write
2CB0000
heap
page read and write
1DADF000
heap
page read and write
7FF5DF067000
unkown
page readonly
C34E000
unkown
page read and write
BF40000
unkown
page read and write
7DF4E6771000
unkown
page execute read
B90000
trusted library allocation
page read and write
FE0000
unkown
page read and write
C149000
unkown
page read and write
4D1E000
stack
page read and write
C192000
unkown
page read and write
52D9000
unkown
page read and write
1EBED620000
trusted library allocation
page read and write
4D90000
heap
page read and write
4788000
unkown
page read and write
7FF5DF0C1000
unkown
page readonly
A09A000
unkown
page read and write
7FF5DEFE8000
unkown
page readonly
EB75000
unkown
page read and write
7FF5DF361000
unkown
page readonly
73B2000
unkown
page read and write
48E0000
unkown
page read and write
2CA5000
heap
page read and write
7DF5E895F000
unkown
page readonly
3394000
unkown
page read and write
769B3FF000
stack
page read and write
914B000
stack
page read and write
303C000
heap
page read and write
A0A5000
unkown
page read and write
1D9A4000
heap
page read and write
47A000
unkown
page write copy
EBA1000
unkown
page read and write
74D6000
unkown
page read and write
7FF000
stack
page read and write
8EAB000
stack
page read and write
3394000
unkown
page read and write
7FF5DF60D000
unkown
page readonly
7F280000
direct allocation
page read and write
7FB90000
direct allocation
page read and write
C048000
unkown
page read and write
9700000
unkown
page read and write
BF98000
unkown
page read and write
935B000
stack
page read and write
7FF5DF62C000
unkown
page readonly
B90000
trusted library allocation
page read and write
336F000
unkown
page read and write
7FF5DF038000
unkown
page readonly
7FF5DF45A000
unkown
page readonly
2A20000
heap
page read and write
83D0000
unkown
page read and write
A769000
unkown
page read and write
7FF5DF0A5000
unkown
page readonly
7FF5DE9CB000
unkown
page readonly
A08D000
unkown
page read and write
A75A000
unkown
page read and write
47F1000
unkown
page read and write
1D9A4000
heap
page read and write
20FDA000
direct allocation
page read and write
73A7000
unkown
page read and write
5095000
heap
page read and write
28D3000
heap
page read and write
1D9A4000
heap
page read and write
970C000
unkown
page read and write
1EBEB9FC000
heap
page read and write
C1CC000
unkown
page read and write
AEF0000
unkown
page read and write
4DEB000
stack
page read and write
B1C0000
unkown
page readonly
9F63000
unkown
page read and write
B45A000
stack
page read and write
1DAD4000
heap
page read and write
3304000
unkown
page read and write
4CF0000
trusted library allocation
page read and write
3375000
unkown
page read and write
7FF5DE9C3000
unkown
page readonly
335B000
unkown
page read and write
7FF5DF349000
unkown
page readonly
7FF5DF551000
unkown
page readonly
7FF5DF2F3000
unkown
page readonly
1EBEB81D000
heap
page read and write
8910000
unkown
page read and write
7FF5DEFE8000
unkown
page readonly
BFAD000
unkown
page read and write
7FF5DF18E000
unkown
page readonly
7F460000
direct allocation
page read and write
7D89000
stack
page read and write
21548000
heap
page read and write
7FF5DF45A000
unkown
page readonly
7FF5DF435000
unkown
page readonly
1EBEB818000
heap
page read and write
479B000
unkown
page read and write
2CB6000
heap
page read and write
C192000
unkown
page read and write
2D60000
unkown
page read and write
4C50000
trusted library allocation
page execute and read and write
DF8000
heap
page read and write
73B8000
unkown
page read and write
9718000
unkown
page read and write
7840000
unkown
page read and write
7800000
unkown
page read and write
BF8C000
unkown
page read and write
1DF14000
heap
page read and write
E0F000
heap
page read and write
73C3000
unkown
page read and write
BF40000
unkown
page read and write
32B0000
unkown
page read and write
21580000
heap
page read and write
A754000
unkown
page read and write
73CD000
unkown
page read and write
D5E000
unkown
page readonly
FF1000
unkown
page readonly
7FF5DF5F6000
unkown
page readonly
7FF5DF488000
unkown
page readonly
7230000
unkown
page read and write
4EB9000
heap
page read and write
9C000
stack
page read and write
7395000
unkown
page read and write
7FF5DF26F000
unkown
page readonly
B90000
trusted library allocation
page read and write
7FF5DF156000
unkown
page readonly
C381000
unkown
page read and write
21540000
heap
page read and write
A0FC000
unkown
page read and write
ADC0000
unkown
page readonly
7D90000
unkown
page read and write
476000
unkown
page read and write
C427000
unkown
page read and write
C18A000
unkown
page read and write
C453000
unkown
page read and write
508A000
heap
page read and write
83D0000
unkown
page read and write
BF84000
unkown
page read and write
C70000
heap
page read and write
7FE0F000
direct allocation
page read and write
1D9B1000
heap
page read and write
50AB000
heap
page read and write
1190000
heap
page read and write
A02D000
unkown
page read and write
8680000
unkown
page read and write
C18A000
unkown
page read and write
E5E000
heap
page read and write
1EBED1A0000
heap
page read and write
9700000
unkown
page read and write
2CAA000
heap
page read and write
4EE6000
heap
page read and write
7FF5DF36A000
unkown
page readonly
1DCF1000
heap
page read and write
2E30000
unkown
page read and write
4828000
unkown
page read and write
4860000
unkown
page read and write
1DADA000
heap
page read and write
C21000
direct allocation
page read and write
7FF5DF341000
unkown
page readonly
7FF5DF388000
unkown
page readonly
6E0000
heap
page read and write
2CB0000
heap
page read and write
2154D000
heap
page read and write
EB40000
unkown
page read and write
7FF5DF380000
unkown
page readonly
E12D000
stack
page read and write
9605000
unkown
page read and write
50ED000
direct allocation
page execute and read and write
C355000
unkown
page read and write
4FBE000
direct allocation
page execute and read and write
29E0000
heap
page read and write
3382000
unkown
page read and write
C3FA000
unkown
page read and write
BF9F000
unkown
page read and write
4750000
unkown
page read and write
C24C000
unkown
page read and write
978C000
unkown
page read and write
BF82000
unkown
page read and write
5078000
heap
page read and write
C048000
unkown
page read and write
C4D9000
unkown
page read and write
C39F000
unkown
page read and write
7FF5DF0A2000
unkown
page readonly
C1A9000
unkown
page read and write
3382000
unkown
page read and write
A0FC000
unkown
page read and write
7FF5DF3E4000
unkown
page readonly
BF9D000
unkown
page read and write
7F3AF000
direct allocation
page read and write
3362000
unkown
page read and write
A754000
unkown
page read and write
7FF5DEFDD000
unkown
page readonly
8DBF000
system
page execute and read and write
B90000
trusted library allocation
page read and write
7FF5DF195000
unkown
page readonly
3038000
heap
page read and write
B90000
trusted library allocation
page read and write
FD46000
unkown
page read and write
8EC000
stack
page read and write
C18A000
unkown
page read and write
215D7000
heap
page read and write
97B2000
unkown
page read and write
7FF5DF582000
unkown
page readonly
7FF5DF248000
unkown
page readonly
C298000
unkown
page read and write
7FF5DF537000
unkown
page readonly
7FF5DF52D000
unkown
page readonly
1D9A4000
heap
page read and write
1D9A4000
heap
page read and write
20EB0000
direct allocation
page read and write
838B000
stack
page read and write
98AD000
unkown
page read and write
4766000
unkown
page read and write
7FE4F000
direct allocation
page read and write
C4C5000
unkown
page read and write
1DCBF000
stack
page read and write
4E7000
unkown
page readonly
7499000
unkown
page read and write
B90000
trusted library allocation
page read and write
20F49000
direct allocation
page read and write
7FF5DF0A2000
unkown
page readonly
B9F0000
unkown
page read and write
A770000
unkown
page read and write
1DADF000
heap
page read and write
7FF5DE535000
unkown
page readonly
23B0000
heap
page read and write
B84000
heap
page read and write
BFC3000
unkown
page read and write
A08A000
unkown
page read and write
CC0000
heap
page read and write
EB40000
unkown
page read and write
9716000
unkown
page read and write
973C000
unkown
page read and write
C3A0000
unkown
page read and write
7FF5DF478000
unkown
page readonly
C1CC000
unkown
page read and write
7FF5DF3BE000
unkown
page readonly
7F050000
direct allocation
page read and write
BF8C000
unkown
page read and write
1DAC0000
heap
page read and write
7FF5DF169000
unkown
page readonly
7FC96000
direct allocation
page read and write
9F74000
unkown
page read and write
971C000
unkown
page read and write
98A7000
unkown
page read and write
7FF5DF396000
unkown
page readonly
BFB3000
unkown
page read and write
7FF5DEFFC000
unkown
page readonly
7FF5DF017000
unkown
page readonly
98A7000
unkown
page read and write
3037000
heap
page read and write
7FF5DF25E000
unkown
page readonly
1D9A4000
heap
page read and write
67E000
stack
page read and write
B90000
trusted library allocation
page read and write
20FD3000
direct allocation
page read and write
1EBEB7F7000
heap
page read and write
536F000
unclassified section
page read and write
19B000
stack
page read and write
A6F1000
unkown
page read and write
7FC80000
direct allocation
page read and write
7FF5DF396000
unkown
page readonly
C0C000
direct allocation
page read and write
B09E000
stack
page read and write
B60A000
stack
page read and write
531E000
stack
page read and write
C04000
direct allocation
page read and write
7DF4E67A1000
unkown
page execute read
4760000
unkown
page read and write
9F7C000
unkown
page read and write
7FF5DF571000
unkown
page readonly
8FE000
heap
page read and write
7FF5DEE43000
unkown
page readonly
4ECB000
heap
page read and write
2D4E000
stack
page read and write
AD2B000
stack
page read and write
336C000
unkown
page read and write
7860000
unkown
page read and write
7FF5DF095000
unkown
page readonly
97C0000
unkown
page read and write
7FF5DF12A000
unkown
page readonly
7FF5DF3D4000
unkown
page readonly
7FF5DF4C6000
unkown
page readonly
AD2B000
stack
page read and write
848E000
stack
page read and write
BFD000
direct allocation
page read and write
2CB6000
heap
page read and write
B90000
trusted library allocation
page read and write
B84000
heap
page read and write
B9BF000
stack
page read and write
7FF5DF45C000
unkown
page readonly
C1CC000
unkown
page read and write
7502000
unkown
page read and write
7FF5DF5AE000
unkown
page readonly
7FF5DEE5A000
unkown
page readonly
C2E4000
unkown
page read and write
7FF5DF21C000
unkown
page readonly
946000
heap
page read and write
B3D000
stack
page read and write
4824000
unkown
page read and write
7A40000
unkown
page readonly
2C90000
heap
page read and write
7FF5DEF06000
unkown
page readonly
1EBEB853000
heap
page read and write
9F78000
unkown
page read and write
7FF5DEFBD000
unkown
page readonly
A106000
unkown
page read and write
2D1F000
stack
page read and write
9E0000
unkown
page readonly
19B000
stack
page read and write
D10000
unkown
page readonly
7FF5DF0F6000
unkown
page readonly
B80000
heap
page read and write
7991000
unkown
page read and write
C76000
heap
page read and write
7FF5DF3F7000
unkown
page readonly
1F0000
heap
page read and write
7399000
unkown
page read and write
320B000
stack
page read and write
A770000
unkown
page read and write
4CF0000
trusted library allocation
page read and write
215A4000
heap
page read and write
96F5000
unkown
page read and write
EB60000
unkown
page read and write
2A00000
heap
page read and write
73B6000
unkown
page read and write
B589000
stack
page read and write
7FF5DF5FC000
unkown
page readonly
A104000
unkown
page read and write
C13000
direct allocation
page read and write
7860000
unkown
page read and write
7FF5DF606000
unkown
page readonly
7FF5DF5D6000
unkown
page readonly
9489000
stack
page read and write
FD03000
unkown
page read and write
BFAD000
unkown
page read and write
BD2000
direct allocation
page read and write
BEF0000
heap
page read and write
77F0000
unkown
page read and write
7FF5DEFBD000
unkown
page readonly
7FF5DF452000
unkown
page readonly
1D9A4000
heap
page read and write
2A10000
heap
page read and write
7FF5DF5A3000
unkown
page readonly
31D0000
direct allocation
page readonly
73B6000
unkown
page read and write
7DF4E6760000
unkown
page readonly
2102C000
stack
page read and write
1E323000
unclassified section
page execute and read and write
7FF5DF42F000
unkown
page readonly
1DADF000
heap
page read and write
5200000
heap
page read and write
5197000
unkown
page read and write
7FF5DF48B000
unkown
page readonly
7910000
unkown
page readonly
7380000
unkown
page read and write
BA0000
heap
page read and write
EB8A000
unkown
page read and write
4D6E000
stack
page read and write
7FF5DF3DF000
unkown
page readonly
7FF5DF4BD000
unkown
page readonly
7FF5DF310000
unkown
page readonly
962B000
unkown
page read and write
BFA3000
unkown
page read and write
7FF5DF0D2000
unkown
page readonly
9F27000
unkown
page read and write
216D8000
direct allocation
page read and write
7FF5DF539000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
1E1F1000
direct allocation
page execute and read and write
838B000
stack
page read and write
A0A7000
unkown
page read and write
3349000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
9E9E000
stack
page read and write
29E7000
heap
page read and write
1D9A4000
heap
page read and write
1DCC0000
trusted library allocation
page execute and read and write
1EBEB740000
heap
page read and write
C34E000
unkown
page read and write
7FF5DEF90000
unkown
page readonly
7FF5DEFF5000
unkown
page readonly
27D0000
unkown
page read and write
7FF5DF626000
unkown
page readonly
2A0D000
heap
page read and write
7FF5DF081000
unkown
page readonly
7FF5DF62C000
unkown
page readonly
96F1000
unkown
page read and write
5110000
unkown
page write copy
7FF5DEFAC000
unkown
page readonly
BFB3000
unkown
page read and write
7FF5DF5BE000
unkown
page readonly
7FF5DF5CC000
unkown
page readonly
7FF5DEF84000
unkown
page readonly
1DADE000
heap
page read and write
3362000
unkown
page read and write
9714000
unkown
page read and write
7FF5DF5B0000
unkown
page readonly
C39F000
unkown
page read and write
4E0B000
heap
page read and write
8C29000
stack
page read and write
3290000
unkown
page readonly
34C0000
unkown
page read and write
2ACE000
stack
page read and write
C4E5000
unkown
page read and write
7FF5DF58A000
unkown
page readonly
C34E000
unkown
page read and write
1EBEB760000
heap
page read and write
C319000
unkown
page read and write
BD7F000
stack
page read and write
C4D9000
unkown
page read and write
A0B1000
unkown
page read and write
D5A000
unkown
page readonly
2CB0000
heap
page read and write
C3F9000
unkown
page read and write
4760000
unkown
page read and write
74F1000
unkown
page read and write
7FF5DF5FC000
unkown
page readonly
BFDF000
unkown
page read and write
3364000
unkown
page read and write
7FF5DEFE2000
unkown
page readonly
50AC000
heap
page read and write
7FF5DF39C000
unkown
page readonly
473000
unkown
page read and write
47F3000
unkown
page read and write
1DEC0000
unclassified section
page execute and read and write
52C3000
unkown
page read and write
7FF5DF207000
unkown
page readonly
7FF5DEE56000
unkown
page readonly
7FF5DEF84000
unkown
page readonly
4855000
unkown
page read and write
D11000
unkown
page execute read
7FF5DF343000
unkown
page readonly
800000
direct allocation
page execute and read and write
BF98000
unkown
page read and write
B2DD000
stack
page read and write
7399000
unkown
page read and write
7DF4E6770000
unkown
page readonly
D60000
heap
page read and write
1DE2F000
stack
page read and write
B90000
trusted library allocation
page read and write
874C000
stack
page read and write
BA76000
stack
page read and write
25F0000
heap
page read and write
B84000
heap
page read and write
296F000
stack
page read and write
2D90000
heap
page read and write
7B4B000
stack
page read and write
9F3E000
unkown
page read and write
7940000
unkown
page readonly
7FF5DF435000
unkown
page readonly
A0A5000
unkown
page read and write
73BC000
unkown
page read and write
7FF5DEFC2000
unkown
page readonly
4C79000
stack
page read and write
7FF5DF47E000
unkown
page readonly
C425000
unkown
page read and write
7FC30000
direct allocation
page read and write
1EBEDE23000
heap
page read and write
4ECD000
heap
page read and write
7B4B000
stack
page read and write
B90000
trusted library allocation
page read and write
47EC000
unkown
page read and write
7FF5DF12A000
unkown
page readonly
1E0BE000
direct allocation
page execute and read and write
C159000
unkown
page read and write
B830000
unkown
page readonly
7FDC0000
direct allocation
page read and write
7F2C0000
direct allocation
page read and write
7FF5DF1EC000
unkown
page readonly
7A40000
unkown
page readonly
9380000
unkown
page readonly
7FF5DF211000
unkown
page readonly
9F2A000
unkown
page read and write
C319000
unkown
page read and write
5770000
trusted library allocation
page read and write
1DADA000
heap
page read and write
C187000
unkown
page read and write
2A10000
heap
page read and write
C1C4000
unkown
page read and write
74A9000
unkown
page read and write
7FF5DF5A3000
unkown
page readonly
7FF5DF443000
unkown
page readonly
7FF5DF029000
unkown
page readonly
4EB0000
heap
page read and write
1195000
heap
page read and write
7FF5DF41B000
unkown
page readonly
E00000
heap
page read and write
1D9A4000
heap
page read and write
A704000
unkown
page read and write
1EBEB80B000
heap
page read and write
C19D000
unkown
page read and write
BFA5000
unkown
page read and write
AEF0000
unkown
page read and write
21640000
trusted library allocation
page read and write
7B50000
unkown
page readonly
B4DB000
stack
page read and write
EB7D000
unkown
page read and write
7FF5DF4A6000
unkown
page readonly
9FA0000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
7830000
unkown
page read and write
7FF5DF623000
unkown
page readonly
7FF5DEE52000
unkown
page readonly
E0AD000
stack
page read and write
A3D000
stack
page read and write
C048000
unkown
page read and write
7FF5DF0F6000
unkown
page readonly
F48000
stack
page read and write
8CAD000
stack
page read and write
4BB0000
trusted library allocation
page execute and read and write
9E0000
unkown
page readonly
B84000
heap
page read and write
3356000
unkown
page read and write
7FF5DE531000
unkown
page readonly
1BD000
stack
page read and write
7FF5DF3B9000
unkown
page readonly
7FF5DF5FF000
unkown
page readonly
1DEB1000
trusted library allocation
page execute and read and write
2DAE000
stack
page read and write
9C8000
heap
page read and write
1D9B0000
heap
page read and write
73AF000
unkown
page read and write
2C1E000
stack
page read and write
C4D6000
unkown
page read and write
7FF5DF549000
unkown
page readonly
739B000
unkown
page read and write
2CAB000
heap
page read and write
95EE000
stack
page read and write
B81D000
stack
page read and write
B90000
trusted library allocation
page read and write
23FE000
stack
page read and write
47F1000
unkown
page read and write
4DA0000
trusted library allocation
page read and write
7FF5DF42F000
unkown
page readonly
7940000
unkown
page readonly
C51F000
unkown
page read and write
7FF5DF2E5000
unkown
page readonly
25A0000
heap
page read and write
7DF4E6781000
unkown
page execute read
2F10000
unkown
page read and write
AB0D000
stack
page read and write
28D0000
heap
page read and write
9F7C000
unkown
page read and write
8910000
unkown
page read and write
C18A000
unkown
page read and write
7FF5DF01B000
unkown
page readonly
C355000
unkown
page read and write
4CF0000
trusted library allocation
page read and write
A6D2000
unkown
page read and write
901B000
stack
page read and write
99AB000
unkown
page read and write
7FF5DEFF5000
unkown
page readonly
B90000
trusted library allocation
page read and write
C192000
unkown
page read and write
20EF7000
direct allocation
page read and write
C4C5000
unkown
page read and write
7FF5DEFCB000
unkown
page readonly
30D0000
heap
page read and write
21620000
heap
page read and write
73CD000
unkown
page read and write
7FF5DF122000
unkown
page readonly
A6EE000
unkown
page read and write
1DEA0000
trusted library allocation
page execute and read and write
A77A000
unkown
page read and write
73A3000
unkown
page read and write
1D9A4000
heap
page read and write
9FA0000
unkown
page read and write
11A0000
unkown
page readonly
5241000
unkown
page read and write
B1C0000
unkown
page readonly
535F000
stack
page read and write
7FF5DF3DF000
unkown
page readonly
A769000
unkown
page read and write
4F49000
direct allocation
page execute and read and write
3185000
stack
page read and write
7FF5DF425000
unkown
page readonly
8D3000
heap
page read and write
7FF5DF567000
unkown
page readonly
1E049000
direct allocation
page execute and read and write
B500000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
874C000
stack
page read and write
4DE9000
stack
page read and write
EB84000
unkown
page read and write
215D3000
heap
page read and write
52C3000
unkown
page read and write
7910000
unkown
page readonly
4855000
unkown
page read and write
2EB0000
unkown
page readonly
7499000
unkown
page read and write
3185000
stack
page read and write
ACAE000
stack
page read and write
ADAD000
unkown
page read and write
7FF5DF3B5000
unkown
page readonly
1DAD6000
heap
page read and write
7FDC0000
direct allocation
page read and write
7FF5DEFAF000
unkown
page readonly
4EEC000
heap
page read and write
9F51000
unkown
page read and write
48B0000
unkown
page read and write
34C0000
unkown
page read and write
830F000
stack
page read and write
C24C000
unkown
page read and write
7FF5DF3BE000
unkown
page readonly
50F1000
direct allocation
page execute and read and write
7FF5DF478000
unkown
page readonly
2290000
heap
page read and write
7FF5DF09B000
unkown
page readonly
7FF5DF5B5000
unkown
page readonly
BCE000
stack
page read and write
B84000
heap
page read and write
1DEA3000
heap
page read and write
20FB6000
direct allocation
page read and write
7FF5DEFB7000
unkown
page readonly
8DAA000
system
page execute and read and write
336C000
unkown
page read and write
7FF5DE9CB000
unkown
page readonly
7FF5DF06F000
unkown
page readonly
7FF5DF4E3000
unkown
page readonly
7FF5DEEEB000
unkown
page readonly
C01A000
unkown
page read and write
2180F000
heap
page read and write
A6F4000
unkown
page read and write
B90000
trusted library allocation
page read and write
416000
unkown
page readonly
7FF5DF3F1000
unkown
page readonly
7FF5DF47E000
unkown
page readonly
ACAE000
stack
page read and write
C23D000
unkown
page read and write
7FF5DF0C3000
unkown
page readonly
99AB000
unkown
page read and write
1190000
heap
page read and write
5060000
heap
page read and write
1EBEB838000
heap
page read and write
B84000
heap
page read and write
63E000
stack
page read and write
7FF5DF4E7000
unkown
page readonly
7991000
unkown
page read and write
7FF5DF567000
unkown
page readonly
7FF5DF366000
unkown
page readonly
C013000
unkown
page read and write
C1CC000
unkown
page read and write
7FF5DF382000
unkown
page readonly
C4E2000
unkown
page read and write
914B000
stack
page read and write
BE0000
direct allocation
page read and write
7FF5DF486000
unkown
page readonly
7F480000
direct allocation
page read and write
13A1000
unkown
page readonly
7FF5DF3B5000
unkown
page readonly
7DF4E6771000
unkown
page execute read
7FF5DF1CD000
unkown
page readonly
73AF000
unkown
page read and write
7FF5DF57F000
unkown
page readonly
7D0D000
stack
page read and write
960000
heap
page read and write
971C000
unkown
page read and write
A6F9000
unkown
page read and write
EB84000
unkown
page read and write
96DF000
unkown
page read and write
2F10000
unkown
page read and write
7FF5DF211000
unkown
page readonly
C75000
stack
page read and write
7FF5DF045000
unkown
page readonly
1EBEB9F5000
heap
page read and write
A0F7000
unkown
page read and write
7FF5DF3FC000
unkown
page readonly
7FF5DF3E4000
unkown
page readonly
C4D9000
unkown
page read and write
7FF5DEE43000
unkown
page readonly
473000
unkown
page write copy
7FB90000
direct allocation
page read and write
C1A000
direct allocation
page read and write
7A01000
unkown
page read and write
C4F9000
unkown
page read and write
989F000
unkown
page read and write
95F0000
unkown
page read and write
7FF5DF229000
unkown
page readonly
4FEF000
stack
page read and write
335B000
unkown
page read and write
7FF5DF577000
unkown
page readonly
4BB0000
trusted library allocation
page read and write
2E50000
unkown
page readonly
2178E000
heap
page read and write
5162000
direct allocation
page execute and read and write
7FF5DF0C9000
unkown
page readonly
9F60000
unkown
page read and write
7FF5DF4D5000
unkown
page readonly
1EBEB807000
heap
page read and write
51AE000
stack
page read and write
3281000
stack
page read and write
CBE000
stack
page read and write
A760000
unkown
page read and write
8590000
unkown
page readonly
C24C000
unkown
page read and write
BCFE000
stack
page read and write
B500000
unkown
page readonly
D99000
heap
page read and write
7FF5DF09B000
unkown
page readonly
7DF4E6780000
unkown
page readonly
5050000
heap
page read and write
9605000
unkown
page read and write
4ED5000
heap
page read and write
401000
unkown
page execute read
790A000
stack
page read and write
1D940000
heap
page read and write
34B0000
unkown
page readonly
A769000
unkown
page read and write
BF90000
unkown
page read and write
830F000
stack
page read and write
7FF5DEE56000
unkown
page readonly
C1C4000
unkown
page read and write
7FF5DF52D000
unkown
page readonly
1DF20000
direct allocation
page execute and read and write
B90000
trusted library allocation
page read and write
C355000
unkown
page read and write
1D9A4000
heap
page read and write
7FF5DF532000
unkown
page readonly
7FF5DF23B000
unkown
page readonly
FE0000
unkown
page read and write
2A11000
heap
page read and write
7FF5DF081000
unkown
page readonly
C2E4000
unkown
page read and write
7FF5DF310000
unkown
page readonly
C298000
unkown
page read and write
B90000
trusted library allocation
page read and write
885E000
stack
page read and write
7FF5DF425000
unkown
page readonly
9B1D000
stack
page read and write
4DA0000
trusted library allocation
page read and write
AFFC000
stack
page read and write
BFA1000
unkown
page read and write
7FF5DF045000
unkown
page readonly
769B37F000
stack
page read and write
7FF5DF08F000
unkown
page readonly
7930000
unkown
page readonly
7FF5DF1D1000
unkown
page readonly
B90000
trusted library allocation
page read and write
9718000
unkown
page read and write
9D1F000
stack
page read and write
21150000
remote allocation
page read and write
7FF5DF203000
unkown
page readonly
C4E5000
unkown
page read and write
A754000
unkown
page read and write
7FF5DF4EC000
unkown
page readonly
7FF5DF50F000
unkown
page readonly
7FF5DF16B000
unkown
page readonly
51EF000
stack
page read and write
B45A000
stack
page read and write
7FF5DEFF0000
unkown
page readonly
EC70000
heap
page read and write
7DF4E6760000
unkown
page readonly
AC0D000
stack
page read and write
4F4D000
direct allocation
page execute and read and write
98AD000
unkown
page read and write
2BCF000
stack
page read and write
4ED5000
heap
page read and write
4766000
unkown
page read and write
9714000
unkown
page read and write
B84000
heap
page read and write
7FF5DF429000
unkown
page readonly
7FF5DF24E000
unkown
page readonly
7FF5DF2CB000
unkown
page readonly
7FF5DF04D000
unkown
page readonly
C319000
unkown
page read and write
96ED000
unkown
page read and write
C35F000
unkown
page read and write
A6EA000
unkown
page read and write
1195000
heap
page read and write
2C0E000
stack
page read and write
7FF5DF5BE000
unkown
page readonly
2870000
unkown
page read and write
2CB0000
heap
page read and write
7F4B8000
direct allocation
page read and write
1EBED2D3000
heap
page read and write
C39F000
unkown
page read and write
2D60000
unkown
page read and write
7A30000
unkown
page read and write
7FF5DEE52000
unkown
page readonly
973C000
unkown
page read and write
B90000
trusted library allocation
page read and write
79E0000
unkown
page readonly
901B000
stack
page read and write
8590000
unkown
page readonly
7380000
unkown
page read and write
9E9E000
stack
page read and write
9D9F000
stack
page read and write
2F99000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
4AB1000
heap
page read and write
7230000
unkown
page read and write
74A9000
unkown
page read and write
50AC000
heap
page read and write
4D5F000
stack
page read and write
C02F000
unkown
page read and write
A6EE000
unkown
page read and write
7FF5DF443000
unkown
page readonly
C4E5000
unkown
page read and write
7B60000
unkown
page readonly
4AB0000
heap
page read and write
9729000
unkown
page read and write
7FF5DF3C6000
unkown
page readonly
9F78000
unkown
page read and write
D50000
unkown
page read and write
1D9A4000
heap
page read and write
20FC4000
direct allocation
page read and write
4860000
unkown
page read and write
9562000
unkown
page read and write
4DA0000
trusted library allocation
page read and write
74D6000
unkown
page read and write
30C0000
heap
page read and write
88E0000
unkown
page read and write
2A10000
heap
page read and write
7FF5C0B65000
unkown
page readonly
7FF5DEFAC000
unkown
page readonly
C35C000
unkown
page read and write
50A7000
heap
page read and write
C474000
unkown
page read and write
C319000
unkown
page read and write
7C89000
stack
page read and write
C39F000
unkown
page read and write
1DD2E000
stack
page read and write
970000
unkown
page readonly
7FF5DF221000
unkown
page readonly
BF7E000
unkown
page read and write
7FF5DE539000
unkown
page readonly
C298000
unkown
page read and write
23AE000
unkown
page read and write
7FF5DF08B000
unkown
page readonly
7FF5DF54D000
unkown
page readonly
7FF5DF222000
unkown
page readonly
1DAE5000
heap
page read and write
50A6000
heap
page read and write
30B3000
heap
page read and write
7FF5DF48B000
unkown
page readonly
9B1E000
stack
page read and write
B90000
trusted library allocation
page read and write
C3C4000
unkown
page read and write
3375000
unkown
page read and write
73B2000
unkown
page read and write
AE6F000
stack
page read and write
99AB000
unkown
page read and write
20FA0000
direct allocation
page read and write
9B000
stack
page read and write
E70000
unkown
page readonly
EB72000
unkown
page read and write
7FF5DF089000
unkown
page readonly
A6F1000
unkown
page read and write
50AB000
heap
page read and write
C4D6000
unkown
page read and write
C3C8000
unkown
page read and write
C19D000
unkown
page read and write
B90000
trusted library allocation
page read and write
AFFC000
stack
page read and write
2EB0000
unkown
page readonly
2DCA000
heap
page read and write
A769000
unkown
page read and write
2129F000
stack
page read and write
20FAF000
direct allocation
page read and write
4D96000
heap
page read and write
7DF4E6761000
unkown
page execute read
A75D000
unkown
page read and write
7FF5DF3C2000
unkown
page readonly
C462000
unkown
page read and write
E1B0000
unkown
page execute and read and write
1EBEB7F0000
heap
page read and write
48A0000
unkown
page read and write
7FF5DF21F000
unkown
page readonly
7DF5E895F000
unkown
page readonly
7FF5DF191000
unkown
page readonly
47B6000
unkown
page read and write
7FF5DF53F000
unkown
page readonly
C425000
unkown
page read and write
215DC000
heap
page read and write
4E20000
direct allocation
page execute and read and write
EB8A000
unkown
page read and write
7FF5DF623000
unkown
page readonly
D5A000
unkown
page readonly
AC0D000
stack
page read and write
34B0000
unkown
page readonly
7FF5DF25B000
unkown
page readonly
7FF5DF392000
unkown
page readonly
7840000
unkown
page read and write
215AF000
heap
page read and write
47D9000
unkown
page read and write
C34E000
unkown
page read and write
7FF5DF3A1000
unkown
page readonly
C071000
unkown
page read and write
479B000
unkown
page read and write
47EC000
unkown
page read and write
A6CF000
unkown
page read and write
7FF5DF275000
unkown
page readonly
7FF5DF54D000
unkown
page readonly
7FF5DF4BD000
unkown
page readonly
7FF5DF20A000
unkown
page readonly
970000
unkown
page readonly
C355000
unkown
page read and write
216BB000
heap
page read and write
212DE000
stack
page read and write
7FF5DF452000
unkown
page readonly
9509000
stack
page read and write
3356000
unkown
page read and write
1DD76000
heap
page read and write
1DADF000
heap
page read and write
2A20000
heap
page read and write
7ACE000
stack
page read and write
5F0000
heap
page read and write
401000
unkown
page execute read
8400000
heap
page read and write
C60000
heap
page read and write
7ACE000
stack
page read and write
8680000
unkown
page read and write
32B0000
unkown
page read and write
E1AC000
stack
page read and write
7FF5DF25B000
unkown
page readonly
A072000
unkown
page read and write
C23D000
unkown
page read and write
7FF5DEFAF000
unkown
page readonly
D3E000
unkown
page write copy
9E1E000
stack
page read and write
48A0000
unkown
page read and write
213DE000
stack
page read and write
7FF5DF4AB000
unkown
page readonly
7FF5DF0CC000
unkown
page readonly
20FE1000
direct allocation
page read and write
7FF5DF4E3000
unkown
page readonly
BFA3000
unkown
page read and write
8A36000
unkown
page read and write
A76E000
unkown
page read and write
7A30000
unkown
page read and write
7FF5DF507000
unkown
page readonly
2890000
unkown
page readonly
B84000
heap
page read and write
7FF5DF2FE000
unkown
page readonly
7DF4E6791000
unkown
page execute read
2DC0000
heap
page read and write
7FF5DEFB7000
unkown
page readonly
2C98000
heap
page read and write
A690000
unkown
page read and write
B90000
trusted library allocation
page read and write
7FF5DF519000
unkown
page readonly
A6EA000
unkown
page read and write
76F0000
unkown
page read and write
1DADB000
heap
page read and write
C1A9000
unkown
page read and write
FD03000
unkown
page read and write
7FF5DF284000
unkown
page readonly
9F27000
unkown
page read and write
909F000
stack
page read and write
48E0000
unkown
page read and write
2147F000
heap
page read and write
B259000
stack
page read and write
1DADF000
heap
page read and write
7FF5DF21B000
unkown
page readonly
7FF5DF2ED000
unkown
page readonly
7DF5E896A000
unkown
page readonly
C1C4000
unkown
page read and write
C36C000
unkown
page read and write
7FF5DF5D6000
unkown
page readonly
7FF5DF26F000
unkown
page readonly
C159000
unkown
page read and write
7FF5DF488000
unkown
page readonly
B9F0000
unkown
page read and write
7FF5DF3A1000
unkown
page readonly
C2E4000
unkown
page read and write
7FF5DF1FD000
unkown
page readonly
3257000
direct allocation
page execute and read and write
B60A000
stack
page read and write
E00000
heap
page read and write
C19D000
unkown
page read and write
7FF5DF3F7000
unkown
page readonly
C23D000
unkown
page read and write
9562000
unkown
page read and write
2112B000
stack
page read and write
7FF5DF398000
unkown
page readonly
BFEF000
unkown
page read and write
E03F000
stack
page read and write
C525000
unkown
page read and write
77F0000
unkown
page read and write
8D98000
system
page execute and read and write
7D90000
unkown
page read and write
73BA000
unkown
page read and write
B120000
unkown
page readonly
7FF5DF4EC000
unkown
page readonly
EB71000
unkown
page read and write
7FF5DF458000
unkown
page readonly
7FF5DF195000
unkown
page readonly
83E0000
unkown
page read and write
4C3D000
stack
page read and write
7FF5DF5B3000
unkown
page readonly
EC72000
heap
page read and write
8F2C000
stack
page read and write
4C61000
trusted library allocation
page execute and read and write
1EBEB660000
heap
page read and write
9F60000
unkown
page read and write
7F4D0000
direct allocation
page read and write
D5E000
unkown
page readonly
7D89000
stack
page read and write
BFA7000
unkown
page read and write
98AD000
unkown
page read and write
5670000
direct allocation
page read and write
7FF5DF59E000
unkown
page readonly
2D1E000
stack
page read and write
A0B1000
unkown
page read and write
2780000
heap
page read and write
7FF5DF4F7000
unkown
page readonly
7FF5DF4E7000
unkown
page readonly
2E30000
unkown
page read and write
B84000
heap
page read and write
7FF5DEFF0000
unkown
page readonly
A098000
unkown
page read and write
7FF5DF364000
unkown
page readonly
DF9000
heap
page read and write
7FF5DF0C9000
unkown
page readonly
FD46000
unkown
page read and write
215A0000
heap
page read and write
7FF5DF5B0000
unkown
page readonly
B90000
trusted library allocation
page read and write
7FF5DF591000
unkown
page readonly
7FF5DF4FB000
unkown
page readonly
7FCA0000
direct allocation
page read and write
EB7D000
unkown
page read and write
C003000
unkown
page read and write
7FF5DF341000
unkown
page readonly
7FF5DEFA6000
unkown
page readonly
7FF5DF091000
unkown
page readonly
C50E000
unkown
page read and write
BFC3000
unkown
page read and write
27D0000
unkown
page read and write
7FF5DEF4B000
unkown
page readonly
B120000
unkown
page readonly
5197000
unkown
page read and write
1D9A4000
heap
page read and write
C3AF000
unkown
page read and write
E00000
heap
page read and write
2770000
heap
page read and write
C75000
stack
page read and write
EC72000
heap
page read and write
7800000
unkown
page read and write
2C9A000
stack
page read and write
C298000
unkown
page read and write
4EAE000
stack
page read and write
9704000
unkown
page read and write
A08D000
unkown
page read and write
2FBF000
stack
page read and write
7DF5E896A000
unkown
page readonly
B84000
heap
page read and write
7FF5DE535000
unkown
page readonly
7FF5DF398000
unkown
page readonly
B90000
trusted library allocation
page read and write
987C000
unkown
page read and write
B9BF000
stack
page read and write
2112F000
stack
page read and write
C24C000
unkown
page read and write
7FF5DEFA6000
unkown
page readonly
7FF5DF584000
unkown
page readonly
20F26000
direct allocation
page read and write
B84000
heap
page read and write
7FF5DF0F1000
unkown
page readonly
E0F000
heap
page read and write
7FF5DEEEB000
unkown
page readonly
7FF5DF2DA000
unkown
page readonly
9F10000
unkown
page read and write
7FF5DE5CC000
unkown
page readonly
C427000
unkown
page read and write
7B50000
unkown
page readonly
7FF5DF591000
unkown
page readonly
2E50000
unkown
page readonly
73E5000
unkown
page read and write
BA76000
stack
page read and write
7FF5DF06F000
unkown
page readonly
E80000
unkown
page read and write
1E362000
unclassified section
page execute and read and write
EC7A000
heap
page read and write
7FF5DF3EA000
unkown
page readonly
D50000
unkown
page read and write
BD000
stack
page read and write
1DADA000
heap
page read and write
4DA0000
trusted library allocation
page read and write
4BC1000
trusted library allocation
page execute and read and write
C1C4000
unkown
page read and write
400000
unkown
page readonly
2D1E000
stack
page read and write
9FC3000
unkown
page read and write
739B000
unkown
page read and write
7FF5DF5FF000
unkown
page readonly
7FF5DEF90000
unkown
page readonly
8D9A000
system
page execute and read and write
FD84000
unkown
page read and write
7810000
unkown
page read and write
5110000
unkown
page write copy
1DACE000
heap
page read and write
7FE18000
direct allocation
page read and write
7FF5DF08B000
unkown
page readonly
BFAF000
unkown
page read and write
7FF5DF2BA000
unkown
page readonly
1E1ED000
direct allocation
page execute and read and write
52D9000
unkown
page read and write
7FF5DF07D000
unkown
page readonly
7FF5DF577000
unkown
page readonly
BF9F000
unkown
page read and write
7DF4E6781000
unkown
page execute read
3034000
heap
page read and write
C34E000
unkown
page read and write
2E23000
unkown
page read and write
C159000
unkown
page read and write
7FF5DF2E2000
unkown
page readonly
7FF5DF2F3000
unkown
page readonly
9F92000
unkown
page read and write
7FF5DF0F1000
unkown
page readonly
9C9B000
stack
page read and write
9FC3000
unkown
page read and write
73E5000
unkown
page read and write
7FE00000
direct allocation
page read and write
B70000
heap
page read and write
96DF000
unkown
page read and write
7DF4E6780000
unkown
page readonly
7FE2F000
direct allocation
page read and write
9D1F000
stack
page read and write
7FF5DF551000
unkown
page readonly
7FF5DF55A000
unkown
page readonly
FD84000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
AE6F000
stack
page read and write
7FF5DF5AE000
unkown
page readonly
98A7000
unkown
page read and write
BCFF000
stack
page read and write
277C000
heap
page read and write
EB84000
unkown
page read and write
7FF5DF3EA000
unkown
page readonly
7FF5DF091000
unkown
page readonly
C456000
unkown
page read and write
303B000
heap
page read and write
7FF5DF4AB000
unkown
page readonly
EB4C000
unkown
page read and write
6F5000
heap
page read and write
7FF5DEF57000
unkown
page readonly
977000
heap
page read and write
C4A6000
unkown
page read and write
B90000
trusted library allocation
page read and write
3281000
stack
page read and write
9489000
stack
page read and write
1EBEDE20000
heap
page read and write
7FF5DF349000
unkown
page readonly
A775000
unkown
page read and write
7FF5DF5E9000
unkown
page readonly
7FF5DF1D1000
unkown
page readonly
73A3000
unkown
page read and write
97F3000
unkown
page read and write
73A7000
unkown
page read and write
E1AC000
stack
page read and write
7FF5DF126000
unkown
page readonly
F80000
unkown
page read and write
7FF5DF095000
unkown
page readonly
20FE8000
direct allocation
page read and write
7FF5DF486000
unkown
page readonly
334B000
direct allocation
page execute and read and write
6C0000
heap
page read and write
7FF5DF20A000
unkown
page readonly
98A7000
unkown
page read and write
C4E5000
unkown
page read and write
BF6D000
unkown
page read and write
B589000
stack
page read and write
7FF5C0B6B000
unkown
page readonly
7FF5DF191000
unkown
page readonly
7FF5DF366000
unkown
page readonly
9C1D000
stack
page read and write
7FF5C0B6B000
unkown
page readonly
7FF5DEFCB000
unkown
page readonly
98A1000
unkown
page read and write
7FF5DF43C000
unkown
page readonly
7FF5DE5CC000
unkown
page readonly
4EEC000
heap
page read and write
1DE9F000
heap
page read and write
C034000
unkown
page read and write
4EE6000
heap
page read and write
30FF000
stack
page read and write
7FF5DF4C6000
unkown
page readonly
7FF5DF364000
unkown
page readonly
21960000
heap
page read and write
9F51000
unkown
page read and write
1D9A4000
heap
page read and write
7FF5DF01B000
unkown
page readonly
3371000
unkown
page read and write
7FF5DF2BA000
unkown
page readonly
7FF5DF2ED000
unkown
page readonly
20FBD000
direct allocation
page read and write
7FF5DF2DA000
unkown
page readonly
50A6000
heap
page read and write
7C89000
stack
page read and write
73B4000
unkown
page read and write
7FF5DF361000
unkown
page readonly
7870000
unkown
page read and write
4BD7000
heap
page read and write
7FF5DF3FC000
unkown
page readonly
7830000
unkown
page read and write
989F000
unkown
page read and write
989F000
unkown
page read and write
4DAD000
stack
page read and write
7B60000
unkown
page readonly
9C1D000
stack
page read and write
4ED5000
heap
page read and write
4CF0000
trusted library allocation
page read and write
97C0000
unkown
page read and write
C319000
unkown
page read and write
2D0F000
stack
page read and write
74F1000
unkown
page read and write
B84000
heap
page read and write
7395000
unkown
page read and write
5176000
unclassified section
page read and write
C187000
unkown
page read and write
7FF5DEE5A000
unkown
page readonly
7FF5C0B65000
unkown
page readonly
978C000
unkown
page read and write
47F3000
unkown
page read and write
B9E0000
unkown
page read and write
7FF5DF4FB000
unkown
page readonly
C034000
unkown
page read and write
B90000
trusted library allocation
page read and write
7DF4E6791000
unkown
page execute read
4AB1000
heap
page read and write
7FF5DF08F000
unkown
page readonly
FCC4000
unkown
page read and write
8390000
unkown
page read and write
B90000
trusted library allocation
page read and write
1E270000
unclassified section
page execute and read and write
987C000
unkown
page read and write
FF1000
unkown
page readonly
C19D000
unkown
page read and write
27F0000
unkown
page readonly
28A0000
unkown
page readonly
C18A000
unkown
page read and write
7FF5DF3C6000
unkown
page readonly
1EBED2D0000
heap
page read and write
BFAB000
unkown
page read and write
7FF5DEF4B000
unkown
page readonly
9380000
unkown
page readonly
E0F000
heap
page read and write
50A6000
heap
page read and write
7FF5DEF94000
unkown
page readonly
5241000
unkown
page read and write
1D9A4000
heap
page read and write
C4F6000
unkown
page read and write
9A6C000
stack
page read and write
769B27B000
stack
page read and write
95EE000
stack
page read and write
88E0000
unkown
page read and write
7FF5DF23B000
unkown
page readonly
FE06000
system
page read and write
73B4000
unkown
page read and write
7FF5DF038000
unkown
page readonly
7FF5DF392000
unkown
page readonly
7FF5DF4A6000
unkown
page readonly
A6CF000
unkown
page read and write
7FF5DF539000
unkown
page readonly
7FF5DF507000
unkown
page readonly
FCC4000
unkown
page read and write
B94000
direct allocation
page read and write
6F0000
heap
page read and write
9716000
unkown
page read and write
BF6D000
unkown
page read and write
7FF5DF422000
unkown
page readonly
5320000
direct allocation
page read and write
4AB4000
heap
page read and write
2E8E000
stack
page read and write
5095000
heap
page read and write
8400000
heap
page read and write
B90000
trusted library allocation
page read and write
2DA0000
heap
page read and write
A760000
unkown
page read and write
7FF5DF0C3000
unkown
page readonly
3304000
unkown
page read and write
C003000
unkown
page read and write
26FF000
unkown
page read and write
C381000
unkown
page read and write
336F000
unkown
page read and write
9729000
unkown
page read and write
8FA000
heap
page read and write
47D9000
unkown
page read and write
C183000
unkown
page read and write
98A1000
unkown
page read and write
21150000
remote allocation
page read and write
8D30000
system
page execute and read and write
7FD88000
direct allocation
page read and write
4EE6000
heap
page read and write
9F0000
heap
page read and write
B010000
unkown
page read and write
1DCE0000
heap
page read and write
92DB000
stack
page read and write
2A8F000
stack
page read and write
9A6C000
stack
page read and write
1DAD4000
heap
page read and write
7FF5DF156000
unkown
page readonly
A072000
unkown
page read and write
7FF5DF537000
unkown
page readonly
3014000
heap
page read and write
7FF5DF382000
unkown
page readonly
C192000
unkown
page read and write
FFFF000
system
page read and write
7FF5DEFDD000
unkown
page readonly
2CB0000
heap
page read and write
3107000
stack
page read and write
7FF5DF571000
unkown
page readonly
7FF5DF3AA000
unkown
page readonly
B90000
trusted library allocation
page read and write
A769000
unkown
page read and write
7F4CA000
direct allocation
page read and write
C36F000
unkown
page read and write
980000
unkown
page readonly
A104000
unkown
page read and write
2E23000
unkown
page read and write
971A000
unkown
page read and write
7FF5DF549000
unkown
page readonly
A76E000
unkown
page read and write
C1C4000
unkown
page read and write
7FF5DF36A000
unkown
page readonly
1D9A4000
heap
page read and write
7FF5DE531000
unkown
page readonly
73BC000
unkown
page read and write
253D000
stack
page read and write
73BA000
unkown
page read and write
BF0000
system
page execute and read and write
B81B000
stack
page read and write
4C6D000
heap
page read and write
2BDF000
unkown
page read and write
7870000
unkown
page read and write
C1A9000
unkown
page read and write
7FF5DF582000
unkown
page readonly
9F23000
unkown
page read and write
D60000
heap
page read and write
7FF5DF388000
unkown
page readonly
4EE7000
heap
page read and write
7FF5DEF87000
unkown
page readonly
B010000
unkown
page read and write
7FF5DE539000
unkown
page readonly
1D9A0000
heap
page read and write
C23D000
unkown
page read and write
BF9B000
unkown
page read and write
96F1000
unkown
page read and write
2112E000
stack
page execute and read and write
A0A7000
unkown
page read and write
7FF5DF39C000
unkown
page readonly
31D1000
direct allocation
page execute read
1EBEB853000
heap
page read and write
C525000
unkown
page read and write
A106000
unkown
page read and write
2EC0000
unkown
page readonly
B259000
stack
page read and write
9F10000
unkown
page read and write
BFAB000
unkown
page read and write
76F0000
unkown
page read and write
987C000
unkown
page read and write
B4DB000
stack
page read and write
334E000
direct allocation
page execute and read and write
9F92000
unkown
page read and write
4828000
unkown
page read and write
984000
heap
page read and write
7FF5DF3F5000
unkown
page readonly
3290000
unkown
page readonly
7DF4E6770000
unkown
page readonly
298E000
stack
page read and write
7FF5DEFF8000
unkown
page readonly
B84000
heap
page read and write
A690000
unkown
page read and write
3364000
unkown
page read and write
28FD000
stack
page read and write
A0F7000
unkown
page read and write
A769000
unkown
page read and write
98AD000
unkown
page read and write
1E262000
direct allocation
page execute and read and write
C2E4000
unkown
page read and write
7FF5DF519000
unkown
page readonly
7FF5DEF87000
unkown
page readonly
C3B2000
unkown
page read and write
1DCD1000
trusted library allocation
page execute and read and write
9F23000
unkown
page read and write
FD4B000
unkown
page read and write
FDC4000
unkown
page read and write
C187000
unkown
page read and write
8F0000
heap
page read and write
7FF5DF207000
unkown
page readonly
7FF5DF4F3000
unkown
page readonly
7FF5DF229000
unkown
page readonly
215A8000
heap
page read and write
3373000
unkown
page read and write
B359000
stack
page read and write
C19D000
unkown
page read and write
C1CC000
unkown
page read and write
603E000
stack
page read and write
28D3000
heap
page read and write
1DAE5000
heap
page read and write
7FF5DF532000
unkown
page readonly
2250000
heap
page read and write
C354000
unkown
page read and write
2119E000
stack
page read and write
1EBEB80B000
heap
page read and write
C192000
unkown
page read and write
A754000
unkown
page read and write
7FF5DF5B5000
unkown
page readonly
4788000
unkown
page read and write
C030000
unkown
page read and write
9B99000
stack
page read and write
4CF0000
trusted library allocation
page read and write
962B000
unkown
page read and write
7FD30000
direct allocation
page read and write
BF7E000
unkown
page read and write
BEF0000
heap
page read and write
8D0000
heap
page read and write
7FCEF000
direct allocation
page read and write
FDC4000
unkown
page read and write
33C0000
unkown
page readonly
30BF000
stack
page read and write
4824000
unkown
page read and write
EB74000
unkown
page read and write
C187000
unkown
page read and write
2164F000
trusted library allocation
page read and write
C3A3000
unkown
page read and write
1D9A4000
heap
page read and write
7FF5DF3F1000
unkown
page readonly
83B0000
unkown
page readonly
7FF5DF2CB000
unkown
page readonly
E2A2000
unkown
page execute and read and write
3373000
unkown
page read and write
9F2A000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
88DE000
stack
page read and write
7F460000
direct allocation
page read and write
BFA7000
unkown
page read and write
4C7B000
stack
page read and write
C474000
unkown
page read and write
BFEF000
unkown
page read and write
7FF5DF122000
unkown
page readonly
C364000
unkown
page read and write
2CA5000
heap
page read and write
7F340000
direct allocation
page read and write
7FF5DF58A000
unkown
page readonly
7FF5DF18E000
unkown
page readonly
7FF5DF606000
unkown
page readonly
1E04D000
direct allocation
page execute and read and write
7FF5DF248000
unkown
page readonly
B90000
trusted library allocation
page read and write
40D000
unkown
page write copy
7FF5DF57F000
unkown
page readonly
1EBEB80B000
heap
page read and write
A6D2000
unkown
page read and write
D69000
heap
page read and write
7FB00000
direct allocation
page read and write
47A2000
unkown
page read and write
769B2FE000
stack
page read and write
2F9A000
heap
page read and write
B9E0000
unkown
page read and write
9C9B000
stack
page read and write
848E000
stack
page read and write
294F000
stack
page read and write
4DA0000
trusted library allocation
page read and write
8A36000
unkown
page read and write
7FF5DF089000
unkown
page readonly
BF10000
unkown
page readonly
7FF5DF49C000
unkown
page readonly
B84000
heap
page read and write
7FF5DF55A000
unkown
page readonly
D99000
heap
page read and write
7FF5DF422000
unkown
page readonly
1DE60000
trusted library allocation
page read and write
C159000
unkown
page read and write
7FF5DF4F3000
unkown
page readonly
7FF5DF59E000
unkown
page readonly
7F580000
direct allocation
page read and write
EB8A000
unkown
page read and write
5095000
heap
page read and write
8F2B000
stack
page read and write
47B6000
unkown
page read and write
1DADF000
heap
page read and write
7F53E000
direct allocation
page read and write
7FF5DF07D000
unkown
page readonly
4ECA000
heap
page read and write
7FF5DEFF8000
unkown
page readonly
7F9E0000
direct allocation
page read and write
2A20000
heap
page read and write
D3E000
unkown
page read and write
2CB0000
heap
page read and write
BF84000
unkown
page read and write
83B0000
unkown
page readonly
9704000
unkown
page read and write
7FF5DF169000
unkown
page readonly
7FF5DF60D000
unkown
page readonly
21530000
heap
page read and write
29D0000
heap
page read and write
C28000
direct allocation
page read and write
FD4B000
unkown
page read and write
1D9B1000
heap
page read and write
C298000
unkown
page read and write
C23D000
unkown
page read and write
7FF5DF626000
unkown
page readonly
2CAB000
heap
page read and write
7FF5DF5F6000
unkown
page readonly
27F0000
unkown
page readonly
1D9A4000
heap
page read and write
3033000
heap
page read and write
C183000
unkown
page read and write
A704000
unkown
page read and write
1D950000
trusted library allocation
page read and write
7FF5DF5CC000
unkown
page readonly
508B000
heap
page read and write
E80000
unkown
page read and write
7FF5DF3F5000
unkown
page readonly
EB71000
unkown
page read and write
7FF5DF3D4000
unkown
page readonly
8EAB000
stack
page read and write
1D9B1000
heap
page read and write
13A0000
unkown
page readonly
47A2000
unkown
page read and write
7FDC0000
direct allocation
page read and write
9F74000
unkown
page read and write
4AB1000
heap
page read and write
7FF5DF2E5000
unkown
page readonly
7FF5DF5F0000
unkown
page readonly
C034000
unkown
page read and write
D11000
unkown
page execute read
7FF5DF0C1000
unkown
page readonly
C187000
unkown
page read and write
C364000
unkown
page read and write
4750000
unkown
page read and write
20FA8000
direct allocation
page read and write
BFAF000
unkown
page read and write
99AB000
unkown
page read and write
4CF0000
trusted library allocation
page read and write
7FF5DF5F0000
unkown
page readonly
28A0000
unkown
page readonly
1DBCE000
heap
page read and write
B90000
trusted library allocation
page read and write
7FF5DEF94000
unkown
page readonly
97F3000
unkown
page read and write
73C3000
unkown
page read and write
4CD0000
heap
page read and write
7FF5DEF57000
unkown
page readonly
AEF000
stack
page read and write
C183000
unkown
page read and write
970C000
unkown
page read and write
8AE000
stack
page read and write
7FF5DF2E2000
unkown
page readonly
C071000
unkown
page read and write
BFDF000
unkown
page read and write
2157D000
heap
page read and write
7FF5DF45C000
unkown
page readonly
97F3000
unkown
page read and write
7FF5DEFE2000
unkown
page readonly
C24C000
unkown
page read and write
73B8000
unkown
page read and write
A02D000
unkown
page read and write
EB7E000
unkown
page read and write
97F3000
unkown
page read and write
4D60000
heap
page read and write
7FF5DF429000
unkown
page readonly
7FF5DF04D000
unkown
page readonly
7FF5DF380000
unkown
page readonly
987C000
unkown
page read and write
4ED5000
heap
page read and write
7FF5DF49C000
unkown
page readonly
3013000
heap
page read and write
7FF5DF50F000
unkown
page readonly
31FE000
direct allocation
page read and write
98A1000
unkown
page read and write
B84000
heap
page read and write
7FF5DF343000
unkown
page readonly
400000
unkown
page readonly
ADC0000
unkown
page readonly
33C0000
unkown
page readonly
C183000
unkown
page read and write
9F63000
unkown
page read and write
BF90000
unkown
page read and write
7FF5DF0D2000
unkown
page readonly
7FF5DF3AA000
unkown
page readonly
2890000
unkown
page readonly
1D98E000
stack
page read and write
C01A000
unkown
page read and write
7FF5DF584000
unkown
page readonly
96ED000
unkown
page read and write
7FF5DF53F000
unkown
page readonly
3490000
heap
page read and write
1EBEB9F0000
heap
page read and write
8C28000
stack
page read and write
AEEE000
stack
page read and write
21150000
remote allocation
page read and write
7F3D0000
direct allocation
page read and write
7FF5DEFC2000
unkown
page readonly
7810000
unkown
page read and write
7D0D000
stack
page read and write
There are 1693 hidden memdumps, click here to show them.