IOC Report
Outstanding payment.exe

loading gif

Files

File Path
Type
Category
Malicious
Outstanding payment.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Outstanding payment.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpE0D0.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\iBSWjb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\iBSWjb.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\iBSWjb.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03hkkdh3.ypg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34qw05zq.w2b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52eucve1.ftn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_anq4t5ds.b1y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jxxbcmwh.nng.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nhuexac3.cpk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rodvztqb.mdz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zrdf23vf.zzk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpF30F.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Outstanding payment.exe
"C:\Users\user\Desktop\Outstanding payment.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Outstanding payment.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\iBSWjb.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iBSWjb" /XML "C:\Users\user\AppData\Local\Temp\tmpE0D0.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\iBSWjb.exe
C:\Users\user\AppData\Roaming\iBSWjb.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iBSWjb" /XML "C:\Users\user\AppData\Local\Temp\tmpF30F.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\SysWOW64\NETSTAT.EXE
"C:\Windows\SysWOW64\NETSTAT.EXE"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.dj1.lat/a03d/
unknown
malicious
http://www.istromarmitaria.online/a03d/
unknown
malicious
http://www.nfluencer-marketing-13524.bond/a03d/www.atidiri.fun
unknown
malicious
http://www.otelhafnia.info/a03d/www.kkkk.shop
unknown
malicious
www.enelog.xyz/a03d/
malicious
http://www.istromarmitaria.online/a03d/www.dj1.lat
unknown
malicious
http://www.dj1.lat/a03d/j
unknown
malicious
http://www.enelog.xyz/a03d/
unknown
malicious
http://www.enelog.xyz/a03d/www.72266.vip
unknown
malicious
https://word.office.comon
unknown
http://www.8oosnny.xyz
unknown
http://www.istromarmitaria.online
unknown
http://www.8oosnny.xyzReferer:
unknown
http://www.otelhafnia.infoReferer:
unknown
https://powerpoint.office.comcember
unknown
http://www.72266.vip/a03d/www.istromarmitaria.online
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
http://www.duxrib.xyzReferer:
unknown
http://www.aja168e.liveReferer:
unknown
http://www.nfluencer-marketing-13524.bond/a03d/
unknown
http://www.enelog.xyzReferer:
unknown
http://www.duxrib.xyz/a03d/
unknown
http://www.oftware-download-92806.bond
unknown
http://www.atidiri.funReferer:
unknown
http://www.aja168e.live/a03d/www.duxrib.xyz
unknown
http://www.lphatechblog.xyzReferer:
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.atidiri.fun/a03d/
unknown
http://www.behm.infoReferer:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.72266.vip
unknown
http://www.lphatechblog.xyz
unknown
http://www.otelhafnia.info/a03d/
unknown
http://www.72266.vipReferer:
unknown
http://www.kkkk.shop/a03d/www.aja168e.live
unknown
http://www.oftware-download-92806.bond/a03d/
unknown
http://www.otelhafnia.info
unknown
https://wns.windows.com/)s
unknown
http://www.dj1.latReferer:
unknown
http://www.nfluencer-marketing-13524.bondReferer:
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.inggraphic.pro/a03d/
unknown
http://www.atidiri.fun/a03d/www.otelhafnia.info
unknown
http://www.aja168e.live
unknown
http://www.atidiri.fun
unknown
http://www.elnqdjc.shop/a03d/www.8oosnny.xyz
unknown
http://www.kkkk.shop
unknown
http://www.behm.info/a03d/
unknown
http://www.72266.vip/a03d/
unknown
http://www.inggraphic.proReferer:
unknown
http://www.behm.info/a03d/www.enelog.xyz
unknown
http://www.lphatechblog.xyz/a03d/www.oftware-download-92806.bond
unknown
http://www.inggraphic.pro
unknown
http://www.8oosnny.xyz/a03d/
unknown
https://outlook.com
unknown
http://www.lphatechblog.xyz/a03d/
unknown
http://www.elnqdjc.shop/a03d/
unknown
http://www.behm.info
unknown
http://www.enelog.xyz
unknown
http://www.dj1.lat
unknown
http://www.aja168e.live/a03d/
unknown
http://www.inggraphic.pro/a03d/www.elnqdjc.shop
unknown
http://www.istromarmitaria.onlineReferer:
unknown
http://www.oftware-download-92806.bond/a03d/www.behm.info
unknown
https://android.notify.windows.com/iOS
unknown
http://www.duxrib.xyz/a03d/www.lphatechblog.xyz
unknown
http://www.elnqdjc.shop
unknown
http://www.elnqdjc.shopReferer:
unknown
http://www.8oosnny.xyz/a03d/www.nfluencer-marketing-13524.bond
unknown
http://www.kkkk.shop/a03d/
unknown
http://www.nfluencer-marketing-13524.bond
unknown
http://www.duxrib.xyz
unknown
https://api.msn.com/
unknown
http://crl.v
unknown
http://www.oftware-download-92806.bondReferer:
unknown
http://www.kkkk.shopReferer:
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.kkkk.shop
121.254.178.252
malicious
www.oftware-download-92806.bond
unknown
malicious
www.inggraphic.pro
unknown
malicious
www.elnqdjc.shop
unknown
malicious
www.otelhafnia.info
unknown
malicious
www.behm.info
unknown
malicious
www.aja168e.live
unknown
malicious
www.atidiri.fun
unknown
malicious
www.8oosnny.xyz
unknown
malicious
www.nfluencer-marketing-13524.bond
unknown
malicious
www.lphatechblog.xyz
unknown
malicious
There are 1 hidden domains, click here to show them.

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Excel.CSV
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
Outlook.File.msg.15
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Word.RTF.8
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
bootstrap.vsto.1
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
Unpacker
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
ddsfile
malicious
unknown
dllfile
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
ocxfile
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
txtfile
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
wdpfile
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 180 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4301000
trusted library allocation
page read and write
malicious
870000
system
page execute and read and write
malicious
2AF0000
unclassified section
page execute and read and write
malicious
4234000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
44E0000
trusted library allocation
page read and write
malicious
2810000
system
page execute and read and write
malicious
44A7000
trusted library allocation
page read and write
malicious
446F000
trusted library allocation
page read and write
malicious
CA3A000
unkown
page read and write
17AD000
stack
page read and write
14CF000
heap
page read and write
7FF5D776F000
unkown
page readonly
30FB000
stack
page read and write
2B67000
heap
page read and write
F13000
heap
page read and write
B220000
unkown
page read and write
7FF5D779E000
unkown
page readonly
7FF5D7385000
unkown
page readonly
29D0000
trusted library allocation
page read and write
7FF5D71EA000
unkown
page readonly
C908000
unkown
page read and write
C9A7000
unkown
page read and write
7AF1000
unkown
page read and write
7F060000
trusted library allocation
page execute and read and write
191D000
trusted library allocation
page execute and read and write
A237000
unkown
page read and write
7DF4F2480000
unkown
page readonly
C621000
unkown
page read and write
761E000
unkown
page read and write
9BB0000
trusted library allocation
page read and write
7FF5D75F2000
unkown
page readonly
7FF5D779E000
unkown
page readonly
C92E000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
7FF5D7740000
unkown
page readonly
C663000
unkown
page read and write
35B3000
unkown
page read and write
186D000
direct allocation
page execute and read and write
9A8C000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
2A50000
trusted library allocation
page read and write
35E4000
unkown
page read and write
91F0000
unkown
page readonly
7FF5D7206000
unkown
page readonly
3532000
unkown
page read and write
9A92000
unkown
page read and write
C96F000
unkown
page read and write
35B3000
unkown
page read and write
9C30000
heap
page read and write
195F000
unclassified section
page execute and read and write
7FF5D73F5000
unkown
page readonly
CA2E000
unkown
page read and write
7FF5D7795000
unkown
page readonly
EF0000
heap
page read and write
35C1000
unkown
page read and write
7FF5D77EB000
unkown
page readonly
7FF5D7425000
unkown
page readonly
1731000
unkown
page readonly
29D0000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
C952000
unkown
page read and write
596E000
stack
page read and write
C899000
unkown
page read and write
7E60000
unkown
page read and write
C617000
unkown
page read and write
C5FD000
unkown
page read and write
8360000
unkown
page read and write
C96D000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
309F000
heap
page read and write
8F49000
stack
page read and write
7FF5D7534000
unkown
page readonly
1079B000
unkown
page read and write
779000
stack
page read and write
35C3000
unkown
page read and write
A23A000
unkown
page read and write
D90000
trusted library allocation
page read and write
CA20000
unkown
page read and write
BDC0000
unkown
page read and write
338C000
stack
page read and write
4980000
unkown
page read and write
9B41000
unkown
page read and write
8C39000
stack
page read and write
7FF5D7558000
unkown
page readonly
7FF5D7442000
unkown
page readonly
3530000
unkown
page read and write
10D50000
system
page execute and read and write
7FF5D77C2000
unkown
page readonly
17F3000
trusted library allocation
page execute and read and write
76F8000
unkown
page read and write
75E0000
unkown
page read and write
7C80000
unkown
page read and write
AA0A000
unkown
page read and write
5463000
unkown
page read and write
7FF5D720A000
unkown
page readonly
7FF5D749B000
unkown
page readonly
E10000
unkown
page readonly
5D2E000
stack
page read and write
2B61000
heap
page read and write
7FF5D72E9000
unkown
page readonly
A3B6000
unkown
page read and write
7460000
unkown
page read and write
C9EB000
unkown
page read and write
3170000
unkown
page read and write
1866000
direct allocation
page execute and read and write
2EC0000
unkown
page readonly
76F8000
unkown
page read and write
CA20000
unkown
page read and write
39E1000
trusted library allocation
page read and write
76CB000
stack
page read and write
7FF5D6BEF000
unkown
page readonly
7D20000
trusted library allocation
page read and write
7FF5D7455000
unkown
page readonly
2F72000
heap
page read and write
58A0000
trusted library allocation
page read and write
86E0000
unkown
page readonly
A39F000
unkown
page read and write
BE90000
unkown
page read and write
7DF4F2461000
unkown
page execute read
7FF5D72BF000
unkown
page readonly
7FF5D77E9000
unkown
page readonly
7FF5D7648000
unkown
page readonly
C96D000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
4650000
trusted library allocation
page read and write
1383000
heap
page read and write
7FF5D705D000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
A28D000
unkown
page read and write
15AD000
trusted library allocation
page execute and read and write
C862000
unkown
page read and write
7FF5D7764000
unkown
page readonly
7FF5D77CD000
unkown
page readonly
9C21000
unkown
page read and write
7FF5D720F000
unkown
page readonly
35D5000
unkown
page read and write
7FF5D7589000
unkown
page readonly
7FF5D7482000
unkown
page readonly
7FF5D748C000
unkown
page readonly
49A8000
unkown
page read and write
66E000
stack
page read and write
7435000
stack
page read and write
CA2E000
unkown
page read and write
362A000
unkown
page read and write
F0C000
heap
page read and write
7FF5D7760000
unkown
page readonly
7FF5D783B000
unkown
page readonly
7FF5D7455000
unkown
page readonly
151E000
heap
page read and write
7FF5D7523000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
CA32000
unkown
page read and write
C46F000
unkown
page read and write
10796000
unkown
page read and write
1484000
heap
page read and write
58A0000
trusted library allocation
page read and write
9FAF000
stack
page read and write
7FF5D76AF000
unkown
page readonly
9B2C000
unkown
page read and write
960000
heap
page read and write
4A12000
unkown
page read and write
BEA0000
unkown
page readonly
7FF5D770A000
unkown
page readonly
4A0E000
unkown
page read and write
C893000
unkown
page read and write
CA26000
unkown
page read and write
1957000
heap
page read and write
7611000
unkown
page read and write
3489000
stack
page read and write
C62D000
unkown
page read and write
5330000
unkown
page write copy
D4E000
stack
page read and write
33B0000
unkown
page readonly
9D70000
trusted library allocation
page read and write
7FF5D771A000
unkown
page readonly
9A94000
unkown
page read and write
B950000
unkown
page readonly
9D67000
unkown
page read and write
1340000
unkown
page read and write
7FF5D723F000
unkown
page readonly
828E000
stack
page read and write
10A8000
heap
page read and write
45C1000
trusted library allocation
page execute and read and write
7FF5D77A8000
unkown
page readonly
7FF5D76AF000
unkown
page readonly
7FF5D6AB6000
unkown
page readonly
4A96000
unclassified section
page read and write
7FF5D7230000
unkown
page readonly
29D0000
heap
page read and write
5000000
trusted library allocation
page read and write
AA40000
unkown
page read and write
C8E3000
unkown
page read and write
A264000
unkown
page read and write
7E58000
stack
page read and write
99B0000
unkown
page read and write
A264000
unkown
page read and write
4A40000
unkown
page read and write
7FF5D7507000
unkown
page readonly
11FFB000
stack
page read and write
7CF5000
trusted library allocation
page read and write
7FF5D7438000
unkown
page readonly
7FF5D758D000
unkown
page readonly
7FF5D77E3000
unkown
page readonly
9A9E000
unkown
page read and write
46C3000
heap
page read and write
9D9E000
stack
page read and write
C866000
unkown
page read and write
1920000
trusted library allocation
page read and write
534E000
stack
page read and write
3280000
unkown
page read and write
84CA000
unkown
page read and write
C5F0000
unkown
page read and write
7FF5D710B000
unkown
page readonly
4521000
trusted library allocation
page execute and read and write
A9B000
heap
page read and write
BFB8000
stack
page read and write
7FF5D7760000
unkown
page readonly
7637000
unkown
page read and write
7609000
unkown
page read and write
61FD000
stack
page read and write
F4D6000
unkown
page read and write
C73E000
unkown
page read and write
A2A2000
unkown
page read and write
760F000
unkown
page read and write
760B000
unkown
page read and write
F490000
unkown
page read and write
F5EA000
heap
page read and write
804E000
stack
page read and write
CA22000
unkown
page read and write
7FF5D765F000
unkown
page readonly
318C000
stack
page read and write
7FF5D71AF000
unkown
page readonly
3021000
unkown
page read and write
17FD000
trusted library allocation
page execute and read and write
CA36000
unkown
page read and write
296E000
stack
page read and write
AF7000
stack
page read and write
29D0000
trusted library allocation
page read and write
C96F000
unkown
page read and write
A233000
unkown
page read and write
35CD000
unkown
page read and write
43E1000
heap
page read and write
4650000
trusted library allocation
page read and write
35B3000
unkown
page read and write
7FF5D7452000
unkown
page readonly
2B40000
heap
page read and write
7FF5D7691000
unkown
page readonly
10753000
unkown
page read and write
AFBE000
stack
page read and write
C0BA000
stack
page read and write
DA0000
trusted library allocation
page read and write
4AC0000
unkown
page read and write
35D5000
unkown
page read and write
7FF5D7808000
unkown
page readonly
29F0000
heap
page read and write
C669000
unkown
page read and write
E4C5000
stack
page read and write
984000
heap
page read and write
CA3A000
unkown
page read and write
107E9000
unkown
page read and write
32BE000
direct allocation
page execute and read and write
7693000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
74B000
heap
page read and write
984000
heap
page read and write
10753000
unkown
page read and write
B0E0000
unkown
page readonly
B85A000
stack
page read and write
7FF5D77E0000
unkown
page readonly
7C70000
unkown
page readonly
3545000
unkown
page read and write
C5FD000
unkown
page read and write
7B00000
unkown
page readonly
9C1E000
stack
page read and write
7FF5D7394000
unkown
page readonly
E7CC000
stack
page read and write
7AA0000
unkown
page read and write
2B6C000
heap
page read and write
AA8F000
unkown
page read and write
7FF5D75F9000
unkown
page readonly
7FF5D74A6000
unkown
page readonly
F6B000
stack
page read and write
C9D9000
unkown
page read and write
4A1D000
stack
page read and write
BB0D000
stack
page read and write
43E3000
heap
page read and write
F4C5000
unkown
page read and write
AA91000
unkown
page read and write
F4CE000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
5A0000
heap
page read and write
4A44000
unkown
page read and write
3500000
stack
page read and write
2B6C000
heap
page read and write
CA20000
unkown
page read and write
29C4000
heap
page read and write
9679000
stack
page read and write
9ADD000
stack
page read and write
C4BD000
unkown
page read and write
1662000
direct allocation
page execute and read and write
997C000
stack
page read and write
7FF5D71E6000
unkown
page readonly
7FF5D75CB000
unkown
page readonly
2A50000
trusted library allocation
page read and write
F4DA000
unkown
page read and write
49BB000
unkown
page read and write
1198E000
stack
page read and write
35B5000
unkown
page read and write
BCE000
stack
page read and write
29D0000
trusted library allocation
page read and write
A9A0000
unkown
page read and write
CA14000
unkown
page read and write
4740000
direct allocation
page execute and read and write
86D0000
unkown
page readonly
78CE000
stack
page read and write
4FE1000
trusted library allocation
page read and write
8995000
trusted library allocation
page read and write
1240000
heap
page read and write
AA99000
unkown
page read and write
7FF5D729E000
unkown
page readonly
29D0000
trusted library allocation
page read and write
7FF5D7202000
unkown
page readonly
7FF5D7703000
unkown
page readonly
94AB000
stack
page read and write
8880000
unkown
page readonly
4A7D000
stack
page read and write
7FF5D7244000
unkown
page readonly
1896000
direct allocation
page execute and read and write
29C4000
heap
page read and write
7DD0000
heap
page read and write
11DCE000
stack
page read and write
2B68000
heap
page read and write
C44F000
stack
page read and write
35B5000
unkown
page read and write
35D1000
unkown
page read and write
7D70000
heap
page read and write
AA84000
unkown
page read and write
35C9000
unkown
page read and write
CA32000
unkown
page read and write
AA88000
unkown
page read and write
120000
system
page execute and read and write
33ED000
direct allocation
page execute and read and write
12D0000
unkown
page readonly
7FF5D77B6000
unkown
page readonly
7FF5D777A000
unkown
page readonly
AA92000
unkown
page read and write
58A0000
trusted library allocation
page read and write
A313000
unkown
page read and write
2FF9000
stack
page read and write
2CFD000
stack
page read and write
97FF000
stack
page read and write
35D1000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
9AAA000
unkown
page read and write
4986000
unkown
page read and write
7FF5D7488000
unkown
page readonly
A60000
heap
page read and write
C3CA000
stack
page read and write
7E58000
stack
page read and write
AAAA000
unkown
page read and write
2FCB000
heap
page read and write
3554000
unkown
page read and write
11860000
system
page execute and read and write
29C4000
heap
page read and write
A9DF000
unkown
page read and write
7FF5D66E3000
unkown
page readonly
769A000
unkown
page read and write
7FF5D7643000
unkown
page readonly
1620000
direct allocation
page execute and read and write
2A50000
trusted library allocation
page read and write
B559000
stack
page read and write
C24E000
stack
page read and write
A90000
heap
page read and write
7FF5D76E8000
unkown
page readonly
16F9000
direct allocation
page execute and read and write
7FF5D71DA000
unkown
page readonly
7686000
unkown
page read and write
7F60000
heap
page read and write
35D3000
unkown
page read and write
7FF5D7705000
unkown
page readonly
5FD000
stack
page read and write
29E1000
trusted library allocation
page read and write
CA0C000
unkown
page read and write
190E000
stack
page read and write
582B000
trusted library allocation
page read and write
158F000
unclassified section
page execute and read and write
3520000
unkown
page readonly
58A0000
trusted library allocation
page read and write
7FF5D7593000
unkown
page readonly
75F8000
unkown
page read and write
7FF5D774A000
unkown
page readonly
F36C000
stack
page read and write
4650000
trusted library allocation
page read and write
29C4000
heap
page read and write
7FF5D77A4000
unkown
page readonly
8970000
trusted library allocation
page execute and read and write
7FF5D771A000
unkown
page readonly
7FF5D7257000
unkown
page readonly
7FF5D762F000
unkown
page readonly
A2B5000
unkown
page read and write
7FF5D66E3000
unkown
page readonly
7FF5D781A000
unkown
page readonly
5060000
heap
page read and write
CA08000
unkown
page read and write
3140000
unkown
page read and write
17E0000
trusted library allocation
page read and write
53E1000
unkown
page read and write
1041000
trusted library allocation
page execute and read and write
29D0000
trusted library allocation
page read and write
3531000
unkown
page read and write
881B000
stack
page read and write
5860000
heap
page read and write
9E2E000
stack
page read and write
1390000
heap
page read and write
7FF5D74C3000
unkown
page readonly
7FF5D76D7000
unkown
page readonly
8D0000
heap
page read and write
137E000
stack
page read and write
DCA000
trusted library allocation
page execute and read and write
156F000
stack
page read and write
2A50000
trusted library allocation
page read and write
CA4E000
unkown
page read and write
7435000
stack
page read and write
4FC0000
trusted library allocation
page read and write
7FF5D7292000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
A3AC000
unkown
page read and write
9A90000
unkown
page read and write
9AB2000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
7FF5D7485000
unkown
page readonly
7FF5D7407000
unkown
page readonly
33C0000
unkown
page read and write
7FF5D75D6000
unkown
page readonly
8160000
heap
page read and write
7FF5D752F000
unkown
page readonly
12B0000
unkown
page read and write
2B6C000
heap
page read and write
7980000
trusted library allocation
page execute and read and write
7FF5CE343000
unkown
page readonly
C8E3000
unkown
page read and write
7FF5D738E000
unkown
page readonly
12D0000
unkown
page readonly
2B4A000
heap
page read and write
10714000
unkown
page read and write
C85F000
unkown
page read and write
A384000
unkown
page read and write
2B6C000
heap
page read and write
7FF5D75E9000
unkown
page readonly
A273000
unkown
page read and write
9AAC000
unkown
page read and write
EB5000
stack
page read and write
5E6E000
stack
page read and write
9EB0000
unkown
page readonly
643E000
stack
page read and write
4A44000
unkown
page read and write
195D000
unclassified section
page execute and read and write
CA0C000
unkown
page read and write
9A80000
unkown
page read and write
7DF4F2460000
unkown
page readonly
C9E4000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
4FE6000
trusted library allocation
page read and write
33B0000
unkown
page readonly
CA2A000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
C483000
unkown
page read and write
33DC000
trusted library allocation
page read and write
10A0000
heap
page read and write
9AA0000
unkown
page read and write
146F000
stack
page read and write
BB10000
heap
page read and write
C8C1000
unkown
page read and write
A273000
unkown
page read and write
77DB000
unkown
page read and write
3220000
heap
page read and write
9D5E000
stack
page read and write
7FF5D75B3000
unkown
page readonly
7FF5D728E000
unkown
page readonly
49FA000
unkown
page read and write
80B6000
heap
page read and write
9EB0000
unkown
page readonly
7FF0000
trusted library allocation
page read and write
7FF5D71BF000
unkown
page readonly
7FF5D7230000
unkown
page readonly
11ACD000
stack
page read and write
7E60000
unkown
page read and write
7FF5D71D7000
unkown
page readonly
176E000
direct allocation
page execute and read and write
31C6000
trusted library allocation
page read and write
7DF4F2471000
unkown
page execute read
3110000
unkown
page readonly
2FCE000
heap
page read and write
7FF5D760B000
unkown
page readonly
779E000
unkown
page read and write
CA1E000
unkown
page read and write
B1F000
unkown
page read and write
C800000
unkown
page read and write
7FF5D776D000
unkown
page readonly
7FF5D7077000
unkown
page readonly
4A90000
unkown
page read and write
7FF5D768B000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
7FF5D77E3000
unkown
page readonly
A40E000
unkown
page read and write
7FF5D7215000
unkown
page readonly
1410000
heap
page read and write
5390000
trusted library allocation
page read and write
FEF000
stack
page read and write
AA04000
unkown
page read and write
10E96000
system
page read and write
760B000
unkown
page read and write
EB5000
stack
page read and write
7FF5D7700000
unkown
page readonly
6B0000
heap
page read and write
B950000
unkown
page readonly
A1AF000
stack
page read and write
7B60000
unkown
page readonly
8D3E000
stack
page read and write
9A8C000
unkown
page read and write
C615000
unkown
page read and write
12B0000
unkown
page read and write
A384000
unkown
page read and write
7FF5D760E000
unkown
page readonly
1160000
heap
page read and write
7F50000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
C7CB000
unkown
page read and write
2B61000
heap
page read and write
7FF5D7075000
unkown
page readonly
3120000
unkown
page read and write
A3B9000
unkown
page read and write
15C6000
direct allocation
page execute and read and write
7D3E000
stack
page read and write
47A000
stack
page read and write
16C3000
direct allocation
page execute and read and write
CA09000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
5063000
heap
page read and write
C609000
unkown
page read and write
C96F000
unkown
page read and write
C89D000
unkown
page read and write
3140000
unkown
page read and write
7E0000
heap
page read and write
7470000
trusted library allocation
page read and write
7FF5D6A4B000
unkown
page readonly
29C4000
heap
page read and write
7FF5D7534000
unkown
page readonly
C5F4000
unkown
page read and write
107E9000
unkown
page read and write
33DA000
trusted library allocation
page read and write
8890000
unkown
page readonly
A02E000
stack
page read and write
740000
heap
page read and write
7FF5D7398000
unkown
page readonly
7440000
unkown
page read and write
C47F000
unkown
page read and write
984000
heap
page read and write
CA2A000
unkown
page read and write
C621000
unkown
page read and write
CA8C000
unkown
page read and write
7FF5D717C000
unkown
page readonly
7FF5D7262000
unkown
page readonly
B220000
unkown
page read and write
8089000
heap
page read and write
D8E000
stack
page read and write
7FF5D7391000
unkown
page readonly
1160000
unkown
page read and write
C92A000
unkown
page read and write
A3AA000
unkown
page read and write
2A50000
trusted library allocation
page read and write
2FC0000
heap
page read and write
29C4000
heap
page read and write
31C4000
trusted library allocation
page read and write
C7BE000
unkown
page read and write
9D67000
unkown
page read and write
85BE000
stack
page read and write
C9E4000
unkown
page read and write
1520000
unclassified section
page execute and read and write
145E000
heap
page read and write
7AC0000
unkown
page read and write
7430000
trusted library allocation
page execute and read and write
584D000
trusted library allocation
page read and write
A1AF000
stack
page read and write
95F000
stack
page read and write
F4C5000
unkown
page read and write
C7C6000
unkown
page read and write
4AD0000
unkown
page read and write
7FF5D7797000
unkown
page readonly
19A0000
heap
page read and write
F4DA000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
7FF5D7065000
unkown
page readonly
1240000
trusted library allocation
page read and write
BE90000
unkown
page read and write
9B75000
unkown
page read and write
AA8D000
unkown
page read and write
9AF9000
unkown
page read and write
C10000
heap
page read and write
3400000
unkown
page read and write
16C9000
direct allocation
page execute and read and write
2AE0000
heap
page read and write
C605000
unkown
page read and write
A2D7000
unkown
page read and write
CA20000
unkown
page read and write
4A71000
unkown
page read and write
4AF0000
unkown
page read and write
1350000
unkown
page readonly
155D000
trusted library allocation
page execute and read and write
CA26000
unkown
page read and write
2950000
heap
page readonly
9578000
stack
page read and write
3462000
direct allocation
page execute and read and write
7FF5D7694000
unkown
page readonly
41E5000
trusted library allocation
page read and write
353D000
unkown
page read and write
83D000
stack
page read and write
7FF5D7792000
unkown
page readonly
C44F000
stack
page read and write
7FF5D716B000
unkown
page readonly
DB0000
trusted library allocation
page read and write
C340000
trusted library allocation
page read and write
7FF5D7272000
unkown
page readonly
9A94000
unkown
page read and write
A12F000
stack
page read and write
189D000
direct allocation
page execute and read and write
4A40000
unkown
page read and write
C893000
unkown
page read and write
C92B000
unkown
page read and write
C8C1000
unkown
page read and write
8290000
trusted library section
page readonly
3630000
unkown
page readonly
9A6A000
unkown
page read and write
C46F000
unkown
page read and write
7FF5D7722000
unkown
page readonly
29D0000
trusted library allocation
page read and write
4A16000
unkown
page read and write
AAAA000
unkown
page read and write
A99000
heap
page read and write
7FF5D7284000
unkown
page readonly
4A71000
unkown
page read and write
9AC3000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
7FF5D77C7000
unkown
page readonly
7691000
unkown
page read and write
C90A000
unkown
page read and write
94D2000
trusted library allocation
page read and write
4650000
trusted library allocation
page read and write
7810000
unkown
page read and write
298D000
stack
page read and write
7DF4F2480000
unkown
page readonly
7FF5D749B000
unkown
page readonly
9AF9000
unkown
page read and write
CCC000
stack
page read and write
A2B5000
unkown
page read and write
C7CB000
unkown
page read and write
35CF000
unkown
page read and write
9B72000
unkown
page read and write
1160000
unkown
page read and write
AFBE000
stack
page read and write
7FF5D7442000
unkown
page readonly
B03B000
stack
page read and write
7990000
trusted library allocation
page read and write
C5F4000
unkown
page read and write
8150000
heap
page read and write
35D3000
unkown
page read and write
2C01000
trusted library allocation
page read and write
35F4000
unkown
page read and write
B0E0000
unkown
page readonly
91E000
stack
page read and write
B4D0000
unkown
page readonly
9D67000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
41F000
remote allocation
page execute and read and write
CA32000
unkown
page read and write
9C22000
unkown
page read and write
75F8000
unkown
page read and write
35FA000
unkown
page read and write
5330000
unkown
page write copy
A408000
unkown
page read and write
109E000
stack
page read and write
2B72000
heap
page read and write
C450000
unkown
page read and write
C893000
unkown
page read and write
C450000
unkown
page read and write
CA0C000
unkown
page read and write
881B000
stack
page read and write
5020000
trusted library allocation
page read and write
118C5000
system
page execute and read and write
1390000
heap
page read and write
CA09000
unkown
page read and write
7FF5D729E000
unkown
page readonly
31E0000
heap
page execute and read and write
7810000
unkown
page read and write
7FF5D744E000
unkown
page readonly
C40000
heap
page read and write
612000
unkown
page readonly
7DF4F2481000
unkown
page execute read
7FF5D7262000
unkown
page readonly
35DC000
unkown
page read and write
1395000
heap
page read and write
43D000
stack
page read and write
1270000
heap
page read and write
ED4000
heap
page read and write
AA07000
unkown
page read and write
5300000
trusted library allocation
page execute and read and write
7FF5D74F2000
unkown
page readonly
A220000
unkown
page read and write
8C39000
stack
page read and write
9A76000
unkown
page read and write
A3C3000
unkown
page read and write
DFE000
heap
page read and write
C472000
unkown
page read and write
C035000
stack
page read and write
7B10000
unkown
page read and write
7FA90000
trusted library allocation
page execute and read and write
9AA8000
unkown
page read and write
B0BD000
stack
page read and write
CA22000
unkown
page read and write
3110000
heap
page read and write
4A11000
direct allocation
page execute and read and write
8A15000
heap
page read and write
7FF5D752F000
unkown
page readonly
7FF5D76CD000
unkown
page readonly
107D2000
unkown
page read and write
2A50000
trusted library allocation
page read and write
4B00000
unkown
page read and write
7FF5D7593000
unkown
page readonly
2A50000
trusted library allocation
page read and write
7FF5D77FD000
unkown
page readonly
CA2A000
unkown
page read and write
7FF5D7425000
unkown
page readonly
166E000
stack
page read and write
7DF4F2481000
unkown
page execute read
7DD0000
heap
page read and write
7FF5CE343000
unkown
page readonly
C61B000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
4B00000
unkown
page read and write
A416000
unkown
page read and write
C806000
unkown
page read and write
7605000
unkown
page read and write
C61B000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
9A9E000
unkown
page read and write
AA91000
unkown
page read and write
1360000
unkown
page readonly
1450000
heap
page read and write
9ADB000
unkown
page read and write
101E000
stack
page read and write
7460000
trusted library allocation
page read and write
7CB0000
unkown
page readonly
7693000
unkown
page read and write
9AA8000
unkown
page read and write
AAAA000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
29D0000
trusted library allocation
page read and write
F4C1000
unkown
page read and write
C24E000
stack
page read and write
C8D9000
unkown
page read and write
9A98000
unkown
page read and write
C90E000
unkown
page read and write
C806000
unkown
page read and write
3249000
direct allocation
page execute and read and write
7FF5D710B000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
AA9B000
unkown
page read and write
7950000
trusted library section
page read and write
4C0000
heap
page read and write
41E9000
trusted library allocation
page read and write
76D0000
heap
page read and write
1360000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
15A7000
direct allocation
page execute and read and write
843F000
stack
page read and write
C653000
unkown
page read and write
7FF5D71D7000
unkown
page readonly
7FF5D778A000
unkown
page readonly
17B0000
heap
page read and write
7FF5D748A000
unkown
page readonly
8890000
unkown
page readonly
7FF5D76CD000
unkown
page readonly
99C0000
unkown
page read and write
9ABD000
unkown
page read and write
99BB000
unkown
page read and write
2AF0000
trusted library allocation
page read and write
7FF5D75D9000
unkown
page readonly
CA4C000
unkown
page read and write
2B63000
heap
page read and write
C460000
unkown
page read and write
1190000
unkown
page read and write
CA36000
unkown
page read and write
3626000
unkown
page read and write
AA5000
heap
page read and write
CA20000
unkown
page read and write
35CD000
unkown
page read and write
7B20000
unkown
page read and write
31A0000
trusted library allocation
page read and write
7FF5D7075000
unkown
page readonly
80BA000
heap
page read and write
7CF0000
trusted library allocation
page read and write
7FF5D7485000
unkown
page readonly
DA4000
trusted library allocation
page read and write
29C4000
heap
page read and write
7FF5D77B9000
unkown
page readonly
C4BD000
unkown
page read and write
338F000
trusted library allocation
page read and write
FF0000
unkown
page readonly
7FF5D7309000
unkown
page readonly
E64D000
stack
page read and write
CA3E000
unkown
page read and write
7C90000
unkown
page read and write
29D0000
trusted library allocation
page read and write
8880000
unkown
page readonly
7AF1000
unkown
page read and write
C85F000
unkown
page read and write
29D0000
trusted library allocation
page read and write
F5E0000
heap
page read and write
35F4000
unkown
page read and write
1A70000
heap
page read and write
7FF5D7820000
unkown
page readonly
B330000
unkown
page read and write
7970000
trusted library section
page readonly
7FF5D7284000
unkown
page readonly
F60000
system
page execute and read and write
91F0000
unkown
page readonly
75FD000
unkown
page read and write
89A0000
heap
page read and write
CA1E000
unkown
page read and write
1731000
unkown
page readonly
7FF5D7641000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
7609000
unkown
page read and write
7FF5D769E000
unkown
page readonly
2EC0000
unkown
page readonly
17F4000
trusted library allocation
page read and write
7FF5D758D000
unkown
page readonly
A40E000
unkown
page read and write
9A84000
unkown
page read and write
29D0000
trusted library allocation
page read and write
7FF5D745B000
unkown
page readonly
32F0000
heap
page read and write
7DF4F24A1000
unkown
page execute read
CA0C000
unkown
page read and write
DA3000
trusted library allocation
page execute and read and write
362A000
unkown
page read and write
49FD000
unkown
page read and write
5015000
trusted library allocation
page read and write
2B68000
heap
page read and write
C8B4000
unkown
page read and write
C78A000
unkown
page read and write
BDC0000
unkown
page read and write
BB10000
heap
page read and write
F4DA000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
1570000
unclassified section
page execute and read and write
53E1000
unkown
page read and write
C863000
unkown
page read and write
CA90000
unkown
page read and write
FF0000
trusted library allocation
page read and write
C78A000
unkown
page read and write
997C000
stack
page read and write
C11000
heap
page read and write
1395000
heap
page read and write
7FF5D74B8000
unkown
page readonly
C952000
unkown
page read and write
E54B000
stack
page read and write
7D80000
trusted library allocation
page execute and read and write
7FF5D7792000
unkown
page readonly
49BB000
unkown
page read and write
7FF5D73F5000
unkown
page readonly
1040000
heap
page execute and read and write
362D000
unkown
page read and write
1B46000
unclassified section
page execute and read and write
9BA0000
trusted library allocation
page read and write
10CF000
heap
page read and write
9ABD000
unkown
page read and write
7631000
unkown
page read and write
84CA000
unkown
page read and write
29C4000
heap
page read and write
4FF2000
trusted library allocation
page read and write
7FF5D770F000
unkown
page readonly
7FF5D7837000
unkown
page readonly
9AB2000
unkown
page read and write
C893000
unkown
page read and write
E18000
heap
page read and write
25DC000
stack
page read and write
7FF5D75E9000
unkown
page readonly
C48B000
unkown
page read and write
C1CC000
stack
page read and write
119CD000
stack
page read and write
AA8F000
unkown
page read and write
9B7E000
unkown
page read and write
3626000
unkown
page read and write
E32000
heap
page read and write
671D000
stack
page read and write
7D00000
trusted library allocation
page read and write
C94F000
unkown
page read and write
984000
heap
page read and write
1223E000
stack
page read and write
29D0000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
75FD000
unkown
page read and write
4A0D000
direct allocation
page execute and read and write
A9A0000
unkown
page read and write
942E000
stack
page read and write
4986000
unkown
page read and write
8870000
unkown
page readonly
10714000
unkown
page read and write
C893000
unkown
page read and write
1030000
heap
page read and write
7FF5D766E000
unkown
page readonly
C4DC000
unkown
page read and write
145A000
heap
page read and write
7FF5D71E0000
unkown
page readonly
5841000
trusted library allocation
page read and write
7FF5D71AF000
unkown
page readonly
984000
heap
page read and write
7FF5D72D0000
unkown
page readonly
7D40000
trusted library allocation
page execute and read and write
89B0000
heap
page read and write
78D5000
heap
page read and write
7FF5D748A000
unkown
page readonly
5FAD000
stack
page read and write
103E000
stack
page read and write
B85A000
stack
page read and write
3521000
trusted library allocation
page read and write
7FF5D75AF000
unkown
page readonly
7FF5D7703000
unkown
page readonly
E6C000
stack
page read and write
4980000
unkown
page read and write
7FF5D7808000
unkown
page readonly
2A50000
trusted library allocation
page read and write
A98000
heap
page read and write
73F0000
trusted library allocation
page execute and read and write
7FF5D75BF000
unkown
page readonly
7FF5D71F9000
unkown
page readonly
7C90000
unkown
page read and write
1A80000
unclassified section
page execute and read and write
76E0000
trusted library allocation
page read and write
9A84000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
10850000
unkown
page read and write
C933000
unkown
page read and write
9A72000
unkown
page read and write
7FF5D706E000
unkown
page readonly
7FF5D7799000
unkown
page readonly
E25000
heap
page read and write
8870000
unkown
page readonly
4A0E000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
7FF5D72FB000
unkown
page readonly
2970000
trusted library allocation
page read and write
8CB8000
stack
page read and write
1383000
heap
page read and write
CA1E000
unkown
page read and write
10796000
unkown
page read and write
EBB000
heap
page read and write
980000
heap
page read and write
7FF5D7705000
unkown
page readonly
29D0000
trusted library allocation
page read and write
4FBE000
stack
page read and write
2BDF000
stack
page read and write
CA26000
unkown
page read and write
C472000
unkown
page read and write
CA2A000
unkown
page read and write
362D000
unkown
page read and write
7FF5D7682000
unkown
page readonly
9AB4000
unkown
page read and write
2B6C000
heap
page read and write
7B10000
unkown
page read and write
CA2A000
unkown
page read and write
7FF5D7682000
unkown
page readonly
A3C3000
unkown
page read and write
35C1000
unkown
page read and write
35DC000
unkown
page read and write
14BE000
stack
page read and write
7FF5D75F2000
unkown
page readonly
29D0000
trusted library allocation
page read and write
1050000
heap
page read and write
35FA000
unkown
page read and write
29D0000
trusted library allocation
page read and write
9578000
stack
page read and write
7FF5D7236000
unkown
page readonly
3301000
trusted library allocation
page read and write
CA3A000
unkown
page read and write
35B5000
unkown
page read and write
C96F000
unkown
page read and write
A237000
unkown
page read and write
7DBC000
stack
page read and write
2A50000
trusted library allocation
page read and write
DA0000
heap
page read and write
1250000
heap
page read and write
7FF5D7257000
unkown
page readonly
7FF5D766E000
unkown
page readonly
29C4000
heap
page read and write
C9FA000
unkown
page read and write
C8E3000
unkown
page read and write
33F1000
direct allocation
page execute and read and write
35B0000
unkown
page read and write
B560000
trusted library allocation
page execute and read and write
7FF5D7385000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
8990000
trusted library allocation
page read and write
7654000
unkown
page read and write
AA8F000
unkown
page read and write
4A12000
unkown
page read and write
E10000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
CA14000
unkown
page read and write
7FF5D7336000
unkown
page readonly
9EA000
stack
page read and write
33F0000
unkown
page read and write
7FF5D741B000
unkown
page readonly
2960000
heap
page read and write
AA08000
unkown
page read and write
2E30000
heap
page read and write
F4C1000
unkown
page read and write
95FB000
stack
page read and write
BE70000
unkown
page readonly
107DB000
unkown
page read and write
8188000
heap
page read and write
4AA0000
unkown
page read and write
2B9E000
stack
page read and write
A39C000
unkown
page read and write
7FF5D732D000
unkown
page readonly
7FF5D7289000
unkown
page readonly
80B0000
heap
page read and write
7FF5D71EF000
unkown
page readonly
7FF5D774A000
unkown
page readonly
7FF5D72BF000
unkown
page readonly
B4D0000
unkown
page readonly
C460000
unkown
page read and write
CA36000
unkown
page read and write
A2D7000
unkown
page read and write
C47F000
unkown
page read and write
B330000
unkown
page read and write
9C96000
unkown
page read and write
C7C6000
unkown
page read and write
1123000
unkown
page read and write
A408000
unkown
page read and write
5CEF000
stack
page read and write
3516000
trusted library allocation
page read and write
A0A8000
stack
page read and write
927E000
stack
page read and write
7FF5D75B8000
unkown
page readonly
17F0000
trusted library allocation
page read and write
7FF5D778A000
unkown
page readonly
309B000
heap
page read and write
1492000
heap
page read and write
E896000
unkown
page execute and read and write
1130000
heap
page read and write
984000
heap
page read and write
1090000
trusted library allocation
page execute and read and write
7FF5D76C8000
unkown
page readonly
BF3E000
stack
page read and write
8A00000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
CA1E000
unkown
page read and write
7FF5D72D7000
unkown
page readonly
6AF000
stack
page read and write
3540000
unkown
page read and write
C9D9000
unkown
page read and write
1920000
unclassified section
page execute and read and write
F5E2000
heap
page read and write
CA14000
unkown
page read and write
7654000
unkown
page read and write
1250000
unkown
page read and write
94F4000
unkown
page read and write
14DB000
unclassified section
page execute and read and write
9D67000
unkown
page read and write
7FF5D764F000
unkown
page readonly
5380000
trusted library allocation
page read and write
15A0000
direct allocation
page execute and read and write
CA14000
unkown
page read and write
C96D000
unkown
page read and write
7F0000
heap
page read and write
3309000
trusted library allocation
page read and write
35DC000
unkown
page read and write
CA3E000
unkown
page read and write
984000
heap
page read and write
C951000
unkown
page read and write
A251000
unkown
page read and write
10814000
unkown
page read and write
2AB0000
trusted library allocation
page read and write
7FF5D7289000
unkown
page readonly
C9A7000
unkown
page read and write
89DD000
heap
page read and write
60B0000
heap
page read and write
AE1D000
stack
page read and write
CA26000
unkown
page read and write
F49C000
unkown
page read and write
8A46000
unkown
page read and write
7FF5D723C000
unkown
page readonly
7FF5D7280000
unkown
page readonly
7F30000
trusted library allocation
page read and write
7AE0000
unkown
page read and write
FF0000
unkown
page readonly
B0EE000
heap
page read and write
7FF5D7558000
unkown
page readonly
8076000
heap
page read and write
F4C4000
unkown
page read and write
769A000
unkown
page read and write
7FF5D7648000
unkown
page readonly
4B29000
trusted library allocation
page read and write
1918000
direct allocation
page execute and read and write
3170000
unkown
page read and write
4506000
heap
page read and write
7DC0000
unkown
page readonly
A286000
unkown
page read and write
7FF5D743F000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
C4DC000
unkown
page read and write
C952000
unkown
page read and write
5E2E000
stack
page read and write
118B5000
system
page execute and read and write
3630000
unkown
page readonly
AAAA000
unkown
page read and write
7FF5D7065000
unkown
page readonly
9A90000
unkown
page read and write
CA32000
unkown
page read and write
7FF5D7398000
unkown
page readonly
9A8E000
unkown
page read and write
7FF5D7795000
unkown
page readonly
A90000
heap
page read and write
29BE000
stack
page read and write
7631000
unkown
page read and write
7FF5D769E000
unkown
page readonly
745A000
trusted library allocation
page read and write
10DEC000
system
page execute and read and write
7FF5D7458000
unkown
page readonly
C5FA000
unkown
page read and write
9A76000
unkown
page read and write
354D000
unkown
page read and write
2A50000
trusted library allocation
page read and write
7FF5D77F0000
unkown
page readonly
BFB8000
stack
page read and write
9ADB000
unkown
page read and write
4B33000
trusted library allocation
page read and write
F4CD000
unkown
page read and write
C96F000
unkown
page read and write
C8E3000
unkown
page read and write
4510000
trusted library allocation
page execute and read and write
10E2B000
system
page execute and read and write
7FF5D760B000
unkown
page readonly
7FF5D77C2000
unkown
page readonly
3160000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
760D000
unkown
page read and write
977E000
stack
page read and write
C615000
unkown
page read and write
C45000
heap
page read and write
5846000
trusted library allocation
page read and write
960000
heap
page read and write
AA98000
unkown
page read and write
7FF5D6BE4000
unkown
page readonly
1123000
unkown
page read and write
29D0000
trusted library allocation
page read and write
7FF5D6AB6000
unkown
page readonly
35D1000
unkown
page read and write
7FF5D7546000
unkown
page readonly
760F000
unkown
page read and write
9A8E000
unkown
page read and write
7FF5D723F000
unkown
page readonly
7FF5D72D7000
unkown
page readonly
C908000
unkown
page read and write
7FF5D7452000
unkown
page readonly
35B0000
unkown
page read and write
7700000
heap
page read and write
7FF5D744E000
unkown
page readonly
158B000
unclassified section
page execute and read and write
62F000
unkown
page read and write
7C80000
unkown
page read and write
7FF5D706F000
unkown
page readonly
9AAA000
unkown
page read and write
5398000
trusted library allocation
page read and write
C669000
unkown
page read and write
B0C0000
heap
page read and write
C609000
unkown
page read and write
A9E9000
unkown
page read and write
1420000
heap
page read and write
7FF5D732D000
unkown
page readonly
7FF5D7799000
unkown
page readonly
824E000
stack
page read and write
7FF5D77FD000
unkown
page readonly
94F4000
unkown
page read and write
7FF5D719C000
unkown
page readonly
9679000
stack
page read and write
8AB0000
heap
page read and write
F4B0000
unkown
page read and write
7987000
stack
page read and write
A9E9000
unkown
page read and write
89C8000
heap
page read and write
A39F000
unkown
page read and write
7FF5D748C000
unkown
page readonly
1256000
heap
page read and write
35E4000
unkown
page read and write
CA8C000
unkown
page read and write
DBD000
trusted library allocation
page execute and read and write
7FF5D71E6000
unkown
page readonly
3110000
unkown
page readonly
7FF5D7396000
unkown
page readonly
2FCF000
heap
page read and write
7FF5D7669000
unkown
page readonly
C90E000
unkown
page read and write
8360000
unkown
page read and write
259C000
stack
page read and write
CA2E000
unkown
page read and write
F5EA000
heap
page read and write
29D0000
trusted library allocation
page read and write
CA0C000
unkown
page read and write
4A16000
unkown
page read and write
9AB4000
unkown
page read and write
35F4000
unkown
page read and write
C96D000
unkown
page read and write
7FF5D76E8000
unkown
page readonly
581E000
stack
page read and write
7DF4F2470000
unkown
page readonly
E00000
unkown
page readonly
7FF5D743F000
unkown
page readonly
19EF000
stack
page read and write
35BD000
unkown
page read and write
CA90000
unkown
page read and write
4AA0000
unkown
page read and write
11BCF000
stack
page read and write
1350000
unkown
page readonly
C1CC000
stack
page read and write
C96D000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
C8F6000
unkown
page read and write
31C0000
trusted library allocation
page read and write
779E000
unkown
page read and write
35BD000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
C8E3000
unkown
page read and write
7691000
unkown
page read and write
10A9000
stack
page read and write
7FF5D77A8000
unkown
page readonly
5463000
unkown
page read and write
7FF5D7694000
unkown
page readonly
760D000
unkown
page read and write
4AC0000
unkown
page read and write
F4C2000
unkown
page read and write
549C000
stack
page read and write
1626000
direct allocation
page execute and read and write
7FF5D76F5000
unkown
page readonly
9B20000
trusted library section
page read and write
9D42000
unkown
page read and write
7FF5D776F000
unkown
page readonly
4B7C000
stack
page read and write
43E1000
heap
page read and write
1926000
trusted library allocation
page execute and read and write
8050000
heap
page read and write
7FF5D77DA000
unkown
page readonly
8FD9000
stack
page read and write
13A0000
unkown
page readonly
C800000
unkown
page read and write
7FF5D7396000
unkown
page readonly
7FF5D7641000
unkown
page readonly
4AE0000
unkown
page read and write
1922000
trusted library allocation
page read and write
9A96000
unkown
page read and write
80B2000
heap
page read and write
CA3E000
unkown
page read and write
7DF4F2470000
unkown
page readonly
A3AC000
unkown
page read and write
314E000
stack
page read and write
C5F0000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
4FDE000
trusted library allocation
page read and write
C9D8000
unkown
page read and write
9BB9000
trusted library allocation
page read and write
353D000
unkown
page read and write
35D3000
unkown
page read and write
A33F000
unkown
page read and write
B4BF000
stack
page read and write
7FF5D770F000
unkown
page readonly
7FF5D75B3000
unkown
page readonly
7FF5D7820000
unkown
page readonly
2DE0000
trusted library allocation
page read and write
CA22000
unkown
page read and write
C605000
unkown
page read and write
3100000
trusted library allocation
page read and write
7FF5D762F000
unkown
page readonly
DC6000
trusted library allocation
page execute and read and write
C617000
unkown
page read and write
9AAC000
unkown
page read and write
7FF5D783B000
unkown
page readonly
7FF5D75BF000
unkown
page readonly
7FF5D72D3000
unkown
page readonly
362A000
unkown
page read and write
633E000
stack
page read and write
7FF5D7752000
unkown
page readonly
29C4000
heap
page read and write
45B0000
trusted library allocation
page execute and read and write
7FF5D774C000
unkown
page readonly
77A2000
unkown
page read and write
1213E000
stack
page read and write
75E0000
unkown
page read and write
120FC000
stack
page read and write
7FF5D76DA000
unkown
page readonly
EF0000
heap
page read and write
F4D6000
unkown
page read and write
1950000
unclassified section
page execute and read and write
1550000
heap
page read and write
7AA0000
unkown
page read and write
AA8D000
unkown
page read and write
C663000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
E6CE000
stack
page read and write
C61D000
unkown
page read and write
4734000
heap
page read and write
C496000
unkown
page read and write
49D6000
unkown
page read and write
ADE000
unkown
page read and write
3626000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
29C4000
heap
page read and write
7FF5D7202000
unkown
page readonly
7FF5D69BB000
unkown
page readonly
7DBC000
stack
page read and write
7FF5D72E9000
unkown
page readonly
7720000
heap
page execute and read and write
7FF5D7336000
unkown
page readonly
78D0000
heap
page read and write
12F000
system
page execute and read and write
35D5000
unkown
page read and write
C4C6000
unkown
page read and write
2DD0000
heap
page read and write
58A0000
trusted library allocation
page read and write
1937000
trusted library allocation
page execute and read and write
3383000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
A28D000
unkown
page read and write
7FF5D7267000
unkown
page readonly
C73E000
unkown
page read and write
46CD000
stack
page read and write
B980000
unkown
page readonly
1A8B000
unclassified section
page execute and read and write
3190000
trusted library allocation
page execute and read and write
9B2C000
unkown
page read and write
CA2E000
unkown
page read and write
7440000
unkown
page read and write
4FCB000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
7605000
unkown
page read and write
2B6C000
heap
page read and write
7FF5D7280000
unkown
page readonly
768C000
unkown
page read and write
84BB000
stack
page read and write
8CB8000
stack
page read and write
CA36000
unkown
page read and write
3100000
unkown
page read and write
7FF5CE33D000
unkown
page readonly
7DF4F2460000
unkown
page readonly
7FF5D76C8000
unkown
page readonly
7FF5D776D000
unkown
page readonly
AE1D000
stack
page read and write
7FF5D74FA000
unkown
page readonly
2E3E000
unkown
page read and write
1000000
heap
page read and write
BE49000
stack
page read and write
7FF5D751F000
unkown
page readonly
10A0000
heap
page read and write
7FF5D719C000
unkown
page readonly
4869000
direct allocation
page execute and read and write
F5E2000
heap
page read and write
7FF5D775C000
unkown
page readonly
B0BD000
stack
page read and write
31D0000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
9A72000
unkown
page read and write
29C0000
trusted library allocation
page read and write
7B80000
unkown
page readonly
7FF5D768B000
unkown
page readonly
96FE000
stack
page read and write
7FF5D7267000
unkown
page readonly
49C2000
unkown
page read and write
7FF5D760E000
unkown
page readonly
3534000
unkown
page read and write
A3AA000
unkown
page read and write
84BB000
stack
page read and write
5010000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
7FF5D7215000
unkown
page readonly
2EA1000
unkown
page read and write
7FF5D7722000
unkown
page readonly
33F0000
unkown
page read and write
14C0000
unclassified section
page execute and read and write
CA4E000
unkown
page read and write
9D1F000
stack
page read and write
7FF5D75CB000
unkown
page readonly
681E000
stack
page read and write
A313000
unkown
page read and write
843F000
stack
page read and write
7FF5D7073000
unkown
page readonly
2B7B000
heap
page read and write
C81C000
unkown
page read and write
C92B000
unkown
page read and write
35C3000
unkown
page read and write
29D0000
trusted library allocation
page read and write
96FE000
stack
page read and write
98FD000
stack
page read and write
324D000
direct allocation
page execute and read and write
8080000
heap
page read and write
7FF5D772C000
unkown
page readonly
2B72000
heap
page read and write
B4BF000
stack
page read and write
7FF5D781A000
unkown
page readonly
7FF5D7419000
unkown
page readonly
C0D000
stack
page read and write
CA4E000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
35B0000
unkown
page read and write
7FF5D7764000
unkown
page readonly
C96F000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
1932000
trusted library allocation
page read and write
C653000
unkown
page read and write
2870000
heap
page read and write
3540000
unkown
page read and write
4FF0000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
7FF5D75A6000
unkown
page readonly
470E000
stack
page read and write
7FF5D72C8000
unkown
page readonly
C9F2000
unkown
page read and write
C8E3000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
C0F000
stack
page read and write
35C1000
unkown
page read and write
C035000
stack
page read and write
C9F5000
unkown
page read and write
29C4000
heap
page read and write
7FF5D7589000
unkown
page readonly
7FF5D75DF000
unkown
page readonly
1270000
unkown
page read and write
C483000
unkown
page read and write
46BF000
heap
page read and write
7FF5D7404000
unkown
page readonly
9AD000
stack
page read and write
9A98000
unkown
page read and write
7F40000
trusted library allocation
page read and write
35FA000
unkown
page read and write
583E000
trusted library allocation
page read and write
9A6A000
unkown
page read and write
107D2000
unkown
page read and write
9FAF000
stack
page read and write
7FF5D66E8000
unkown
page readonly
C96D000
unkown
page read and write
7FF5D772C000
unkown
page readonly
7FF5D7546000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
35CF000
unkown
page read and write
768E000
unkown
page read and write
107DB000
unkown
page read and write
486D000
direct allocation
page execute and read and write
8000000
heap
page execute and read and write
CA32000
unkown
page read and write
B2F0000
trusted library allocation
page execute and read and write
7618000
unkown
page read and write
DF0000
heap
page read and write
B2C0000
trusted library allocation
page read and write
3280000
unkown
page read and write
77DB000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
7FF5D728E000
unkown
page readonly
A3B6000
unkown
page read and write
1108F000
system
page read and write
F4CD000
unkown
page read and write
9A96000
unkown
page read and write
1380000
heap
page read and write
1800000
heap
page read and write
7FF5D7691000
unkown
page readonly
5F6F000
stack
page read and write
7FF5D72BD000
unkown
page readonly
7AB0000
unkown
page read and write
9A80000
unkown
page read and write
FD0000
heap
page read and write
7FF5D72DF000
unkown
page readonly
DAD000
trusted library allocation
page execute and read and write
35C9000
unkown
page read and write
16FD000
direct allocation
page execute and read and write
7DF4F24A1000
unkown
page execute read
3400000
unkown
page read and write
8A70000
unkown
page read and write
2A62000
trusted library allocation
page read and write
7FF5D7404000
unkown
page readonly
60AD000
stack
page read and write
29D0000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
5820000
trusted library allocation
page read and write
7CB0000
unkown
page readonly
7FF5D71BF000
unkown
page readonly
9BD0000
trusted library allocation
page execute and read and write
7FF5D7523000
unkown
page readonly
7FF5D75EE000
unkown
page readonly
65DC000
stack
page read and write
CA3E000
unkown
page read and write
7FF5D741F000
unkown
page readonly
7FF5D7309000
unkown
page readonly
9C92000
unkown
page read and write
7FF5D745B000
unkown
page readonly
1851000
direct allocation
page execute and read and write
7FF5D7837000
unkown
page readonly
D10000
trusted library allocation
page read and write
8A46000
unkown
page read and write
F4F0000
unkown
page read and write
C952000
unkown
page read and write
29C4000
heap
page read and write
29C4000
heap
page read and write
7B20000
unkown
page read and write
9B0B000
unkown
page read and write
A9DF000
unkown
page read and write
4A82000
direct allocation
page execute and read and write
894F000
stack
page read and write
2B67000
heap
page read and write
3100000
unkown
page read and write
C61D000
unkown
page read and write
A391000
unkown
page read and write
A391000
unkown
page read and write
1340000
unkown
page read and write
AA84000
unkown
page read and write
7FF5D7669000
unkown
page readonly
10814000
unkown
page read and write
2DF0000
heap
page read and write
AA04000
unkown
page read and write
B7DA000
stack
page read and write
9AA0000
unkown
page read and write
5479000
unkown
page read and write
43E0000
heap
page read and write
7FF5D77EB000
unkown
page readonly
7FF5D75AF000
unkown
page readonly
CA36000
unkown
page read and write
1020000
heap
page read and write
32EE000
stack
page read and write
11A7000
stack
page read and write
35BD000
unkown
page read and write
C863000
unkown
page read and write
9EAC000
stack
page read and write
9B77000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
29C4000
heap
page read and write
7FF5D723C000
unkown
page readonly
8A70000
unkown
page read and write
C62D000
unkown
page read and write
4650000
trusted library allocation
page read and write
7FF5D76F5000
unkown
page readonly
108C000
stack
page read and write
2F7E000
stack
page read and write
49A8000
unkown
page read and write
76F0000
heap
page read and write
C8AC000
unkown
page read and write
B8DB000
stack
page read and write
1140000
heap
page read and write
13A0000
unkown
page readonly
10D1000
heap
page read and write
7C70000
unkown
page readonly
2F7F000
stack
page read and write
7FF5D72D3000
unkown
page readonly
192A000
trusted library allocation
page execute and read and write
2A50000
trusted library allocation
page read and write
4A90000
unkown
page read and write
1930000
trusted library allocation
page read and write
7618000
unkown
page read and write
A12F000
stack
page read and write
7FF5D747F000
unkown
page readonly
1250000
unkown
page read and write
49D6000
unkown
page read and write
31BF000
stack
page read and write
C933000
unkown
page read and write
7FF5D7604000
unkown
page readonly
7FF5D7482000
unkown
page readonly
7FF5D75FF000
unkown
page readonly
A220000
unkown
page read and write
3530000
unkown
page read and write
7FF5D777A000
unkown
page readonly
CA2E000
unkown
page read and write
7686000
unkown
page read and write
7450000
trusted library allocation
page read and write
BF3E000
stack
page read and write
7FF5D7752000
unkown
page readonly
7FF5D7073000
unkown
page readonly
DD7000
trusted library allocation
page execute and read and write
7FF5D7604000
unkown
page readonly
807E000
heap
page read and write
35CF000
unkown
page read and write
19B0000
unclassified section
page execute and read and write
1030000
trusted library allocation
page execute and read and write
7FF5D7077000
unkown
page readonly
7F3A000
trusted library allocation
page read and write
C65E000
unkown
page read and write
7FF5D7407000
unkown
page readonly
8A00000
unkown
page read and write
7FF5D774C000
unkown
page readonly
7FF5D77C7000
unkown
page readonly
C5F8000
unkown
page read and write
7FF5D7236000
unkown
page readonly
B8DB000
stack
page read and write
9B41000
unkown
page read and write
338C000
stack
page read and write
4596000
heap
page read and write
9D42000
unkown
page read and write
5479000
unkown
page read and write
7FF5D770A000
unkown
page readonly
2E3A000
heap
page read and write
89E1000
heap
page read and write
86D0000
unkown
page readonly
1380000
heap
page read and write
CA14000
unkown
page read and write
C8B4000
unkown
page read and write
7DC0000
unkown
page readonly
92D0000
heap
page read and write
7FF5D7700000
unkown
page readonly
7FF5D705D000
unkown
page readonly
3500000
stack
page read and write
1261000
unkown
page read and write
C96D000
unkown
page read and write
C496000
unkown
page read and write
7FF5D764F000
unkown
page readonly
1190000
unkown
page read and write
7FF5D7458000
unkown
page readonly
43E1000
heap
page read and write
7FF5D7292000
unkown
page readonly
7B80000
unkown
page readonly
8DCB000
stack
page read and write
11ECE000
stack
page read and write
BB9C000
stack
page read and write
7FF5D720F000
unkown
page readonly
7FF5D77E0000
unkown
page readonly
DCB000
stack
page read and write
C81C000
unkown
page read and write
3160000
unkown
page read and write
66DC000
stack
page read and write
7AE0000
unkown
page read and write
8A07000
heap
page read and write
7989000
stack
page read and write
5863000
heap
page read and write
7FF5D71E0000
unkown
page readonly
1188E000
stack
page read and write
1079B000
unkown
page read and write
AA01000
unkown
page read and write
30A0000
heap
page read and write
7FF5D7591000
unkown
page readonly
7FF5D7488000
unkown
page readonly
7FF5D744B000
unkown
page readonly
7FF5D7394000
unkown
page readonly
35CD000
unkown
page read and write
33C0000
unkown
page read and write
49FA000
unkown
page read and write
C5FA000
unkown
page read and write
7460000
unkown
page read and write
7FF5D747F000
unkown
page readonly
3230000
heap
page read and write
98FD000
stack
page read and write
1950000
heap
page read and write
7AC0000
unkown
page read and write
A02E000
stack
page read and write
7FF5D77E9000
unkown
page readonly
147F000
stack
page read and write
CA26000
unkown
page read and write
C8AC000
unkown
page read and write
C8EB000
unkown
page read and write
1270000
unkown
page read and write
A251000
unkown
page read and write
CA3A000
unkown
page read and write
1170000
unkown
page read and write
E74D000
stack
page read and write
794E000
stack
page read and write
7FF5D775C000
unkown
page readonly
62FE000
stack
page read and write
C8E3000
unkown
page read and write
7AB0000
unkown
page read and write
AA40000
unkown
page read and write
8980000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
C7BE000
unkown
page read and write
35C3000
unkown
page read and write
7FF5D7745000
unkown
page readonly
4FED000
trusted library allocation
page read and write
3021000
unkown
page read and write
35C9000
unkown
page read and write
9E2D000
stack
page read and write
CA22000
unkown
page read and write
3544000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
C9F8000
unkown
page read and write
AA8D000
unkown
page read and write
AA91000
unkown
page read and write
4418000
heap
page read and write
C0BA000
stack
page read and write
C642000
unkown
page read and write
CA22000
unkown
page read and write
CA4C000
unkown
page read and write
AA4000
heap
page read and write
A3B9000
unkown
page read and write
8082000
heap
page read and write
9AC3000
unkown
page read and write
29C4000
heap
page read and write
761E000
unkown
page read and write
7FF5D765F000
unkown
page readonly
E00000
unkown
page readonly
7FF5D77B6000
unkown
page readonly
9B75000
unkown
page read and write
4AB0000
unkown
page read and write
15D0000
direct allocation
page execute and read and write
F490000
unkown
page read and write
5040000
trusted library allocation
page read and write
7DF4F2491000
unkown
page execute read
1881000
direct allocation
page execute and read and write
695E000
stack
page read and write
C8AC000
unkown
page read and write
2F7F000
stack
page read and write
7420000
heap
page read and write
7FF5D77F7000
unkown
page readonly
685E000
stack
page read and write
7FF5D7360000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
F4D6000
unkown
page read and write
7DF4F2471000
unkown
page execute read
7FF5D7784000
unkown
page readonly
29C0000
heap
page read and write
99C0000
unkown
page read and write
2F3F000
unkown
page read and write
351B000
trusted library allocation
page read and write
12D000
system
page execute and read and write
E857000
unkown
page execute and read and write
A2A2000
unkown
page read and write
F13000
heap
page read and write
3120000
direct allocation
page execute and read and write
1555000
heap
page read and write
7FF5D7797000
unkown
page readonly
1000000
heap
page read and write
C625000
unkown
page read and write
4C8F000
unclassified section
page read and write
7FF5D77CD000
unkown
page readonly
C5F8000
unkown
page read and write
48DE000
direct allocation
page execute and read and write
C4C6000
unkown
page read and write
C65E000
unkown
page read and write
A33F000
unkown
page read and write
118DA000
system
page execute and read and write
DD2000
trusted library allocation
page read and write
7FF5D75F9000
unkown
page readonly
7FF5D6A4B000
unkown
page readonly
4AB0000
unkown
page read and write
C642000
unkown
page read and write
7DF4F2461000
unkown
page execute read
7FF5D751F000
unkown
page readonly
8AC0000
heap
page read and write
7D3E000
stack
page read and write
7B00000
unkown
page readonly
1910000
trusted library allocation
page read and write
3120000
unkown
page read and write
A23A000
unkown
page read and write
F4F0000
unkown
page read and write
176E000
stack
page read and write
A9FD000
unkown
page read and write
B03B000
stack
page read and write
BEA0000
unkown
page readonly
A286000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
7FF5D738E000
unkown
page readonly
7FF5D74C3000
unkown
page readonly
CA3E000
unkown
page read and write
610000
unkown
page readonly
3520000
unkown
page readonly
7FF5D7643000
unkown
page readonly
804B000
stack
page read and write
2A50000
trusted library allocation
page read and write
1281000
unkown
page readonly
193B000
trusted library allocation
page execute and read and write
7FF5D7438000
unkown
page readonly
C933000
unkown
page read and write
AA01000
unkown
page read and write
7FF5D7784000
unkown
page readonly
7FF5D7507000
unkown
page readonly
7FF5D7391000
unkown
page readonly
1281000
unkown
page readonly
89A5000
heap
page read and write
A50000
heap
page read and write
A233000
unkown
page read and write
49C2000
unkown
page read and write
A416000
unkown
page read and write
DDB000
trusted library allocation
page execute and read and write
C48B000
unkown
page read and write
A9FD000
unkown
page read and write
4B05000
trusted library allocation
page read and write
7FF5D7591000
unkown
page readonly
99B0000
unkown
page read and write
CA77000
unkown
page read and write
7611000
unkown
page read and write
CA3A000
unkown
page read and write
984000
heap
page read and write
B980000
unkown
page readonly
DC2000
trusted library allocation
page read and write
7FF5D7740000
unkown
page readonly
118B3000
system
page execute and read and write
29D0000
trusted library allocation
page read and write
80A0000
heap
page read and write
85BE000
stack
page read and write
AAAA000
unkown
page read and write
7FF5D7360000
unkown
page readonly
35E4000
unkown
page read and write
7FF5D717C000
unkown
page readonly
7DF4F2491000
unkown
page execute read
7C31000
unkown
page read and write
5EE000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
7FF5D7745000
unkown
page readonly
9A92000
unkown
page read and write
1038000
heap
page read and write
A39C000
unkown
page read and write
7FF5D7639000
unkown
page readonly
7B60000
unkown
page readonly
7FF5D7272000
unkown
page readonly
11BD0000
heap
page read and write
2A50000
trusted library allocation
page read and write
C8D9000
unkown
page read and write
AA40000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
7FF5D716B000
unkown
page readonly
362D000
unkown
page read and write
C11000
heap
page read and write
77A2000
unkown
page read and write
C625000
unkown
page read and write
984000
heap
page read and write
9B72000
unkown
page read and write
CA1E000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
7C31000
unkown
page read and write
7637000
unkown
page read and write
BE49000
stack
page read and write
C96D000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
86E0000
unkown
page readonly
7FF5D7376000
unkown
page readonly
7FF5D7244000
unkown
page readonly
E7D0000
unkown
page execute and read and write
7FF5D7639000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
C96F000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
7FF5D720A000
unkown
page readonly
7FF5D744B000
unkown
page readonly
F0C000
heap
page read and write
49FD000
unkown
page read and write
3535000
unkown
page read and write
DB1000
heap
page read and write
F5E0000
heap
page read and write
There are 1842 hidden memdumps, click here to show them.