IOC Report
New PO 796512.exe

loading gif

Files

File Path
Type
Category
Malicious
New PO 796512.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Documents\New PO 796512.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\New PO 796512.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\New PO 796512.pif.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\Documents\New PO 796512.pif:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.pif.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.pif.pif.pif.log
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New PO 796512.exe
"C:\Users\user\Desktop\New PO 796512.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Desktop\New PO 796512.exe" "C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Users\user\Desktop\New PO 796512.exe
"C:\Users\user\Desktop\New PO 796512.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\msdt.exe
"C:\Windows\SysWOW64\msdt.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\New PO 796512.exe"
malicious
C:\Users\user\Documents\New PO 796512.pif
"C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif" "C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif
"C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif
"C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif
"C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif" "C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif
"C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif
"C:\Users\user\Documents\New PO 796512.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\msdt.exe
"C:\Windows\SysWOW64\msdt.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\mstsc.exe
"C:\Windows\SysWOW64\mstsc.exe"
malicious
C:\Users\user\Documents\New PO 796512.pif.pif.pif
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\autoconv.exe
"C:\Windows\SysWOW64\autoconv.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 54 hidden processes, click here to show them.

URLs

Name
IP
Malicious
www.hronika.fun/o62s/
malicious
http://www.gtg.store
unknown
http://www.uikstudy.sbs
unknown
http://www.ukulbagus10.click
unknown
https://api.msn.com:443/v1/news/Feed/Windows?t
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
unknown
http://www.uikstudy.sbs/o62s/
unknown
http://www.ukulbagus10.click/o62s/
unknown
http://www.pertforces.store/o62s/www.kipoxz.xyz
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://www.iveworks.xyzReferer:
unknown
http://www.hronika.fun/o62s/www.iveworks.xyz
unknown
http://www.ottostar.motorcycles
unknown
http://www.ukulbagus10.clickReferer:
unknown
http://www.onghi292.topReferer:
unknown
http://www.ottostar.motorcyclesReferer:
unknown
http://www.pertforces.store/o62s/
unknown
http://www.epiyiisigorta.onlineReferer:
unknown
http://www.2045.pictures/o62s/www.hronika.fun
unknown
http://www.enisehirarnavutkoy.xyzReferer:
unknown
http://www.hronika.fun
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
unknown
http://www.epiyiisigorta.online
unknown
https://wns.windows.com/
unknown
http://www.2045.pictures/o62s/
unknown
http://www.pertforces.storeReferer:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.itoolz.net/o62s/
unknown
http://www.heterraceongregory.store
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://word.office.com
unknown
http://www.iveworks.xyz
unknown
http://www.kipoxz.xyzReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.kipoxz.xyz/o62s/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
http://www.hronika.funReferer:
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.2045.pictures
unknown
https://rn3-sa.com/1454
66.29.153.238
https://outlook.com
unknown
http://www.2045.picturesReferer:
unknown
https://rn3-sa.com
unknown
http://www.heterraceongregory.store/o62s/www.onghi292.top
unknown
http://www.ukulbagus10.click/o62s/www.epiyiisigorta.online
unknown
http://www.enisehirarnavutkoy.xyz/o62s/www.regnancy-10606.bond
unknown
https://android.notify.windows.com/iOS
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.epiyiisigorta.online/o62s/
unknown
http://www.kipoxz.xyz
unknown
http://www.regnancy-10606.bondReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://www.pollensense.com/
unknown
http://www.ottostar.motorcycles/o62s/www.2045.pictures
unknown
http://www.axiquynhongiare.asiaReferer:
unknown
http://www.hronika.fun/o62s/
unknown
http://www.axiquynhongiare.asia
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
http://schemas.micro
unknown
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
unknown
http://www.onghi292.top/o62s/www.uikstudy.sbs
unknown
http://www.enisehirarnavutkoy.xyz/o62s/
unknown
http://www.heterraceongregory.store/o62s/
unknown
https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
unknown
http://www.iveworks.xyz/o62s/
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.ottostar.motorcycles/o62s/
unknown
http://www.axiquynhongiare.asia/o62s/
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
http://www.iveworks.xyz/o62s/www.enisehirarnavutkoy.xyz
unknown
http://www.heterraceongregory.storeReferer:
unknown
http://www.gtg.store/o62s/www.ukulbagus10.click
unknown
http://www.enisehirarnavutkoy.xyz
unknown
http://www.onghi292.top
unknown
https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
unknown
http://www.itoolz.netReferer:
unknown
http://www.regnancy-10606.bond
unknown
http://www.pertforces.store
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://powerpoint.office.com
unknown
http://www.foreca.com
unknown
http://crl.microU
unknown
http://www.regnancy-10606.bond/o62s/www.gtg.store
unknown
http://www.regnancy-10606.bond/o62s/
unknown
http://www.uikstudy.sbsReferer:
unknown
http://www.gtg.store/o62s/
unknown
http://www.gtg.storeReferer:
unknown
http://www.onghi292.top/o62s/
unknown
http://www.uikstudy.sbs/o62s/www.pertforces.store
unknown
http://www.kipoxz.xyz/o62s/www.ottostar.motorcycles
unknown
https://api.msn.com/
unknown
http://www.axiquynhongiare.asia/o62s/www.itoolz.net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.heterraceongregory.store
unknown
malicious
www.onghi292.top
unknown
malicious
www.uikstudy.sbs
unknown
malicious
www.pertforces.store
unknown
malicious
rn3-sa.com
66.29.153.238

IPs

IP
Domain
Country
Malicious
66.29.153.238
rn3-sa.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
New PO 796512
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
New PO 796512.pif
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
New PO 796512.pif.pif
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
New PO 796512.pif.pif.pif
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004044A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080082
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060450
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005045A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
c
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006045E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070452
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
d
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A0454
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D005A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
e
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000009046C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D0450
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
f
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000E0450
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs.cvs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 103 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2830000
system
page execute and read and write
malicious
640000
system
page execute and read and write
malicious
3260000
trusted library allocation
page read and write
malicious
4194000
trusted library allocation
page read and write
malicious
4059000
trusted library allocation
page read and write
malicious
770000
system
page execute and read and write
malicious
4146000
trusted library allocation
page read and write
malicious
3230000
unclassified section
page execute and read and write
malicious
2E00000
system
page execute and read and write
malicious
2710000
system
page execute and read and write
malicious
2F90000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1097000
heap
page read and write
3404000
heap
page read and write
79A0000
unkown
page read and write
66FE000
stack
page read and write
46F6000
unkown
page read and write
11910000
system
page execute and read and write
C46F000
unkown
page read and write
7FF5570C1000
unkown
page readonly
7FF55752E000
unkown
page readonly
2B40000
heap
page read and write
68DE000
stack
page read and write
33C0000
heap
page read and write
7040D000
unkown
page read and write
2C05000
heap
page read and write
2EF4000
heap
page read and write
7FF5574F4000
unkown
page readonly
10484000
unkown
page read and write
591E000
stack
page read and write
11FD000
trusted library allocation
page execute and read and write
1606000
direct allocation
page execute and read and write
3AD000
stack
page read and write
7FF5574B3000
unkown
page readonly
AFFF000
stack
page read and write
53F3000
heap
page read and write
A888000
unkown
page read and write
121E000
heap
page read and write
5A3E000
stack
page read and write
378C000
trusted library allocation
page read and write
C47F000
unkown
page read and write
6B0000
heap
page read and write
84D000
stack
page read and write
10B6A000
system
page execute and read and write
45A000
system
page execute and read and write
C18A000
unkown
page read and write
8BD9000
stack
page read and write
2E9D000
trusted library allocation
page read and write
DE0000
heap
page read and write
A156000
unkown
page read and write
55C6000
trusted library allocation
page read and write
7FF557099000
unkown
page readonly
1178000
heap
page read and write
2BC0000
heap
page read and write
12E0000
heap
page read and write
4A50000
direct allocation
page execute and read and write
2EF0000
heap
page read and write
2D20000
heap
page read and write
105C4000
unkown
page read and write
6C4000
heap
page read and write
B72B000
stack
page read and write
7FF556E48000
unkown
page readonly
F85000
heap
page read and write
3940000
heap
page read and write
2BE0000
heap
page read and write
798E000
stack
page read and write
B41000
heap
page read and write
C10000
unkown
page read and write
7FF557568000
unkown
page readonly
4D6D000
stack
page read and write
7FF557113000
unkown
page readonly
C3B3000
unkown
page read and write
1237000
heap
page read and write
2ADE000
unkown
page read and write
7FF557302000
unkown
page readonly
7FF557627000
unkown
page readonly
7FF5573EA000
unkown
page readonly
7FF5573A9000
unkown
page readonly
C31000
unkown
page readonly
2FA5000
heap
page read and write
2F6F000
unkown
page read and write
27B1000
heap
page read and write
7FF557463000
unkown
page readonly
11E3000
trusted library allocation
page execute and read and write
7E05000
stack
page read and write
3180000
heap
page read and write
739D000
stack
page read and write
1218000
heap
page read and write
C4DB000
unkown
page read and write
1320000
direct allocation
page execute and read and write
9D8E000
stack
page read and write
146E000
stack
page read and write
30A0000
unclassified section
page execute and read and write
8D60000
unkown
page read and write
4C80000
heap
page read and write
5A8E000
stack
page read and write
6A0000
heap
page read and write
C47F000
unkown
page read and write
10D0000
heap
page read and write
1213000
trusted library allocation
page execute and read and write
C44D000
unkown
page read and write
360F000
heap
page read and write
303C000
heap
page read and write
3FB6000
trusted library allocation
page read and write
2880000
heap
page read and write
2D00000
heap
page read and write
635E000
stack
page read and write
7FF557434000
unkown
page readonly
D8A000
stack
page read and write
A881000
unkown
page read and write
7FF556E9A000
unkown
page readonly
4044000
trusted library allocation
page read and write
7F600000
trusted library allocation
page execute and read and write
5600000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FF5575E0000
unkown
page readonly
3169000
trusted library allocation
page read and write
29F0000
heap
page read and write
7173000
unkown
page read and write
1202000
trusted library allocation
page read and write
1260000
heap
page read and write
7AE000
stack
page read and write
90C9000
unkown
page read and write
109A6000
system
page execute and read and write
3CE0000
direct allocation
page execute and read and write
F40000
heap
page read and write
37AF000
unkown
page read and write
7FF557426000
unkown
page readonly
2C0A000
heap
page read and write
7FF556E4B000
unkown
page readonly
7FF557103000
unkown
page readonly
A114000
unkown
page read and write
6888000
heap
page read and write
77B0000
unkown
page read and write
49D6000
heap
page read and write
14D0000
heap
page read and write
54E0000
trusted library allocation
page read and write
7F020000
trusted library allocation
page execute and read and write
3609000
heap
page read and write
4F79000
direct allocation
page execute and read and write
C10B000
unkown
page read and write
2DE9000
trusted library allocation
page read and write
4B20000
heap
page read and write
C3E7000
unkown
page read and write
6716000
heap
page read and write
A70000
heap
page read and write
7FF55730C000
unkown
page readonly
5580000
heap
page read and write
C18A000
unkown
page read and write
4209000
trusted library allocation
page read and write
AD4000
heap
page read and write
7FF55738F000
unkown
page readonly
4785000
unkown
page read and write
54E8000
trusted library allocation
page read and write
7306000
unkown
page read and write
344E000
unkown
page read and write
7FF557280000
unkown
page readonly
54AE000
trusted library allocation
page read and write
6662000
heap
page read and write
3E7E000
direct allocation
page execute and read and write
7FF55748F000
unkown
page readonly
52F1000
trusted library allocation
page read and write
7FF5575B1000
unkown
page readonly
5325000
trusted library allocation
page read and write
C23A000
unkown
page read and write
7FF557429000
unkown
page readonly
3450000
unkown
page read and write
7FF55752A000
unkown
page readonly
10546000
unkown
page read and write
2AF4000
heap
page read and write
7169000
unkown
page read and write
7FF5573ED000
unkown
page readonly
3EF9000
trusted library allocation
page read and write
7FF557437000
unkown
page readonly
B4C000
heap
page read and write
6A2E000
stack
page read and write
4BD3000
heap
page read and write
4CB2000
direct allocation
page execute and read and write
B4C000
heap
page read and write
3CD7000
heap
page read and write
9A90000
system
page execute and read and write
896000
trusted library allocation
page execute and read and write
2D71000
trusted library allocation
page read and write
40B6000
trusted library allocation
page read and write
30AE000
stack
page read and write
7FF5574C6000
unkown
page readonly
297D000
stack
page read and write
B20000
heap
page read and write
4732000
unkown
page read and write
EC8000
heap
page read and write
A8D2000
unkown
page read and write
101E000
unclassified section
page execute and read and write
72FC000
unkown
page read and write
1023000
heap
page read and write
1668000
direct allocation
page execute and read and write
3CC000
stack
page read and write
AD4000
heap
page read and write
5860000
heap
page read and write
1691000
direct allocation
page execute and read and write
32C7000
unkown
page read and write
2C0A000
heap
page read and write
42F6000
trusted library allocation
page read and write
3FE6000
trusted library allocation
page read and write
639F000
stack
page read and write
2C10000
heap
page read and write
B4C000
heap
page read and write
2C6E000
stack
page read and write
5550000
heap
page read and write
14E7000
heap
page read and write
8C0000
trusted library allocation
page read and write
553D000
stack
page read and write
6DE0000
trusted library allocation
page read and write
C2E4000
unkown
page read and write
68C9000
heap
page read and write
2486000
trusted library allocation
page read and write
2F4E000
stack
page read and write
1CAF000
stack
page read and write
4004000
trusted library allocation
page read and write
4AB1000
heap
page read and write
CB0000
heap
page read and write
16A3000
direct allocation
page execute and read and write
7FF5573B0000
unkown
page readonly
2B7B000
stack
page read and write
E13B000
stack
page read and write
3190000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page execute and read and write
7FF556FFB000
unkown
page readonly
F6C000
stack
page read and write
33DE000
direct allocation
page execute and read and write
7FF5575BF000
unkown
page readonly
7162000
unkown
page read and write
BDA000
stack
page read and write
2EFF000
stack
page read and write
7FF5573ED000
unkown
page readonly
F3B000
heap
page read and write
7FF5572B4000
unkown
page readonly
7FF556FEE000
unkown
page readonly
8D6C000
unkown
page read and write
2D20000
trusted library allocation
page read and write
307F000
unkown
page read and write
1983000
direct allocation
page execute and read and write
A280000
unkown
page read and write
6F7000
stack
page read and write
2F2F000
stack
page read and write
6C4000
heap
page read and write
104C2000
unkown
page read and write
7FF556E66000
unkown
page readonly
7FF557607000
unkown
page readonly
5CBD000
stack
page read and write
ABE000
stack
page read and write
4054000
trusted library allocation
page read and write
7FF556E85000
unkown
page readonly
8F4D000
unkown
page read and write
B0E9000
system
page execute and read and write
7FF557293000
unkown
page readonly
3FB6000
trusted library allocation
page read and write
629E000
stack
page read and write
C47F000
unkown
page read and write
73C000
stack
page read and write
12AE000
heap
page read and write
1210000
heap
page read and write
57CD000
stack
page read and write
26E2000
trusted library allocation
page read and write
913F000
unkown
page read and write
2C2C000
heap
page read and write
2DD0000
heap
page read and write
84DC000
stack
page read and write
7300000
unkown
page read and write
E260000
unkown
page read and write
A850000
unkown
page read and write
47C0000
unkown
page read and write
2908000
heap
page read and write
1528000
trusted library allocation
page read and write
C46F000
unkown
page read and write
4D1D000
direct allocation
page execute and read and write
3F29000
trusted library allocation
page read and write
7A60000
unkown
page readonly
4F7D000
direct allocation
page execute and read and write
B42F000
stack
page read and write
BC10000
unkown
page read and write
7FF557568000
unkown
page readonly
17AB000
stack
page read and write
1500000
trusted library allocation
page read and write
11FBA000
system
page execute and read and write
6572000
heap
page read and write
6870000
trusted library allocation
page read and write
6683000
heap
page read and write
F522000
heap
page read and write
7FF55714D000
unkown
page readonly
541E000
trusted library allocation
page read and write
651E000
stack
page read and write
8DFE000
unkown
page read and write
4DC8000
heap
page read and write
C06D000
unkown
page read and write
7FF5570A6000
unkown
page readonly
1492000
trusted library allocation
page read and write
EF7000
stack
page read and write
3FAD000
direct allocation
page execute and read and write
7FF557264000
unkown
page readonly
3F1C000
trusted library allocation
page read and write
A877000
unkown
page read and write
298F000
unkown
page read and write
2E60000
heap
page read and write
C5C7000
unkown
page read and write
C328000
unkown
page read and write
2D30000
heap
page read and write
2AD0000
heap
page read and write
6D6C000
stack
page read and write
15EF000
stack
page read and write
7176000
unkown
page read and write
2E90000
heap
page read and write
25DE000
unkown
page read and write
7FF557033000
unkown
page readonly
E1B9000
stack
page read and write
4830000
unkown
page read and write
350E000
unkown
page read and write
4850000
unkown
page read and write
732E000
unkown
page read and write
7FF55733B000
unkown
page readonly
69D7000
heap
page read and write
39D000
stack
page read and write
4009000
trusted library allocation
page read and write
7FF55726C000
unkown
page readonly
2D90000
trusted library allocation
page read and write
3FFC000
trusted library allocation
page read and write
31C0000
heap
page read and write
5650000
heap
page execute and read and write
42B6000
trusted library allocation
page read and write
E424000
system
page execute and read and write
2AF4000
heap
page read and write
559E000
stack
page read and write
1400000
heap
page read and write
144D000
direct allocation
page execute and read and write
13D0000
heap
page read and write
BBE0000
unkown
page readonly
7C00000
unkown
page readonly
10A0000
heap
page read and write
1466000
direct allocation
page execute and read and write
19FA000
unclassified section
page execute and read and write
7FF55764C000
unkown
page readonly
2EDC000
heap
page read and write
3404000
heap
page read and write
54B6000
trusted library allocation
page read and write
651E000
stack
page read and write
4D21000
direct allocation
page execute and read and write
42C6000
trusted library allocation
page read and write
2940000
heap
page read and write
E868000
unkown
page read and write
61AE000
stack
page read and write
7FF5570B5000
unkown
page readonly
AF6D000
stack
page read and write
7FF5570F7000
unkown
page readonly
A218000
unkown
page read and write
7FF556FFF000
unkown
page readonly
11D0000
trusted library allocation
page read and write
2D40000
heap
page read and write
306F000
stack
page read and write
7FF557026000
unkown
page readonly
8D78000
unkown
page read and write
5AA0000
trusted library allocation
page read and write
C12D000
unkown
page read and write
E80000
heap
page read and write
2740000
direct allocation
page read and write
7FF5574F1000
unkown
page readonly
90C9000
unkown
page read and write
11DE000
stack
page read and write
4746000
unkown
page read and write
A231000
unkown
page read and write
C46C000
unkown
page read and write
7FF5570D4000
unkown
page readonly
643E000
stack
page read and write
7FF5573FF000
unkown
page readonly
6A10000
trusted library allocation
page read and write
920000
heap
page read and write
2A15000
trusted library allocation
page read and write
7A0000
heap
page read and write
647E000
stack
page read and write
BFD0000
unkown
page read and write
2E8E000
stack
page read and write
664E000
stack
page read and write
7FF55756D000
unkown
page readonly
5850000
heap
page execute and read and write
6C14000
heap
page read and write
54A0000
trusted library allocation
page read and write
B040000
unkown
page readonly
7FF557210000
unkown
page readonly
8D78000
unkown
page read and write
3404000
heap
page read and write
14AB000
trusted library allocation
page execute and read and write
1247000
trusted library allocation
page execute and read and write
316D000
trusted library allocation
page read and write
7FF557627000
unkown
page readonly
1090000
heap
page read and write
760000
heap
page read and write
2E60000
heap
page read and write
7FF5570C5000
unkown
page readonly
6BB0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
4AB1000
heap
page read and write
6689000
heap
page read and write
55E0000
trusted library allocation
page read and write
9960000
system
page execute and read and write
5540000
trusted library allocation
page read and write
1023000
heap
page read and write
4880000
unkown
page read and write
1711000
direct allocation
page execute and read and write
4124000
trusted library allocation
page read and write
B050000
unkown
page read and write
1846000
direct allocation
page execute and read and write
2E72000
trusted library allocation
page read and write
41A6000
trusted library allocation
page read and write
2780000
heap
page readonly
5740000
heap
page read and write
7FF55726A000
unkown
page readonly
4B21000
direct allocation
page execute and read and write
7DF468991000
unkown
page execute read
3029000
stack
page read and write
28F0000
heap
page read and write
2D83000
trusted library allocation
page read and write
55DE000
stack
page read and write
2DE1000
trusted library allocation
page read and write
7FF55714A000
unkown
page readonly
7B99000
stack
page read and write
25C0000
heap
page read and write
798E000
stack
page read and write
7FF5574EF000
unkown
page readonly
2F9F000
heap
page read and write
1236000
trusted library allocation
page execute and read and write
7FF5571E6000
unkown
page readonly
A280000
unkown
page read and write
8DAE000
unkown
page read and write
68F0000
trusted library allocation
page execute and read and write
E70000
heap
page read and write
2CF5000
heap
page read and write
7FF5573D8000
unkown
page readonly
32DB000
unkown
page read and write
410000
system
page execute and read and write
7FF557599000
unkown
page readonly
89A000
trusted library allocation
page execute and read and write
5F41000
heap
page read and write
4880000
unkown
page read and write
AFFF000
stack
page read and write
3FB6000
trusted library allocation
page read and write
31BF000
stack
page read and write
4296000
trusted library allocation
page read and write
7FF557095000
unkown
page readonly
55E4000
trusted library allocation
page read and write
14BA000
unclassified section
page execute and read and write
62AF000
stack
page read and write
2D20000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
7FF557330000
unkown
page readonly
324E000
unclassified section
page execute and read and write
289A000
heap
page read and write
7FF556FF3000
unkown
page readonly
63EE000
stack
page read and write
7FF557235000
unkown
page readonly
864F000
stack
page read and write
1460000
trusted library allocation
page read and write
1210000
heap
page read and write
715C000
unkown
page read and write
147D000
trusted library allocation
page execute and read and write
E60000
unkown
page readonly
2FAE000
unkown
page read and write
1290000
heap
page read and write
3E0D000
direct allocation
page execute and read and write
2FFF000
heap
page read and write
460B000
heap
page read and write
7FF546F35000
unkown
page readonly
2E4E000
unkown
page read and write
615F000
stack
page read and write
29C4000
heap
page read and write
2B3E000
stack
page read and write
6818000
heap
page read and write
33A000
stack
page read and write
C0F9000
unkown
page read and write
72FE000
unkown
page read and write
7FF5570E7000
unkown
page readonly
3350000
unkown
page readonly
288F000
heap
page read and write
2C1E000
stack
page read and write
68C0000
trusted library allocation
page execute and read and write
7FF5570D6000
unkown
page readonly
C101000
unkown
page read and write
333E000
stack
page read and write
8D6A000
unkown
page read and write
7FF556E75000
unkown
page readonly
7FF5570CA000
unkown
page readonly
4AB1000
heap
page read and write
5478000
trusted library allocation
page read and write
2D6F000
stack
page read and write
88F8000
unkown
page read and write
29E0000
heap
page read and write
2E90000
heap
page read and write
3370000
trusted library allocation
page read and write
308F000
heap
page read and write
B080000
unkown
page read and write
90CF000
unkown
page read and write
A118000
unkown
page read and write
51E3000
unkown
page read and write
4840000
unkown
page read and write
5430000
trusted library allocation
page read and write
144D000
trusted library allocation
page execute and read and write
246B000
trusted library allocation
page read and write
C328000
unkown
page read and write
7FF556FC4000
unkown
page readonly
7FF556F98000
unkown
page readonly
E13B000
stack
page read and write
548D000
trusted library allocation
page read and write
F32000
system
page execute and read and write
72FC000
unkown
page read and write
288D000
heap
page read and write
1118000
heap
page read and write
8911000
unkown
page read and write
7FF5575FC000
unkown
page readonly
3140000
heap
page read and write
55A0000
trusted library allocation
page read and write
B7AA000
stack
page read and write
6B50000
trusted library allocation
page read and write
A286000
unkown
page read and write
FD0000
unkown
page readonly
3FC6000
trusted library allocation
page read and write
E10000
heap
page read and write
138B000
unclassified section
page execute and read and write
2BB0000
heap
page read and write
5170000
trusted library allocation
page execute and read and write
A0B9000
unkown
page read and write
71AE000
stack
page read and write
7FF55719C000
unkown
page readonly
4769000
unkown
page read and write
2CEC000
heap
page read and write
9F0000
unkown
page readonly
C4A2000
unkown
page read and write
2FEE000
stack
page read and write
7FF55722A000
unkown
page readonly
1288000
heap
page read and write
8810000
unkown
page readonly
716B000
unkown
page read and write
A6E000
stack
page read and write
3846000
trusted library allocation
page read and write
6959000
heap
page read and write
12FF000
stack
page read and write
7FF5575D0000
unkown
page readonly
C244000
unkown
page read and write
3550000
direct allocation
page read and write
7FF557594000
unkown
page readonly
8EDD000
unkown
page read and write
289A000
heap
page read and write
7FF5574EF000
unkown
page readonly
4800000
unkown
page read and write
1831000
direct allocation
page execute and read and write
A215000
unkown
page read and write
2F21000
trusted library allocation
page read and write
7FF55724C000
unkown
page readonly
271E000
unkown
page read and write
2EF4000
heap
page read and write
59B0000
trusted library allocation
page read and write
1070000
heap
page read and write
7FF5573D8000
unkown
page readonly
3ED6000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
7040D000
unkown
page read and write
2E7B000
trusted library allocation
page read and write
7FF55765C000
unkown
page readonly
5161000
unkown
page read and write
5590000
trusted library allocation
page execute and read and write
256D000
stack
page read and write
4734000
unkown
page read and write
6803000
heap
page read and write
319C000
stack
page read and write
7FF556E7E000
unkown
page readonly
29FE000
stack
page read and write
9F8F000
stack
page read and write
55FC000
trusted library allocation
page read and write
1060000
unkown
page read and write
A231000
unkown
page read and write
2492000
trusted library allocation
page read and write
47EE000
unkown
page read and write
1240000
trusted library allocation
page execute and read and write
9366000
unkown
page read and write
45A000
system
page execute and read and write
6850000
trusted library allocation
page execute and read and write
2D1C000
heap
page read and write
5290000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
1240000
heap
page read and write
10996000
system
page execute and read and write
7A50000
unkown
page readonly
67CE000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
354F000
stack
page read and write
79B0000
unkown
page read and write
5ED000
stack
page read and write
1830000
unclassified section
page execute and read and write
5743000
heap
page read and write
7FF557579000
unkown
page readonly
7FF55733F000
unkown
page readonly
2EF4000
heap
page read and write
8D68000
unkown
page read and write
7FF557571000
unkown
page readonly
1770000
unclassified section
page execute and read and write
7FF5571AC000
unkown
page readonly
2D3B000
stack
page read and write
72C3000
unkown
page read and write
A01000
heap
page read and write
968000
heap
page read and write
3E09000
direct allocation
page execute and read and write
7FF5570A6000
unkown
page readonly
8911000
unkown
page read and write
7178000
unkown
page read and write
88E5000
unkown
page read and write
3290000
trusted library allocation
page read and write
7FF556E4D000
unkown
page readonly
7FF5575BB000
unkown
page readonly
356D000
unclassified section
page execute and read and write
900000
unkown
page readonly
4DF0000
trusted library allocation
page read and write
2894000
heap
page read and write
98DA000
stack
page read and write
318F000
stack
page read and write
2D33000
heap
page read and write
14B0000
heap
page read and write
511C000
stack
page read and write
46F0000
unkown
page read and write
2F2B000
trusted library allocation
page read and write
C3B3000
unkown
page read and write
C3FC000
unkown
page read and write
913F000
unkown
page read and write
9259000
stack
page read and write
2B7F000
unkown
page read and write
7FF55750F000
unkown
page readonly
5400000
trusted library allocation
page read and write
3801000
heap
page read and write
E99000
stack
page read and write
6060000
trusted library allocation
page read and write
7162000
unkown
page read and write
A156000
unkown
page read and write
2C6F000
unkown
page read and write
F520000
heap
page read and write
7FF5571E2000
unkown
page readonly
995E000
stack
page read and write
45E000
system
page execute and read and write
3404000
heap
page read and write
495C000
heap
page read and write
88B0000
unkown
page read and write
13F0000
trusted library allocation
page read and write
7FF5570D6000
unkown
page readonly
9D8E000
stack
page read and write
72D8000
unkown
page read and write
3609000
heap
page read and write
E290000
unkown
page read and write
3610000
heap
page read and write
4850000
unkown
page read and write
4DCC000
heap
page read and write
3085000
unclassified section
page execute and read and write
9362000
unkown
page read and write
7FF557589000
unkown
page readonly
3230000
heap
page read and write
55B0000
heap
page execute and read and write
4DF7000
trusted library allocation
page read and write
4860000
unkown
page read and write
7B0000
heap
page read and write
3290000
trusted library allocation
page read and write
17C0000
heap
page read and write
4371000
trusted library allocation
page read and write
7FF557239000
unkown
page readonly
BDC000
stack
page read and write
6DF0000
trusted library allocation
page execute and read and write
2D01000
heap
page read and write
2D8A000
stack
page read and write
8B1B000
unkown
page read and write
84E0000
unkown
page readonly
B5AE000
stack
page read and write
7FF556E4B000
unkown
page readonly
6A70000
trusted library allocation
page execute and read and write
6040000
trusted library allocation
page execute and read and write
892000
trusted library allocation
page read and write
6B40000
trusted library allocation
page execute and read and write
7FF557554000
unkown
page readonly
3118000
stack
page read and write
B52000
heap
page read and write
6A8E000
trusted library allocation
page read and write
C561000
unkown
page read and write
A225000
unkown
page read and write
2F00000
heap
page read and write
6A6C000
stack
page read and write
7040D000
unkown
page read and write
A8D2000
unkown
page read and write
14E6000
direct allocation
page execute and read and write
8D6A000
unkown
page read and write
360B000
heap
page read and write
149A000
trusted library allocation
page execute and read and write
C68000
heap
page read and write
1268000
heap
page read and write
1313000
trusted library allocation
page read and write
104CB000
unkown
page read and write
3FD6000
trusted library allocation
page read and write
C46F000
unkown
page read and write
5180000
trusted library allocation
page read and write
7FF557257000
unkown
page readonly
1355000
heap
page read and write
F8D000
trusted library allocation
page execute and read and write
5FE0000
heap
page read and write
13DD000
trusted library allocation
page execute and read and write
1FB000
stack
page read and write
7FF5571E2000
unkown
page readonly
49D2000
heap
page read and write
C5AA000
unkown
page read and write
7FF5575A1000
unkown
page readonly
7FF557661000
unkown
page readonly
650000
heap
page read and write
121D000
trusted library allocation
page execute and read and write
71B1000
unkown
page read and write
C90000
trusted library allocation
page read and write
5FF4000
heap
page read and write
29C4000
heap
page read and write
2DC0000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
2E80000
heap
page read and write
2C30000
heap
page read and write
6AC0000
trusted library allocation
page execute and read and write
3010000
heap
page read and write
C10000
unkown
page read and write
FD000
stack
page read and write
6D00000
trusted library allocation
page execute and read and write
32E6000
unkown
page read and write
354F000
unkown
page read and write
2E3E000
stack
page read and write
F1CA000
system
page execute and read and write
A0BF000
unkown
page read and write
6A90000
heap
page read and write
26DC000
stack
page read and write
7FF557393000
unkown
page readonly
8B1A000
unkown
page read and write
28AE000
unkown
page read and write
477D000
unkown
page read and write
2EF4000
heap
page read and write
7FF55728F000
unkown
page readonly
AB9000
stack
page read and write
140E000
heap
page read and write
698E000
stack
page read and write
B287000
system
page execute and read and write
7FF5574F1000
unkown
page readonly
2DBF000
stack
page read and write
A85A000
unkown
page read and write
1472000
heap
page read and write
7FF556E48000
unkown
page readonly
6FD000
stack
page read and write
24F8000
trusted library allocation
page read and write
1182000
direct allocation
page execute and read and write
B0AA000
system
page execute and read and write
313E000
stack
page read and write
7E03000
stack
page read and write
13ED000
trusted library allocation
page execute and read and write
7FF557487000
unkown
page readonly
44F1000
heap
page read and write
58E0000
trusted library allocation
page read and write
6C4000
heap
page read and write
990000
system
page execute and read and write
A850000
unkown
page read and write
6955000
heap
page read and write
7E0000
heap
page read and write
8EEE000
unkown
page read and write
4BC1000
trusted library allocation
page execute and read and write
C5C000
stack
page read and write
73C5000
stack
page read and write
14AE000
stack
page read and write
7FF55752E000
unkown
page readonly
910000
unkown
page readonly
72C3000
unkown
page read and write
11F3000
trusted library allocation
page read and write
7FF557476000
unkown
page readonly
7803000
unkown
page read and write
33D0000
heap
page read and write
7306000
unkown
page read and write
74DE000
stack
page read and write
A8DD000
unkown
page read and write
732D000
unkown
page read and write
657F000
stack
page read and write
3040000
heap
page read and write
910000
trusted library allocation
page execute and read and write
7FF556FE3000
unkown
page readonly
D1D000
heap
page read and write
3614000
heap
page read and write
7FF5570BB000
unkown
page readonly
5840000
trusted library allocation
page read and write
119B0000
system
page execute and read and write
7FF557302000
unkown
page readonly
7FF5570CA000
unkown
page readonly
1483000
trusted library allocation
page read and write
716E000
unkown
page read and write
90F2000
unkown
page read and write
1060000
unkown
page read and write
13C0000
trusted library allocation
page read and write
A85E000
unkown
page read and write
7FF55741C000
unkown
page readonly
55C1000
trusted library allocation
page read and write
E856000
unkown
page read and write
7FF5573F3000
unkown
page readonly
54EB000
trusted library allocation
page read and write
F52A000
heap
page read and write
10B2B000
system
page execute and read and write
5B7E000
stack
page read and write
10B0000
unkown
page readonly
2AF4000
heap
page read and write
5AB0000
trusted library allocation
page read and write
F00000
heap
page read and write
6A5F000
trusted library allocation
page read and write
59CF000
stack
page read and write
C3AE000
unkown
page read and write
7FF557413000
unkown
page readonly
7FF556E8D000
unkown
page readonly
2ED0000
heap
page read and write
4979000
direct allocation
page execute and read and write
1200000
trusted library allocation
page read and write
2E40000
heap
page execute and read and write
A0A8000
unkown
page read and write
1460000
direct allocation
page execute and read and write
7FF557009000
unkown
page readonly
7E05000
stack
page read and write
574D000
stack
page read and write
2E41000
trusted library allocation
page read and write
7FF55728F000
unkown
page readonly
DC0000
heap
page read and write
C22F000
unkown
page read and write
4785000
unkown
page read and write
E86C000
unkown
page read and write
4FDF000
stack
page read and write
E6E000
stack
page read and write
E5EB000
stack
page read and write
7FF55748F000
unkown
page readonly
10F7000
stack
page read and write
18E0000
direct allocation
page execute and read and write
40F6000
trusted library allocation
page read and write
5600000
heap
page execute and read and write
1702000
trusted library allocation
page read and write
2D1F000
stack
page read and write
6A00000
trusted library allocation
page execute and read and write
2B20000
heap
page read and write
5590000
trusted library allocation
page read and write
7C70000
unkown
page readonly
C5D2000
unkown
page read and write
77D0000
unkown
page read and write
7185000
unkown
page read and write
E260000
unkown
page read and write
3190000
trusted library allocation
page read and write
7DF468990000
unkown
page readonly
59AE000
stack
page read and write
7FF5569FA000
unkown
page readonly
26B9000
trusted library allocation
page read and write
497D000
direct allocation
page execute and read and write
7FF5575D5000
unkown
page readonly
47BE000
heap
page read and write
46F1000
heap
page read and write
6842000
heap
page read and write
71FC000
unkown
page read and write
50B0000
unkown
page write copy
73DE000
stack
page read and write
7FF55745B000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
29C4000
heap
page read and write
B010000
unkown
page readonly
DD7000
stack
page read and write
E23B000
stack
page read and write
90DB000
unkown
page read and write
7FF5575EA000
unkown
page readonly
1332000
trusted library allocation
page read and write
9013000
unkown
page read and write
7FF5571DF000
unkown
page readonly
29C4000
heap
page read and write
7FF55702F000
unkown
page readonly
2F5B000
trusted library allocation
page read and write
9B4F000
system
page execute and read and write
2C06000
stack
page read and write
9CDC000
stack
page read and write
3190000
trusted library allocation
page read and write
2C3E000
stack
page read and write
3A0000
heap
page read and write
8D74000
unkown
page read and write
E91B000
stack
page read and write
4860000
unkown
page read and write
B1A0000
unkown
page read and write
1583000
direct allocation
page execute and read and write
150F000
stack
page read and write
5230000
trusted library allocation
page read and write
C60000
heap
page read and write
5492000
trusted library allocation
page read and write
32D3000
unkown
page read and write
B41000
heap
page read and write
25E0000
heap
page read and write
77B0000
unkown
page read and write
336D000
direct allocation
page execute and read and write
69B5000
trusted library allocation
page read and write
69F0000
trusted library allocation
page execute and read and write
570D000
stack
page read and write
4C3D000
direct allocation
page execute and read and write
6A8E000
trusted library allocation
page read and write
110B000
heap
page read and write
32F3000
unkown
page read and write
C04F000
unkown
page read and write
2C2C000
heap
page read and write
641E000
stack
page read and write
7FF556E9A000
unkown
page readonly
C3AE000
unkown
page read and write
600000
heap
page read and write
7FF55710A000
unkown
page readonly
C233000
unkown
page read and write
549B000
trusted library allocation
page read and write
C0F3000
unkown
page read and write
AE0000
heap
page read and write
65AE000
stack
page read and write
A0FC000
unkown
page read and write
2D4D000
stack
page read and write
2790000
heap
page read and write
65DE000
stack
page read and write
7FF55760F000
unkown
page readonly
28EE000
stack
page read and write
1490000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
34C0000
heap
page read and write
262E000
stack
page read and write
715C000
unkown
page read and write
687D000
heap
page read and write
136F000
stack
page read and write
4E3D000
heap
page read and write
CB7000
heap
page read and write
5280000
heap
page read and write
133E000
stack
page read and write
26F9000
trusted library allocation
page read and write
6B91000
trusted library allocation
page read and write
839F000
unkown
page read and write
1204000
trusted library allocation
page read and write
3E99000
trusted library allocation
page read and write
7FF5570CF000
unkown
page readonly
2D00000
heap
page read and write
3F21000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
948000
heap
page read and write
61BE000
stack
page read and write
2C8E000
stack
page read and write
7FF557426000
unkown
page readonly
54F0000
trusted library allocation
page read and write
8D76000
unkown
page read and write
2CB5000
heap
page read and write
14A7000
trusted library allocation
page execute and read and write
69E0000
trusted library allocation
page read and write
90CF000
unkown
page read and write
41F000
remote allocation
page execute and read and write
47AC000
stack
page read and write
C6D000
heap
page read and write
6908000
heap
page read and write
E2A0000
heap
page read and write
596E000
stack
page read and write
6020000
trusted library allocation
page read and write
2F55000
heap
page read and write
7FF557174000
unkown
page readonly
3F56000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
2D1E000
stack
page read and write
69DE000
stack
page read and write
FE0000
heap
page read and write
2C06000
stack
page read and write
C42C000
unkown
page read and write
7FF55753D000
unkown
page readonly
2F10000
unkown
page readonly
68EF000
stack
page read and write
679E000
trusted library allocation
page read and write
47D1000
heap
page read and write
7FF556FF3000
unkown
page readonly
64DE000
stack
page read and write
269C000
stack
page read and write
3EC9000
trusted library allocation
page read and write
703D000
heap
page read and write
10A0000
heap
page read and write
7FF5575B9000
unkown
page readonly
7FF557669000
unkown
page readonly
4732000
unkown
page read and write
7FF557413000
unkown
page readonly
16B0000
heap
page read and write
126F000
stack
page read and write
88F2000
unkown
page read and write
6C4000
heap
page read and write
24FD000
stack
page read and write
4F78000
trusted library allocation
page read and write
7FF5573CB000
unkown
page readonly
7FF5570FE000
unkown
page readonly
C1E9000
unkown
page read and write
7FF55747D000
unkown
page readonly
124E000
stack
page read and write
2DA0000
trusted library allocation
page read and write
7FF557148000
unkown
page readonly
AD4000
heap
page read and write
410000
system
page execute and read and write
7FF557083000
unkown
page readonly
55AB000
trusted library allocation
page read and write
2A9D000
stack
page read and write
71A4000
unkown
page read and write
2C0A000
heap
page read and write
2FAA000
heap
page read and write
3799000
trusted library allocation
page read and write
5CAE000
stack
page read and write
CFB000
stack
page read and write
27EE000
unkown
page read and write
6614000
heap
page read and write
1260000
heap
page read and write
6BCE000
trusted library allocation
page read and write
501C000
stack
page read and write
6A80000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
7FF557416000
unkown
page readonly
13D0000
trusted library allocation
page read and write
3FE4000
trusted library allocation
page read and write
F52A000
heap
page read and write
7FF557285000
unkown
page readonly
2CFD000
stack
page read and write
8D86000
unkown
page read and write
7FF557456000
unkown
page readonly
C59000
heap
page read and write
2C38000
heap
page read and write
2FAA000
heap
page read and write
58E7000
trusted library allocation
page read and write
3160000
heap
page read and write
7FF557549000
unkown
page readonly
48E7000
heap
page read and write
2FAA000
heap
page read and write
304C000
heap
page read and write
F8E000
heap
page read and write
7030000
heap
page read and write
675E000
stack
page read and write
3886000
trusted library allocation
page read and write
5920000
heap
page read and write
77C0000
unkown
page read and write
505F000
stack
page read and write
6900000
trusted library allocation
page execute and read and write
90D6000
unkown
page read and write
3290000
trusted library allocation
page read and write
70EE000
stack
page read and write
3901000
trusted library allocation
page read and write
279C000
heap
page read and write
14BE000
direct allocation
page execute and read and write
7FF5574C6000
unkown
page readonly
7FF557411000
unkown
page readonly
F2D000
system
page execute and read and write
82E000
stack
page read and write
2CD0000
heap
page execute and read and write
46F0000
heap
page read and write
4746000
unkown
page read and write
1320000
trusted library allocation
page read and write
3614000
heap
page read and write
30BE000
stack
page read and write
84E0000
unkown
page readonly
C59000
heap
page read and write
1522000
direct allocation
page execute and read and write
C5AA000
unkown
page read and write
7FF5569E8000
unkown
page readonly
2CFE000
stack
page read and write
77F0000
unkown
page read and write
4970000
direct allocation
page execute and read and write
BB7000
stack
page read and write
961B000
stack
page read and write
7173000
unkown
page read and write
7FF557210000
unkown
page readonly
12C7000
heap
page read and write
864F000
stack
page read and write
C3A8000
unkown
page read and write
6939000
heap
page read and write
6EEC000
stack
page read and write
2A50000
heap
page read and write
717E000
unkown
page read and write
29A0000
heap
page read and write
2AFD000
stack
page read and write
C50000
heap
page read and write
67BC000
heap
page read and write
4A47000
heap
page read and write
7FF557493000
unkown
page readonly
3DE1000
trusted library allocation
page read and write
8AB000
trusted library allocation
page execute and read and write
28FB000
stack
page read and write
E370000
unkown
page read and write
2EF4000
heap
page read and write
2FE0000
heap
page read and write
360D000
heap
page read and write
B010000
unkown
page readonly
8DFE000
unkown
page read and write
8F27000
unkown
page read and write
2F3C000
heap
page read and write
5513000
heap
page read and write
6B50000
heap
page read and write
11EE000
stack
page read and write
C460000
unkown
page read and write
DF0000
heap
page read and write
1214000
trusted library allocation
page read and write
30FF000
stack
page read and write
2860000
heap
page read and write
1A6D000
trusted library allocation
page execute and read and write
6622000
heap
page read and write
4E8B000
stack
page read and write
6890000
heap
page read and write
3440000
unkown
page readonly
B2C6000
system
page execute and read and write
2FA2000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
1322000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
3440000
unkown
page readonly
7185000
unkown
page read and write
1441000
unkown
page readonly
1146000
direct allocation
page execute and read and write
7FF557607000
unkown
page readonly
3511000
direct allocation
page execute and read and write
88A0000
unkown
page read and write
88ED000
unkown
page read and write
1100000
heap
page read and write
7300000
unkown
page read and write
6B50000
trusted library section
page read and write
143F000
stack
page read and write
900000
unkown
page readonly
7FF55714F000
unkown
page readonly
7FF55731B000
unkown
page readonly
904C000
unkown
page read and write
E5F000
stack
page read and write
6A51000
trusted library allocation
page read and write
12B8000
trusted library allocation
page read and write
7FF55763D000
unkown
page readonly
B4C000
heap
page read and write
2FBD000
trusted library allocation
page read and write
693E000
stack
page read and write
61FD000
stack
page read and write
A858000
unkown
page read and write
B4AD000
stack
page read and write
148C000
heap
page read and write
32C4000
unkown
page read and write
7FF557239000
unkown
page readonly
1867000
direct allocation
page execute and read and write
5B3E000
stack
page read and write
7FF556F26000
unkown
page readonly
3801000
heap
page read and write
F81000
heap
page read and write
9F8F000
stack
page read and write
975000
heap
page read and write
300F000
stack
page read and write
61EC000
stack
page read and write
4091000
trusted library allocation
page read and write
32E3000
unkown
page read and write
2C28000
heap
page read and write
3A06000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6C6D000
stack
page read and write
7FF556E7E000
unkown
page readonly
3080000
unclassified section
page execute and read and write
A110000
unkown
page read and write
2AF0000
heap
page read and write
6942000
heap
page read and write
1200000
trusted library allocation
page read and write
9A28000
system
page execute and read and write
2EF4000
heap
page read and write
4C41000
direct allocation
page execute and read and write
3460000
unkown
page read and write
8EF5000
unkown
page read and write
8580000
unkown
page read and write
69EE000
heap
page read and write
7FF556F87000
unkown
page readonly
A0BF000
unkown
page read and write
7FF55747D000
unkown
page readonly
F209000
system
page execute and read and write
2B35000
heap
page read and write
3090000
heap
page read and write
7FF556F84000
unkown
page readonly
2BFF000
heap
page read and write
3369000
direct allocation
page execute and read and write
3190000
trusted library allocation
page read and write
4870000
unkown
page read and write
E380000
system
page execute and read and write
2D96000
trusted library allocation
page read and write
4176000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
7FF556F26000
unkown
page readonly
2DD2000
heap
page read and write
5605000
trusted library allocation
page read and write
1406000
direct allocation
page execute and read and write
2B6E000
unkown
page read and write
685F000
stack
page read and write
C10B000
unkown
page read and write
72BA000
heap
page read and write
7FF55719C000
unkown
page readonly
4B79000
direct allocation
page execute and read and write
2D0B000
stack
page read and write
A131000
unkown
page read and write
7FF5572C9000
unkown
page readonly
69E0000
trusted library allocation
page read and write
106E000
stack
page read and write
7FF557026000
unkown
page readonly
2A8E000
stack
page read and write
24D0000
trusted library allocation
page read and write
8A7000
trusted library allocation
page execute and read and write
7FF5573D5000
unkown
page readonly
7FF5573BB000
unkown
page readonly
8EC5000
unkown
page read and write
1509000
direct allocation
page execute and read and write
2FA5000
heap
page read and write
16AD000
direct allocation
page execute and read and write
3985000
heap
page read and write
7FF5572AC000
unkown
page readonly
4769000
unkown
page read and write
2E90000
heap
page read and write
2C2C000
heap
page read and write
C96000
trusted library allocation
page read and write
29EF000
stack
page read and write
B72B000
stack
page read and write
7FF557065000
unkown
page readonly
7FF557531000
unkown
page readonly
5547000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
1B11000
direct allocation
page execute and read and write
674D000
stack
page read and write
9050000
unkown
page read and write
642E000
stack
page read and write
86CE000
stack
page read and write
3010000
heap
page read and write
E70000
heap
page read and write
9052000
unkown
page read and write
35B0000
heap
page read and write
52FD000
trusted library allocation
page read and write
2A40000
heap
page read and write
5400000
heap
page read and write
1410000
unclassified section
page execute and read and write
5467000
trusted library allocation
page read and write
C20000
unkown
page read and write
2EF4000
heap
page read and write
2F69000
trusted library allocation
page read and write
3906000
trusted library allocation
page read and write
ACBE000
stack
page read and write
2E0E000
stack
page read and write
17C7000
heap
page read and write
2F00000
heap
page read and write
7FF55750F000
unkown
page readonly
E920000
unkown
page execute and read and write
58CD000
stack
page read and write
2EF4000
heap
page read and write
3300000
heap
page read and write
11E4000
trusted library allocation
page read and write
AE2B000
stack
page read and write
2B3E000
unkown
page read and write
7FF55708D000
unkown
page readonly
671E000
stack
page read and write
3110000
heap
page read and write
46F1000
heap
page read and write
7FF546F35000
unkown
page readonly
2D30000
heap
page read and write
62EE000
stack
page read and write
2A4E000
stack
page read and write
79D000
trusted library allocation
page execute and read and write
9F0000
unkown
page readonly
2963000
heap
page read and write
9E0000
trusted library allocation
page execute and read and write
55D0000
heap
page execute and read and write
7FF5570F7000
unkown
page readonly
2F30000
heap
page read and write
41F000
remote allocation
page execute and read and write
12D5000
heap
page read and write
FB0000
unkown
page read and write
1467000
direct allocation
page execute and read and write
C3ED000
unkown
page read and write
BBD0000
unkown
page readonly
7FF557042000
unkown
page readonly
2E12000
trusted library allocation
page read and write
A08D000
stack
page read and write
9050000
unkown
page read and write
62D000
system
page execute and read and write
694C000
stack
page read and write
7A5000
heap
page read and write
AEE7000
stack
page read and write
FC0000
heap
page read and write
7FF557328000
unkown
page readonly
7FF556FD2000
unkown
page readonly
6A90000
trusted library allocation
page execute and read and write
7FF556E6C000
unkown
page readonly
7FF55714A000
unkown
page readonly
7FF5575BD000
unkown
page readonly
7FF5571E6000
unkown
page readonly
297D000
stack
page read and write
7FF556F9E000
unkown
page readonly
7FF5569FA000
unkown
page readonly
A8DD000
unkown
page read and write
7FF557476000
unkown
page readonly
131D000
trusted library allocation
page execute and read and write
10A30000
heap
page read and write
A131000
unkown
page read and write
7FF5572BD000
unkown
page readonly
6E3C000
stack
page read and write
7FF55763D000
unkown
page readonly
2800000
heap
page read and write
7FF5574B3000
unkown
page readonly
1700000
trusted library allocation
page read and write
6824000
heap
page read and write
10A5000
heap
page read and write
1750000
trusted library allocation
page read and write
BFD0000
unkown
page read and write
6791000
trusted library allocation
page read and write
6953000
heap
page read and write
6628000
heap
page read and write
C3A8000
unkown
page read and write
2DA5000
trusted library allocation
page execute and read and write
7D0E000
stack
page read and write
44F1000
heap
page read and write
8D70000
unkown
page read and write
3109000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
A0FF000
unkown
page read and write
167D000
trusted library allocation
page execute and read and write
3600000
heap
page read and write
14D0000
trusted library allocation
page execute and read and write
2C05000
heap
page read and write
1516000
trusted library allocation
page read and write
1242000
trusted library allocation
page read and write
10E6000
direct allocation
page execute and read and write
12A0000
heap
page read and write
3EE6000
trusted library allocation
page read and write
4AB3000
heap
page read and write
AD4000
heap
page read and write
1707000
trusted library allocation
page execute and read and write
9580000
unkown
page readonly
44F0000
heap
page read and write
2DC0000
heap
page read and write
717E000
unkown
page read and write
1473000
trusted library allocation
page execute and read and write
7FF5570B5000
unkown
page readonly
67E2000
heap
page read and write
7FF556F2A000
unkown
page readonly
E9B3000
unkown
page execute and read and write
4800000
unkown
page read and write
7FF557285000
unkown
page readonly
717C000
unkown
page read and write
41FC000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
54A4000
trusted library allocation
page read and write
1600000
direct allocation
page execute and read and write
4718000
unkown
page read and write
7FF55710A000
unkown
page readonly
26B1000
trusted library allocation
page read and write
24E0000
heap
page read and write
28F0000
heap
page read and write
7FF5572B6000
unkown
page readonly
125E000
stack
page read and write
7FF546F2F000
unkown
page readonly
323F000
unkown
page read and write
E5EB000
stack
page read and write
1223000
trusted library allocation
page read and write
76B0000
unkown
page read and write
4810000
unkown
page read and write
1860000
direct allocation
page execute and read and write
2C0F000
unkown
page read and write
A08D000
stack
page read and write
7FF557083000
unkown
page readonly
2CFD000
stack
page read and write
7FF55703C000
unkown
page readonly
6210000
heap
page read and write
3C66000
heap
page read and write
30FB000
stack
page read and write
148D000
trusted library allocation
page execute and read and write
EB5000
heap
page read and write
8D74000
unkown
page read and write
68FC000
heap
page read and write
288B000
heap
page read and write
5640000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
7FF5572BD000
unkown
page readonly
1210000
heap
page read and write
7FF55756D000
unkown
page readonly
12D0000
heap
page read and write
29C4000
heap
page read and write
2E8D000
trusted library allocation
page read and write
3053000
heap
page read and write
7FF5575E0000
unkown
page readonly
BFB000
unclassified section
page execute and read and write
A8D2000
unkown
page read and write
A28D000
unkown
page read and write
FD0000
unkown
page readonly
B48000
heap
page read and write
7FF5569CB000
unkown
page readonly
2C00000
heap
page read and write
C24F000
unkown
page read and write
7FF5573FF000
unkown
page readonly
9086000
unkown
page read and write
69E6000
heap
page read and write
C23A000
unkown
page read and write
2630000
heap
page read and write
330A000
unkown
page read and write
1110000
heap
page read and write
31FF000
unkown
page read and write
1753000
trusted library allocation
page execute and read and write
12E0000
heap
page read and write
322D000
heap
page read and write
10C7000
direct allocation
page execute and read and write
2D96000
trusted library allocation
page execute and read and write
88ED000
unkown
page read and write
4A9D000
direct allocation
page execute and read and write
2CD0000
heap
page read and write
6817000
heap
page read and write
32C4000
unkown
page read and write
32B9000
unkown
page read and write
3E41000
trusted library allocation
page read and write
41B6000
trusted library allocation
page read and write
7FF5573E2000
unkown
page readonly
2F10000
heap
page execute and read and write
2F5D000
stack
page read and write
55BE000
trusted library allocation
page read and write
70CE000
stack
page read and write
29A0000
heap
page read and write
88E2000
unkown
page read and write
3350000
heap
page read and write
A129000
unkown
page read and write
145E000
stack
page read and write
654C000
heap
page read and write
46F6000
unkown
page read and write
8D6C000
unkown
page read and write
9013000
unkown
page read and write
2C21000
heap
page read and write
ADAF000
stack
page read and write
13D3000
trusted library allocation
page execute and read and write
7FF5570D4000
unkown
page readonly
C74000
heap
page read and write
3404000
heap
page read and write
2F41000
unkown
page read and write
4476000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
7FF5573EA000
unkown
page readonly
29C5000
heap
page read and write
10FB000
stack
page read and write
7FF557411000
unkown
page readonly
32FF000
stack
page read and write
8AE6000
unkown
page read and write
955B000
stack
page read and write
7FF55733B000
unkown
page readonly
69EE000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
660000
heap
page read and write
63DE000
stack
page read and write
79F000
stack
page read and write
35D000
stack
page read and write
C244000
unkown
page read and write
4C9F000
heap
page read and write
3F76000
trusted library allocation
page read and write
6932000
heap
page read and write
6D4B000
stack
page read and write
7FF55708D000
unkown
page readonly
29C4000
heap
page read and write
7160000
unkown
page read and write
7040D000
unkown
page read and write
71EE000
stack
page read and write
1206000
trusted library allocation
page execute and read and write
7FF557456000
unkown
page readonly
7FF557549000
unkown
page readonly
A85E000
unkown
page read and write
360F000
heap
page read and write
2F78000
trusted library allocation
page read and write
AD10000
unkown
page readonly
7F8A0000
trusted library allocation
page execute and read and write
1199000
heap
page read and write
2D40000
heap
page execute and read and write
F0E0000
system
page execute and read and write
7DF468980000
unkown
page readonly
5160000
trusted library allocation
page read and write
13F2000
trusted library allocation
page read and write
7FF557653000
unkown
page readonly
7FF5574F4000
unkown
page readonly
3230000
unkown
page read and write
6F8C000
stack
page read and write
842F000
stack
page read and write
1408000
heap
page read and write
2E3D000
stack
page read and write
4820000
unkown
page read and write
7169000
unkown
page read and write
108E000
stack
page read and write
72FE000
unkown
page read and write
6C4000
heap
page read and write
6864000
heap
page read and write
5580000
trusted library allocation
page execute and read and write
1335000
trusted library allocation
page execute and read and write
2CBF000
stack
page read and write
77F0000
unkown
page read and write
8D68000
unkown
page read and write
729E000
stack
page read and write
6EB0000
heap
page read and write
29AE000
stack
page read and write
7DF4689A1000
unkown
page execute read
477D000
unkown
page read and write
41F000
remote allocation
page execute and read and write
F6C000
stack
page read and write
69CB000
heap
page read and write
71CE000
stack
page read and write
4AB0000
heap
page read and write
7FF55741A000
unkown
page readonly
67AE000
stack
page read and write
90D7000
unkown
page read and write
850000
heap
page read and write
52D0000
trusted library allocation
page read and write
2EF4000
heap
page read and write
2E4E000
stack
page read and write
7A80000
unkown
page readonly
539F000
unclassified section
page read and write
950000
heap
page read and write
902C000
unkown
page read and write
86CE000
stack
page read and write
5F65000
heap
page read and write
E83A000
stack
page read and write
6BA0000
trusted library allocation
page execute and read and write
669E000
stack
page read and write
69B1000
trusted library allocation
page read and write
2894000
heap
page read and write
2D0B000
stack
page read and write
104D9000
unkown
page read and write
874E000
stack
page read and write
60F0000
trusted library allocation
page execute and read and write
2E60000
heap
page read and write
6763000
heap
page read and write
C460000
unkown
page read and write
88F2000
unkown
page read and write
2B8C000
stack
page read and write
A1FD000
unkown
page read and write
66BF000
stack
page read and write
6A40000
trusted library allocation
page read and write
7FF5573DE000
unkown
page readonly
2E89000
trusted library allocation
page read and write
7FF556E98000
unkown
page readonly
B82A000
stack
page read and write
324A000
unkown
page read and write
288F000
heap
page read and write
7140000
unkown
page read and write
2C80000
heap
page read and write
E1B9000
stack
page read and write
BBC0000
unkown
page read and write
790000
trusted library allocation
page read and write
7FF557187000
unkown
page readonly
31C0000
heap
page read and write
7DF468970000
unkown
page readonly
AD4000
heap
page read and write
7FF5572C9000
unkown
page readonly
9C6000
heap
page read and write
C091000
unkown
page read and write
7FF557065000
unkown
page readonly
C562000
unkown
page read and write
2E98000
heap
page read and write
605F000
stack
page read and write
6D8E000
stack
page read and write
54B3000
heap
page read and write
3930000
heap
page read and write
2B20000
heap
page read and write
EFB000
stack
page read and write
10970000
system
page execute and read and write
55F8000
trusted library allocation
page read and write
669A000
heap
page read and write
7FF557579000
unkown
page readonly
625E000
stack
page read and write
6C50000
heap
page read and write
12D4000
heap
page read and write
4026000
trusted library allocation
page read and write
2C70000
heap
page read and write
C04B000
unkown
page read and write
A87A000
unkown
page read and write
7FF557594000
unkown
page readonly
2D21000
heap
page read and write
2D40000
heap
page execute and read and write
4E50000
direct allocation
page execute and read and write
2A17000
trusted library allocation
page read and write
4096000
trusted library allocation
page read and write
C7B000
stack
page read and write
10D5000
heap
page read and write
2BFB000
stack
page read and write
1100000
heap
page read and write
7FF5575BB000
unkown
page readonly
14BE000
stack
page read and write
1217000
trusted library allocation
page execute and read and write
32E3000
unkown
page read and write
1250000
trusted library allocation
page read and write
6B2E000
stack
page read and write
A129000
unkown
page read and write
3190000
trusted library allocation
page read and write
1296000
heap
page read and write
3550000
heap
page read and write
6C0000
heap
page read and write
26D0000
heap
page read and write
C9E000
stack
page read and write
6BF0000
heap
page read and write
7DF468971000
unkown
page execute read
650E000
stack
page read and write
5EC000
stack
page read and write
2C0A000
heap
page read and write
C1DB000
unkown
page read and write
3614000
heap
page read and write
68BF000
trusted library allocation
page read and write
AD0000
heap
page read and write
2DB0000
heap
page read and write
24FD000
stack
page read and write
2E90000
heap
page read and write
1135000
heap
page read and write
5350000
trusted library allocation
page read and write
8DB0000
unkown
page read and write
68B5000
trusted library allocation
page read and write
2A0E000
unkown
page read and write
32D7000
unkown
page read and write
2FAB000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
2CE0000
heap
page read and write
1215000
trusted library allocation
page execute and read and write
C072000
unkown
page read and write
7FF557535000
unkown
page readonly
29AC000
heap
page read and write
7F340000
trusted library allocation
page execute and read and write
546B000
trusted library allocation
page read and write
472C000
unkown
page read and write
E84C000
unkown
page read and write
5426000
trusted library allocation
page read and write
E9F2000
unkown
page execute and read and write
902C000
unkown
page read and write
2C04000
stack
page read and write
54A6000
trusted library allocation
page read and write
8A5000
trusted library allocation
page execute and read and write
70CE000
stack
page read and write
6B94000
trusted library allocation
page read and write
88E4000
unkown
page read and write
2E10000
heap
page read and write
5797000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
904C000
unkown
page read and write
5C6E000
stack
page read and write
2EF4000
heap
page read and write
77D000
stack
page read and write
10D5000
heap
page read and write
676F000
stack
page read and write
4064000
trusted library allocation
page read and write
88B0000
unkown
page read and write
3460000
unkown
page read and write
2815000
heap
page read and write
4BB0000
trusted library allocation
page execute and read and write
1203000
trusted library allocation
page execute and read and write
B43000
heap
page read and write
C063000
unkown
page read and write
9E8E000
stack
page read and write
5403000
heap
page read and write
910000
unkown
page readonly
2990000
heap
page read and write
32FD000
stack
page read and write
4850000
direct allocation
page execute and read and write
7FF5573B0000
unkown
page readonly
5A0E000
stack
page read and write
53B0000
trusted library allocation
page execute and read and write
B4C000
heap
page read and write
5CF0000
trusted library allocation
page read and write
62D0000
heap
page read and write
7FF557420000
unkown
page readonly
55D2000
trusted library allocation
page read and write
E7B000
unclassified section
page execute and read and write
68E0000
trusted library allocation
page read and write
6864000
heap
page read and write
2DE0000
heap
page read and write
11D0000
heap
page read and write
4B0E000
direct allocation
page execute and read and write
4830000
unkown
page read and write
655E000
stack
page read and write
2D60000
trusted library allocation
page read and write
32B9000
unkown
page read and write
361A000
heap
page read and write
29C0000
heap
page read and write
2FB0000
heap
page read and write
3590000
trusted library allocation
page read and write
BBBB000
stack
page read and write
5850000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
7908000
stack
page read and write
3826000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
10994000
system
page execute and read and write
4840000
unkown
page read and write
8EC5000
unkown
page read and write
88E1000
unkown
page read and write
2D6E000
trusted library allocation
page read and write
6860000
trusted library allocation
page execute and read and write
6E8E000
stack
page read and write
58F0000
heap
page read and write
515E000
stack
page read and write
A0DA000
unkown
page read and write
102F000
heap
page read and write
6C50000
trusted library allocation
page execute and read and write
C41F000
unkown
page read and write
547E000
trusted library allocation
page read and write
C22B000
unkown
page read and write
73D0000
unkown
page read and write
7FF55706A000
unkown
page readonly
25FD000
stack
page read and write
2EEF000
stack
page read and write
AD10000
unkown
page readonly
88F2000
unkown
page read and write
10B0000
unkown
page readonly
9F1000
trusted library allocation
page execute and read and write
11F10000
system
page execute and read and write
256D000
stack
page read and write
2E82000
trusted library allocation
page read and write
9050000
unkown
page read and write
2E4E000
stack
page read and write
48EB000
heap
page read and write
3190000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
7FF55726A000
unkown
page readonly
7FF55753D000
unkown
page readonly
70406000
unkown
page readonly
4022000
direct allocation
page execute and read and write
2D34000
trusted library allocation
page read and write
26EB000
trusted library allocation
page read and write
8ECE000
unkown
page read and write
2DEB000
trusted library allocation
page read and write
6530000
heap
page read and write
AD4000
heap
page read and write
E32E000
stack
page read and write
15BF000
stack
page read and write
5C2E000
stack
page read and write
B42F000
stack
page read and write
7FF557387000
unkown
page readonly
7FF5571B3000
unkown
page readonly
7FF55723F000
unkown
page readonly
152B000
trusted library allocation
page read and write
BB3E000
stack
page read and write
A23B000
unkown
page read and write
72D7000
unkown
page read and write
10A0000
heap
page read and write
7FF5573DE000
unkown
page readonly
F8E000
stack
page read and write
2F60000
heap
page read and write
7D8D000
stack
page read and write
6860000
heap
page read and write
8F27000
unkown
page read and write
7FF5572AC000
unkown
page readonly
4842000
heap
page read and write
5DBE000
stack
page read and write
2F77000
trusted library allocation
page read and write
11E9000
direct allocation
page execute and read and write
6C4000
heap
page read and write
718B000
unkown
page read and write
55C0000
trusted library allocation
page read and write
5560000
heap
page read and write
7FF556F31000
unkown
page readonly
7FF5575D0000
unkown
page readonly
8EB8000
unkown
page read and write
46E0000
unkown
page read and write
FA0000
unclassified section
page execute and read and write
91D9000
stack
page read and write
2DA0000
trusted library allocation
page read and write
7FF55761F000
unkown
page readonly
2EF4000
heap
page read and write
7FF557661000
unkown
page readonly
7FF55714D000
unkown
page readonly
14EC000
stack
page read and write
B040000
unkown
page readonly
62F000
system
page execute and read and write
2894000
heap
page read and write
6970000
heap
page read and write
7040F000
unkown
page readonly
7FF5575D5000
unkown
page readonly
29FE000
stack
page read and write
6EAD000
stack
page read and write
1140000
direct allocation
page execute and read and write
2900000
heap
page read and write
10C0000
unclassified section
page execute and read and write
AD4000
heap
page read and write
7276000
unkown
page read and write
7FF556E6C000
unkown
page readonly
8C59000
stack
page read and write
5360000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
72AD000
stack
page read and write
29C4000
heap
page read and write
8DA6000
unkown
page read and write
7FF546F2F000
unkown
page readonly
4FEE000
direct allocation
page execute and read and write
13E0000
direct allocation
page execute and read and write
7FF5573E2000
unkown
page readonly
6E90000
heap
page read and write
7FF55732D000
unkown
page readonly
7FF55764C000
unkown
page readonly
C101000
unkown
page read and write
2D20000
heap
page read and write
2C0A000
heap
page read and write
2F09000
stack
page read and write
170B000
trusted library allocation
page execute and read and write
7FF5573E6000
unkown
page readonly
7FF557099000
unkown
page readonly
2F8F000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
2F80000
heap
page read and write
9E0F000
stack
page read and write
6C4000
heap
page read and write
DF0000
heap
page read and write
3FB1000
direct allocation
page execute and read and write
BEBF000
stack
page read and write
4376000
trusted library allocation
page read and write
F08000
heap
page read and write
6B90000
heap
page read and write
2FA6000
heap
page read and write
2FC8000
trusted library allocation
page read and write
F40000
heap
page read and write
675E000
stack
page read and write
7FF556F90000
unkown
page readonly
176E000
stack
page read and write
7FF557045000
unkown
page readonly
26FD000
trusted library allocation
page read and write
631E000
stack
page read and write
6B10000
trusted library allocation
page read and write
6E60000
heap
page read and write
2CCE000
stack
page read and write
7FF557493000
unkown
page readonly
7276000
unkown
page read and write
3404000
heap
page read and write
15A6000
direct allocation
page execute and read and write
6E30000
heap
page read and write
883000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
8ECE000
unkown
page read and write
2E0E000
unkown
page read and write
73F0000
unkown
page read and write
361A000
heap
page read and write
2C88000
heap
page read and write
2890000
heap
page read and write
7FF556FE3000
unkown
page readonly
64CC000
stack
page read and write
29C2000
heap
page read and write
C00000
heap
page read and write
6C4000
heap
page read and write
1503000
direct allocation
page execute and read and write
EEC000
stack
page read and write
1020000
heap
page read and write
F5F000
stack
page read and write
6B40000
trusted library allocation
page execute and read and write
7FF55703F000
unkown
page readonly
3152000
trusted library allocation
page read and write
27A0000
heap
page read and write
90CF000
unkown
page read and write
1240000
trusted library allocation
page read and write
86F000
stack
page read and write
594F000
stack
page read and write
935A000
stack
page read and write
7FF5572B6000
unkown
page readonly
7FF55700F000
unkown
page readonly
1449000
direct allocation
page execute and read and write
B28000
heap
page read and write
121B000
trusted library allocation
page execute and read and write
7FF55760F000
unkown
page readonly
7FF5570BB000
unkown
page readonly
2DD5000
heap
page read and write
1642000
direct allocation
page execute and read and write
AD4000
heap
page read and write
2894000
heap
page read and write
5A4E000
stack
page read and write
6BC0000
trusted library allocation
page read and write
B070000
unkown
page read and write
7FF556FEE000
unkown
page readonly
2C0A000
heap
page read and write
6BE0000
heap
page read and write
913F000
unkown
page read and write
67C0000
trusted library allocation
page read and write
64E000
stack
page read and write
11BF000
stack
page read and write
2F20000
unkown
page readonly
6A60000
trusted library allocation
page execute and read and write
74EE000
stack
page read and write
1020000
heap
page read and write
7A60000
unkown
page readonly
11E0000
trusted library allocation
page read and write
7FF556F90000
unkown
page readonly
71A4000
unkown
page read and write
8D80000
unkown
page read and write
88F8000
unkown
page read and write
6070000
trusted library allocation
page execute and read and write
124B000
trusted library allocation
page execute and read and write
3290000
trusted library allocation
page read and write
13E7000
direct allocation
page execute and read and write
2D92000
trusted library allocation
page read and write
2F20000
unkown
page readonly
2FA4000
heap
page read and write
4BCE000
stack
page read and write
145F000
stack
page read and write
C0F9000
unkown
page read and write
2EDE000
unkown
page read and write
7FF55741A000
unkown
page readonly
8ED5000
unkown
page read and write
2FAA000
heap
page read and write
4B1D000
direct allocation
page execute and read and write
2D82000
trusted library allocation
page read and write
7A0000
heap
page read and write
B7AA000
stack
page read and write
2C20000
heap
page read and write
C5BE000
unkown
page read and write
3220000
unclassified section
page execute and read and write
7FF557535000
unkown
page readonly
3970000
heap
page read and write
7FF5573CB000
unkown
page readonly
7FF55733F000
unkown
page readonly
AD4000
heap
page read and write
C214000
unkown
page read and write
1320000
heap
page read and write
839F000
unkown
page read and write
C0FB000
unkown
page read and write
5450000
trusted library allocation
page read and write
32D7000
unkown
page read and write
63AE000
stack
page read and write
8ED5000
unkown
page read and write
5847000
trusted library allocation
page read and write
717A000
unkown
page read and write
52DB000
trusted library allocation
page read and write
15E6000
direct allocation
page execute and read and write
2D76000
trusted library allocation
page read and write
1054B000
unkown
page read and write
8530000
unkown
page readonly
67D0000
trusted library allocation
page execute and read and write
E280000
unkown
page read and write
9853000
unkown
page read and write
2EAE000
stack
page read and write
2FF0000
heap
page read and write
A222000
unkown
page read and write
7FF55703C000
unkown
page readonly
C541000
unkown
page read and write
131D000
stack
page read and write
B6AA000
stack
page read and write
7140000
unkown
page read and write
6808000
heap
page read and write
C24F000
unkown
page read and write
184D000
direct allocation
page execute and read and write
10F7000
stack
page read and write
32F0000
heap
page read and write
2590000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
1989000
direct allocation
page execute and read and write
6627000
heap
page read and write
6A3E000
stack
page read and write
90C9000
unkown
page read and write
10BE000
stack
page read and write
1886000
direct allocation
page execute and read and write
1126000
heap
page read and write
54C0000
trusted library allocation
page read and write
15FF000
stack
page read and write
326A000
unkown
page read and write
8F09000
unkown
page read and write
52F6000
trusted library allocation
page read and write
7FF5569F1000
unkown
page readonly
90DB000
unkown
page read and write
7FF5575C5000
unkown
page readonly
67EE000
stack
page read and write
8FB000
stack
page read and write
7FF55704A000
unkown
page readonly
120D000
trusted library allocation
page execute and read and write
B070000
unkown
page read and write
73D000
stack
page read and write
3190000
trusted library allocation
page read and write
32C7000
unkown
page read and write
1726000
direct allocation
page execute and read and write
C1DD000
unkown
page read and write
26BB000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
1000000
heap
page read and write
589E000
stack
page read and write
5F70000
heap
page read and write
9768000
system
page execute and read and write
55E6000
trusted library allocation
page read and write
668000
heap
page read and write
2FF0000
direct allocation
page read and write
10A30000
heap
page read and write
3054000
heap
page read and write
3E51000
trusted library allocation
page read and write
89C0000
unkown
page read and write
578E000
stack
page read and write
B090000
system
page execute and read and write
8AE6000
unkown
page read and write
2AF4000
heap
page read and write
7FF5575EA000
unkown
page readonly
CF2000
unkown
page readonly
7FF55752A000
unkown
page readonly
7FF557245000
unkown
page readonly
54B0000
heap
page read and write
16A6000
direct allocation
page execute and read and write
1142000
heap
page read and write
7FF55765C000
unkown
page readonly
4BD0000
heap
page read and write
2E2D000
trusted library allocation
page read and write
10DB000
unclassified section
page execute and read and write
7FF557062000
unkown
page readonly
633E000
stack
page read and write
2D8A000
stack
page read and write
7FF557037000
unkown
page readonly
2BC0000
direct allocation
page read and write
8EEE000
unkown
page read and write
B050000
unkown
page read and write
C4A2000
unkown
page read and write
2F90000
unkown
page readonly
2E8B000
trusted library allocation
page read and write
4031000
trusted library allocation
page read and write
4A99000
direct allocation
page execute and read and write
14A2000
direct allocation
page execute and read and write
7C00000
unkown
page readonly
4718000
unkown
page read and write
A891000
unkown
page read and write
606E000
trusted library allocation
page read and write
7FF5569CB000
unkown
page readonly
2D80000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page execute and read and write
75EF000
stack
page read and write
A0BD000
unkown
page read and write
51F9000
unkown
page read and write
6618000
heap
page read and write
47DB000
unkown
page read and write
90E000
stack
page read and write
9086000
unkown
page read and write
38B4000
trusted library allocation
page read and write
2BFF000
heap
page read and write
2C10000
heap
page read and write
3AA8000
heap
page read and write
2C8E000
stack
page read and write
14F0000
trusted library allocation
page execute and read and write
5330000
trusted library allocation
page read and write
7FF5573E6000
unkown
page readonly
7FF557106000
unkown
page readonly
2DC0000
trusted library allocation
page read and write
45E000
system
page execute and read and write
9D0000
heap
page read and write
72FC000
unkown
page read and write
A118000
unkown
page read and write
176F000
stack
page read and write
58DD000
stack
page read and write
40A6000
trusted library allocation
page read and write
2889000
heap
page read and write
C2E4000
unkown
page read and write
7FF5574BD000
unkown
page readonly
7FF556F2A000
unkown
page readonly
5421000
trusted library allocation
page read and write
2E50000
heap
page read and write
2AF0000
heap
page read and write
B030000
unkown
page readonly
7FF557148000
unkown
page readonly
1006000
unclassified section
page execute and read and write
BC00000
unkown
page readonly
B4C000
heap
page read and write
7FF55704A000
unkown
page readonly
6031000
trusted library allocation
page read and write
7FF55720D000
unkown
page readonly
1310000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
625E000
stack
page read and write
128E000
stack
page read and write
EC0000
heap
page read and write
8D72000
unkown
page read and write
68D3000
heap
page read and write
1460000
direct allocation
page execute and read and write
89F000
stack
page read and write
7FF557437000
unkown
page readonly
1922000
direct allocation
page execute and read and write
27B5000
heap
page read and write
311E000
stack
page read and write
1220000
trusted library allocation
page read and write
652E000
stack
page read and write
7FF5575E3000
unkown
page readonly
7FF557416000
unkown
page readonly
C072000
unkown
page read and write
521C000
stack
page read and write
7FF5573A9000
unkown
page readonly
2FB0000
heap
page read and write
2C80000
heap
page read and write
7FF5574F9000
unkown
page readonly
10503000
unkown
page read and write
7FF556FD2000
unkown
page readonly
55BE000
stack
page read and write
7FF5572A4000
unkown
page readonly
F90000
heap
page read and write
2F41000
unkown
page read and write
7040D000
unkown
page read and write
A2F000
heap
page read and write
4820000
heap
page read and write
7FF557187000
unkown
page readonly
47C6000
unkown
page read and write
E2A0000
heap
page read and write
A222000
unkown
page read and write
10F46000
system
page read and write
13F6000
trusted library allocation
page execute and read and write
514C000
stack
page read and write
A810000
unkown
page read and write
8580000
unkown
page read and write
7FF5570C1000
unkown
page readonly
E87A000
unkown
page read and write
68B1000
trusted library allocation
page read and write
2C3F000
stack
page read and write
37FF000
stack
page read and write
10D0000
heap
page read and write
4BD6000
heap
page read and write
2C04000
stack
page read and write
2BAE000
stack
page read and write
2FE0000
heap
page read and write
67A0000
trusted library allocation
page execute and read and write
5500000
trusted library allocation
page read and write
3249000
unkown
page read and write
132A000
trusted library allocation
page execute and read and write
5494000
trusted library allocation
page read and write
11E3000
direct allocation
page execute and read and write
330A000
unkown
page read and write
6D4C000
stack
page read and write
1514000
trusted library allocation
page read and write
2AFD000
stack
page read and write
33D0000
heap
page read and write
E871000
unkown
page read and write
C1DF000
unkown
page read and write
4CA1000
trusted library allocation
page execute and read and write
3240000
direct allocation
page execute and read and write
3190000
trusted library allocation
page read and write
7FF5575B9000
unkown
page readonly
B52000
heap
page read and write
C3E000
stack
page read and write
38D4000
trusted library allocation
page read and write
557D000
stack
page read and write
7FF557174000
unkown
page readonly
EEC000
stack
page read and write
726D000
stack
page read and write
685E000
stack
page read and write
D5B000
stack
page read and write
7803000
unkown
page read and write
995E000
stack
page read and write
2E80000
heap
page read and write
90F2000
unkown
page read and write
2C9E000
stack
page read and write
10DA0000
system
page execute and read and write
54C0000
trusted library allocation
page read and write
3230000
unkown
page read and write
2BD0000
heap
page read and write
8D80000
unkown
page read and write
1210000
trusted library allocation
page read and write
3572000
unclassified section
page execute and read and write
2F0F000
unkown
page read and write
7D8D000
stack
page read and write
C374000
unkown
page read and write
E5E000
stack
page read and write
703F0000
unkown
page readonly
88EE000
unkown
page read and write
30AF000
unclassified section
page execute and read and write
2A7D000
stack
page read and write
7306000
unkown
page read and write
7FF557095000
unkown
page readonly
7DF468981000
unkown
page execute read
7FF55707D000
unkown
page readonly
18E6000
direct allocation
page execute and read and write
1140000
heap
page read and write
8DFE000
unkown
page read and write
7FF556FFB000
unkown
page readonly
C3ED000
unkown
page read and write
568D000
stack
page read and write
7FF557531000
unkown
page readonly
43E000
system
page execute and read and write
6970000
trusted library allocation
page read and write
89C0000
unkown
page read and write
C4DC000
unkown
page read and write
AD0000
heap
page read and write
88D000
trusted library allocation
page execute and read and write
A22F000
unkown
page read and write
7FF55702F000
unkown
page readonly
2BBE000
stack
page read and write
40A1000
trusted library allocation
page read and write
7A4B000
stack
page read and write
C94000
trusted library allocation
page read and write
1337000
trusted library allocation
page execute and read and write
7FF557280000
unkown
page readonly
3115000
stack
page read and write
1371000
direct allocation
page execute and read and write
F97000
stack
page read and write
2EBC000
heap
page read and write
11F0000
unclassified section
page execute and read and write
8820000
unkown
page readonly
2E50000
trusted library allocation
page read and write
2EEE000
stack
page read and write
2C2E000
unkown
page read and write
29BD000
stack
page read and write
5510000
trusted library allocation
page read and write
E270000
unkown
page read and write
2950000
heap
page read and write
2D10000
heap
page read and write
5121000
direct allocation
page execute and read and write
3055000
heap
page read and write
7A80000
unkown
page readonly
3B0000
heap
page read and write
63C000
stack
page read and write
725C000
stack
page read and write
4B30000
trusted library allocation
page execute and read and write
84DC000
stack
page read and write
9374000
unkown
page read and write
AEE7000
stack
page read and write
7FF5574A9000
unkown
page readonly
C04B000
unkown
page read and write
4136000
trusted library allocation
page read and write
2464000
trusted library allocation
page read and write
35BC000
heap
page read and write
313E000
unkown
page read and write
7FF55731B000
unkown
page readonly
C50B000
unkown
page read and write
90DB000
unkown
page read and write
35C6000
heap
page read and write
7FF5572A4000
unkown
page readonly
E290000
unkown
page read and write
7FF5575B1000
unkown
page readonly
2EC0000
heap
page read and write
7FF557602000
unkown
page readonly
703F1000
unkown
page execute read
8EB8000
unkown
page read and write
9E8E000
stack
page read and write
1545000
trusted library allocation
page read and write
6A30000
heap
page read and write
511E000
stack
page read and write
2CA0000
heap
page read and write
A225000
unkown
page read and write
7FF55714F000
unkown
page readonly
BBBB000
stack
page read and write
3213000
stack
page read and write
2AF4000
heap
page read and write
3450000
unclassified section
page execute and read and write
A218000
unkown
page read and write
3220000
unkown
page readonly
105C4000
unkown
page read and write
53F0000
heap
page read and write
6A90000
trusted library allocation
page execute and read and write
6970000
trusted library allocation
page execute and read and write
57A0000
heap
page execute and read and write
2961000
heap
page read and write
7FF5572D4000
unkown
page readonly
7FF5575A1000
unkown
page readonly
C460000
unkown
page read and write
2E7F000
stack
page read and write
12E2000
heap
page read and write
68C8000
heap
page read and write
7DF468991000
unkown
page execute read
5AD000
stack
page read and write
11F7B000
system
page execute and read and write
716C000
stack
page read and write
135E000
stack
page read and write
2770000
heap
page read and write
7A4B000
stack
page read and write
1360000
trusted library allocation
page execute and read and write
7FF557113000
unkown
page readonly
2C23000
heap
page read and write
28B0000
heap
page read and write
7FF557583000
unkown
page readonly
472C000
unkown
page read and write
7FF55742B000
unkown
page readonly
2F00000
heap
page read and write
8ECE000
unkown
page read and write
51A6000
unclassified section
page read and write
1842000
unclassified section
page execute and read and write
33D0000
heap
page read and write
C3F7000
unkown
page read and write
F520000
heap
page read and write
2BA0000
heap
page read and write
B82A000
stack
page read and write
13F8000
heap
page read and write
10546000
unkown
page read and write
7DF468970000
unkown
page readonly
C50000
heap
page read and write
3400000
heap
page read and write
77E000
stack
page read and write
76B0000
unkown
page read and write
1370000
heap
page read and write
3F39000
trusted library allocation
page read and write
2790000
heap
page read and write
EA0000
heap
page read and write
317E000
stack
page read and write
6F20000
heap
page read and write
123A000
trusted library allocation
page execute and read and write
64AE000
stack
page read and write
8D72000
unkown
page read and write
B5AE000
stack
page read and write
60BE000
stack
page read and write
7F8E0000
trusted library allocation
page execute and read and write
3109000
trusted library allocation
page read and write
1054B000
unkown
page read and write
11971000
system
page execute and read and write
1496000
trusted library allocation
page execute and read and write
7FF557330000
unkown
page readonly
4614000
heap
page read and write
5AC0000
trusted library allocation
page execute and read and write
C74000
heap
page read and write
68A0000
trusted library allocation
page read and write
B1A0000
unkown
page read and write
3F09000
trusted library allocation
page read and write
7E10000
unkown
page read and write
7FF557487000
unkown
page readonly
5464000
trusted library allocation
page read and write
D14000
heap
page read and write
9B10000
system
page execute and read and write
51F9000
unkown
page read and write
3340000
heap
page read and write
BBD0000
unkown
page readonly
5F00000
heap
page read and write
8F83000
unkown
page read and write
5320000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
E0E000
stack
page read and write
A873000
unkown
page read and write
7BC1000
unkown
page read and write
7FF557420000
unkown
page readonly
2FB0000
heap
page read and write
3404000
heap
page read and write
6C4000
heap
page read and write
2AFC000
stack
page read and write
9013000
unkown
page read and write
5481000
trusted library allocation
page read and write
10A40000
unkown
page read and write
7FF557328000
unkown
page readonly
65BE000
stack
page read and write
F29000
heap
page read and write
706E000
stack
page read and write
8EF5000
unkown
page read and write
D60000
heap
page read and write
7FF556F9E000
unkown
page readonly
2C90000
direct allocation
page read and write
6EBE000
heap
page read and write
A882000
unkown
page read and write
8F27000
unkown
page read and write
1470000
trusted library allocation
page read and write
7DF468981000
unkown
page execute read
14C0000
heap
page read and write
25E0000
heap
page read and write
1587000
direct allocation
page execute and read and write
79A0000
unkown
page read and write
611F000
stack
page read and write
4171000
trusted library allocation
page read and write
13D4000
trusted library allocation
page read and write
6E4C000
stack
page read and write
1245000
trusted library allocation
page execute and read and write
1205000
heap
page read and write
8C59000
stack
page read and write
A1FD000
unkown
page read and write
50BC000
stack
page read and write
D20000
trusted library allocation
page read and write
294C000
heap
page read and write
BE0000
unclassified section
page execute and read and write
1326000
trusted library allocation
page execute and read and write
6BD000
stack
page read and write
7FF55751D000
unkown
page readonly
10A5000
heap
page read and write
5CEE000
stack
page read and write
14A2000
trusted library allocation
page read and write
A0B9000
unkown
page read and write
7BC0000
unkown
page read and write
2D10000
heap
page read and write
8D70000
unkown
page read and write
8F4D000
unkown
page read and write
2C88000
trusted library allocation
page read and write
7FF5572A2000
unkown
page readonly
662C000
heap
page read and write
7FF55700F000
unkown
page readonly
7FF5574BA000
unkown
page readonly
A0BD000
unkown
page read and write
7FF557599000
unkown
page readonly
A114000
unkown
page read and write
32D3000
unkown
page read and write
A0DA000
unkown
page read and write
8EC5000
unkown
page read and write
90F2000
unkown
page read and write
10A40000
system
page execute and read and write
66A5000
heap
page read and write
13BE000
stack
page read and write
2DA0000
heap
page read and write
11ED000
trusted library allocation
page execute and read and write
68EE000
trusted library allocation
page read and write
88F8000
unkown
page read and write
6BC0000
trusted library allocation
page execute and read and write
149E000
stack
page read and write
1770000
unclassified section
page execute and read and write
7FF556F87000
unkown
page readonly
2960000
heap
page read and write
2FAA000
heap
page read and write
603E000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
2BE8000
heap
page read and write
4344000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
11CF000
stack
page read and write
D14000
heap
page read and write
2EB0000
heap
page read and write
276E000
stack
page read and write
8F4D000
unkown
page read and write
7FF557467000
unkown
page readonly
A8CA000
unkown
page read and write
6CF0000
heap
page read and write
1200000
trusted library allocation
page read and write
358E000
stack
page read and write
24A5000
trusted library allocation
page read and write
C57F000
unkown
page read and write
5647000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
7FF556E85000
unkown
page readonly
6AB0000
trusted library allocation
page read and write
68A1000
heap
page read and write
14E0000
heap
page read and write
17A3000
unclassified section
page execute and read and write
EB5B000
stack
page read and write
E60000
unkown
page readonly
10503000
unkown
page read and write
3290000
trusted library allocation
page read and write
43E000
system
page execute and read and write
C0FB000
unkown
page read and write
5490000
trusted library allocation
page read and write
4276000
trusted library allocation
page read and write
C22F000
unkown
page read and write
7FF5575AB000
unkown
page readonly
59A0000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
29C4000
heap
page read and write
C5AA000
unkown
page read and write
2AE0000
heap
page read and write
7FF556E98000
unkown
page readonly
9052000
unkown
page read and write
7DE000
stack
page read and write
794000
trusted library allocation
page read and write
2C5E000
unkown
page read and write
31BC000
heap
page read and write
7B99000
stack
page read and write
CA8000
trusted library allocation
page read and write
8EF5000
unkown
page read and write
780000
trusted library allocation
page read and write
2AF4000
heap
page read and write
7FF557642000
unkown
page readonly
110E000
heap
page read and write
3F2C000
trusted library allocation
page read and write
7FF557429000
unkown
page readonly
2C32000
heap
page read and write
2DB5000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
26AE000
stack
page read and write
717C000
unkown
page read and write
7FF557463000
unkown
page readonly
7FF557642000
unkown
page readonly
55CD000
trusted library allocation
page read and write
4144000
trusted library allocation
page read and write
8F09000
unkown
page read and write
8DA6000
unkown
page read and write
32E6000
unkown
page read and write
A87A000
unkown
page read and write
2F88000
heap
page read and write
27BD000
stack
page read and write
C46C000
unkown
page read and write
54C2000
trusted library allocation
page read and write
A00A000
stack
page read and write
2C38000
heap
page read and write
8BD9000
stack
page read and write
71FC000
unkown
page read and write
2D35000
heap
page read and write
3800000
heap
page read and write
940000
heap
page read and write
2EF4000
heap
page read and write
7FF55732D000
unkown
page readonly
540B000
trusted library allocation
page read and write
6A8E000
stack
page read and write
788B000
stack
page read and write
15ED000
direct allocation
page execute and read and write
73D0000
unkown
page read and write
A8CA000
unkown
page read and write
32C9000
unkown
page read and write
51E3000
unkown
page read and write
7FF557583000
unkown
page readonly
9F0E000
stack
page read and write
3350000
unkown
page readonly
1357000
heap
page read and write
7FF557352000
unkown
page readonly
D7A000
stack
page read and write
1B2D000
direct allocation
page execute and read and write
175D000
trusted library allocation
page execute and read and write
1230000
trusted library allocation
page read and write
702C000
stack
page read and write
7FF556E66000
unkown
page readonly
7FF557617000
unkown
page readonly
9086000
unkown
page read and write
7DF468980000
unkown
page readonly
649E000
stack
page read and write
8EDD000
unkown
page read and write
1767000
heap
page read and write
4B7D000
direct allocation
page execute and read and write
10E60000
system
page execute and read and write
13AD000
trusted library allocation
page execute and read and write
A00A000
stack
page read and write
4781000
unkown
page read and write
7FF557501000
unkown
page readonly
2C32000
heap
page read and write
4121000
trusted library allocation
page read and write
9B5000
stack
page read and write
344F000
unkown
page read and write
1200000
heap
page read and write
7FF55738F000
unkown
page readonly
3FD9000
trusted library allocation
page read and write
2EF4000
heap
page read and write
5630000
trusted library allocation
page read and write
7FF557382000
unkown
page readonly
7C70000
unkown
page readonly
7FF556E8D000
unkown
page readonly
2B2C000
heap
page read and write
288B000
heap
page read and write
77C0000
unkown
page read and write
6A10000
trusted library allocation
page read and write
273D000
stack
page read and write
A8DD000
unkown
page read and write
1754000
trusted library allocation
page read and write
95C000
stack
page read and write
C5D000
stack
page read and write
6ABE000
trusted library allocation
page read and write
511D000
direct allocation
page execute and read and write
7DF4689B1000
unkown
page execute read
2AF4000
heap
page read and write
6894000
heap
page read and write
28AD000
stack
page read and write
85E000
stack
page read and write
1377000
heap
page read and write
598E000
stack
page read and write
2BFF000
stack
page read and write
6E8C000
stack
page read and write
711C000
stack
page read and write
7FF5574BA000
unkown
page readonly
104C2000
unkown
page read and write
716E000
unkown
page read and write
24C0000
heap
page read and write
7FF5573B5000
unkown
page readonly
7FF556A1B000
unkown
page readonly
1040000
heap
page read and write
7E10000
unkown
page read and write
1020000
heap
page read and write
1B26000
direct allocation
page execute and read and write
7FF557245000
unkown
page readonly
1370000
heap
page read and write
10AE000
stack
page read and write
1200000
heap
page read and write
7FF5575BF000
unkown
page readonly
3195000
heap
page read and write
2EF4000
heap
page read and write
2720000
heap
page read and write
EA8000
heap
page read and write
296F000
stack
page read and write
736E000
stack
page read and write
C2D3000
unkown
page read and write
874E000
stack
page read and write
6DAE000
stack
page read and write
7FF5573BB000
unkown
page readonly
6C30000
heap
page read and write
2965000
heap
page read and write
1232000
trusted library allocation
page read and write
1589000
direct allocation
page execute and read and write
7FF55710F000
unkown
page readonly
1390000
unclassified section
page execute and read and write
AF6D000
stack
page read and write
2C7E000
stack
page read and write
79B0000
unkown
page read and write
2AF4000
heap
page read and write
52EE000
trusted library allocation
page read and write
BC10000
unkown
page read and write
730A000
unkown
page read and write
2F9F000
heap
page read and write
4870000
unkown
page read and write
7FF55720D000
unkown
page readonly
2481000
trusted library allocation
page read and write
104D9000
unkown
page read and write
3404000
heap
page read and write
CA0000
trusted library allocation
page read and write
BFB000
stack
page read and write
DDC000
stack
page read and write
38AF000
stack
page read and write
615E000
stack
page read and write
C2D3000
unkown
page read and write
2C21000
heap
page read and write
7040D000
unkown
page read and write
16A9000
direct allocation
page execute and read and write
1760000
heap
page read and write
7FF557103000
unkown
page readonly
7FF55703F000
unkown
page readonly
2ED0000
heap
page read and write
3404000
heap
page read and write
2F29000
trusted library allocation
page read and write
8EEE000
unkown
page read and write
6C0C000
stack
page read and write
7FF5572A2000
unkown
page readonly
7FF5569F1000
unkown
page readonly
BC00000
unkown
page readonly
EB0000
heap
page read and write
3582000
direct allocation
page execute and read and write
326D000
stack
page read and write
2DE0000
direct allocation
page read and write
5404000
trusted library allocation
page read and write
2C10000
heap
page read and write
2E00000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
2D0F000
stack
page read and write
666E000
stack
page read and write
583E000
stack
page read and write
2FCE000
stack
page read and write
81F000
stack
page read and write
69BF000
trusted library allocation
page read and write
7D0000
heap
page read and write
C80000
trusted library allocation
page read and write
FBB000
unclassified section
page execute and read and write
4EDC000
stack
page read and write
8820000
unkown
page readonly
2FDF000
stack
page read and write
4B92000
direct allocation
page execute and read and write
1550000
heap
page read and write
5AAF000
stack
page read and write
2ACF000
stack
page read and write
7908000
stack
page read and write
6A55000
trusted library allocation
page read and write
283E000
stack
page read and write
1486000
direct allocation
page execute and read and write
E7F000
unclassified section
page execute and read and write
89CC000
unkown
page read and write
542D000
trusted library allocation
page read and write
7EE10000
trusted library allocation
page execute and read and write
2DD0000
heap
page read and write
7FF557062000
unkown
page readonly
2AF4000
heap
page read and write
8D60000
unkown
page read and write
7E03000
stack
page read and write
29AE000
stack
page read and write
A85A000
unkown
page read and write
18D0000
unclassified section
page execute and read and write
6A81000
trusted library allocation
page read and write
2BCD000
stack
page read and write
7FF557257000
unkown
page readonly
53E7000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
2D31000
heap
page read and write
7A50000
unkown
page readonly
7FF557009000
unkown
page readonly
3121000
trusted library allocation
page read and write
2F10000
unkown
page readonly
AFC000
stack
page read and write
1280000
heap
page read and write
24B0000
trusted library allocation
page read and write
6B9E000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
8530000
unkown
page readonly
8DAD000
unkown
page read and write
7FF5572D4000
unkown
page readonly
4820000
unkown
page read and write
69C0000
trusted library allocation
page execute and read and write
2EB0000
heap
page read and write
7040D000
unkown
page read and write
4730000
unkown
page read and write
7FF5571AC000
unkown
page readonly
BF3F000
stack
page read and write
2F6D000
trusted library allocation
page read and write
2900000
heap
page read and write
7FF5573C1000
unkown
page readonly
6FC000
stack
page read and write
EFE000
stack
page read and write
2F52000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
7FF556E75000
unkown
page readonly
BBE0000
unkown
page readonly
C1DB000
unkown
page read and write
2F52000
heap
page read and write
3614000
heap
page read and write
13E3000
trusted library allocation
page read and write
47C0000
unkown
page read and write
140F000
stack
page read and write
27F0000
heap
page read and write
936E000
unkown
page read and write
C20000
unkown
page read and write
E20000
heap
page read and write
97BE000
stack
page read and write
7FF55710F000
unkown
page readonly
2BDF000
unkown
page read and write
B628000
stack
page read and write
2E60000
heap
page read and write
1480000
trusted library allocation
page read and write
4DAE000
stack
page read and write
4E10000
heap
page execute and read and write
24A0000
trusted library allocation
page read and write
4B50000
heap
page read and write
147E000
stack
page read and write
4810000
unkown
page read and write
F8E000
stack
page read and write
91D9000
stack
page read and write
1070000
heap
page read and write
7FF557617000
unkown
page readonly
1370000
unclassified section
page execute and read and write
7FF5571B3000
unkown
page readonly
A877000
unkown
page read and write
104CB000
unkown
page read and write
31B8000
heap
page read and write
B628000
stack
page read and write
7FF556E3D000
unkown
page readonly
E280000
unkown
page read and write
7FF556F31000
unkown
page readonly
172D000
direct allocation
page execute and read and write
2D94000
trusted library allocation
page read and write
1441000
heap
page read and write
1113F000
system
page read and write
9F0E000
stack
page read and write
24AD000
stack
page read and write
17F0000
unclassified section
page execute and read and write
F9B000
heap
page read and write
3450000
unkown
page read and write
5490000
heap
page read and write
13FA000
trusted library allocation
page execute and read and write
593E000
stack
page read and write
7DF468971000
unkown
page execute read
13AB000
unclassified section
page execute and read and write
7160000
unkown
page read and write
2DD0000
heap
page read and write
A0A5000
unkown
page read and write
2DB0000
heap
page read and write
5310000
trusted library allocation
page read and write
E329000
stack
page read and write
9B5000
stack
page read and write
1434000
heap
page read and write
BEBF000
stack
page read and write
7FF5575E3000
unkown
page readonly
2E20000
trusted library allocation
page read and write
BF3F000
stack
page read and write
7FF55751D000
unkown
page readonly
69A0000
trusted library allocation
page read and write
606F000
stack
page read and write
1290000
heap
page read and write
25F0000
heap
page read and write
C428000
unkown
page read and write
3190000
trusted library allocation
page read and write
A810000
unkown
page read and write
5161000
unkown
page read and write
3220000
unkown
page readonly
326E000
unclassified section
page execute and read and write
8EDD000
unkown
page read and write
2D54000
trusted library allocation
page read and write
CDE000
stack
page read and write
A0A8000
unkown
page read and write
2F10000
heap
page read and write
5720000
heap
page read and write
C3FB000
unkown
page read and write
7FF557042000
unkown
page readonly
7FF5573D5000
unkown
page readonly
98DA000
stack
page read and write
47EE000
unkown
page read and write
2DAB000
trusted library allocation
page execute and read and write
A873000
unkown
page read and write
C59E000
unkown
page read and write
2CA0000
heap
page read and write
292E000
stack
page read and write
3746000
trusted library allocation
page read and write
3E76000
trusted library allocation
page read and write
B1E000
stack
page read and write
3404000
heap
page read and write
9853000
unkown
page read and write
D1D000
heap
page read and write
A286000
unkown
page read and write
9C0000
heap
page read and write
2E86000
stack
page read and write
50B0000
unkown
page write copy
2C0A000
heap
page read and write
4F8B000
stack
page read and write
7FF557264000
unkown
page readonly
C3F7000
unkown
page read and write
44F1000
heap
page read and write
665E000
stack
page read and write
904C000
unkown
page read and write
2F71000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
7FF55707D000
unkown
page readonly
54BD000
trusted library allocation
page read and write
CD9000
stack
page read and write
360B000
heap
page read and write
13E0000
trusted library allocation
page read and write
CAB000
trusted library allocation
page read and write
3EBC000
trusted library allocation
page read and write
6B6C000
stack
page read and write
7176000
unkown
page read and write
2D1E000
unkown
page read and write
17B0000
heap
page execute and read and write
9580000
unkown
page readonly
7FF5571A1000
unkown
page readonly
1360000
heap
page read and write
2FAA000
heap
page read and write
3213000
stack
page read and write
C04F000
unkown
page read and write
661F000
stack
page read and write
3230000
trusted library allocation
page read and write
C214000
unkown
page read and write
66AF000
stack
page read and write
8F0000
trusted library allocation
page read and write
C091000
unkown
page read and write
2889000
heap
page read and write
4C90000
trusted library allocation
page execute and read and write
4781000
unkown
page read and write
55D0000
trusted library allocation
page read and write
2C30000
heap
page read and write
1350000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
A0FF000
unkown
page read and write
4734000
unkown
page read and write
2490000
trusted library allocation
page read and write
47C6000
unkown
page read and write
A8CA000
unkown
page read and write
702C000
stack
page read and write
2BCC000
stack
page read and write
6B20000
trusted library allocation
page execute and read and write
34B0000
heap
page read and write
5690000
trusted library allocation
page execute and read and write
2F6F000
stack
page read and write
A8CD000
unkown
page read and write
8D86000
unkown
page read and write
A8DD000
unkown
page read and write
2ED8000
heap
page read and write
1350000
heap
page read and write
FB0000
unkown
page read and write
7FF556E7C000
unkown
page readonly
7FF557106000
unkown
page readonly
8D7A000
unkown
page read and write
2D7E000
unkown
page read and write
7FF5571A1000
unkown
page readonly
2E70000
heap
page read and write
8EB8000
unkown
page read and write
6D70000
heap
page read and write
72B0000
heap
page read and write
62FF000
stack
page read and write
65A7000
heap
page read and write
504C000
stack
page read and write
7FF557393000
unkown
page readonly
E10000
heap
page read and write
322F000
stack
page read and write
7FF557235000
unkown
page readonly
2E29000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
55F0000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
9CDC000
stack
page read and write
2DA2000
trusted library allocation
page read and write
3B39000
heap
page read and write
7FF557352000
unkown
page readonly
8ED5000
unkown
page read and write
5990000
trusted library allocation
page execute and read and write
1253000
heap
page read and write
7FF5573C1000
unkown
page readonly
1350000
trusted library allocation
page read and write
64DE000
stack
page read and write
2E0A000
stack
page read and write
14A5000
trusted library allocation
page execute and read and write
793000
trusted library allocation
page execute and read and write
73F0000
unkown
page read and write
7C30000
unkown
page readonly
6960000
trusted library allocation
page execute and read and write
2E00000
heap
page read and write
509E000
stack
page read and write
B080000
unkown
page read and write
50DD000
stack
page read and write
326A000
unclassified section
page execute and read and write
120A000
trusted library allocation
page execute and read and write
273F000
unkown
page read and write
A154000
unkown
page read and write
7FF55722A000
unkown
page readonly
14E0000
direct allocation
page execute and read and write
717A000
unkown
page read and write
860000
heap
page read and write
E60000
heap
page read and write
7FF557669000
unkown
page readonly
310B000
trusted library allocation
page read and write
30AD000
unclassified section
page execute and read and write
788B000
stack
page read and write
4074000
trusted library allocation
page read and write
842F000
stack
page read and write
6A20000
trusted library allocation
page execute and read and write
7FF557571000
unkown
page readonly
2D90000
trusted library allocation
page read and write
10584000
unkown
page read and write
1580000
direct allocation
page execute and read and write
46FD000
heap
page read and write
5680000
heap
page read and write
31E3000
trusted library allocation
page read and write
25A0000
heap
page execute and read and write
354E000
stack
page read and write
5490000
trusted library allocation
page read and write
2F53000
heap
page read and write
716B000
unkown
page read and write
2DBC000
heap
page read and write
54F3000
heap
page read and write
5DFE000
stack
page read and write
6750000
heap
page read and write
1530000
heap
page read and write
1008000
heap
page read and write
6C06000
heap
page read and write
B1B0000
system
page execute and read and write
CF0000
unkown
page readonly
ADAF000
stack
page read and write
2F90000
unkown
page readonly
2E0A000
stack
page read and write
14A0000
trusted library allocation
page read and write
3100000
heap
page read and write
2D5B000
trusted library allocation
page read and write
1245000
heap
page read and write
73E000
stack
page read and write
7DF4689B1000
unkown
page execute read
1212000
trusted library allocation
page read and write
7FF557501000
unkown
page readonly
621E000
stack
page read and write
E370000
unkown
page read and write
4016000
trusted library allocation
page read and write
5550000
heap
page read and write
7FF5571DF000
unkown
page readonly
7DF468990000
unkown
page readonly
25D0000
heap
page read and write
6E9F000
heap
page read and write
99E9000
system
page execute and read and write
4036000
trusted library allocation
page read and write
9E0F000
stack
page read and write
1520000
heap
page read and write
2D70000
heap
page read and write
1440000
unkown
page readonly
C427000
unkown
page read and write
C374000
unkown
page read and write
B4A6000
stack
page read and write
299D000
stack
page read and write
3150000
heap
page read and write
7FF557045000
unkown
page readonly
C233000
unkown
page read and write
25FD000
stack
page read and write
5300000
trusted library allocation
page read and write
C56F000
unkown
page read and write
3194000
trusted library allocation
page read and write
25F0000
direct allocation
page read and write
7FF5574A9000
unkown
page readonly
2C70000
heap
page read and write
3030000
heap
page read and write
7FF556FC4000
unkown
page readonly
7300000
unkown
page read and write
7FF5575BD000
unkown
page readonly
7C30000
unkown
page readonly
C582000
unkown
page read and write
7FF556E7B000
unkown
page readonly
718B000
unkown
page read and write
6C4000
heap
page read and write
2EF4000
heap
page read and write
16FF000
stack
page read and write
29F0000
heap
page read and write
EBDB000
stack
page read and write
5530000
trusted library allocation
page read and write
12AE000
stack
page read and write
9052000
unkown
page read and write
A110000
unkown
page read and write
6FCE000
stack
page read and write
B3F000
stack
page read and write
49EE000
direct allocation
page execute and read and write
C22B000
unkown
page read and write
280C000
heap
page read and write
7FF556F84000
unkown
page readonly
2D01000
heap
page read and write
4E00000
trusted library allocation
page read and write
7FF5570FE000
unkown
page readonly
2F6F000
unkown
page read and write
13F0000
heap
page read and write
E60000
unclassified section
page execute and read and write
472E000
heap
page read and write
C12D000
unkown
page read and write
47DB000
unkown
page read and write
2DA8000
trusted library allocation
page read and write
15D1000
direct allocation
page execute and read and write
48A9000
heap
page read and write
54D5000
trusted library allocation
page read and write
2E30000
trusted library allocation
page execute and read and write
29C0000
heap
page read and write
990000
system
page execute and read and write
2C6E000
stack
page read and write
7F890000
trusted library allocation
page execute and read and write
C4BF000
unkown
page read and write
3C0000
heap
page read and write
4096000
trusted library allocation
page read and write
A215000
unkown
page read and write
1705000
trusted library allocation
page execute and read and write
77D0000
unkown
page read and write
A23B000
unkown
page read and write
1510000
trusted library allocation
page read and write
25BE000
unkown
page read and write
A22F000
unkown
page read and write
2C2C000
heap
page read and write
7FF5569E8000
unkown
page readonly
7FF55706A000
unkown
page readonly
E463000
system
page execute and read and write
31E1000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
2940000
heap
page read and write
C1DD000
unkown
page read and write
68F9000
heap
page read and write
4E48000
trusted library allocation
page read and write
8D76000
unkown
page read and write
8810000
unkown
page readonly
FD0000
heap
page read and write
1890000
unclassified section
page execute and read and write
7FF557602000
unkown
page readonly
1720000
trusted library allocation
page read and write
4730000
unkown
page read and write
16C0000
unclassified section
page execute and read and write
7FF55730C000
unkown
page readonly
7FF557467000
unkown
page readonly
2E3E000
stack
page read and write
7FF557589000
unkown
page readonly
138D000
direct allocation
page execute and read and write
29C4000
heap
page read and write
55B0000
trusted library allocation
page read and write
7322000
unkown
page read and write
61A0000
trusted library allocation
page execute and read and write
A0A5000
unkown
page read and write
54B1000
trusted library allocation
page read and write
E270000
unkown
page read and write
679E000
stack
page read and write
318C000
heap
page read and write
C1E9000
unkown
page read and write
5C7E000
stack
page read and write
AD4000
heap
page read and write
5FAE000
heap
page read and write
5540000
trusted library allocation
page read and write
122D000
trusted library allocation
page execute and read and write
46F0000
unkown
page read and write
6B10000
trusted library allocation
page execute and read and write
5790000
trusted library allocation
page read and write
C424000
unkown
page read and write
350D000
direct allocation
page execute and read and write
7FF5570E7000
unkown
page readonly
3C62000
heap
page read and write
F522000
heap
page read and write
2AF4000
heap
page read and write
7178000
unkown
page read and write
7FF557653000
unkown
page readonly
32C9000
unkown
page read and write
5500000
trusted library allocation
page read and write
5F56000
heap
page read and write
E5E000
stack
page read and write
90D8000
unkown
page read and write
616E000
stack
page read and write
11F0000
trusted library allocation
page read and write
2D21000
heap
page read and write
E10000
system
page execute and read and write
2B9D000
stack
page read and write
A154000
unkown
page read and write
72FE000
unkown
page read and write
C0F3000
unkown
page read and write
715E000
stack
page read and write
7FF5574BD000
unkown
page readonly
2D7D000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
4BEE000
direct allocation
page execute and read and write
584E000
stack
page read and write
97A7000
system
page execute and read and write
7FF55745B000
unkown
page readonly
4D92000
direct allocation
page execute and read and write
3290000
trusted library allocation
page read and write
2E1F000
stack
page read and write
C063000
unkown
page read and write
C06D000
unkown
page read and write
7FF556FFF000
unkown
page readonly
7DF4689A1000
unkown
page execute read
2BE0000
heap
page read and write
8F09000
unkown
page read and write
7FF557554000
unkown
page readonly
E91D000
stack
page read and write
C00000
heap
page read and write
10584000
unkown
page read and write
7FF5573D3000
unkown
page readonly
7FF556E4D000
unkown
page readonly
54B0000
heap
page read and write
73C5000
stack
page read and write
47CD000
heap
page read and write
7FF5573F3000
unkown
page readonly
25AD000
stack
page read and write
6C2C000
stack
page read and write
583E000
stack
page read and write
5640000
trusted library allocation
page read and write
4324000
trusted library allocation
page read and write
10E21000
system
page execute and read and write
AE2B000
stack
page read and write
1520000
trusted library allocation
page read and write
2FB9000
trusted library allocation
page read and write
3054000
heap
page read and write
88E1000
unkown
page read and write
1260000
heap
page read and write
10484000
unkown
page read and write
7FF5570C5000
unkown
page readonly
870000
heap
page read and write
29C4000
heap
page read and write
3340000
heap
page read and write
B52A000
stack
page read and write
67FF000
stack
page read and write
336C000
stack
page read and write
5560000
trusted library allocation
page execute and read and write
133B000
trusted library allocation
page execute and read and write
54F0000
heap
page read and write
661E000
stack
page read and write
7D0E000
stack
page read and write
7FF5573D3000
unkown
page readonly
2ACF000
stack
page read and write
7FF557387000
unkown
page readonly
2E1B000
trusted library allocation
page read and write
53A0000
heap
page read and write
7FF557382000
unkown
page readonly
2F09000
stack
page read and write
3380000
heap
page read and write
248D000
trusted library allocation
page read and write
7FF557037000
unkown
page readonly
53E0000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
C31000
unkown
page readonly
7FF55726C000
unkown
page readonly
8A2000
trusted library allocation
page read and write
7FF5575FC000
unkown
page readonly
88A0000
unkown
page read and write
2D10000
heap
page read and write
BBC0000
unkown
page read and write
9259000
stack
page read and write
7FF556A1B000
unkown
page readonly
7FF557434000
unkown
page readonly
32F3000
unkown
page read and write
7FF5574F9000
unkown
page readonly
A0FC000
unkown
page read and write
41D9000
trusted library allocation
page read and write
E9D000
trusted library allocation
page execute and read and write
7FF5570CF000
unkown
page readonly
317F000
stack
page read and write
8F83000
unkown
page read and write
2A3E000
stack
page read and write
166E000
stack
page read and write
6B30000
trusted library allocation
page read and write
E0E000
stack
page read and write
7FF55761F000
unkown
page readonly
52D4000
trusted library allocation
page read and write
5EFE000
stack
page read and write
2570000
heap
page read and write
2FA1000
heap
page read and write
2E70000
heap
page read and write
6F2E000
stack
page read and write
32DB000
unkown
page read and write
9740000
system
page execute and read and write
F90000
heap
page read and write
660C000
stack
page read and write
639E000
stack
page read and write
7FF5572B4000
unkown
page readonly
10C0000
direct allocation
page execute and read and write
58DE000
stack
page read and write
C3E7000
unkown
page read and write
5510000
heap
page read and write
A858000
unkown
page read and write
2CAC000
heap
page read and write
620000
system
page execute and read and write
4F28000
trusted library allocation
page read and write
5192000
direct allocation
page execute and read and write
902E000
unkown
page read and write
7FF5575AB000
unkown
page readonly
2DFF000
stack
page read and write
2D30000
trusted library allocation
page read and write
2A8F000
stack
page read and write
2DF0000
heap
page read and write
3290000
trusted library allocation
page read and write
46A4000
heap
page read and write
247E000
trusted library allocation
page read and write
1386000
direct allocation
page execute and read and write
7FF55724C000
unkown
page readonly
7FF55741C000
unkown
page readonly
4196000
trusted library allocation
page read and write
7FF55742B000
unkown
page readonly
C6D000
heap
page read and write
46E0000
unkown
page read and write
2FBB000
trusted library allocation
page read and write
7FF557293000
unkown
page readonly
88D000
stack
page read and write
8D7A000
unkown
page read and write
2D8D000
trusted library allocation
page execute and read and write
2EAF000
unkown
page read and write
93FD000
stack
page read and write
7FF5575C5000
unkown
page readonly
There are 3161 hidden memdumps, click here to show them.