IOC Report
NEW ORDER_.exe

loading gif

Files

File Path
Type
Category
Malicious
NEW ORDER_.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_fe8167436d6db6c6d2c4bed5d6f2d2c06e142845_f78a65ed_d88794a9-3ae8-4ccf-9e81-c2d383b4609a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1593.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15C3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD8.tmp.dmp
Mini DuMP crash report, 17 streams, Fri Nov 22 15:16:45 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000001b.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\Windows[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\aut7281.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\syphilous
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NEW ORDER_.exe
"C:\Users\user\Desktop\NEW ORDER_.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\NEW ORDER_.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\ipconfig.exe
"C:\Windows\SysWOW64\ipconfig.exe"
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4056 -s 3536

URLs

Name
IP
Malicious
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA12QGBm-dark
unknown
https://api.msn.com:443/v1/news/Feed/Windows?t
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.066iwx2t.shop/ge07/www.g18q11a.top
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
unknown
http://www.reyhazeusa.shop
unknown
http://www.ivglass.xyzReferer:
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://www.f7y2i9fgm.xyz/ge07/www.giyztm.xyz
unknown
https://www.msn.com/en-us/money/realestate/senator-questions-w
unknown
http://www.ehkd.top/ge07/www.ivglass.xyz
unknown
http://www.yegle.net/ge07/www.066iwx2t.shop
unknown
http://www.ehkd.top/ge07/
unknown
http://www.giyztm.xyz/ge07/
unknown
http://www.ivglass.xyz/ge07/
unknown
http://www.reyhazeusa.shopReferer:
unknown
http://www.f7y2i9fgm.xyz
unknown
http://www.nce-ystyx.xyz
unknown
http://www.giyztm.xyzReferer:
unknown
http://www.dvle-father.xyz/ge07/www.yegle.net
unknown
https://www.msn.com/en-
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
unknown
http://www.ostcanadantpl.top/ge07/www.f7y2i9fgm.xyz
unknown
http://www.ostcanadantpl.topReferer:
unknown
http://www.yegle.net/ge07/
unknown
http://www.dvle-father.xyz
unknown
https://wns.windows.com/
unknown
http://www.acifictechnologycctv.net/ge07/
unknown
http://www.9net88.net/ge07/www.dvle-father.xyz
unknown
http://www.epehr.pics
unknown
https://word.office.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://www.msn.com/en-us/play/games/bubbly
unknown
https://outlook.comOB
unknown
http://www.ood-packaging-jobs-brasil.today/ge07/www.acifictechnologycctv.net
unknown
http://www.ngeribe2.homes
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
https://www.msn.com/en-us/play/g
unknown
https://api.msn.com:443/v1/news/Feed/Windows?=
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.ivglass.xyz/ge07/www.nce-ystyx.xyz
unknown
https://outlook.com
unknown
http://www.ehkd.top
unknown
http://www.acifictechnologycctv.net/ge07/www.reyhazeusa.shop
unknown
www.9net88.net/ge07/
http://www.g18q11a.top/ge07/
unknown
http://www.ood-packaging-jobs-brasil.today
unknown
https://android.notify.windows.com/iOS
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.f7y2i9fgm.xyz/ge07/
unknown
https://api.msn.com/v1/news/Feed/Windows??K
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.reyhazeusa.shop/ge07/www.ostcanadantpl.top
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
unknown
http://www.epehr.pics/ge07/www.ngeribe2.homes
unknown
http://www.g18q11a.topReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://www.pollensense.com/
unknown
http://www.9net88.netReferer:
unknown
http://www.ostcanadantpl.top/ge07/
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
http://schemas.micro
unknown
http://www.nce-ystyx.xyzReferer:
unknown
http://www.acifictechnologycctv.netReferer:
unknown
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA12QGBm
unknown
https://cdn.query.
unknown
http://www.9net88.net/ge07/
unknown
https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.066iwx2t.shopReferer:
unknown
https://word.office.com%I
unknown
http://www.nce-ystyx.xyz/ge07/
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
http://www.dvle-father.xyzReferer:
unknown
http://www.ehkd.topReferer:
unknown
http://www.giyztm.xyz
unknown
https://www.msn.com/en-u
unknown
http://www.giyztm.xyz/ge07/www.epehr.pics
unknown
http://www.f7y2i9fgm.xyzReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gAHG-dark
unknown
http://www.ostcanadantpl.top
unknown
http://www.g18q11a.top
unknown
http://www.acifictechnologycctv.net
unknown
http://www.reyhazeusa.shop/ge07/
unknown
https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
unknown
http://www.ngeribe2.homes/ge07/
unknown
http://www.dvle-father.xyz/ge07/
unknown
http://www.epehr.pics/ge07/
unknown
http://schemas.microsoft.
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://powerpoint.office.com
unknown
http://www.foreca.com
unknown
https://www.msn.com/en-us/sports/other/paul-finebaum-ranks-his-top-four-college-football-teams-this-
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.acifictechnologycctv.net
unknown
malicious
www.reyhazeusa.shop
unknown
malicious
www.ostcanadantpl.top
unknown
malicious
www.ood-packaging-jobs-brasil.today
unknown
malicious
api.msn.com
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010414
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001040E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030406
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010402
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103FC
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C8
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103B2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103A6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103A2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001039A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010392
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002037A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001037E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004030E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000302FE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004028E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004018C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000240048
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
There are 72 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3170000
unclassified section
page execute and read and write
malicious
C90000
system
page execute and read and write
malicious
3140000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
3AB0000
direct allocation
page read and write
malicious
3170000
trusted library allocation
page read and write
malicious
31A0000
unclassified section
page execute and read and write
malicious
31B1000
trusted library allocation
page execute and read and write
7FF55742B000
unkown
page readonly
2E0A000
stack
page read and write
A114000
unkown
page read and write
27F0000
heap
page read and write
C244000
unkown
page read and write
E470000
system
page execute and read and write
9AB9000
heap
page read and write
C57C000
unkown
page read and write
C3F7000
unkown
page read and write
EEC000
stack
page read and write
3240000
trusted library allocation
page execute and read and write
8D74000
unkown
page read and write
7A51000
heap
page read and write
77D000
unkown
page readonly
B43B000
heap
page read and write
46F0000
unkown
page read and write
3300000
trusted library allocation
page read and write
7140000
unkown
page read and write
CA4D000
heap
page read and write
A22F000
unkown
page read and write
9B33000
heap
page read and write
CE4000
heap
page read and write
B453000
heap
page read and write
B030000
unkown
page readonly
4BFB000
stack
page read and write
7FF55710F000
unkown
page readonly
7FF55703F000
unkown
page readonly
7FF557113000
unkown
page readonly
31A0000
trusted library allocation
page read and write
5106000
heap
page read and write
C57E000
unkown
page read and write
C976000
heap
page read and write
7C14000
heap
page read and write
34B0000
direct allocation
page execute and read and write
9013000
unkown
page read and write
718B000
unkown
page read and write
7FF5570F7000
unkown
page readonly
9BFD000
heap
page read and write
2D0B000
stack
page read and write
7FF55714D000
unkown
page readonly
B368000
heap
page read and write
2A13000
heap
page read and write
3064000
heap
page read and write
7AF2000
heap
page read and write
A186000
system
page read and write
B72B000
stack
page read and write
5115000
heap
page read and write
10C9000
heap
page read and write
3770000
heap
page read and write
F0CE000
unkown
page read and write
4FFF000
heap
page read and write
7DF468990000
unkown
page readonly
B396000
heap
page read and write
730B000
unkown
page read and write
C85F000
heap
page read and write
8DA6000
unkown
page read and write
50B0000
unkown
page write copy
7BD9000
heap
page read and write
9C1B000
heap
page read and write
C4AA000
unkown
page read and write
8D76000
unkown
page read and write
B4BE000
heap
page read and write
515F000
heap
page read and write
C6D0000
heap
page read and write
7FF5571A1000
unkown
page readonly
7FF55714D000
unkown
page readonly
7A78000
heap
page read and write
B2E6000
heap
page read and write
98D6000
heap
page read and write
5180000
trusted library allocation
page read and write
7162000
unkown
page read and write
7FF5573DE000
unkown
page readonly
CE4000
heap
page read and write
C889000
heap
page read and write
B460000
heap
page read and write
A00A000
stack
page read and write
7FF5570D6000
unkown
page readonly
9C64000
heap
page read and write
C450000
unkown
page read and write
7AC8000
heap
page read and write
7FF5570E7000
unkown
page readonly
9B02000
heap
page read and write
C40A000
unkown
page read and write
B7AA000
stack
page read and write
7FF557210000
unkown
page readonly
A156000
unkown
page read and write
9BF7000
heap
page read and write
2C8F000
stack
page read and write
C8FF000
heap
page read and write
3784000
unclassified section
page execute and read and write
9A61000
heap
page read and write
C4E8000
unkown
page read and write
8EEE000
unkown
page read and write
A225000
unkown
page read and write
F0B6000
unkown
page read and write
9AD1000
heap
page read and write
7AF000
unkown
page write copy
7FF556F26000
unkown
page readonly
7FF5575D5000
unkown
page readonly
7FF557413000
unkown
page readonly
15B2000
heap
page read and write
A231000
unkown
page read and write
7185000
unkown
page read and write
3118000
stack
page read and write
DE0000
trusted library allocation
page read and write
7176000
unkown
page read and write
7FF556E7E000
unkown
page readonly
8D78000
unkown
page read and write
B47A000
heap
page read and write
2C24000
heap
page read and write
B463000
heap
page read and write
9C79000
heap
page read and write
9B2E000
heap
page read and write
C4B5000
unkown
page read and write
C502000
unkown
page read and write
35D1000
direct allocation
page execute and read and write
7FF5575D0000
unkown
page readonly
1FAF000
stack
page read and write
842F000
stack
page read and write
7FF55745B000
unkown
page readonly
1090000
heap
page read and write
88C0000
unkown
page read and write
40FD000
direct allocation
page read and write
91D9000
stack
page read and write
CE4000
heap
page read and write
7FF55708D000
unkown
page readonly
5003000
heap
page read and write
7FB0000
trusted library allocation
page read and write
B456000
heap
page read and write
7FF5573A9000
unkown
page readonly
C4EF000
unkown
page read and write
7FF55733F000
unkown
page readonly
C4B5000
unkown
page read and write
4734000
unkown
page read and write
9B2C000
heap
page read and write
7FF556F87000
unkown
page readonly
C74000
heap
page read and write
7DF4689A1000
unkown
page execute read
9259000
stack
page read and write
8870000
remote allocation
page read and write
99DF000
stack
page read and write
9AC1000
heap
page read and write
7FF557382000
unkown
page readonly
FB0000
unkown
page read and write
C9B8000
heap
page read and write
BB1B000
heap
page read and write
9C11000
heap
page read and write
329E000
heap
page read and write
71A4000
unkown
page read and write
98C6000
heap
page read and write
CE4000
heap
page read and write
46E0000
unkown
page read and write
7FF557065000
unkown
page readonly
7DF468970000
unkown
page readonly
B2E8000
heap
page read and write
9AB5000
heap
page read and write
B460000
heap
page read and write
7FF5571AC000
unkown
page readonly
B453000
heap
page read and write
7A87000
heap
page read and write
7FF557434000
unkown
page readonly
9AA8000
heap
page read and write
9C1F000
heap
page read and write
B456000
heap
page read and write
7FF55726C000
unkown
page readonly
7FF5574F1000
unkown
page readonly
9AC1000
heap
page read and write
A218000
unkown
page read and write
5130000
heap
page read and write
9C29000
heap
page read and write
9BC2000
heap
page read and write
8922000
heap
page read and write
7ADA000
heap
page read and write
7FF557257000
unkown
page readonly
9BEB000
heap
page read and write
13FA000
heap
page read and write
7FF557599000
unkown
page readonly
412D000
direct allocation
page read and write
C5C0000
heap
page readonly
7A4B000
stack
page read and write
7276000
unkown
page read and write
90AC000
unkown
page read and write
2EF0000
trusted library allocation
page read and write
CE4000
heap
page read and write
7FF5574A9000
unkown
page readonly
7DF468991000
unkown
page execute read
9C1F000
heap
page read and write
E290000
unkown
page read and write
316F000
stack
page read and write
B447000
heap
page read and write
337E000
stack
page read and write
32DB000
unkown
page read and write
99CB000
heap
page read and write
98D4000
heap
page read and write
892A000
heap
page read and write
B47A000
heap
page read and write
B628000
stack
page read and write
B47A000
heap
page read and write
7B53000
heap
page read and write
B47A000
heap
page read and write
9BC8000
heap
page read and write
77D000
unkown
page readonly
3049000
heap
page read and write
F0BC000
unkown
page read and write
73D0000
unkown
page read and write
C9FF000
heap
page read and write
C481000
unkown
page read and write
8AE6000
unkown
page read and write
3047000
heap
page read and write
B460000
heap
page read and write
9B6000
stack
page read and write
7FF557250000
unkown
page readonly
7FF557352000
unkown
page readonly
9BB6000
heap
page read and write
FD0000
unkown
page readonly
71FC000
unkown
page read and write
3040000
heap
page read and write
CA61000
heap
page read and write
B447000
heap
page read and write
98A0000
heap
page read and write
2D8A000
stack
page read and write
7DF468990000
unkown
page readonly
CA66000
heap
page read and write
32E3000
unkown
page read and write
7FF5573E2000
unkown
page readonly
B2CE000
heap
page read and write
7FF55741C000
unkown
page readonly
7A47000
heap
page read and write
13DE000
heap
page read and write
4840000
unkown
page read and write
C31000
unkown
page readonly
9AA8000
heap
page read and write
AFD2000
heap
page read and write
7B53000
heap
page read and write
7DF421A41000
trusted library allocation
page execute read
7FF557411000
unkown
page readonly
1390000
heap
page read and write
A0DA000
unkown
page read and write
142A000
heap
page read and write
A1FD000
unkown
page read and write
7FF55726A000
unkown
page readonly
8920000
heap
page read and write
C50000
heap
page read and write
8D6C000
unkown
page read and write
7FF5573BB000
unkown
page readonly
C1DB000
unkown
page read and write
7FF557083000
unkown
page readonly
9BC6000
heap
page read and write
9C29000
heap
page read and write
9AC1000
heap
page read and write
7A60000
unkown
page readonly
B5AE000
stack
page read and write
4769000
unkown
page read and write
DE0000
trusted library allocation
page read and write
7B53000
heap
page read and write
79B0000
unkown
page read and write
7FF5572AC000
unkown
page readonly
C3E7000
unkown
page read and write
A22F000
unkown
page read and write
7FF557302000
unkown
page readonly
364E000
direct allocation
page execute and read and write
9B26000
heap
page read and write
7FF557393000
unkown
page readonly
10BFF000
stack
page read and write
CACC000
heap
page read and write
7FF557239000
unkown
page readonly
7BE4000
heap
page read and write
9B43000
heap
page read and write
77D0000
unkown
page read and write
B14E000
stack
page read and write
7FF557602000
unkown
page readonly
377D000
direct allocation
page execute and read and write
CA85000
heap
page read and write
7FF556FFF000
unkown
page readonly
B356000
heap
page read and write
7FF556E75000
unkown
page readonly
715C000
unkown
page read and write
A156000
unkown
page read and write
7FF5572B6000
unkown
page readonly
7B64000
heap
page read and write
2F21000
heap
page read and write
B4BE000
heap
page read and write
1023000
heap
page read and write
C0FB000
unkown
page read and write
CAAA000
heap
page read and write
7FF5574BD000
unkown
page readonly
10B0000
unkown
page readonly
7FF556FE3000
unkown
page readonly
B43B000
heap
page read and write
842F000
stack
page read and write
7FF55732D000
unkown
page readonly
C063000
unkown
page read and write
35DD000
direct allocation
page execute and read and write
7FF5573E6000
unkown
page readonly
CA7B000
heap
page read and write
8F27000
unkown
page read and write
8D74000
unkown
page read and write
879F000
stack
page read and write
9C01000
heap
page read and write
84DC000
stack
page read and write
46F0000
unkown
page read and write
CE4000
heap
page read and write
7A87000
heap
page read and write
7FF5569E8000
unkown
page readonly
7FF55747D000
unkown
page readonly
B010000
unkown
page readonly
7FF5569F1000
unkown
page readonly
C1DD000
unkown
page read and write
C24F000
unkown
page read and write
7FF557285000
unkown
page readonly
7FF55753D000
unkown
page readonly
913F000
unkown
page read and write
CA90000
heap
page read and write
7306000
unkown
page read and write
CE4000
heap
page read and write
7FF557669000
unkown
page readonly
2F21000
heap
page read and write
98B2000
heap
page read and write
9C27000
heap
page read and write
7FF5573D3000
unkown
page readonly
7FF5573E2000
unkown
page readonly
2C3D000
stack
page read and write
7FF556E44000
unkown
page readonly
7A96000
heap
page read and write
7FF557285000
unkown
page readonly
9C2D000
heap
page read and write
7FF557617000
unkown
page readonly
EA0000
heap
page read and write
7DF468980000
unkown
page readonly
B46D000
heap
page read and write
9005000
unkown
page read and write
B4BE000
heap
page read and write
FBC000
stack
page read and write
B040000
unkown
page readonly
B46F000
heap
page read and write
A129000
unkown
page read and write
A154000
unkown
page read and write
C091000
unkown
page read and write
7B3C000
heap
page read and write
9C25000
heap
page read and write
A280000
unkown
page read and write
7FF557042000
unkown
page readonly
9938000
heap
page read and write
CE4000
heap
page read and write
90DB000
unkown
page read and write
7FF55724C000
unkown
page readonly
419E000
direct allocation
page read and write
2A13000
heap
page read and write
7FF55764C000
unkown
page readonly
3450000
unkown
page read and write
9C03000
heap
page read and write
10AFF000
stack
page read and write
9C69000
heap
page read and write
7FF5575BF000
unkown
page readonly
7FF546F2F000
unkown
page readonly
BBBB000
stack
page read and write
3E30000
direct allocation
page read and write
CE4000
heap
page read and write
C31000
unkown
page readonly
7FF55756D000
unkown
page readonly
7A9E000
heap
page read and write
7FF5572B4000
unkown
page readonly
7FF557045000
unkown
page readonly
510E000
heap
page read and write
98D6000
heap
page read and write
3210000
trusted library allocation
page execute and read and write
9AD1000
heap
page read and write
7FF556E6C000
unkown
page readonly
7FF557095000
unkown
page readonly
B456000
heap
page read and write
7FF5573B0000
unkown
page readonly
B46D000
heap
page read and write
CA5F000
heap
page read and write
CA49000
heap
page read and write
4880000
unkown
page read and write
7FF557026000
unkown
page readonly
B46F000
heap
page read and write
7C21000
heap
page read and write
512A000
heap
page read and write
7FF5570FE000
unkown
page readonly
CDE3000
trusted library allocation
page read and write
8B21000
unkown
page read and write
15B5000
heap
page read and write
72FE000
unkown
page read and write
7BDC000
heap
page read and write
7C1F000
heap
page read and write
7FF557476000
unkown
page readonly
9C07000
heap
page read and write
B82A000
stack
page read and write
BB38000
heap
page read and write
2C8E000
stack
page read and write
A08D000
stack
page read and write
7FF5575EA000
unkown
page readonly
8ED5000
unkown
page read and write
73D0000
unkown
page read and write
B463000
heap
page read and write
9B94000
heap
page read and write
7FF557420000
unkown
page readonly
3220000
unkown
page readonly
97EB000
stack
page read and write
3058000
heap
page read and write
B3C8000
heap
page read and write
C916000
heap
page read and write
4FB9000
heap
page read and write
B43B000
heap
page read and write
B456000
heap
page read and write
8D76000
unkown
page read and write
7C03000
heap
page read and write
8940000
unkown
page readonly
9B82000
heap
page read and write
9C07000
heap
page read and write
50F1000
heap
page read and write
7FF556E85000
unkown
page readonly
7BBC000
heap
page read and write
9C58000
heap
page read and write
6F1000
unkown
page execute read
961B000
stack
page read and write
9B42000
heap
page read and write
7A4B000
stack
page read and write
72C3000
unkown
page read and write
C59000
heap
page read and write
2A02000
heap
page read and write
BFD0000
unkown
page read and write
C7F2000
heap
page read and write
B348000
heap
page read and write
D958000
stack
page read and write
F0CE000
unkown
page read and write
9D8E000
stack
page read and write
C2E4000
unkown
page read and write
C916000
heap
page read and write
BF3F000
stack
page read and write
7FF5574EF000
unkown
page readonly
7A96000
heap
page read and write
416E000
direct allocation
page read and write
A0A8000
unkown
page read and write
C89C000
heap
page read and write
B3F5000
heap
page read and write
10875000
unkown
page execute and read and write
C976000
heap
page read and write
90F2000
unkown
page read and write
9BF9000
heap
page read and write
AFFF000
stack
page read and write
14B0000
heap
page read and write
416E000
direct allocation
page read and write
7FF557330000
unkown
page readonly
7FF5573ED000
unkown
page readonly
2F00000
heap
page read and write
4A70000
trusted library section
page readonly
9BBA000
heap
page read and write
A877000
unkown
page read and write
AD10000
unkown
page readonly
9580000
unkown
page readonly
7AC8000
heap
page read and write
C1DD000
unkown
page read and write
BC10000
unkown
page read and write
B453000
heap
page read and write
7173000
unkown
page read and write
D14000
heap
page read and write
B47A000
heap
page read and write
7FF5573ED000
unkown
page readonly
7FF556F90000
unkown
page readonly
7A8B000
heap
page read and write
B3F5000
heap
page read and write
864F000
stack
page read and write
A850000
unkown
page read and write
A8DD000
unkown
page read and write
7FF5570D4000
unkown
page readonly
9F0000
unkown
page readonly
7FF557245000
unkown
page readonly
9BD9000
heap
page read and write
E270000
unkown
page read and write
7FF556F2A000
unkown
page readonly
CE0000
heap
page read and write
8DFE000
unkown
page read and write
ED0000
system
page execute and read and write
B393000
heap
page read and write
9C09000
heap
page read and write
9B49000
heap
page read and write
3F53000
direct allocation
page read and write
7A50000
unkown
page readonly
7FF556F90000
unkown
page readonly
B010000
unkown
page readonly
7FF556E9A000
unkown
page readonly
7FF5570F7000
unkown
page readonly
7B68000
heap
page read and write
C5A7000
unkown
page read and write
3350000
unkown
page readonly
7FF556E44000
unkown
page readonly
7FF55704A000
unkown
page readonly
900000
unkown
page readonly
8D80000
unkown
page read and write
8977000
unkown
page read and write
7FF55719C000
unkown
page readonly
98DA000
stack
page read and write
AEE7000
stack
page read and write
B3C8000
heap
page read and write
9C11000
heap
page read and write
7FF557037000
unkown
page readonly
910F000
unkown
page read and write
9050000
unkown
page read and write
7B99000
stack
page read and write
C597000
unkown
page read and write
717C000
unkown
page read and write
7AA5000
heap
page read and write
7C00000
unkown
page readonly
C8B1000
heap
page read and write
7FF55747D000
unkown
page readonly
F0AE000
unkown
page read and write
A0FF000
unkown
page read and write
C244000
unkown
page read and write
9B04000
heap
page read and write
DE0000
trusted library allocation
page read and write
B396000
heap
page read and write
7FF557617000
unkown
page readonly
B4A6000
stack
page read and write
7FF557416000
unkown
page readonly
A08D000
stack
page read and write
9C05000
heap
page read and write
C9B8000
heap
page read and write
10A0000
heap
page read and write
A218000
unkown
page read and write
7FF55751D000
unkown
page readonly
8EF5000
unkown
page read and write
7169000
unkown
page read and write
C8D2000
heap
page read and write
C57C000
unkown
page read and write
7FF557568000
unkown
page readonly
3249000
unkown
page read and write
8530000
unkown
page readonly
C101000
unkown
page read and write
8870000
remote allocation
page read and write
C506000
unkown
page read and write
B3C8000
heap
page read and write
13EE000
heap
page read and write
B447000
heap
page read and write
8D60000
unkown
page read and write
7FF55741A000
unkown
page readonly
76B0000
unkown
page read and write
B47A000
heap
page read and write
B2C1000
heap
page read and write
B4BE000
heap
page read and write
10B1F000
system
page read and write
4830000
unkown
page read and write
7FF557083000
unkown
page readonly
72C3000
unkown
page read and write
7FF557642000
unkown
page readonly
7A79000
heap
page read and write
9B1C000
heap
page read and write
4800000
unkown
page read and write
9B49000
heap
page read and write
7FF55703F000
unkown
page readonly
7FF557411000
unkown
page readonly
7FF557235000
unkown
page readonly
90DB000
unkown
page read and write
904C000
unkown
page read and write
3450000
unkown
page read and write
77D0000
unkown
page read and write
7803000
unkown
page read and write
7FF556E4A000
unkown
page readonly
32E6000
unkown
page read and write
904C000
unkown
page read and write
902C000
unkown
page read and write
B4A6000
stack
page read and write
8EB8000
unkown
page read and write
512E000
heap
page read and write
C2D3000
unkown
page read and write
9086000
unkown
page read and write
3350000
unkown
page readonly
7FF557463000
unkown
page readonly
7FF5574BA000
unkown
page readonly
9C11000
heap
page read and write
B24D000
stack
page read and write
9C1D000
heap
page read and write
7DF4689A1000
unkown
page execute read
7FF557113000
unkown
page readonly
BFBD000
stack
page read and write
D14000
heap
page read and write
7FF557062000
unkown
page readonly
2E88000
stack
page read and write
3650000
unclassified section
page execute and read and write
9C5C000
heap
page read and write
BFD0000
unkown
page read and write
9917000
heap
page read and write
501A000
heap
page read and write
7AAE000
heap
page read and write
47C6000
unkown
page read and write
76B0000
unkown
page read and write
A810000
unkown
page read and write
7BC0000
heap
page read and write
7FF557293000
unkown
page readonly
477D000
unkown
page read and write
7FF557387000
unkown
page readonly
7FF55750F000
unkown
page readonly
716E000
unkown
page read and write
864F000
stack
page read and write
7FF5573D8000
unkown
page readonly
B456000
heap
page read and write
C63F000
heap
page read and write
8EDD000
unkown
page read and write
7FF557264000
unkown
page readonly
4734000
unkown
page read and write
C6D000
heap
page read and write
B42F000
stack
page read and write
C4A3000
unkown
page read and write
A286000
unkown
page read and write
9BD9000
heap
page read and write
C506000
unkown
page read and write
CE4000
heap
page read and write
7FF55748F000
unkown
page readonly
CA88000
heap
page read and write
E280000
unkown
page read and write
7FF5574BD000
unkown
page readonly
902C000
unkown
page read and write
B32A000
heap
page read and write
C3ED000
unkown
page read and write
CE4000
heap
page read and write
9B8B000
heap
page read and write
B368000
heap
page read and write
C8FF000
heap
page read and write
3300000
trusted library allocation
page read and write
798E000
stack
page read and write
4F27000
heap
page read and write
4FB1000
heap
page read and write
B46D000
heap
page read and write
B2EE000
heap
page read and write
77C0000
unkown
page read and write
9C25000
heap
page read and write
A0B9000
unkown
page read and write
A286000
unkown
page read and write
7DF4689B1000
unkown
page execute read
B32E000
heap
page read and write
C233000
unkown
page read and write
5132000
heap
page read and write
7FF5570B5000
unkown
page readonly
C091000
unkown
page read and write
71B2000
unkown
page read and write
9C9D000
heap
page read and write
5D70000
trusted library allocation
page read and write
9C84000
heap
page read and write
32B9000
unkown
page read and write
9AAD000
heap
page read and write
7FF5574F9000
unkown
page readonly
4730000
unkown
page read and write
7FF557456000
unkown
page readonly
4732000
unkown
page read and write
7FF556F9E000
unkown
page readonly
A8D3000
unkown
page read and write
CAAA000
heap
page read and write
A8CA000
unkown
page read and write
1491000
heap
page read and write
C233000
unkown
page read and write
4E8F000
stack
page read and write
9AA8000
heap
page read and write
7FF557328000
unkown
page readonly
4F4A000
heap
page read and write
272C000
stack
page read and write
B46F000
heap
page read and write
7AD9000
heap
page read and write
B463000
heap
page read and write
B348000
heap
page read and write
7FF5574B3000
unkown
page readonly
900000
unkown
page readonly
910000
unkown
page readonly
C3AE000
unkown
page read and write
B34E000
heap
page read and write
C500000
unkown
page read and write
C705000
heap
page read and write
BB1A000
heap
page read and write
9AE5000
heap
page read and write
9C09000
heap
page read and write
7FF557627000
unkown
page readonly
9052000
unkown
page read and write
79E000
unkown
page readonly
B453000
heap
page read and write
A23B000
unkown
page read and write
E280000
unkown
page read and write
7FF557187000
unkown
page readonly
7FF55748F000
unkown
page readonly
7FF557583000
unkown
page readonly
9A61000
heap
page read and write
B46D000
heap
page read and write
B3F5000
heap
page read and write
9B43000
heap
page read and write
B456000
heap
page read and write
D1D000
heap
page read and write
7FF557661000
unkown
page readonly
98D6000
heap
page read and write
A858000
unkown
page read and write
BB14000
heap
page read and write
3FD0000
direct allocation
page read and write
7FF557280000
unkown
page readonly
C0FB000
unkown
page read and write
9BD9000
heap
page read and write
7DF421A31000
trusted library allocation
page execute read
7B38000
heap
page read and write
B463000
heap
page read and write
6F0000
unkown
page readonly
CE00000
heap
page read and write
7FF5570B5000
unkown
page readonly
7FF556E98000
unkown
page readonly
7FF556E98000
unkown
page readonly
F070000
unkown
page read and write
B460000
heap
page read and write
7FF55760F000
unkown
page readonly
C8DE000
heap
page read and write
B46F000
heap
page read and write
3437000
heap
page read and write
9E0F000
stack
page read and write
11F0000
heap
page read and write
9B78000
heap
page read and write
892A000
heap
page read and write
A8DC000
unkown
page read and write
7FF55732D000
unkown
page readonly
7FF55710A000
unkown
page readonly
7FF557429000
unkown
page readonly
7FF5573D8000
unkown
page readonly
D8DE000
stack
page read and write
A873000
unkown
page read and write
B447000
heap
page read and write
7FF557476000
unkown
page readonly
716B000
unkown
page read and write
9C05000
heap
page read and write
B46F000
heap
page read and write
C57C000
unkown
page read and write
7A8B000
heap
page read and write
ACBE000
stack
page read and write
98D6000
heap
page read and write
7FF557607000
unkown
page readonly
98D4000
heap
page read and write
342D000
direct allocation
page execute and read and write
2A13000
heap
page read and write
995E000
stack
page read and write
CE4000
heap
page read and write
C89C000
heap
page read and write
F0CE000
unkown
page read and write
C561000
unkown
page read and write
B463000
heap
page read and write
B4BE000
heap
page read and write
C59000
heap
page read and write
7FF5575A1000
unkown
page readonly
BBE0000
unkown
page readonly
7FF5575AB000
unkown
page readonly
D1BA000
stack
page read and write
7FF5571DF000
unkown
page readonly
CACC000
heap
page read and write
3051000
heap
page read and write
7BBC000
heap
page read and write
7FF5573EA000
unkown
page readonly
7FF55710A000
unkown
page readonly
C10B000
unkown
page read and write
46F6000
unkown
page read and write
7FF5573C1000
unkown
page readonly
7FF557467000
unkown
page readonly
88A0000
unkown
page read and write
472C000
unkown
page read and write
B3C8000
heap
page read and write
9C48000
heap
page read and write
9BFD000
heap
page read and write
7FF5570C1000
unkown
page readonly
4746000
unkown
page read and write
B47A000
heap
page read and write
2C05000
heap
page read and write
7B99000
stack
page read and write
3781000
direct allocation
page execute and read and write
2C00000
heap
page read and write
32D7000
unkown
page read and write
9C07000
heap
page read and write
C4D3000
unkown
page read and write
5128000
heap
page read and write
73F0000
unkown
page read and write
40F9000
direct allocation
page read and write
7FF556E66000
unkown
page readonly
F0D5000
unkown
page read and write
83AC000
stack
page read and write
B3C8000
heap
page read and write
9BD9000
heap
page read and write
C89C000
heap
page read and write
9AE8000
heap
page read and write
CE4000
heap
page read and write
7FF55733B000
unkown
page readonly
5D70000
trusted library allocation
page read and write
F0B6000
unkown
page read and write
2C12000
heap
page read and write
7FF55714F000
unkown
page readonly
F0B6000
unkown
page read and write
472C000
unkown
page read and write
9BF7000
heap
page read and write
7FF5574BA000
unkown
page readonly
DE0000
trusted library allocation
page read and write
B460000
heap
page read and write
913F000
unkown
page read and write
4129000
direct allocation
page read and write
7B72000
heap
page read and write
9B10000
heap
page read and write
8530000
unkown
page readonly
CE4000
heap
page read and write
C41F000
unkown
page read and write
939E000
stack
page read and write
3230000
unkown
page read and write
B34E000
heap
page read and write
C22F000
unkown
page read and write
7FF5575C5000
unkown
page readonly
C00000
heap
page read and write
9B33000
heap
page read and write
9A95000
heap
page read and write
F0A1000
unkown
page read and write
F0CF000
unkown
page read and write
7AAE000
heap
page read and write
9B4A000
heap
page read and write
7FF55728F000
unkown
page readonly
5113000
heap
page read and write
C10000
unkown
page read and write
7FF55761F000
unkown
page readonly
7B3C000
heap
page read and write
7C19000
heap
page read and write
10B0000
unkown
page readonly
306E000
stack
page read and write
9AE5000
heap
page read and write
7FF556F98000
unkown
page readonly
47DB000
unkown
page read and write
9F0E000
stack
page read and write
8D60000
unkown
page read and write
7FF5572C1000
unkown
page readonly
B4BE000
heap
page read and write
7A71000
heap
page read and write
A85E000
unkown
page read and write
7FF556E75000
unkown
page readonly
C0F9000
unkown
page read and write
3100000
heap
page read and write
C1DB000
unkown
page read and write
B46F000
heap
page read and write
349E000
direct allocation
page execute and read and write
C3ED000
unkown
page read and write
CDF0000
trusted library allocation
page read and write
302F000
stack
page read and write
7FF557554000
unkown
page readonly
3400000
heap
page read and write
8ED5000
unkown
page read and write
CA87000
heap
page read and write
7FF556FC4000
unkown
page readonly
B33E000
heap
page read and write
3230000
unkown
page read and write
BB3E000
stack
page read and write
3052000
heap
page read and write
7FF557669000
unkown
page readonly
B2E9000
heap
page read and write
E13B000
stack
page read and write
7A80000
unkown
page readonly
A1FD000
unkown
page read and write
E60000
unkown
page readonly
4000000
direct allocation
page read and write
9AC1000
heap
page read and write
9BCF000
heap
page read and write
B312000
heap
page read and write
CE4000
heap
page read and write
C7F5000
heap
page read and write
9C84000
heap
page read and write
CE30000
trusted library allocation
page read and write
BF3F000
stack
page read and write
7FF55730C000
unkown
page readonly
7DF421A20000
trusted library allocation
page readonly
7FF5573BB000
unkown
page readonly
7FF5570E7000
unkown
page readonly
7AA000
unkown
page write copy
90C9000
unkown
page read and write
BEBF000
stack
page read and write
2A00000
heap
page read and write
47C0000
unkown
page read and write
B456000
heap
page read and write
31D7000
unclassified section
page execute and read and write
8EC5000
unkown
page read and write
CE10000
trusted library allocation
page read and write
A85A000
unkown
page read and write
B354000
heap
page read and write
2A13000
heap
page read and write
3FD0000
direct allocation
page read and write
9B42000
heap
page read and write
3251000
trusted library allocation
page execute and read and write
35A2000
stack
page read and write
B463000
heap
page read and write
9BFD000
heap
page read and write
7FF557174000
unkown
page readonly
8910000
trusted library allocation
page read and write
511E000
heap
page read and write
DE0000
trusted library allocation
page read and write
B43B000
heap
page read and write
7B53000
heap
page read and write
9B02000
heap
page read and write
72FC000
unkown
page read and write
C0F3000
unkown
page read and write
904C000
unkown
page read and write
2D01000
heap
page read and write
7160000
unkown
page read and write
7FF5572B4000
unkown
page readonly
7178000
unkown
page read and write
9C01000
heap
page read and write
9C03000
heap
page read and write
9038000
stack
page read and write
7FF557568000
unkown
page readonly
C4CB000
stack
page read and write
7FF5573C1000
unkown
page readonly
7DF468991000
unkown
page execute read
C4D3000
unkown
page read and write
CE10000
trusted library allocation
page read and write
9AD1000
heap
page read and write
C889000
heap
page read and write
7FF5573F3000
unkown
page readonly
C401000
unkown
page read and write
AFFF000
stack
page read and write
9B46000
heap
page read and write
7FF5570C5000
unkown
page readonly
E60000
unkown
page readonly
7AAE000
heap
page read and write
7B64000
heap
page read and write
899E000
stack
page read and write
7FF5575B1000
unkown
page readonly
7FF557033000
unkown
page readonly
7AE7000
heap
page read and write
7178000
unkown
page read and write
788B000
stack
page read and write
2A13000
heap
page read and write
8D78000
unkown
page read and write
C12D000
unkown
page read and write
B2E9000
heap
page read and write
C23A000
unkown
page read and write
7A40000
heap
page read and write
B357000
heap
page read and write
3F53000
direct allocation
page read and write
7176000
unkown
page read and write
883D000
stack
page read and write
9AA8000
heap
page read and write
AE2B000
stack
page read and write
7DF421A21000
trusted library allocation
page execute read
C3FB000
unkown
page read and write
7FF5575FC000
unkown
page readonly
9B42000
heap
page read and write
7FF5571B3000
unkown
page readonly
7E10000
unkown
page read and write
9013000
unkown
page read and write
7FF5573FF000
unkown
page readonly
7FF55763D000
unkown
page readonly
9AB5000
heap
page read and write
7FF557589000
unkown
page readonly
9C1B000
heap
page read and write
8810000
unkown
page readonly
2F21000
heap
page read and write
3023000
heap
page read and write
98D4000
heap
page read and write
A87F000
unkown
page read and write
7B38000
heap
page read and write
C328000
unkown
page read and write
FCF000
stack
page read and write
B447000
heap
page read and write
A131000
unkown
page read and write
9AA8000
heap
page read and write
A225000
unkown
page read and write
9052000
unkown
page read and write
13BA000
heap
page read and write
9E8E000
stack
page read and write
3E60000
direct allocation
page read and write
9BFD000
heap
page read and write
B356000
heap
page read and write
419E000
direct allocation
page read and write
7FF5575BB000
unkown
page readonly
E260000
unkown
page read and write
7FF556F2A000
unkown
page readonly
7A94000
heap
page read and write
9B6000
stack
page read and write
A858000
unkown
page read and write
308E000
stack
page read and write
7AA5000
heap
page read and write
C06D000
unkown
page read and write
7FF5575BD000
unkown
page readonly
32C9000
unkown
page read and write
7A9E000
heap
page read and write
A0FC000
unkown
page read and write
7FF55714A000
unkown
page readonly
1060000
unkown
page read and write
7FF557382000
unkown
page readonly
7FF557531000
unkown
page readonly
B447000
heap
page read and write
98C0000
heap
page read and write
8D86000
unkown
page read and write
8C59000
stack
page read and write
8820000
unkown
page readonly
9BB8000
heap
page read and write
4F5D000
heap
page read and write
E290000
unkown
page read and write
7FF5572BD000
unkown
page readonly
7FF557426000
unkown
page readonly
7FF5575BB000
unkown
page readonly
4732000
unkown
page read and write
C04B000
unkown
page read and write
C214000
unkown
page read and write
7FF55753D000
unkown
page readonly
47C0000
unkown
page read and write
B050000
unkown
page read and write
BB0E000
heap
page read and write
2FA0000
heap
page read and write
7FF557599000
unkown
page readonly
CA3D000
heap
page read and write
1080000
unkown
page readonly
9C05000
heap
page read and write
10393000
unkown
page read and write
C04F000
unkown
page read and write
7FF5574F1000
unkown
page readonly
CE4000
heap
page read and write
15B5000
heap
page read and write
7DF468980000
unkown
page readonly
7FF55752E000
unkown
page readonly
7E05000
stack
page read and write
9050000
unkown
page read and write
CA63000
heap
page read and write
9C66000
heap
page read and write
C427000
unkown
page read and write
C7F2000
heap
page read and write
C9B5000
heap
page read and write
90F2000
unkown
page read and write
9A5F000
stack
page read and write
2DD0000
heap
page read and write
B368000
heap
page read and write
C73A000
heap
page read and write
9B48000
heap
page read and write
3E60000
direct allocation
page read and write
BB35000
heap
page read and write
B396000
heap
page read and write
E45E000
system
page execute and read and write
9BC2000
heap
page read and write
90BF000
stack
page read and write
34A8000
heap
page read and write
913F000
unkown
page read and write
7FF557257000
unkown
page readonly
1BAE000
stack
page read and write
9013000
unkown
page read and write
C6D000
heap
page read and write
B47A000
heap
page read and write
7FC0000
trusted library allocation
page read and write
CE4000
heap
page read and write
7306000
unkown
page read and write
C1F8000
unkown
page read and write
90F2000
unkown
page read and write
9C91000
heap
page read and write
9086000
unkown
page read and write
C885000
heap
page read and write
7BE4000
heap
page read and write
9913000
heap
page read and write
3220000
unkown
page readonly
412D000
direct allocation
page read and write
7FF55707D000
unkown
page readonly
7FF556FFB000
unkown
page readonly
C214000
unkown
page read and write
8920000
heap
page read and write
4129000
direct allocation
page read and write
A0FC000
unkown
page read and write
7FF55726A000
unkown
page readonly
7FF5575D0000
unkown
page readonly
B368000
heap
page read and write
732B000
unkown
page read and write
C4D3000
unkown
page read and write
B3F5000
heap
page read and write
7D0E000
stack
page read and write
7DF468981000
unkown
page execute read
994A000
heap
page read and write
1080000
unkown
page readonly
C9B8000
heap
page read and write
37F2000
direct allocation
page execute and read and write
9A71000
heap
page read and write
32F3000
unkown
page read and write
5D70000
trusted library allocation
page read and write
9B84000
heap
page read and write
CE13000
trusted library allocation
page read and write
C402000
unkown
page read and write
4820000
unkown
page read and write
7C38000
heap
page read and write
7FF557099000
unkown
page readonly
7FF55702F000
unkown
page readonly
B050000
unkown
page read and write
B3C8000
heap
page read and write
B453000
heap
page read and write
9C41000
heap
page read and write
B2E2000
heap
page read and write
3052000
heap
page read and write
2E0A000
stack
page read and write
7BBC000
heap
page read and write
8DA6000
unkown
page read and write
C1E9000
unkown
page read and write
3201000
trusted library allocation
page execute and read and write
90DB000
unkown
page read and write
4769000
unkown
page read and write
BC00000
unkown
page readonly
A87A000
unkown
page read and write
7FF557187000
unkown
page readonly
99D2000
heap
page read and write
B463000
heap
page read and write
9B2C000
heap
page read and write
788B000
stack
page read and write
FD0000
unkown
page readonly
8D7A000
unkown
page read and write
C3ED000
unkown
page read and write
9DE000
stack
page read and write
2D3D000
stack
page read and write
7FF5575B9000
unkown
page readonly
40F9000
direct allocation
page read and write
88A0000
unkown
page read and write
7E05000
stack
page read and write
CA7D000
heap
page read and write
1060000
unkown
page read and write
B1A0000
unkown
page read and write
7A7E000
heap
page read and write
7FF557210000
unkown
page readonly
BF3D000
stack
page read and write
7A80000
unkown
page readonly
C44D000
unkown
page read and write
77F0000
unkown
page read and write
B34E000
heap
page read and write
B326000
heap
page read and write
7C22000
heap
page read and write
B453000
heap
page read and write
9B49000
heap
page read and write
B1CD000
stack
page read and write
8ECE000
unkown
page read and write
B070000
unkown
page read and write
C13F000
stack
page read and write
9B26000
heap
page read and write
319F000
unkown
page read and write
9B37000
heap
page read and write
8D72000
unkown
page read and write
5124000
heap
page read and write
B453000
heap
page read and write
7FF55752E000
unkown
page readonly
A118000
unkown
page read and write
C9B2000
heap
page read and write
7FF5575C5000
unkown
page readonly
C328000
unkown
page read and write
9BCF000
heap
page read and write
C374000
unkown
page read and write
7FF557434000
unkown
page readonly
C374000
unkown
page read and write
B4BE000
heap
page read and write
86CE000
stack
page read and write
B46F000
heap
page read and write
B46F000
heap
page read and write
7FF5574C6000
unkown
page readonly
C23D000
stack
page read and write
D820000
heap
page read and write
F0D5000
unkown
page read and write
C18A000
unkown
page read and write
7FF5569E8000
unkown
page readonly
7320000
unkown
page read and write
98B5000
heap
page read and write
7FF556E66000
unkown
page readonly
9B26000
heap
page read and write
5080000
heap
page read and write
CE4000
heap
page read and write
7FF557554000
unkown
page readonly
7FF5569F1000
unkown
page readonly
9050000
unkown
page read and write
7A65000
heap
page read and write
9B8B000
heap
page read and write
2F09000
stack
page read and write
9B49000
heap
page read and write
9BDF000
heap
page read and write
7FF556F87000
unkown
page readonly
3213000
stack
page read and write
4718000
unkown
page read and write
C500000
unkown
page read and write
E260000
unkown
page read and write
950000
heap
page read and write
7AD6000
heap
page read and write
2A13000
heap
page read and write
7FF5575E3000
unkown
page readonly
9C09000
heap
page read and write
8910000
unkown
page readonly
4000000
direct allocation
page read and write
7FF557245000
unkown
page readonly
3300000
trusted library allocation
page read and write
7FD0000
trusted library allocation
page read and write
C9B5000
heap
page read and write
995E000
stack
page read and write
9E0F000
stack
page read and write
1500000
trusted library allocation
page read and write
901E000
unkown
page read and write
10314000
unkown
page read and write
90CF000
unkown
page read and write
C063000
unkown
page read and write
CA85000
heap
page read and write
C18A000
unkown
page read and write
9C01000
heap
page read and write
913F000
unkown
page read and write
C20000
unkown
page read and write
B3C8000
heap
page read and write
7FF556FE3000
unkown
page readonly
A222000
unkown
page read and write
9086000
unkown
page read and write
7FF5575E3000
unkown
page readonly
7D0E000
stack
page read and write
7A60000
unkown
page readonly
7A54000
heap
page read and write
3E30000
direct allocation
page read and write
35CD000
direct allocation
page execute and read and write
7FF55722A000
unkown
page readonly
B355000
heap
page read and write
7FF5575BF000
unkown
page readonly
C7F5000
heap
page read and write
7FF5572C9000
unkown
page readonly
90CF000
unkown
page read and write
B46D000
heap
page read and write
9C94000
heap
page read and write
9BD1000
heap
page read and write
BBE0000
unkown
page readonly
2C17000
heap
page read and write
C481000
unkown
page read and write
7AA000
unkown
page read and write
2F0E000
stack
page read and write
C4FE000
unkown
page read and write
B463000
heap
page read and write
5D70000
unclassified section
page execute and read and write
9BC6000
heap
page read and write
2EE0000
heap
page read and write
B3F5000
heap
page read and write
7FF557535000
unkown
page readonly
8ECE000
unkown
page read and write
7FF55761F000
unkown
page readonly
4800000
unkown
page read and write
9AAD000
heap
page read and write
B42F000
stack
page read and write
9BD1000
heap
page read and write
9C2D000
heap
page read and write
7FF55752A000
unkown
page readonly
10780000
unkown
page execute and read and write
8F4D000
unkown
page read and write
C23A000
unkown
page read and write
9B82000
heap
page read and write
7FF557549000
unkown
page readonly
ADAF000
stack
page read and write
C916000
heap
page read and write
23AE000
stack
page read and write
3745000
unclassified section
page execute and read and write
7FF557393000
unkown
page readonly
BBBB000
stack
page read and write
C101000
unkown
page read and write
CE4000
heap
page read and write
7BC1000
unkown
page read and write
7FF55725B000
unkown
page readonly
E1B9000
stack
page read and write
7C19000
heap
page read and write
2F90000
unkown
page readonly
84DC000
stack
page read and write
72FC000
unkown
page read and write
AE2B000
stack
page read and write
7DF421A30000
trusted library allocation
page readonly
C06D000
unkown
page read and write
7FF557571000
unkown
page readonly
7AA5000
heap
page read and write
7FF5570D4000
unkown
page readonly
C1DB000
unkown
page read and write
C22B000
unkown
page read and write
9C9C000
heap
page read and write
AF6E000
stack
page read and write
A37F000
system
page read and write
32C4000
unkown
page read and write
B4BE000
heap
page read and write
B3F5000
heap
page read and write
A0A5000
unkown
page read and write
7FF5570CA000
unkown
page readonly
8910000
unkown
page readonly
715C000
unkown
page read and write
9B82000
heap
page read and write
B447000
heap
page read and write
9AE8000
heap
page read and write
C54C000
unkown
page read and write
35D9000
direct allocation
page execute and read and write
B46D000
heap
page read and write
1440000
unkown
page readonly
A154000
unkown
page read and write
AD10000
unkown
page readonly
B46D000
heap
page read and write
7A8D000
heap
page read and write
7FF557535000
unkown
page readonly
A0BF000
unkown
page read and write
7FF5571E6000
unkown
page readonly
C916000
heap
page read and write
109EA000
stack
page read and write
CE40000
trusted library allocation
page read and write
7FF55703C000
unkown
page readonly
9AB9000
heap
page read and write
7BE0000
heap
page read and write
F0BC000
unkown
page read and write
A215000
unkown
page read and write
7FF5575EA000
unkown
page readonly
4000000
direct allocation
page read and write
330A000
unkown
page read and write
C5A7000
unkown
page read and write
B040000
unkown
page readonly
7FF557106000
unkown
page readonly
4FD6000
heap
page read and write
9050000
unkown
page read and write
8D70000
unkown
page read and write
901F000
unkown
page read and write
9B97000
heap
page read and write
47EE000
unkown
page read and write
7FF556E48000
unkown
page readonly
7FF5575B1000
unkown
page readonly
9C1D000
heap
page read and write
F0BC000
unkown
page read and write
B354000
heap
page read and write
B463000
heap
page read and write
50F6000
heap
page read and write
7FF557429000
unkown
page readonly
B46D000
heap
page read and write
2ED0000
heap
page readonly
7FF55733F000
unkown
page readonly
513D000
heap
page read and write
7FF557148000
unkown
page readonly
2A13000
heap
page read and write
B453000
heap
page read and write
CE4000
heap
page read and write
7FF5571A1000
unkown
page readonly
B447000
heap
page read and write
C889000
heap
page read and write
E1B9000
stack
page read and write
3F83000
direct allocation
page read and write
C2E4000
unkown
page read and write
902C000
unkown
page read and write
B348000
heap
page read and write
8D70000
unkown
page read and write
CE4000
heap
page read and write
5120000
heap
page read and write
9AE5000
heap
page read and write
CA03000
heap
page read and write
3300000
trusted library allocation
page read and write
1490000
heap
page read and write
27A0000
heap
page read and write
15B2000
heap
page read and write
2E88000
stack
page read and write
326B000
heap
page read and write
4F65000
heap
page read and write
9B26000
heap
page read and write
103DB000
unkown
page read and write
7FF5573EA000
unkown
page readonly
7FF556E6C000
unkown
page readonly
A231000
unkown
page read and write
9AB9000
heap
page read and write
BB31000
heap
page read and write
7FF557589000
unkown
page readonly
9E8E000
stack
page read and write
7FF556F84000
unkown
page readonly
C5A8000
unkown
page read and write
4746000
unkown
page read and write
C10B000
unkown
page read and write
B4BE000
heap
page read and write
7FF55742B000
unkown
page readonly
4880000
unkown
page read and write
AFD2000
heap
page read and write
A0FF000
unkown
page read and write
8930000
heap
page read and write
4730000
unkown
page read and write
7FF557103000
unkown
page readonly
7FF55738F000
unkown
page readonly
C03B000
stack
page read and write
871F000
stack
page read and write
7AC8000
heap
page read and write
C10000
unkown
page read and write
2F90000
unkown
page readonly
8F27000
unkown
page read and write
9BCF000
heap
page read and write
9B02000
heap
page read and write
7E03000
stack
page read and write
7FF55724C000
unkown
page readonly
7FF557661000
unkown
page readonly
10B7F000
stack
page read and write
B43B000
heap
page read and write
B46F000
heap
page read and write
7909000
stack
page read and write
C3A8000
unkown
page read and write
7FF557493000
unkown
page readonly
AECB000
stack
page read and write
1490000
heap
page read and write
B3C8000
heap
page read and write
8BD8000
stack
page read and write
9C07000
heap
page read and write
F0A4000
unkown
page read and write
C04B000
unkown
page read and write
B347000
heap
page read and write
3213000
stack
page read and write
8D6C000
unkown
page read and write
B460000
heap
page read and write
7A94000
heap
page read and write
7CC5000
stack
page read and write
C905000
heap
page read and write
9C2B000
heap
page read and write
7DF4689B1000
unkown
page execute read
B456000
heap
page read and write
7B38000
heap
page read and write
B6AA000
stack
page read and write
3AE4000
heap
page read and write
8810000
unkown
page readonly
103D6000
unkown
page read and write
8D7A000
unkown
page read and write
3058000
heap
page read and write
9B8B000
heap
page read and write
7A50000
unkown
page readonly
9A95000
heap
page read and write
89C0000
unkown
page read and write
7FF557148000
unkown
page readonly
99A5000
heap
page read and write
3029000
stack
page read and write
4820000
unkown
page read and write
B397000
heap
page read and write
C587000
unkown
page read and write
B3C8000
heap
page read and write
DE0000
trusted library allocation
page read and write
7FF5572C9000
unkown
page readonly
C770000
heap
page read and write
9BD1000
heap
page read and write
7FF557416000
unkown
page readonly
B396000
heap
page read and write
7FF556FFB000
unkown
page readonly
B82A000
stack
page read and write
9B42000
heap
page read and write
7BE6000
heap
page read and write
7FF557042000
unkown
page readonly
5122000
heap
page read and write
7FF557009000
unkown
page readonly
2F8B000
stack
page read and write
C04F000
unkown
page read and write
B46D000
heap
page read and write
CA29000
heap
page read and write
7909000
stack
page read and write
CA87000
heap
page read and write
7FF55725B000
unkown
page readonly
3429000
direct allocation
page execute and read and write
CA41000
heap
page read and write
D1D000
heap
page read and write
7FF5574A9000
unkown
page readonly
B453000
heap
page read and write
7FF5573F3000
unkown
page readonly
C3F7000
unkown
page read and write
717A000
unkown
page read and write
C072000
unkown
page read and write
4718000
unkown
page read and write
C407000
unkown
page read and write
CE4000
heap
page read and write
717E000
unkown
page read and write
C23A000
unkown
page read and write
7FF5573D3000
unkown
page readonly
9AB9000
heap
page read and write
7FF556FEE000
unkown
page readonly
7FF5571AC000
unkown
page readonly
CE4000
heap
page read and write
40FD000
direct allocation
page read and write
9580000
unkown
page readonly
9BB8000
heap
page read and write
3F53000
direct allocation
page read and write
B3C8000
heap
page read and write
C214000
unkown
page read and write
1510000
heap
page read and write
C89C000
heap
page read and write
AFD0000
heap
page read and write
8D72000
unkown
page read and write
994A000
heap
page read and write
7FF556E48000
unkown
page readonly
7276000
unkown
page read and write
C22F000
unkown
page read and write
C428000
unkown
page read and write
C9B2000
heap
page read and write
2C05000
heap
page read and write
7A87000
heap
page read and write
50B0000
unkown
page write copy
9B33000
heap
page read and write
C50000
heap
page read and write
7BB4000
heap
page read and write
7FF556E7B000
unkown
page readonly
7FF5575BD000
unkown
page readonly
B354000
heap
page read and write
910E000
unkown
page read and write
8EDD000
unkown
page read and write
B456000
heap
page read and write
2C2C000
heap
page read and write
47DB000
unkown
page read and write
4785000
unkown
page read and write
B43B000
heap
page read and write
F0B8000
unkown
page read and write
7FF557653000
unkown
page readonly
9C03000
heap
page read and write
B3C8000
heap
page read and write
15B6000
heap
page read and write
A87B000
unkown
page read and write
7FF557250000
unkown
page readonly
B393000
heap
page read and write
4785000
unkown
page read and write
7FF557437000
unkown
page readonly
B447000
heap
page read and write
CAC9000
heap
page read and write
477D000
unkown
page read and write
7FF557026000
unkown
page readonly
A0BD000
unkown
page read and write
7D8E000
stack
page read and write
C5B0000
trusted library allocation
page read and write
C7DD000
heap
page read and write
BB11000
heap
page read and write
A110000
unkown
page read and write
C500000
unkown
page read and write
32C9000
unkown
page read and write
E2A0000
heap
page read and write
8EF5000
unkown
page read and write
B345000
heap
page read and write
7FF556FC4000
unkown
page readonly
10414000
unkown
page read and write
BBC0000
unkown
page read and write
C3B3000
unkown
page read and write
9F8F000
stack
page read and write
CA03000
heap
page read and write
7FF5574EF000
unkown
page readonly
89C0000
unkown
page read and write
7DF468970000
unkown
page readonly
3642000
direct allocation
page execute and read and write
5160000
heap
page read and write
C3E7000
unkown
page read and write
10C7C000
stack
page read and write
E270000
unkown
page read and write
9A95000
heap
page read and write
7BB4000
heap
page read and write
A110000
unkown
page read and write
7FF55700F000
unkown
page readonly
BAC0000
heap
page read and write
7FF5571E2000
unkown
page readonly
9B3B000
heap
page read and write
3F83000
direct allocation
page read and write
3E30000
direct allocation
page read and write
7FF55722A000
unkown
page readonly
C57E000
unkown
page read and write
B396000
heap
page read and write
C3AE000
unkown
page read and write
7FF557501000
unkown
page readonly
416E000
direct allocation
page read and write
C746000
heap
page read and write
A0A5000
unkown
page read and write
90C9000
unkown
page read and write
9AD1000
heap
page read and write
798E000
stack
page read and write
874C000
stack
page read and write
7BD5000
heap
page read and write
9B4E000
heap
page read and write
4FE5000
heap
page read and write
C502000
unkown
page read and write
B3F5000
heap
page read and write
A8D3000
unkown
page read and write
B52A000
stack
page read and write
9AB5000
heap
page read and write
4F78000
heap
page read and write
B453000
heap
page read and write
7BB4000
heap
page read and write
8940000
unkown
page readonly
7FF55720D000
unkown
page readonly
9AB5000
heap
page read and write
B46F000
heap
page read and write
1520000
heap
page read and write
8820000
unkown
page readonly
3FD0000
direct allocation
page read and write
ADAF000
stack
page read and write
BBC0000
unkown
page read and write
6F1000
unkown
page execute read
2FAC000
heap
page read and write
71FC000
unkown
page read and write
32E6000
unkown
page read and write
412D000
direct allocation
page read and write
961E000
stack
page read and write
9F0000
unkown
page readonly
C5D0000
heap
page read and write
B368000
heap
page read and write
501D000
heap
page read and write
84E0000
unkown
page readonly
B447000
heap
page read and write
CA90000
heap
page read and write
7FF546F35000
unkown
page readonly
9C01000
heap
page read and write
9C79000
heap
page read and write
99D000
stack
page read and write
C57E000
unkown
page read and write
C549000
stack
page read and write
7FF55714A000
unkown
page readonly
E2A0000
heap
page read and write
C50D000
unkown
page read and write
7169000
unkown
page read and write
8D80000
unkown
page read and write
A0B9000
unkown
page read and write
7FF557487000
unkown
page readonly
B463000
heap
page read and write
B456000
heap
page read and write
BBD0000
unkown
page readonly
9B0D000
heap
page read and write
7B3C000
heap
page read and write
CE4000
heap
page read and write
98C5000
heap
page read and write
7FF55745B000
unkown
page readonly
7E03000
stack
page read and write
C0F9000
unkown
page read and write
7FF557420000
unkown
page readonly
BB3D000
heap
page read and write
1096A000
stack
page read and write
7FF557437000
unkown
page readonly
5118000
heap
page read and write
CA4B000
heap
page read and write
3440000
unkown
page readonly
13FA000
heap
page read and write
C1DD000
unkown
page read and write
3118000
stack
page read and write
110E000
stack
page read and write
8F83000
unkown
page read and write
10369000
unkown
page read and write
7FF55751D000
unkown
page readonly
7FF557239000
unkown
page readonly
99B4000
heap
page read and write
9052000
unkown
page read and write
40F9000
direct allocation
page read and write
B46D000
heap
page read and write
88C0000
unkown
page read and write
40FD000
direct allocation
page read and write
F070000
unkown
page read and write
7FF556E85000
unkown
page readonly
C976000
heap
page read and write
7C70000
unkown
page readonly
90F2000
unkown
page read and write
7FF557627000
unkown
page readonly
C8C6000
heap
page read and write
84E0000
unkown
page readonly
B080000
unkown
page read and write
AF6E000
stack
page read and write
7FF557413000
unkown
page readonly
B453000
heap
page read and write
7FF5573DE000
unkown
page readonly
7B4000
unkown
page readonly
A85E000
unkown
page read and write
7FF55765C000
unkown
page readonly
8D6A000
unkown
page read and write
98A9000
heap
page read and write
C2D3000
unkown
page read and write
7162000
unkown
page read and write
2DCE000
unkown
page read and write
7FF556E8D000
unkown
page readonly
7FF5570C1000
unkown
page readonly
D280000
trusted library allocation
page read and write
C57E000
unkown
page read and write
7FF557252000
unkown
page readonly
9086000
unkown
page read and write
7FF546F35000
unkown
page readonly
3300000
direct allocation
page execute and read and write
7FF55731B000
unkown
page readonly
5D70000
trusted library allocation
page read and write
C3E7000
unkown
page read and write
7A94000
heap
page read and write
C745000
heap
page read and write
10C0000
heap
page read and write
2F2E000
stack
page read and write
7FF5570D6000
unkown
page readonly
B47A000
heap
page read and write
4810000
unkown
page read and write
CE4000
heap
page read and write
C7B000
stack
page read and write
C976000
heap
page read and write
CA29000
heap
page read and write
C1F5000
unkown
page read and write
F6C000
stack
page read and write
72FE000
unkown
page read and write
330A000
heap
page read and write
C500000
unkown
page read and write
9AA8000
heap
page read and write
C22B000
unkown
page read and write
E370000
unkown
page read and write
9C27000
heap
page read and write
3140000
trusted library allocation
page read and write
2F09000
stack
page read and write
940000
heap
page read and write
7FF5571E2000
unkown
page readonly
7FF557264000
unkown
page readonly
4FED000
heap
page read and write
7FF5574B3000
unkown
page readonly
77C0000
unkown
page read and write
51F9000
unkown
page read and write
5D70000
trusted library allocation
page read and write
A0A8000
unkown
page read and write
7FF5572BD000
unkown
page readonly
7FF55706A000
unkown
page readonly
9AE5000
heap
page read and write
3460000
unkown
page read and write
C1DF000
unkown
page read and write
79A0000
unkown
page read and write
B447000
heap
page read and write
7FF5575FC000
unkown
page readonly
8D68000
unkown
page read and write
A810000
unkown
page read and write
32D7000
unkown
page read and write
CAD2000
heap
page read and write
7FF557549000
unkown
page readonly
15B1000
heap
page execute and read and write
B4BE000
heap
page read and write
7FF546F2F000
unkown
page readonly
4810000
unkown
page read and write
2A13000
heap
page read and write
15B2000
heap
page read and write
5161000
unkown
page read and write
9CDC000
stack
page read and write
7FF557487000
unkown
page readonly
B46F000
heap
page read and write
DE0000
trusted library allocation
page read and write
90DB000
unkown
page read and write
A850000
unkown
page read and write
C24F000
unkown
page read and write
7FF557352000
unkown
page readonly
B346000
heap
page read and write
B447000
heap
page read and write
7FF5570A6000
unkown
page readonly
B628000
stack
page read and write
B4BE000
heap
page read and write
7FF5575E0000
unkown
page readonly
8F09000
unkown
page read and write
CE4000
heap
page read and write
9CDC000
stack
page read and write
9C09000
heap
page read and write
32F0000
heap
page read and write
7FF5573E6000
unkown
page readonly
B47A000
heap
page read and write
7FF55760F000
unkown
page readonly
A87A000
unkown
page read and write
B460000
heap
page read and write
9B02000
heap
page read and write
7FF55728F000
unkown
page readonly
9AB5000
heap
page read and write
7FF557579000
unkown
page readonly
7FF556F84000
unkown
page readonly
B43B000
heap
page read and write
7B49000
heap
page read and write
CE4000
heap
page read and write
1513000
heap
page read and write
8EBC000
stack
page read and write
2C33000
heap
page read and write
7AC2000
heap
page read and write
1419000
heap
page read and write
F0A1000
unkown
page read and write
B456000
heap
page read and write
A0DA000
unkown
page read and write
B456000
heap
page read and write
9AAD000
heap
page read and write
7FF5569FA000
unkown
page readonly
11B0000
heap
page read and write
A85A000
unkown
page read and write
C57E000
unkown
page read and write
7B38000
heap
page read and write
7FF55714F000
unkown
page readonly
5160000
heap
page read and write
9C3C000
heap
page read and write
C3FC000
unkown
page read and write
7DF421A51000
trusted library allocation
page execute read
C12D000
unkown
page read and write
C9B5000
heap
page read and write
39FF000
unclassified section
page read and write
B393000
heap
page read and write
99B4000
heap
page read and write
1035B000
unkown
page read and write
7FF55731B000
unkown
page readonly
7FF55764C000
unkown
page readonly
9AAD000
heap
page read and write
7FF55730C000
unkown
page readonly
512C000
heap
page read and write
7FF5570C5000
unkown
page readonly
B3F5000
heap
page read and write
98AC000
heap
page read and write
AEE7000
stack
page read and write
9BB4000
heap
page read and write
CE4000
heap
page read and write
A129000
unkown
page read and write
2DF0000
heap
page read and write
32C7000
unkown
page read and write
C4A3000
unkown
page read and write
C22B000
unkown
page read and write
7FF55700F000
unkown
page readonly
9B42000
heap
page read and write
5134000
heap
page read and write
7C19000
heap
page read and write
4F61000
heap
page read and write
9B26000
heap
page read and write
7FF5574F4000
unkown
page readonly
7FF557037000
unkown
page readonly
B4BE000
heap
page read and write
B7AA000
stack
page read and write
B354000
heap
page read and write
B46F000
heap
page read and write
C12D000
unkown
page read and write
F0AD000
unkown
page read and write
7FF5574F4000
unkown
page readonly
7FF556FD2000
unkown
page readonly
C1E9000
unkown
page read and write
F0B8000
unkown
page read and write
BBD0000
unkown
page readonly
77B0000
unkown
page read and write
32F3000
unkown
page read and write
13B0000
heap
page read and write
7DF421A40000
trusted library allocation
page readonly
C4B5000
unkown
page read and write
B3F5000
heap
page read and write
7FF55720D000
unkown
page readonly
9AC1000
heap
page read and write
9AD1000
heap
page read and write
7BBC000
heap
page read and write
ED7000
system
page execute and read and write
7FF557594000
unkown
page readonly
CE4000
heap
page read and write
2C04000
stack
page read and write
9B49000
heap
page read and write
8EEE000
unkown
page read and write
B47A000
heap
page read and write
7FF55741A000
unkown
page readonly
A8DC000
unkown
page read and write
7FF556FF3000
unkown
page readonly
9BC2000
heap
page read and write
716E000
unkown
page read and write
C20000
unkown
page read and write
7FF556F26000
unkown
page readonly
2F58000
heap
page read and write
7FF5575E0000
unkown
page readonly
7FF557594000
unkown
page readonly
10454000
unkown
page read and write
7FF556E4A000
unkown
page readonly
2A13000
heap
page read and write
B332000
heap
page read and write
2C06000
stack
page read and write
CE4000
heap
page read and write
322D000
heap
page read and write
C233000
unkown
page read and write
C072000
unkown
page read and write
7FF5574F9000
unkown
page readonly
97EB000
stack
page read and write
7B72000
heap
page read and write
3460000
unkown
page read and write
7DF468971000
unkown
page execute read
CAD2000
heap
page read and write
9AE6000
heap
page read and write
9B26000
heap
page read and write
9B42000
heap
page read and write
7FF556A1B000
unkown
page readonly
7FF557235000
unkown
page readonly
9259000
stack
page read and write
C2E4000
unkown
page read and write
77B0000
unkown
page read and write
B46D000
heap
page read and write
7FF5570BB000
unkown
page readonly
7FF55738F000
unkown
page readonly
C420000
unkown
page read and write
2D0B000
stack
page read and write
B46D000
heap
page read and write
B3F5000
heap
page read and write
7FF5571E6000
unkown
page readonly
7FF55719C000
unkown
page readonly
E370000
unkown
page read and write
7A9E000
heap
page read and write
90C9000
unkown
page read and write
9AC1000
heap
page read and write
1020000
heap
page read and write
71B2000
unkown
page read and write
718B000
unkown
page read and write
A0BF000
unkown
page read and write
3221000
trusted library allocation
page execute and read and write
3801000
heap
page read and write
85B3000
unkown
page read and write
CDE3000
trusted library allocation
page read and write
3052000
heap
page read and write
7FF55765C000
unkown
page readonly
B456000
heap
page read and write
B453000
heap
page read and write
C5B0000
trusted library allocation
page read and write
C24F000
unkown
page read and write
8FDB000
unkown
page read and write
90C9000
unkown
page read and write
9BC6000
heap
page read and write
90CF000
unkown
page read and write
B3F5000
heap
page read and write
35A0000
stack
page read and write
B463000
heap
page read and write
E380000
unkown
page read and write
B34E000
heap
page read and write
7300000
unkown
page read and write
7B68000
heap
page read and write
33BE000
stack
page read and write
C1DF000
unkown
page read and write
13F7000
heap
page read and write
CE4000
heap
page read and write
730A000
unkown
page read and write
FDB000
stack
page read and write
511A000
heap
page read and write
9D8E000
stack
page read and write
9BF7000
heap
page read and write
717C000
unkown
page read and write
9AAD000
heap
page read and write
C3A8000
unkown
page read and write
C89C000
heap
page read and write
4781000
unkown
page read and write
8DFE000
unkown
page read and write
B2C0000
heap
page read and write
9B10000
heap
page read and write
8FDE000
unkown
page read and write
7C0F000
heap
page read and write
7185000
unkown
page read and write
32C4000
unkown
page read and write
B43B000
heap
page read and write
9AE5000
heap
page read and write
B356000
heap
page read and write
9AE5000
heap
page read and write
7FF557579000
unkown
page readonly
E23C000
stack
page read and write
9B3C000
heap
page read and write
7FF5572D4000
unkown
page readonly
C885000
heap
page read and write
717A000
unkown
page read and write
717E000
unkown
page read and write
CAD2000
heap
page read and write
C0F3000
unkown
page read and write
7FF55707D000
unkown
page readonly
13FA000
heap
page read and write
B4BE000
heap
page read and write
7160000
unkown
page read and write
990B000
heap
page read and write
8D9000
stack
page read and write
CE4000
heap
page read and write
A877000
unkown
page read and write
2F20000
heap
page read and write
C7FB000
heap
page read and write
CFBD000
stack
page read and write
7FF55704A000
unkown
page readonly
C3AE000
unkown
page read and write
99A5000
heap
page read and write
91D9000
stack
page read and write
9AD1000
heap
page read and write
B368000
heap
page read and write
7FF556E7E000
unkown
page readonly
3300000
trusted library allocation
page read and write
C889000
heap
page read and write
A8CA000
unkown
page read and write
B3C8000
heap
page read and write
AF48000
stack
page read and write
32C7000
unkown
page read and write
7FF5575A1000
unkown
page readonly
7140000
unkown
page read and write
F0AD000
unkown
page read and write
C123000
unkown
page read and write
B46D000
heap
page read and write
CE4000
heap
page read and write
CE4000
heap
page read and write
7FF557099000
unkown
page readonly
CDD0000
trusted library allocation
page read and write
902C000
unkown
page read and write
7FF557330000
unkown
page readonly
B3F5000
heap
page read and write
9013000
unkown
page read and write
7B6A000
heap
page read and write
7C1A000
heap
page read and write
7FF557456000
unkown
page readonly
8EB8000
unkown
page read and write
276B000
stack
page read and write
5D70000
trusted library allocation
page read and write
E400000
system
page execute and read and write
B47A000
heap
page read and write
E9F000
stack
page read and write
B396000
heap
page read and write
10A0000
heap
page read and write
B43B000
heap
page read and write
7FF5575D5000
unkown
page readonly
8EC5000
unkown
page read and write
7FF5571B3000
unkown
page readonly
9BC8000
heap
page read and write
C74000
heap
page read and write
3052000
heap
page read and write
7B72000
heap
page read and write
C57C000
unkown
page read and write
7FF55750F000
unkown
page readonly
874E000
stack
page read and write
F0B8000
unkown
page read and write
47C6000
unkown
page read and write
9BDF000
heap
page read and write
C374000
unkown
page read and write
9C1B000
heap
page read and write
CE4000
heap
page read and write
CA03000
heap
page read and write
8D6A000
unkown
page read and write
C506000
unkown
page read and write
7FF5572A2000
unkown
page readonly
E5E000
stack
page read and write
7FF557095000
unkown
page readonly
9BC6000
heap
page read and write
31A0000
trusted library allocation
page execute and read and write
1023000
heap
page read and write
73C5000
stack
page read and write
7FF556E9A000
unkown
page readonly
3806000
unclassified section
page read and write
27C0000
heap
page read and write
C85F000
heap
page read and write
71A4000
unkown
page read and write
7B4000
unkown
page readonly
7B72000
heap
page read and write
7BB1000
heap
page read and write
13BE000
heap
page read and write
7300000
unkown
page read and write
4F20000
heap
page read and write
A215000
unkown
page read and write
CE4000
heap
page read and write
BC00000
unkown
page readonly
7FF5569CB000
unkown
page readonly
3AE0000
heap
page read and write
7FF5573D5000
unkown
page readonly
7FF5572AC000
unkown
page readonly
7C70000
unkown
page readonly
7A96000
heap
page read and write
7FF557467000
unkown
page readonly
10A5000
heap
page read and write
7FF557280000
unkown
page readonly
330A000
unkown
page read and write
D00000
heap
page read and write
A8CA000
unkown
page read and write
9BDF000
heap
page read and write
1020000
heap
page read and write
1525000
heap
page read and write
7FF557106000
unkown
page readonly
9C9C000
heap
page read and write
1075000
stack
page read and write
B5AE000
stack
page read and write
BB1B000
heap
page read and write
C22F000
unkown
page read and write
4781000
unkown
page read and write
C8C6000
heap
page read and write
BB03000
heap
page read and write
C244000
unkown
page read and write
913F000
unkown
page read and write
13FA000
heap
page read and write
7D8E000
stack
page read and write
3148000
heap
page read and write
7A8B000
heap
page read and write
7FF5573D5000
unkown
page readonly
7FF5570A6000
unkown
page readonly
716B000
unkown
page read and write
CDE0000
trusted library allocation
page read and write
5144000
heap
page read and write
9B1C000
heap
page read and write
B460000
heap
page read and write
7FF556FD2000
unkown
page readonly
329F000
stack
page read and write
8870000
remote allocation
page read and write
9B04000
heap
page read and write
9F0E000
stack
page read and write
BB06000
heap
page read and write
3F83000
direct allocation
page read and write
9BD1000
heap
page read and write
7FF557328000
unkown
page readonly
9C11000
heap
page read and write
C328000
unkown
page read and write
9AAD000
heap
page read and write
B463000
heap
page read and write
7B3C000
heap
page read and write
7FF55756D000
unkown
page readonly
A23B000
unkown
page read and write
32DB000
unkown
page read and write
9052000
unkown
page read and write
9BDF000
heap
page read and write
904C000
unkown
page read and write
2C17000
heap
page read and write
7FF5572D4000
unkown
page readonly
A118000
unkown
page read and write
CE4000
heap
page read and write
7FF5569FA000
unkown
page readonly
7DF468981000
unkown
page execute read
7FF55703C000
unkown
page readonly
7FF5573B0000
unkown
page readonly
9B42000
heap
page read and write
7FF556A1B000
unkown
page readonly
7FF557174000
unkown
page readonly
3249000
unkown
page read and write
9B49000
heap
page read and write
CACC000
heap
page read and write
7FF557045000
unkown
page readonly
7FF55706A000
unkown
page readonly
8D68000
unkown
page read and write
98ED000
heap
page read and write
BB10000
heap
page read and write
B447000
heap
page read and write
7FF5570CF000
unkown
page readonly
C1E9000
unkown
page read and write
4F9E000
heap
page read and write
C502000
unkown
page read and write
7AC2000
heap
page read and write
7FF557463000
unkown
page readonly
910000
unkown
page readonly
7A8D000
heap
page read and write
3229000
heap
page read and write
F0A2000
unkown
page read and write
CE4000
heap
page read and write
A8D3000
unkown
page read and write
9B2E000
heap
page read and write
C570000
trusted library allocation
page read and write
B373000
heap
page read and write
C5A7000
unkown
page read and write
A8DC000
unkown
page read and write
10D7F000
stack
page read and write
A00A000
stack
page read and write
7FF55708D000
unkown
page readonly
32D3000
unkown
page read and write
CA6F000
heap
page read and write
9854000
unkown
page read and write
B46F000
heap
page read and write
C502000
unkown
page read and write
7FF556FFF000
unkown
page readonly
7FF557103000
unkown
page readonly
7FF55733B000
unkown
page readonly
9004000
unkown
page read and write
7FF557493000
unkown
page readonly
7FF557583000
unkown
page readonly
46F6000
unkown
page read and write
9C2B000
heap
page read and write
B43B000
heap
page read and write
C00000
heap
page read and write
BB1B000
heap
page read and write
7FF5575AB000
unkown
page readonly
7FF557009000
unkown
page readonly
7C38000
heap
page read and write
7FF5574C6000
unkown
page readonly
7FF556F9E000
unkown
page readonly
98C6000
heap
page read and write
2D80000
heap
page read and write
11E0000
heap
page read and write
3440000
unkown
page readonly
7FF55702F000
unkown
page readonly
A280000
unkown
page read and write
7FF557602000
unkown
page readonly
10A0000
heap
page read and write
7FF5571DF000
unkown
page readonly
B396000
heap
page read and write
9BB6000
heap
page read and write
3047000
heap
page read and write
B47A000
heap
page read and write
4F67000
heap
page read and write
BEBF000
stack
page read and write
10352000
unkown
page read and write
98DA000
stack
page read and write
C3F7000
unkown
page read and write
C9B2000
heap
page read and write
7FF5573A9000
unkown
page readonly
B460000
heap
page read and write
5100000
heap
page read and write
C18A000
unkown
page read and write
7FF5570CF000
unkown
page readonly
C684000
heap
page read and write
7FF557501000
unkown
page readonly
BB1B000
heap
page read and write
9B02000
heap
page read and write
8C59000
stack
page read and write
7BBC000
heap
page read and write
C555000
unkown
page read and write
7FF556F31000
unkown
page readonly
7FF556FF3000
unkown
page readonly
7C00000
unkown
page readonly
31D0000
unclassified section
page execute and read and write
F0A5000
unkown
page read and write
7AD6000
heap
page read and write
7FF557302000
unkown
page readonly
8BD8000
stack
page read and write
FFD000
stack
page read and write
B453000
heap
page read and write
994F000
heap
page read and write
C1DF000
unkown
page read and write
7AC2000
heap
page read and write
108B4000
unkown
page execute and read and write
9F8F000
stack
page read and write
B43B000
heap
page read and write
3433000
heap
page read and write
7FF557607000
unkown
page readonly
7FF557531000
unkown
page readonly
E460000
system
page execute and read and write
79E000
unkown
page readonly
7FF556E7C000
unkown
page readonly
3E60000
direct allocation
page read and write
7FF5570FE000
unkown
page readonly
9C1B000
heap
page read and write
9A61000
heap
page read and write
732E000
unkown
page read and write
7FF557293000
unkown
page readonly
B460000
heap
page read and write
9916000
heap
page read and write
9B3B000
heap
page read and write
9AB9000
heap
page read and write
CE4000
heap
page read and write
C8DE000
heap
page read and write
32E3000
unkown
page read and write
3052000
heap
page read and write
6F0000
unkown
page readonly
7FF557062000
unkown
page readonly
CE4000
heap
page read and write
9B42000
heap
page read and write
A114000
unkown
page read and write
7FF5573FF000
unkown
page readonly
A131000
unkown
page read and write
A873000
unkown
page read and write
9BF7000
heap
page read and write
31F0000
trusted library allocation
page execute and read and write
11B1000
heap
page read and write
7FF55763D000
unkown
page readonly
7B3F000
heap
page read and write
C5A7000
unkown
page read and write
FB0000
unkown
page read and write
A222000
unkown
page read and write
7FF5572A2000
unkown
page readonly
2A13000
heap
page read and write
98D4000
heap
page read and write
90CF000
unkown
page read and write
C54B000
unkown
page read and write
A0BD000
unkown
page read and write
CA53000
heap
page read and write
10A5000
heap
page read and write
4129000
direct allocation
page read and write
9BC2000
heap
page read and write
B463000
heap
page read and write
7FF557387000
unkown
page readonly
C3B3000
unkown
page read and write
7173000
unkown
page read and write
98E2000
heap
page read and write
DE0000
trusted library allocation
page read and write
10926000
system
page read and write
C3B3000
unkown
page read and write
7FF5570BB000
unkown
page readonly
B460000
heap
page read and write
7FF556E8D000
unkown
page readonly
73C5000
stack
page read and write
7FF5570CA000
unkown
page readonly
5013000
heap
page read and write
7A60000
heap
page read and write
B6AA000
stack
page read and write
5176000
heap
page read and write
47EE000
unkown
page read and write
C57C000
unkown
page read and write
C4D3000
unkown
page read and write
7FF557065000
unkown
page readonly
C4EA000
unkown
page read and write
7FF557653000
unkown
page readonly
7FF55726C000
unkown
page readonly
5126000
heap
page read and write
B43B000
heap
page read and write
9BCF000
heap
page read and write
B460000
heap
page read and write
7B53000
heap
page read and write
E13B000
stack
page read and write
C85F000
heap
page read and write
8922000
heap
page read and write
8F4D000
unkown
page read and write
7AF0000
heap
page read and write
32B9000
unkown
page read and write
7FF556FEE000
unkown
page readonly
C506000
unkown
page read and write
CDE0000
trusted library allocation
page read and write
B3F5000
heap
page read and write
7FF557426000
unkown
page readonly
B33F000
heap
page read and write
7FF55710F000
unkown
page readonly
9C03000
heap
page read and write
32D3000
unkown
page read and write
CE20000
trusted library allocation
page read and write
B3C8000
heap
page read and write
B460000
heap
page read and write
51E3000
unkown
page read and write
8D86000
unkown
page read and write
8F09000
unkown
page read and write
B43B000
heap
page read and write
9AB9000
heap
page read and write
C3C000
stack
page read and write
C3A8000
unkown
page read and write
8930000
heap
page read and write
7FF55752A000
unkown
page readonly
7FF557642000
unkown
page readonly
9B46000
heap
page read and write
9B82000
heap
page read and write
7ADA000
heap
page read and write
319C000
stack
page read and write
9C05000
heap
page read and write
C2D3000
unkown
page read and write
7FF557571000
unkown
page readonly
9AE8000
heap
page read and write
7FF5575B9000
unkown
page readonly
7FF5572B6000
unkown
page readonly
7DF421A11000
trusted library allocation
page execute read
B31A000
heap
page read and write
511C000
heap
page read and write
C240000
system
page execute and read and write
9AB5000
heap
page read and write
419E000
direct allocation
page read and write
7DF468971000
unkown
page execute read
A87C000
unkown
page read and write
There are 2290 hidden memdumps, click here to show them.