IOC Report
https://staticcontent.cricut.com/a/software/win32-native/CricutDesignSpace-Install-v8.24.60.exe?Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBEm0NcoBXnTJbNIFUhXCXRo~PkpHmlp-Y848h

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\download\CricutDesignSpace-Install-v8.24.60.exe@Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBE
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_30b8aeca5aa8662f4a40dbd0fd9a29f7169b1d84_f78a65ed_c0e20fbf-ccdc-45f2-bec4-0580145f96d3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_260da228-fc52-4137-9ec6-a5af3f8e1133\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_278d70e9-509c-47e8-bd86-e59e7df398c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_2bf35a4a-e428-470f-80d3-448479483fab\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_313101d7-52ed-405e-b9f6-2e8c2433cda8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_4ae6c052-630c-4411-81ed-992ec2950817\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_741c8546-adff-4f01-97ff-b945035cdc76\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_83c674cc-7d88-48f1-8a2a-c1f602ca8507\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_b5a8f54b-c615-4aca-a88f-4b208a7dd387\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_cff6b4738afde0348919af8c934d74ecbb7b35e_07ad8ade_d79898f3-9059-4ff4-bd0f-d124400504cf\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2233.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER264B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER269A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3BB7.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E58.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E87.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DE7.tmp.dmp
Mini DuMP crash report, 17 streams, Thu Apr 18 01:53:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7366.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7396.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER758.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8160.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83D2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8401.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER98A1.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B61.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9BCF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA87.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBDCC.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0DB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC12A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3C5.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD56C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5AC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE5A7.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE877.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8B7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF603.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 18 01:53:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF846.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF876.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002d.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\LICENSE
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\architecture
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\ur.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\resources.pak
data
dropped
C:\Users\user\AppData\Local\Programs\Cricut Design Space\resources\app.asar
data
dropped
C:\Users\user\AppData\Local\Temp\nsl657C.tmp\SpiderBanner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsl657C.tmp\StdUtils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsl657C.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsl657C.tmp\app-32.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nsl657C.tmp\nsProcess.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsl657C.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\cmdline.out
ASCII text, with very long lines (521), with CRLF line terminators
modified
There are 105 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\download\CricutDesignSpace-Install-v8.24.60.exe@Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBE.exe
"C:\Users\user\Desktop\download\CricutDesignSpace-Install-v8.24.60.exe@Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBE.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://staticcontent.cricut.com/a/software/win32-native/CricutDesignSpace-Install-v8.24.60.exe?Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBEm0NcoBXnTJbNIFUhXCXRo~PkpHmlp-Y848hU1zn-5iSX5OQNww3WIYg3K44DIbQxYvphEE2jdUyUTtrCWjluOBokHPH6E~RD6qKswmjzuLGyXmsEyq2FGQou~BS4AMtEkggT4nGQgr237R7z6oZi4w27o~lPIOGwMp1OZKYPzPyFXWTVDDIRSWrWSGeDI6ePgo8Ifcsj4g__&Key-Pair-Id=K2W1AJ47IQWIOI" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://staticcontent.cricut.com/a/software/win32-native/CricutDesignSpace-Install-v8.24.60.exe?Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBEm0NcoBXnTJbNIFUhXCXRo~PkpHmlp-Y848hU1zn-5iSX5OQNww3WIYg3K44DIbQxYvphEE2jdUyUTtrCWjluOBokHPH6E~RD6qKswmjzuLGyXmsEyq2FGQou~BS4AMtEkggT4nGQgr237R7z6oZi4w27o~lPIOGwMp1OZKYPzPyFXWTVDDIRSWrWSGeDI6ePgo8Ifcsj4g__&Key-Pair-Id=K2W1AJ47IQWIOI"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2580 -s 9996
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3696 -s 4220
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6952 -s 4872
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5928 -s 4328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6596 -s 4360
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2300 -s 2264
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2996 -s 1440
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2060 -s 4488
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4988 -s 4528
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4484 -s 4352
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://staticcontent.cricut.com/a/software/win32-native/CricutDesignSpace-Install-v8.24.60.exe?Expires=1713405575&Signature=2WQC5y2N-HrvfbwCMSuJ2AepXckGrbtsXEdZfqTTcjsjIKwZ48XDUv2do7SKzLJZWbg3r4Qt-YcgcCEnlL4U8K~rZtlF1Sign5lBZQZ-qWq6nwQhfqOgI~2AzpwFlKa5Z0ZnNvk2QuBEm0NcoBXnTJbNIFUhXCXRo~PkpHmlp-Y848hU1zn-5iSX5OQNww3WIYg3K44DIbQxYvphEE2jdUyUTtrCWjluOBokHPH6E~RD6qKswmjzuLGyXmsEyq2FGQou~BS4AMtEkggT4nGQgr237R7z6oZi4w27o~lPIOGwMp1OZKYPzPyFXWTVDDIRSWrWSGeDI6ePgo8Ifcsj4g__&Key-Pair-Id=K2W1AJ47IQWIOI
malicious
https://aka.ms/odirmr
unknown
https://github.com/gpuweb/gpuweb/wiki/Implementation-Status#implementation-status
unknown
https://github.com/simplejson/simplejson
unknown
http://anglebug.com/8280enableTranslatedShaderSubstitutionCheck
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.bluetooth.com/specifications/gatt/services
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://github.com/WebBluetoothCG/web-bluetooth/blob/main/implementation-status.md
unknown
https://crbug.com/1356053
unknown
https://cdn.n
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://crbug.com/110263
unknown
http://anglebug.com/6929
unknown
https://github.com/google/pprof/tree/master/proto
unknown
https://assets.msn.com/weathermapdata/1/
unknown
https://github.com/jrmuizel/qcms/tree/v4
unknown
https://chromium.googlesource.com/chromium/src/
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://crbug.com/593024
unknown
https://w3c.github.io/manifest/#installability-signals
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
http://exslt.org/common
unknown
https://github.com/tensorflow/models
unknown
https://github.com/KhronosGroup/SPIRV-Headers.git
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://issuetracker.google.com/161903006
unknown
https://crbug.com/1300575
unknown
https://crbug.com/710443
unknown
https://aka.ms/odirmG
unknown
https://github.com/tensorflow/tflite-support
unknown
https://sqlite.org/
unknown
https://crbug.com/1060012
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://anglebug.com/3997
unknown
http://anglebug.com/4722
unknown
http://crbug.com/642605
unknown
http://anglebug.com/1452
unknown
https://github.com/gpuweb/gpuweb/wiki/Implementation-Status#implementation-statusFailed
unknown
https://outlook.com_
unknown
https://crbug.com/650547callClearTwiceUsing
unknown
http://crbug.com/1420130
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://gitlab.freedesktop.org/xdg/xdgmime
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://www.unicode.org/copyright.html
unknown
https://beacons.gcp.gvt2.com/domainreliability/upload
unknown
http://anglebug.com/2894
unknown
http://anglebug.com/3862
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://schemas.micro
unknown
https://github.com/google/shell-encryption
unknown
https://github.com/wasdk/wasmparser
unknown
https://goo.gl/4NeimXOrigin
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
http://anglebug.com/3970
unknown
https://android.com/pay
unknown
http://anglebug.com/8297
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/3729
unknown
http://anglebug.com/5906
unknown
http://crbug.com/830046
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://crbug.com/1144908
unknown
https://datatracker.ietf.org/doc/draft-ietf-rtcweb-ip-handling.
unknown
https://issuetracker.google.com/166809097
unknown
http://crbug.com/672380
unknown
https://goo.gl/EuHzyv
unknown
http://crbug.com/941620allowTranslateUniformBlockToStructuredBufferThere
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
http://anglebug.com/3832
unknown
https://beacons4.gvt2.com/domainreliability/upload
unknown
https://crbug.com/811661
unknown
https://github.com/GPUOpen-LibrariesAndSDKs/VulkanMemoryAllocator
unknown
https://goo.gl/HxfxSQOrigin
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
http://devel.freebsoft.org/speechd
unknown
http://anglebug.com/8172
unknown
http://anglebug.com/8291
unknown
http://developer.android.com/tools/extras/support-library.html
unknown
https://crbug.com/1091824
unknown
http://anglebug.com/1085
unknown
http://anglebug.com/6651
unknown
https://anglebug.com/4830
unknown
http://anglebug.com/5007disableDrawBuffersIndexedDisable
unknown
http://anglebug.com/3027
unknown
https://chromium.googlesource.com/angle/angle/
unknown
https://excel.office.com
unknown
http://anglebug.com/2162
unknown
http://anglebug.com/5430
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
13.32.151.60
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\{113DD42F-AE80-489B-8F15-FB8499306C48}
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\{113DD42F-AE80-489B-8F15-FB8499306C48}
KeepShortcuts
HKEY_CURRENT_USER\SOFTWARE\{113DD42F-AE80-489B-8F15-FB8499306C48}
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{113DD42F-AE80-489B-8F15-FB8499306C48}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000002043E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003043E
VirtualDesktop
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\System32\display.dll,-4
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\system32\themecpl.dll,-10
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-123
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-174
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-131
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-101
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010426
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010422
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020414
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003040A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010404
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000503EA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103F2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E8
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103DE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010426
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010422
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001041E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010418
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020414
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003040A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001040C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010408
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010404
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000503EA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103F2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E8
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006038A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010394
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010390
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010426
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001041E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020414
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010408
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103F2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103EE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103DA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020302
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000601DC
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006005A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060172
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040220
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003043E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{a33c736e-61ca-11ee-8c18-806e6f6e6963}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010426
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0332
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001034A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000007031E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006005A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000007004C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060062
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060232
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000502C2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030278
VirtualDesktop
There are 166 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8E3A000
heap
page read and write
9893000
unkown
page read and write
1440000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
50A2000
heap
page read and write
3201000
heap
page read and write
810B000
stack
page read and write
AF8D000
stack
page read and write
7A14000
heap
page read and write
37E7000
heap
page read and write
30B0000
heap
page read and write
A7F0000
heap
page read and write
90F000
heap
page read and write
2B1F000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
2DD0000
heap
page read and write
7FF5ED74A000
unkown
page readonly
A90000
heap
page read and write
A5E0000
heap
page read and write
C57F000
unkown
page read and write
5004000
heap
page read and write
8B34000
heap
page read and write
2D7A000
stack
page read and write
4981000
heap
page read and write
18A0000
unkown
page readonly
33ED000
stack
page read and write
60B1000
heap
page read and write
522D000
heap
page read and write
7FF5ED33F000
unkown
page readonly
AB5D000
unkown
page read and write
4F71000
heap
page read and write
4F98000
heap
page read and write
4E03000
heap
page read and write
7AE5000
heap
page read and write
11FF000
stack
page read and write
5571000
heap
page read and write
4E55000
heap
page read and write
7094000
heap
page read and write
96A1000
heap
page read and write
4E41000
heap
page read and write
979C000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
875000
heap
page read and write
868B000
stack
page read and write
7610000
heap
page read and write
7B5B000
heap
page read and write
A91000
heap
page read and write
2BDE000
stack
page read and write
8BB1000
heap
page read and write
C503000
unkown
page read and write
FBA0000
unkown
page read and write
496F000
heap
page read and write
987B000
unkown
page read and write
B170000
unkown
page readonly
4B13000
heap
page read and write
4E55000
heap
page read and write
A9E000
stack
page read and write
7FF5ED476000
unkown
page readonly
F7FB000
unkown
page read and write
A4A1000
unkown
page read and write
B08D000
stack
page read and write
44CA000
heap
page read and write
50E1000
heap
page read and write
5330000
heap
page read and write
4C6A000
heap
page read and write
3236000
stack
page read and write
D14000
heap
page read and write
7C2A000
stack
page read and write
4692000
heap
page read and write
2B3A000
heap
page read and write
B20000
heap
page read and write
C5A3000
unkown
page read and write
965C000
stack
page read and write
719C000
heap
page read and write
4323000
heap
page read and write
45DC000
heap
page read and write
7580000
trusted library allocation
page read and write
7F0B000
stack
page read and write
7FF5ED1BC000
unkown
page readonly
3A9E000
heap
page read and write
7FF5ED692000
unkown
page readonly
7FF5ED9CC000
unkown
page readonly
AAF2000
unkown
page read and write
840E000
stack
page read and write
5060000
heap
page read and write
7FF5ED286000
unkown
page readonly
7FF5ED853000
unkown
page readonly
502E000
heap
page read and write
8A1F000
stack
page read and write
A281000
heap
page read and write
8E3C000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
D66000
stack
page read and write
718A000
heap
page read and write
7A6F000
heap
page read and write
4407000
heap
page read and write
9B14000
heap
page read and write
A281000
heap
page read and write
43B5000
heap
page read and write
C20000
heap
page read and write
D1A000
heap
page read and write
A250000
heap
page read and write
9AE2000
heap
page read and write
A433000
unkown
page read and write
4B3F000
heap
page read and write
7FF5ED404000
unkown
page readonly
7189000
heap
page read and write
7B0B000
stack
page read and write
C51E000
unkown
page read and write
4BEF000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
7386000
heap
page read and write
750C000
stack
page read and write
4A0D000
heap
page read and write
4790000
trusted library allocation
page read and write
8B98000
heap
page read and write
C64000
heap
page read and write
532A000
heap
page read and write
C52C000
unkown
page read and write
7FF5ED781000
unkown
page readonly
814E000
stack
page read and write
7BB4000
heap
page read and write
A680000
heap
page read and write
4BFD000
heap
page read and write
7FF5ED7FD000
unkown
page readonly
C893000
unkown
page read and write
4B90000
unkown
page read and write
BC9B000
stack
page read and write
982D000
unkown
page read and write
7FF5ED602000
unkown
page readonly
4E07000
heap
page read and write
A276000
heap
page read and write
F6F4000
unkown
page read and write
923E000
stack
page read and write
FBD2000
unkown
page read and write
9792000
unkown
page read and write
A80000
heap
page read and write
9BC1000
heap
page read and write
C7C5000
unkown
page read and write
ACD000
heap
page read and write
4669000
heap
page read and write
7D00000
unkown
page readonly
9BF4000
heap
page read and write
80C1000
heap
page read and write
50C1000
heap
page read and write
9798000
unkown
page read and write
13D0000
heap
page read and write
9A49000
stack
page read and write
7FF5ED8B4000
unkown
page readonly
4C4D000
heap
page read and write
7FF5ED8C6000
unkown
page readonly
95B7000
heap
page read and write
45C1000
heap
page read and write
3844000
heap
page read and write
5064000
heap
page read and write
5959000
heap
page read and write
9566000
heap
page read and write
246E000
stack
page read and write
2D63000
heap
page read and write
920B000
stack
page read and write
51F3000
heap
page read and write
4B30000
direct allocation
page read and write
1439000
heap
page read and write
C964000
unkown
page read and write
174A000
stack
page read and write
3227000
stack
page read and write
5FB1000
heap
page read and write
1451000
unkown
page readonly
A29E000
stack
page read and write
4651000
heap
page read and write
64B1000
heap
page read and write
A1CF000
heap
page read and write
27EC000
stack
page read and write
785D000
unkown
page read and write
4D70000
heap
page read and write
70BA000
heap
page read and write
5071000
heap
page read and write
9591000
heap
page read and write
7AE8000
heap
page read and write
479F000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
37B0000
unkown
page read and write
5280000
trusted library allocation
page read and write
7A7B000
heap
page read and write
7FF5ED404000
unkown
page readonly
C512000
unkown
page read and write
A5AD000
stack
page read and write
680000
heap
page read and write
F39000
heap
page read and write
5168000
heap
page read and write
8CA3000
heap
page read and write
7FF5ED39E000
unkown
page readonly
1480000
heap
page read and write
7FF5ED286000
unkown
page readonly
5431000
heap
page read and write
9558000
heap
page read and write
5892000
heap
page read and write
7FF5ED433000
unkown
page readonly
4C71000
heap
page read and write
3180000
heap
page read and write
3ABE000
heap
page read and write
7FF5ED46A000
unkown
page readonly
93BE000
stack
page read and write
4B78000
unkown
page read and write
47AE000
heap
page read and write
C9B1000
unkown
page read and write
13C0000
heap
page read and write
FD82000
heap
page read and write
C57F000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
50C6000
heap
page read and write
497B000
heap
page read and write
AAD1000
unkown
page read and write
5303000
heap
page read and write
7FF5ED939000
unkown
page readonly
532A000
heap
page read and write
7FF5ED942000
unkown
page readonly
55B0000
heap
page read and write
7473000
heap
page read and write
4D75000
heap
page read and write
A9F000
heap
page read and write
9B80000
heap
page read and write
1340000
unkown
page read and write
B8AB000
stack
page read and write
52D4000
heap
page read and write
2819000
stack
page read and write
4CA8000
heap
page read and write
3AC9000
heap
page read and write
7A7B000
heap
page read and write
C893000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
4E0A000
heap
page read and write
8C29000
heap
page read and write
C964000
unkown
page read and write
7DF4F3051000
unkown
page execute read
35B9000
stack
page read and write
A63D000
stack
page read and write
3791000
unkown
page read and write
9B4B000
heap
page read and write
8C43000
heap
page read and write
4260000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FF5ED844000
unkown
page readonly
C4D0000
unkown
page read and write
AAD1000
unkown
page read and write
2B12000
heap
page read and write
75A2000
heap
page read and write
8656000
heap
page read and write
746A000
heap
page read and write
8D08000
heap
page read and write
8C60000
heap
page read and write
1455000
heap
page read and write
9F2C000
stack
page read and write
35D0000
unkown
page read and write
8730000
unkown
page read and write
7DF4F3051000
unkown
page execute read
4F33000
heap
page read and write
80AE000
stack
page read and write
857E000
stack
page read and write
505B000
heap
page read and write
D1D000
heap
page read and write
1150000
heap
page read and write
1430000
heap
page read and write
BD98000
stack
page read and write
7A3B000
heap
page read and write
892E000
stack
page read and write
51DE000
heap
page read and write
1440000
unkown
page read and write
4B66000
heap
page read and write
5590000
unkown
page write copy
7D8C000
stack
page read and write
7FF5ED93B000
unkown
page readonly
3209000
stack
page read and write
522D000
heap
page read and write
32C0000
heap
page read and write
A94E000
heap
page read and write
44DE000
heap
page read and write
4F6D000
heap
page read and write
8000000
unkown
page read and write
236B000
stack
page read and write
87AB000
stack
page read and write
49F9000
heap
page read and write
4DE9000
heap
page read and write
906E000
stack
page read and write
7FF5ED6DB000
unkown
page readonly
829E000
stack
page read and write
1483000
heap
page read and write
5079000
heap
page read and write
876C000
heap
page read and write
7BB1000
heap
page read and write
97B5000
unkown
page read and write
A278000
heap
page read and write
7FF5ED265000
unkown
page readonly
7A47000
heap
page read and write
DE0000
heap
page read and write
7A4F000
heap
page read and write
A283000
heap
page read and write
790E000
stack
page read and write
9050000
unkown
page readonly
71DC000
stack
page read and write
A934000
heap
page read and write
C6F2000
unkown
page read and write
8A5A000
stack
page read and write
9B40000
heap
page read and write
7DF4F3071000
unkown
page execute read
2D60000
heap
page read and write
785B000
unkown
page read and write
4FC0000
heap
page read and write
A684000
heap
page read and write
AB47000
unkown
page read and write
43D1000
heap
page read and write
9370000
heap
page read and write
6532000
heap
page read and write
4FFD000
heap
page read and write
6DDB000
direct allocation
page read and write
7FF5ED7DB000
unkown
page readonly
81FE000
stack
page read and write
2E00000
heap
page read and write
A01B000
stack
page read and write
848E000
stack
page read and write
A70000
heap
page read and write
32B3000
stack
page read and write
7FF5ED426000
unkown
page readonly
4C18000
unkown
page read and write
4460000
heap
page read and write
30BD000
stack
page read and write
4B93000
unkown
page read and write
5631000
heap
page read and write
A259000
heap
page read and write
A379000
unkown
page read and write
1230000
unkown
page read and write
F774000
unkown
page read and write
3056000
stack
page read and write
52BC000
heap
page read and write
97B5000
unkown
page read and write
28A0000
unkown
page readonly
7FF5ED7DB000
unkown
page readonly
A97A000
heap
page read and write
AB47000
unkown
page read and write
4F58000
heap
page read and write
4E10000
trusted library allocation
page read and write
479D000
heap
page read and write
42EC000
heap
page read and write
7695000
stack
page read and write
4DC0000
trusted library allocation
page read and write
4BB8000
heap
page read and write
9550000
unkown
page readonly
7AE8000
heap
page read and write
7A20000
heap
page read and write
A29E000
stack
page read and write
7FF5ED4EF000
unkown
page readonly
70B0000
heap
page read and write
9DAA000
stack
page read and write
7522000
heap
page read and write
7451000
heap
page read and write
50CA000
heap
page read and write
8C57000
heap
page read and write
7031000
heap
page read and write
7FF5ED942000
unkown
page readonly
4C20000
trusted library allocation
page read and write
531A000
heap
page read and write
680000
heap
page read and write
9660000
unkown
page read and write
7FF5ED996000
unkown
page readonly
7FF5ED5EB000
unkown
page readonly
F734000
unkown
page read and write
C561000
unkown
page read and write
4F75000
heap
page read and write
4E30000
trusted library section
page readonly
1230000
unkown
page read and write
33B9000
stack
page read and write
FBEE000
unkown
page read and write
4DE9000
heap
page read and write
4B90000
heap
page read and write
A278000
heap
page read and write
3ACF000
heap
page read and write
7FF5ED961000
unkown
page readonly
346A000
stack
page read and write
6230000
heap
page read and write
AD3F000
stack
page read and write
7FF5ED697000
unkown
page readonly
775A000
heap
page read and write
A631000
heap
page read and write
121F000
heap
page read and write
C851000
unkown
page read and write
73AF000
heap
page read and write
2CE9000
stack
page read and write
5070000
heap
page read and write
BAF9000
stack
page read and write
4F98000
heap
page read and write
2D63000
heap
page read and write
8679000
stack
page read and write
7BBC000
heap
page read and write
A9D000
heap
page read and write
7D90000
trusted library allocation
page read and write
34DE000
stack
page read and write
84FC000
stack
page read and write
4DB1000
heap
page read and write
44A6000
heap
page read and write
7FF5ED279000
unkown
page readonly
A0CD000
stack
page read and write
4C34000
unkown
page read and write
5FF0000
heap
page read and write
B341000
heap
page read and write
4B87000
heap
page read and write
7D8E000
stack
page read and write
8710000
unkown
page readonly
92AF000
stack
page read and write
4ECC000
heap
page read and write
5312000
heap
page read and write
9873000
unkown
page read and write
349E000
stack
page read and write
7FF5ED3EA000
unkown
page readonly
CAFE000
unkown
page read and write
7F9A000
stack
page read and write
F834000
unkown
page read and write
50E3000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
4FB4000
heap
page read and write
A7EC000
heap
page read and write
408000
unkown
page readonly
AAF6000
unkown
page read and write
FBD4000
unkown
page read and write
44B0000
trusted library allocation
page read and write
9E2B000
stack
page read and write
4969000
heap
page read and write
BDC0000
unkown
page readonly
7FF5EDA0D000
unkown
page readonly
9FAF000
stack
page read and write
476000
stack
page read and write
4478000
heap
page read and write
8BFC000
heap
page read and write
7FF5ED3F3000
unkown
page readonly
501C000
heap
page read and write
A66000
heap
page read and write
9871000
unkown
page read and write
991B000
unkown
page read and write
502B000
heap
page read and write
7FF5ED556000
unkown
page readonly
8998000
stack
page read and write
8D69000
stack
page read and write
70A4000
heap
page read and write
7A2C000
heap
page read and write
AB66000
unkown
page read and write
8B8D000
heap
page read and write
CD5000
heap
page read and write
7A7B000
heap
page read and write
775E000
stack
page read and write
9869000
unkown
page read and write
8240000
trusted library section
page readonly
7FF5ED3DA000
unkown
page readonly
D02000
heap
page read and write
4466000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
7FF5ED495000
unkown
page readonly
11B0000
unkown
page readonly
7FF5ED803000
unkown
page readonly
7FF5EDA31000
unkown
page readonly
23EB000
stack
page read and write
C9C4000
unkown
page read and write
7FF5ED4DF000
unkown
page readonly
7BF7000
heap
page read and write
A259000
heap
page read and write
3758000
unkown
page read and write
6FF2000
heap
page read and write
4DB3000
heap
page read and write
4EE0000
heap
page read and write
5211000
heap
page read and write
7FF5ED471000
unkown
page readonly
CA14000
unkown
page read and write
3ACD000
heap
page read and write
6EB1000
heap
page read and write
B22B000
stack
page read and write
4B13000
heap
page read and write
A52E000
stack
page read and write
54F2000
heap
page read and write
1023000
heap
page read and write
2B09000
heap
page read and write
7FF5ED743000
unkown
page readonly
787C000
unkown
page read and write
A290000
heap
page read and write
9883000
unkown
page read and write
986B000
unkown
page read and write
C6F4000
unkown
page read and write
CA1E000
unkown
page read and write
1040000
heap
page read and write
1180000
heap
page read and write
4450000
heap
page read and write
7FF5EDA47000
unkown
page readonly
934C000
stack
page read and write
494C000
heap
page read and write
7B83000
heap
page read and write
4DC6000
heap
page read and write
4649000
heap
page read and write
7E30000
direct allocation
page read and write
AB8D000
stack
page read and write
7A39000
heap
page read and write
5034000
heap
page read and write
813E000
stack
page read and write
808B000
stack
page read and write
4E0B000
heap
page read and write
3241000
heap
page read and write
5100000
trusted library allocation
page read and write
A32A000
unkown
page read and write
7FF5ED849000
unkown
page readonly
7B80000
unkown
page read and write
7FF5ED530000
unkown
page readonly
3240000
unkown
page read and write
7F8C000
stack
page read and write
BD0000
heap
page read and write
2DEA000
stack
page read and write
A4F0000
heap
page read and write
C978000
unkown
page read and write
5331000
heap
page read and write
786B000
unkown
page read and write
446C000
heap
page read and write
7ADE000
heap
page read and write
7FF5EDA53000
unkown
page readonly
B729000
stack
page read and write
7FF5ED50A000
unkown
page readonly
9CAA000
heap
page read and write
3658000
stack
page read and write
9A5B000
unkown
page read and write
7FF5ED503000
unkown
page readonly
6E71000
heap
page read and write
8B7F000
heap
page read and write
4C77000
heap
page read and write
C557000
unkown
page read and write
4F10000
heap
page read and write
9A10000
unkown
page read and write
51EC000
heap
page read and write
4C34000
unkown
page read and write
A4FC000
unkown
page read and write
37A8000
unkown
page read and write
58A0000
heap
page read and write
8E20000
heap
page read and write
7FF5ED806000
unkown
page readonly
60B0000
heap
page read and write
5557000
stack
page read and write
95BB000
heap
page read and write
9566000
heap
page read and write
4BA4000
heap
page read and write
7C0B000
heap
page read and write
4E8C000
heap
page read and write
C49000
heap
page read and write
462D000
heap
page read and write
73FA000
heap
page read and write
B8AB000
stack
page read and write
8CC3000
heap
page read and write
70BC000
heap
page read and write
39D0000
heap
page read and write
50CA000
heap
page read and write
809E000
stack
page read and write
7A49000
heap
page read and write
7637000
heap
page read and write
465F000
heap
page read and write
925B000
stack
page read and write
7FF5ED26E000
unkown
page readonly
9893000
unkown
page read and write
8B11000
heap
page read and write
BA0000
heap
page read and write
3AD9000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
3346000
heap
page read and write
7F59000
stack
page read and write
7FF5ED342000
unkown
page readonly
4D47000
heap
page read and write
49DF000
heap
page read and write
6F30000
heap
page read and write
4BFD000
heap
page read and write
37F2000
unkown
page read and write
896B000
stack
page read and write
8E5C000
heap
page read and write
5EF1000
heap
page read and write
7865000
unkown
page read and write
4F23000
heap
page read and write
A4FC000
unkown
page read and write
1505000
heap
page read and write
5076000
heap
page read and write
7FF5EDA2A000
unkown
page readonly
4CAE000
heap
page read and write
461E000
stack
page read and write
8BE0000
heap
page read and write
677000
heap
page read and write
7CA0000
unkown
page read and write
7DF4F3041000
unkown
page execute read
7BF7000
heap
page read and write
9875000
unkown
page read and write
4423000
heap
page read and write
51EC000
heap
page read and write
4D29000
heap
page read and write
7FF5ED695000
unkown
page readonly
2ECB000
stack
page read and write
A0F0000
heap
page read and write
1158000
heap
page read and write
37AC000
unkown
page read and write
4DD8000
heap
page read and write
2EA9000
stack
page read and write
8ACF000
heap
page read and write
A959000
heap
page read and write
4792000
heap
page read and write
7DCE000
stack
page read and write
4B1F000
heap
page read and write
C89A000
unkown
page read and write
8E87000
heap
page read and write
7FF5ED990000
unkown
page readonly
7BD3000
heap
page read and write
4F30000
trusted library allocation
page read and write
114E000
stack
page read and write
53B0000
heap
page read and write
589B000
heap
page read and write
4CD0000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
4E2E000
heap
page read and write
594A000
heap
page read and write
A24C000
heap
page read and write
7232000
heap
page read and write
E70000
heap
page read and write
4A45000
stack
page read and write
1120000
heap
page read and write
876C000
heap
page read and write
9F20000
unkown
page readonly
95BD000
heap
page read and write
CB60000
unkown
page read and write
872D000
heap
page read and write
8CCC000
heap
page read and write
C700000
unkown
page read and write
5472000
heap
page read and write
43E3000
heap
page read and write
5267000
heap
page read and write
F7F6000
unkown
page read and write
A53E000
heap
page read and write
1E0000
heap
page read and write
506C000
heap
page read and write
43C1000
heap
page read and write
4D87000
heap
page read and write
97D4000
unkown
page read and write
62D000
heap
page read and write
7FF5EDA53000
unkown
page readonly
882C000
stack
page read and write
8B65000
heap
page read and write
4F33000
heap
page read and write
35A0000
unkown
page readonly
45BA000
heap
page read and write
C89A000
unkown
page read and write
957A000
heap
page read and write
2F4D000
stack
page read and write
6F72000
heap
page read and write
66F0000
direct allocation
page read and write
4E50000
heap
page read and write
709C000
heap
page read and write
2D50000
trusted library allocation
page read and write
7FF5ED534000
unkown
page readonly
4CA8000
heap
page read and write
7FF5ED68F000
unkown
page readonly
58E3000
heap
page read and write
94B000
heap
page read and write
4CE0000
unkown
page read and write
9570000
heap
page read and write
82CB000
stack
page read and write
736B000
stack
page read and write
4F80000
heap
page read and write
86CC000
heap
page read and write
4DAB000
heap
page read and write
A0F2000
heap
page read and write
4955000
heap
page read and write
2B67000
stack
page read and write
72E5000
stack
page read and write
7A34000
unkown
page read and write
91B9000
stack
page read and write
4FE7000
heap
page read and write
7847000
unkown
page read and write
4ADA000
heap
page read and write
A7EF000
heap
page read and write
4E2E000
heap
page read and write
7106000
heap
page read and write
B150000
unkown
page read and write
C507000
unkown
page read and write
3110000
direct allocation
page read and write
C962000
unkown
page read and write
952B000
heap
page read and write
F56000
heap
page read and write
4ADE000
heap
page read and write
7BAE000
heap
page read and write
9F20000
unkown
page readonly
C516000
unkown
page read and write
786B000
unkown
page read and write
7BB2000
heap
page read and write
A691000
heap
page read and write
6330000
heap
page read and write
A8A0000
heap
page read and write
8A0F000
stack
page read and write
C8E1000
unkown
page read and write
7FF5ED975000
unkown
page readonly
A21E000
stack
page read and write
89C0000
unkown
page read and write
8F4B000
heap
page read and write
7884000
unkown
page read and write
3385000
heap
page read and write
28EB000
stack
page read and write
7620000
heap
page read and write
96C9000
heap
page read and write
7FF5ED4F3000
unkown
page readonly
7FF5D1CD4000
unkown
page readonly
51EC000
heap
page read and write
7CA7000
stack
page read and write
4C5A000
heap
page read and write
3220000
unkown
page readonly
A4B8000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
4B50000
unkown
page read and write
615000
heap
page read and write
90AA000
stack
page read and write
8CD1000
heap
page read and write
7FF5ED4E8000
unkown
page readonly
65F0000
direct allocation
page read and write
4E0B000
heap
page read and write
986F000
unkown
page read and write
7861000
unkown
page read and write
DB0000
heap
page read and write
4CA6000
heap
page read and write
7FF5ED65C000
unkown
page readonly
4FF8000
heap
page read and write
877E000
heap
page read and write
985000
heap
page read and write
4CA8000
heap
page read and write
4DFF000
heap
page read and write
4FC0000
heap
page read and write
3170000
unkown
page read and write
9E30000
unkown
page readonly
4760000
trusted library allocation
page read and write
8B27000
heap
page read and write
9C30000
heap
page read and write
BDD0000
unkown
page readonly
9139000
stack
page read and write
4F6E000
heap
page read and write
505D000
heap
page read and write
A84F000
heap
page read and write
7F3C000
stack
page read and write
4E30000
trusted library allocation
page read and write
8CD4000
heap
page read and write
7071000
heap
page read and write
5F70000
heap
page read and write
A33E000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
8066000
heap
page read and write
A968000
heap
page read and write
A5BD000
stack
page read and write
A37D000
unkown
page read and write
7FF5ED933000
unkown
page readonly
31B0000
heap
page read and write
A6C0000
heap
page read and write
3ACD000
heap
page read and write
2CF6000
stack
page read and write
3ACF000
heap
page read and write
50CE000
heap
page read and write
7FF5ED9B8000
unkown
page readonly
6F31000
heap
page read and write
7FF5ED92C000
unkown
page readonly
7FF5ED779000
unkown
page readonly
35D9000
stack
page read and write
7D3E000
stack
page read and write
8108000
stack
page read and write
7A56000
heap
page read and write
C7C5000
unkown
page read and write
CA42000
unkown
page read and write
4709000
heap
page read and write
CA1E000
unkown
page read and write
4D3C000
heap
page read and write
8EF1000
heap
page read and write
95CD000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
5211000
heap
page read and write
7FF5ED519000
unkown
page readonly
7FF5ED433000
unkown
page readonly
8663000
heap
page read and write
D00000
heap
page read and write
8C53000
heap
page read and write
DD0000
unkown
page readonly
3114000
heap
page read and write
A33E000
unkown
page read and write
8EF0000
unkown
page readonly
4CB0000
unkown
page read and write
7EFC000
stack
page read and write
7FF5ED9A1000
unkown
page readonly
90DC000
stack
page read and write
A4B8000
unkown
page read and write
1505000
heap
page read and write
C811000
unkown
page read and write
531A000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
A6D000
heap
page read and write
467F000
heap
page read and write
4FEB000
stack
page read and write
CA1E000
unkown
page read and write
4B94000
heap
page read and write
4EE6000
heap
page read and write
3791000
unkown
page read and write
7A8E000
heap
page read and write
8F49000
unkown
page readonly
8B0F000
stack
page read and write
4F48000
heap
page read and write
7A4B000
heap
page read and write
C89A000
unkown
page read and write
502E000
heap
page read and write
5330000
heap
page read and write
7B9E000
heap
page read and write
34E9000
stack
page read and write
4585000
heap
page read and write
1350000
unkown
page readonly
7570000
trusted library allocation
page read and write
9BB3000
heap
page read and write
4BA6000
unkown
page read and write
923E000
stack
page read and write
7CE0000
trusted library section
page readonly
7FFE000
stack
page read and write
7F90000
heap
page read and write
3515000
stack
page read and write
644000
heap
page read and write
7FF5ED625000
unkown
page readonly
5242000
heap
page read and write
8B28000
stack
page read and write
50A1000
heap
page read and write
37F2000
unkown
page read and write
8C26000
heap
page read and write
3AC5000
heap
page read and write
7AE2000
heap
page read and write
AF0C000
stack
page read and write
CA16000
unkown
page read and write
76DB000
stack
page read and write
2BFB000
stack
page read and write
1200000
unkown
page readonly
CA75000
unkown
page read and write
7759000
heap
page read and write
A259000
heap
page read and write
6F70000
heap
page read and write
7FF5ED986000
unkown
page readonly
7FF5ED7D6000
unkown
page readonly
7FF5ED5C5000
unkown
page readonly
CA16000
unkown
page read and write
4DE9000
heap
page read and write
3658000
stack
page read and write
781C000
stack
page read and write
5072000
heap
page read and write
42B0000
heap
page read and write
8B98000
heap
page read and write
1238000
heap
page read and write
460E000
heap
page read and write
4875000
stack
page read and write
9DED000
stack
page read and write
A327000
unkown
page read and write
93BE000
stack
page read and write
10D0000
heap
page read and write
7A4B000
heap
page read and write
A323000
unkown
page read and write
FBD1000
unkown
page read and write
A4F4000
heap
page read and write
8690000
heap
page read and write
4AD8000
heap
page read and write
A391000
unkown
page read and write
8E7C000
heap
page read and write
97C3000
unkown
page read and write
14B0000
unkown
page readonly
4F1F000
heap
page read and write
51F3000
heap
page read and write
4C3B000
heap
page read and write
7414000
heap
page read and write
5FF1000
heap
page read and write
336A000
stack
page read and write
A983000
heap
page read and write
7BAC000
stack
page read and write
A323000
unkown
page read and write
7FF5ED5EB000
unkown
page readonly
4BC9000
unkown
page read and write
A959000
heap
page read and write
AE3D000
stack
page read and write
955A000
heap
page read and write
37D2000
unkown
page read and write
7C80000
heap
page read and write
312C000
stack
page read and write
75A2000
heap
page read and write
FBDD000
unkown
page read and write
9660000
unkown
page read and write
78A0000
unkown
page read and write
CB68000
unkown
page read and write
A11F000
stack
page read and write
3AC9000
heap
page read and write
A283000
heap
page read and write
C6E3000
unkown
page read and write
9566000
heap
page read and write
A530000
heap
page read and write
C6C9000
unkown
page read and write
A24C000
heap
page read and write
AAF2000
unkown
page read and write
448B000
heap
page read and write
6170000
heap
page read and write
3A10000
heap
page read and write
B629000
stack
page read and write
7C04000
heap
page read and write
51F7000
heap
page read and write
A391000
unkown
page read and write
C28000
heap
page read and write
2E6E000
stack
page read and write
789C000
stack
page read and write
5068000
heap
page read and write
948F000
stack
page read and write
7A4F000
heap
page read and write
7031000
heap
page read and write
AF8D000
stack
page read and write
35F9000
stack
page read and write
943F000
stack
page read and write
7BED000
heap
page read and write
4BB8000
heap
page read and write
4C3B000
heap
page read and write
7FF5ED915000
unkown
page readonly
4C60000
unkown
page read and write
533A000
heap
page read and write
4651000
heap
page read and write
4B30000
heap
page read and write
7FF5EDA38000
unkown
page readonly
4660000
heap
page read and write
8EEF000
heap
page read and write
2B0E000
heap
page read and write
7FF5ED85F000
unkown
page readonly
CAE3000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
8CEE000
stack
page read and write
8B7F000
heap
page read and write
7FF5ED695000
unkown
page readonly
2ADA000
heap
page read and write
804E000
stack
page read and write
8B01000
heap
page read and write
A375000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
3ACF000
heap
page read and write
7CC0000
unkown
page readonly
97D4000
unkown
page read and write
9510000
heap
page read and write
8099000
heap
page read and write
7FF5ED68C000
unkown
page readonly
7FF5EDA69000
unkown
page readonly
1FC3000
heap
page read and write
7FF5ED956000
unkown
page readonly
32A9000
stack
page read and write
7F96000
heap
page read and write
AC9000
heap
page read and write
7FC7000
stack
page read and write
6370000
heap
page read and write
C10A000
stack
page read and write
4F24000
heap
page read and write
A4AE000
unkown
page read and write
A257000
heap
page read and write
7BE3000
heap
page read and write
2B59000
stack
page read and write
58A8000
heap
page read and write
9B60000
unkown
page readonly
E80000
stack
page readonly
5018000
heap
page read and write
47A1000
heap
page read and write
767B000
heap
page read and write
7FF5ED87D000
unkown
page readonly
D3F000
heap
page read and write
1235000
heap
page read and write
4703000
heap
page read and write
4BFD000
heap
page read and write
7FF5ED68C000
unkown
page readonly
37B0000
unkown
page read and write
5055000
heap
page read and write
8772000
heap
page read and write
C9C1000
unkown
page read and write
CB10000
unkown
page read and write
62B0000
heap
page read and write
76F1000
heap
page read and write
2C6F000
stack
page read and write
4BE1000
unkown
page read and write
8AB0000
heap
page read and write
560000
heap
page read and write
7FF5ED64F000
unkown
page readonly
4F9D000
heap
page read and write
8EBB000
heap
page read and write
3280000
heap
page read and write
73FA000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
4C26000
heap
page read and write
C6F4000
unkown
page read and write
79B1000
unkown
page read and write
9BB6000
heap
page read and write
5371000
heap
page read and write
3AC9000
heap
page read and write
6EF1000
heap
page read and write
4B87000
heap
page read and write
504E000
heap
page read and write
AB41000
unkown
page read and write
308A000
stack
page read and write
7A6F000
heap
page read and write
4EB9000
heap
page read and write
C5A0000
unkown
page read and write
4DE2000
heap
page read and write
4C39000
heap
page read and write
5226000
heap
page read and write
A4AB000
unkown
page read and write
AB4D000
unkown
page read and write
C9F8000
unkown
page read and write
4E97000
heap
page read and write
BDA0000
unkown
page readonly
2ADA000
heap
page read and write
AB41000
unkown
page read and write
4E29000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
7ADA000
heap
page read and write
7FF5ED28E000
unkown
page readonly
A433000
unkown
page read and write
979C000
unkown
page read and write
4D63000
heap
page read and write
5370000
heap
page read and write
4F1B000
heap
page read and write
9873000
unkown
page read and write
1390000
heap
page read and write
8BF3000
heap
page read and write
4D75000
heap
page read and write
3830000
heap
page read and write
C49E000
stack
page read and write
4513000
heap
page read and write
858000
heap
page read and write
51F3000
heap
page read and write
8C38000
heap
page read and write
9BE9000
heap
page read and write
7FF5ED71B000
unkown
page readonly
5007000
heap
page read and write
5678000
heap
page read and write
6531000
heap
page read and write
A540000
heap
page read and write
8D68000
heap
page read and write
4C10000
heap
page read and write
14B0000
unkown
page readonly
B2C0000
heap
page read and write
5281000
heap
page read and write
7FF5ED50A000
unkown
page readonly
1168000
heap
page read and write
7FF5ED793000
unkown
page readonly
3AC7000
heap
page read and write
8ADE000
heap
page read and write
2AEF000
heap
page read and write
A1AE000
stack
page read and write
5075000
heap
page read and write
A0D0000
heap
page read and write
C00000
heap
page read and write
4641000
heap
page read and write
BDD0000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
52D7000
heap
page read and write
32B5000
stack
page read and write
50AA000
heap
page read and write
37E9000
heap
page read and write
5150000
trusted library allocation
page read and write
9B46000
heap
page read and write
4AD7000
heap
page read and write
AB5B000
unkown
page read and write
4B78000
unkown
page read and write
8720000
unkown
page readonly
9170000
heap
page read and write
32C1000
heap
page read and write
7409000
stack
page readonly
978E000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
761C000
heap
page read and write
7FF5ED77C000
unkown
page readonly
7A1F000
stack
page read and write
9570000
heap
page read and write
502B000
heap
page read and write
34E6000
stack
page read and write
4F7C000
heap
page read and write
3758000
unkown
page read and write
9BF3000
heap
page read and write
32EF000
stack
page read and write
7978000
unkown
page read and write
8121000
heap
page read and write
7DA0000
trusted library allocation
page read and write
C54A000
unkown
page read and write
7A32000
heap
page read and write
8ADC000
stack
page read and write
502C000
heap
page read and write
CF9000
heap
page read and write
517D000
heap
page read and write
B82A000
stack
page read and write
A53F000
heap
page read and write
99E0000
heap
page read and write
4B66000
heap
page read and write
79B1000
unkown
page read and write
965C000
stack
page read and write
75A9000
heap
page read and write
9B60000
unkown
page readonly
3AAE000
heap
page read and write
440D000
heap
page read and write
7BD0000
trusted library section
page readonly
4B2E000
heap
page read and write
4711000
heap
page read and write
447F000
heap
page read and write
2B56000
heap
page read and write
CA14000
unkown
page read and write
7450000
trusted library section
page readonly
4D76000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
3381000
heap
page read and write
C811000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
4F75000
heap
page read and write
7FF5ED818000
unkown
page readonly
7D6C000
unkown
page read and write
7FF5ED844000
unkown
page readonly
1480000
heap
page read and write
C08A000
stack
page read and write
8CB3000
heap
page read and write
7DF4F3040000
unkown
page readonly
51E0000
direct allocation
page read and write
7FF5ED39B000
unkown
page readonly
869D000
heap
page read and write
94C0000
heap
page read and write
B10D000
stack
page read and write
7867000
unkown
page read and write
4A14000
heap
page read and write
C9AE000
unkown
page read and write
9C30000
heap
page read and write
4C12000
heap
page read and write
5062000
heap
page read and write
4C71000
heap
page read and write
7AEC000
stack
page read and write
8C3F000
heap
page read and write
6F71000
heap
page read and write
4739000
heap
page read and write
8B16000
heap
page read and write
7865000
unkown
page read and write
A964000
heap
page read and write
5212000
direct allocation
page read and write
26A0000
heap
page read and write
7FF5ECED2000
unkown
page readonly
A964000
heap
page read and write
7E50000
unkown
page readonly
139C000
unkown
page read and write
7978000
unkown
page read and write
4471000
heap
page read and write
951F000
heap
page read and write
95BA000
stack
page read and write
7B9B000
heap
page read and write
A327000
unkown
page read and write
7A4D000
heap
page read and write
7FF5ED42B000
unkown
page readonly
9883000
unkown
page read and write
B150000
unkown
page read and write
A94E000
heap
page read and write
802E000
heap
page read and write
58B3000
heap
page read and write
978E000
unkown
page read and write
7FF5ED1F5000
unkown
page readonly
7FF5ED750000
unkown
page readonly
63B0000
heap
page read and write
7FF5ED8AC000
unkown
page readonly
7FF5ED864000
unkown
page readonly
8E2A000
stack
page read and write
7FF5ED507000
unkown
page readonly
8EFE000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
56D9000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
4BA6000
unkown
page read and write
8BD2000
heap
page read and write
7E4A000
stack
page read and write
987D000
unkown
page read and write
7DA6000
unkown
page read and write
4C1E000
unkown
page read and write
B34C000
heap
page read and write
7C4C000
stack
page read and write
B510000
heap
page read and write
36F0000
unkown
page readonly
8BC9000
heap
page read and write
705B000
stack
page read and write
7D00000
unkown
page readonly
876C000
heap
page read and write
3590000
unkown
page read and write
9ADA000
stack
page read and write
79EA000
stack
page read and write
7794000
heap
page read and write
2CF0000
trusted library section
page readonly
289E000
stack
page read and write
8208000
stack
page read and write
2B10000
heap
page read and write
7BB4000
heap
page read and write
3889000
stack
page read and write
708E000
heap
page read and write
96E0000
heap
page read and write
F30000
heap
page read and write
AF90000
unkown
page readonly
58AF000
heap
page read and write
7FF5ED476000
unkown
page readonly
6470000
heap
page read and write
50BB000
heap
page read and write
AC0E000
stack
page read and write
7FF5ED9B8000
unkown
page readonly
2B49000
heap
page read and write
F80000
heap
page read and write
717A000
heap
page read and write
4B5A000
heap
page read and write
5050000
trusted library allocation
page read and write
A361000
unkown
page read and write
4D2F000
heap
page read and write
501C000
heap
page read and write
36D3000
stack
page read and write
7852000
unkown
page read and write
2BEA000
stack
page read and write
8C59000
stack
page read and write
7CD0000
unkown
page read and write
F15000
heap
page read and write
3A9E000
heap
page read and write
558000
heap
page read and write
533D000
heap
page read and write
8A6E000
stack
page read and write
C857000
unkown
page read and write
7756000
heap
page read and write
6571000
heap
page read and write
875C000
stack
page read and write
10C0000
unkown
page readonly
963B000
heap
page read and write
7E50000
unkown
page readonly
4962000
heap
page read and write
1074000
stack
page read and write
78AD000
unkown
page read and write
50BD000
heap
page read and write
8AE8000
heap
page read and write
7FF5ED2A9000
unkown
page readonly
868B000
stack
page read and write
F872000
unkown
page read and write
123D000
heap
page read and write
8650000
heap
page read and write
7FF5ED1BC000
unkown
page readonly
4FE0000
heap
page read and write
8B60000
unkown
page readonly
4F4C000
direct allocation
page read and write
A8CE000
heap
page read and write
7FF5ED71E000
unkown
page readonly
40A000
unkown
page write copy
A631000
heap
page read and write
8507000
stack
page read and write
8FF000
heap
page read and write
9F1E000
stack
page read and write
8650000
heap
page read and write
C6D8000
unkown
page read and write
4DD3000
heap
page read and write
A4AB000
unkown
page read and write
6231000
heap
page read and write
507000
heap
page read and write
850000
heap
page read and write
4FA7000
heap
page read and write
45A7000
heap
page read and write
9BEF000
heap
page read and write
5296000
heap
page read and write
9929000
unkown
page read and write
4D87000
heap
page read and write
4EB0000
direct allocation
page read and write
FEC000
heap
page read and write
4E90000
heap
page read and write
8F26000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
9885000
unkown
page read and write
7A2C000
heap
page read and write
93CA000
stack
page read and write
36D3000
stack
page read and write
8FB9000
stack
page read and write
4E0A000
heap
page read and write
7D90000
unkown
page readonly
C846000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
5093000
heap
page read and write
803C000
heap
page read and write
4C00000
trusted library allocation
page read and write
505D000
heap
page read and write
A976000
heap
page read and write
9B80000
heap
page read and write
5066000
heap
page read and write
C50A000
unkown
page read and write
4B32000
heap
page read and write
4CC0000
unkown
page read and write
2F2A000
stack
page read and write
4B50000
unkown
page read and write
4649000
heap
page read and write
7651000
heap
page read and write
5670000
heap
page read and write
C5AA000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
4C71000
heap
page read and write
7BAF000
heap
page read and write
B640000
unkown
page read and write
8A54000
heap
page read and write
710D000
heap
page read and write
4D3C000
heap
page read and write
8EEB000
heap
page read and write
FBE4000
unkown
page read and write
74A8000
heap
page read and write
5053000
heap
page read and write
4B18000
heap
page read and write
5020000
heap
page read and write
873E000
heap
page read and write
1395000
heap
page read and write
4ED3000
heap
page read and write
C557000
unkown
page read and write
4E46000
heap
page read and write
A255000
heap
page read and write
7FF5ED9E1000
unkown
page readonly
4682000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
9729000
heap
page read and write
A1AD000
stack
page read and write
7B9E000
heap
page read and write
B629000
stack
page read and write
3AAE000
heap
page read and write
5093000
heap
page read and write
5950000
heap
page read and write
1246000
heap
page read and write
8A6A000
heap
page read and write
7FF5ED505000
unkown
page readonly
8A2A000
stack
page read and write
2B10000
heap
page read and write
A250000
heap
page read and write
7FF5EDA69000
unkown
page readonly
A491000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
A76000
stack
page read and write
8671000
heap
page read and write
7FF5ED602000
unkown
page readonly
A257000
heap
page read and write
5E70000
heap
page read and write
A39B000
unkown
page read and write
A491000
unkown
page read and write
8B82000
heap
page read and write
4CE9000
heap
page read and write
7FF5ED4FD000
unkown
page readonly
7622000
heap
page read and write
97C3000
unkown
page read and write
878C000
stack
page read and write
4FC2000
direct allocation
page read and write
3590000
unkown
page read and write
7FF5ED4C6000
unkown
page readonly
8766000
heap
page read and write
7FF5ED810000
unkown
page readonly
594E000
heap
page read and write
862C000
stack
page read and write
7FF5ED40D000
unkown
page readonly
4EE7000
heap
page read and write
3830000
heap
page read and write
7FF5ED39B000
unkown
page readonly
3795000
unkown
page read and write
2B1F000
heap
page read and write
3800000
unkown
page readonly
7FF5ED990000
unkown
page readonly
50BE000
heap
page read and write
7FF5ED4DF000
unkown
page readonly
739C000
heap
page read and write
5431000
heap
page read and write
5078000
heap
page read and write
50BA000
heap
page read and write
4AB0000
direct allocation
page read and write
3240000
unkown
page read and write
430B000
heap
page read and write
7FF5ED915000
unkown
page readonly
CB40000
unkown
page read and write
A6C0000
heap
page read and write
4520000
trusted library allocation
page read and write
7FF5ED449000
unkown
page readonly
A28F000
heap
page read and write
4C6A000
heap
page read and write
37C5000
heap
page read and write
9220000
heap
page read and write
3170000
heap
page read and write
CA14000
unkown
page read and write
7FF5ED9C6000
unkown
page readonly
4692000
heap
page read and write
8FB9000
stack
page read and write
3127000
stack
page read and write
70B0000
heap
page read and write
8200000
trusted library section
page readonly
AD5000
heap
page read and write
6130000
heap
page read and write
162E000
stack
page read and write
880F000
stack
page read and write
7FF5EDA47000
unkown
page readonly
A214000
heap
page read and write
490000
heap
page read and write
7DF4F3030000
unkown
page readonly
982D000
unkown
page read and write
FBEE000
unkown
page read and write
47C3000
heap
page read and write
C512000
unkown
page read and write
8E53000
heap
page read and write
71AD000
heap
page read and write
FA2E000
stack
page read and write
8F16000
heap
page read and write
F10000
heap
page read and write
7A47000
heap
page read and write
A375000
unkown
page read and write
4AD2000
heap
page read and write
37EB000
heap
page read and write
B5AE000
stack
page read and write
7852000
unkown
page read and write
4997000
heap
page read and write
D9E000
stack
page read and write
45FB000
heap
page read and write
7B5B000
heap
page read and write
7A6B000
heap
page read and write
2BEA000
stack
page read and write
8BBC000
heap
page read and write
7FF5ED77E000
unkown
page readonly
8539000
stack
page read and write
7DF4F3050000
unkown
page readonly
AD1000
heap
page read and write
4F8B000
heap
page read and write
4DE1000
heap
page read and write
477E000
heap
page read and write
B25000
heap
page read and write
4F95000
heap
page read and write
507E000
heap
page read and write
9DED000
stack
page read and write
B140000
unkown
page readonly
BD1D000
stack
page read and write
3AD9000
heap
page read and write
9AF0000
heap
page read and write
FBA0000
unkown
page read and write
797D000
unkown
page read and write
8715000
heap
page read and write
4D63000
heap
page read and write
9B80000
heap
page read and write
5070000
heap
page read and write
7FF5ED516000
unkown
page readonly
C89C000
unkown
page read and write
71C1000
heap
page read and write
C6BF000
unkown
page read and write
7FF5ED850000
unkown
page readonly
35A0000
unkown
page readonly
AB5B000
unkown
page read and write
36D5000
stack
page read and write
530F000
heap
page read and write
8BF0000
unkown
page readonly
A691000
heap
page read and write
7FF5ED97E000
unkown
page readonly
4532000
heap
page read and write
5EB0000
heap
page read and write
7FF5ED660000
unkown
page readonly
4B2C000
heap
page read and write
A0E000
stack
page read and write
4FAE000
heap
page read and write
100000
heap
page read and write
7FF5ED46A000
unkown
page readonly
AB47000
unkown
page read and write
8CD4000
heap
page read and write
8719000
heap
page read and write
9139000
stack
page read and write
4492000
heap
page read and write
50CE000
heap
page read and write
A265000
heap
page read and write
5320000
heap
page read and write
56C3000
unkown
page read and write
7FF5ED928000
unkown
page readonly
4F7D000
heap
page read and write
12DC000
heap
page read and write
4B32000
heap
page read and write
8A20000
heap
page read and write
44AD000
heap
page read and write
CAAE000
unkown
page read and write
37F8000
heap
page read and write
4C84000
heap
page read and write
4C71000
heap
page read and write
7FF5ED975000
unkown
page readonly
957F000
heap
page read and write
889B000
stack
page read and write
A970000
heap
page read and write
8F09000
heap
page read and write
23A0000
heap
page read and write
3AA0000
heap
page read and write
F85000
heap
page read and write
87DA000
stack
page read and write
83FB000
stack
page read and write
51D3000
heap
page read and write
3141000
heap
page read and write
7BBC000
heap
page read and write
891E000
stack
page read and write
7FF5ED4B0000
unkown
page readonly
3580000
unkown
page readonly
3120000
unkown
page execute and read and write
89C0000
unkown
page read and write
69F0000
direct allocation
page read and write
8A6D000
heap
page read and write
8AD0000
heap
page read and write
4F84000
heap
page read and write
5078000
heap
page read and write
7FF5ED669000
unkown
page readonly
7FF5ED9D2000
unkown
page readonly
8A1E000
stack
page read and write
7FC7000
heap
page read and write
76C0000
unkown
page read and write
7FF5ED980000
unkown
page readonly
7BF5000
heap
page read and write
4466000
heap
page read and write
4B56000
unkown
page read and write
841A000
stack
page read and write
8CF0000
heap
page read and write
2AFF000
stack
page read and write
A37B000
unkown
page read and write
7FF5ED674000
unkown
page readonly
7BF5000
heap
page read and write
9B44000
heap
page read and write
1027000
heap
page read and write
4F8A000
heap
page read and write
37AE000
unkown
page read and write
24E7000
stack
page read and write
50C1000
heap
page read and write
76A0000
unkown
page read and write
B7AC000
unkown
page read and write
1210000
unkown
page readonly
7FF5ED534000
unkown
page readonly
7FF5ED449000
unkown
page readonly
2B09000
heap
page read and write
A69B000
heap
page read and write
7DF2000
direct allocation
page read and write
4C19000
heap
page read and write
8BE9000
stack
page read and write
500D000
heap
page read and write
4F8B000
heap
page read and write
8BF6000
heap
page read and write
8409000
stack
page read and write
3290000
unkown
page read and write
AD0000
heap
page read and write
7DDE000
stack
page read and write
7A39000
heap
page read and write
A983000
heap
page read and write
517D000
heap
page read and write
8EC8000
unkown
page read and write
C9F6000
unkown
page read and write
A5A4000
heap
page read and write
50CA000
heap
page read and write
7FF5ED8C1000
unkown
page readonly
A8CE000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
84BB000
stack
page read and write
4F8E000
heap
page read and write
C49E000
stack
page read and write
12DC000
stack
page read and write
C6C9000
unkown
page read and write
75E8000
heap
page read and write
70B8000
heap
page read and write
4F1D000
heap
page read and write
81CC000
stack
page read and write
9977000
unkown
page read and write
A970000
heap
page read and write
A270000
heap
page read and write
A6EE000
heap
page read and write
A37B000
unkown
page read and write
5325000
heap
page read and write
9795000
unkown
page read and write
7B9E000
heap
page read and write
4D8B000
heap
page read and write
8650000
heap
page read and write
5EF0000
heap
page read and write
FC03000
unkown
page read and write
9854000
unkown
page read and write
7A0000
heap
page read and write
FD8A000
heap
page read and write
739B000
stack
page read and write
3A84000
heap
page read and write
A68F000
heap
page read and write
4EA6000
heap
page read and write
70F6000
heap
page read and write
5090000
heap
page read and write
802A000
stack
page read and write
5211000
heap
page read and write
7FF5ED503000
unkown
page readonly
3AA0000
heap
page read and write
4532000
heap
page read and write
3AC7000
heap
page read and write
5223000
heap
page read and write
73CD000
heap
page read and write
744F000
heap
page read and write
A6EE000
heap
page read and write
6131000
heap
page read and write
8C4C000
heap
page read and write
C857000
unkown
page read and write
4CBB000
heap
page read and write
9A10000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
5211000
heap
page read and write
2867000
stack
page read and write
7FF5ED9BE000
unkown
page readonly
3AD3000
heap
page read and write
865C000
heap
page read and write
4E40000
trusted library allocation
page read and write
96E3000
heap
page read and write
CB68000
unkown
page read and write
2ADF000
heap
page read and write
7580000
heap
page read and write
5F30000
heap
page read and write
2B3A000
heap
page read and write
4BE1000
unkown
page read and write
4692000
heap
page read and write
3341000
heap
page read and write
121B000
heap
page read and write
4B18000
heap
page read and write
89E0000
unkown
page read and write
8399000
stack
page read and write
573000
heap
page read and write
49E3000
heap
page read and write
50B1000
heap
page read and write
48F9000
stack
page read and write
7C90000
unkown
page read and write
54B1000
heap
page read and write
3AD7000
heap
page read and write
3AD3000
heap
page read and write
B343000
heap
page read and write
7D5A000
stack
page read and write
3AD1000
heap
page read and write
BC9B000
stack
page read and write
4B21000
heap
page read and write
517D000
heap
page read and write
7031000
heap
page read and write
1160000
heap
page read and write
4E90000
heap
page read and write
7BB4000
heap
page read and write
B8C0000
unkown
page readonly
A19D000
heap
page read and write
7DF4F3031000
unkown
page execute read
CA14000
unkown
page read and write
1241000
heap
page read and write
2D4F000
stack
page read and write
3141000
heap
page read and write
45D9000
heap
page read and write
FC4000
heap
page read and write
5670000
heap
page read and write
D08000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
C88B000
unkown
page read and write
4CC8000
heap
page read and write
8E3C000
heap
page read and write
4D10000
heap
page read and write
4C84000
heap
page read and write
4C4B000
unkown
page read and write
808C000
heap
page read and write
A0B0000
heap
page read and write
4675000
heap
page read and write
9518000
heap
page read and write
7FF5ED76D000
unkown
page readonly
4B93000
unkown
page read and write
796B000
stack
page read and write
8B11000
heap
page read and write
497D000
heap
page read and write
785B000
unkown
page read and write
943D000
stack
page read and write
ED9000
stack
page readonly
808A000
heap
page read and write
7C90000
unkown
page read and write
5050000
heap
page read and write
BAF9000
stack
page read and write
5961000
heap
page read and write
9596000
heap
page read and write
8BA1000
heap
page read and write
885B000
stack
page read and write
8C48000
heap
page read and write
9B000
stack
page read and write
A0B9000
heap
page read and write
507000
heap
page read and write
7FF5ED28E000
unkown
page readonly
37D2000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
8A8E000
stack
page read and write
7FF5ED9E1000
unkown
page readonly
7FF5ED1CF000
unkown
page readonly
37BD000
unkown
page read and write
506A000
heap
page read and write
CA0A000
unkown
page read and write
C9AE000
unkown
page read and write
A19F000
stack
page read and write
8CE0000
heap
page read and write
1239000
heap
page read and write
304C000
stack
page read and write
87BE000
stack
page read and write
9792000
unkown
page read and write
7641000
heap
page read and write
88EE000
stack
page read and write
A684000
heap
page read and write
4F78000
heap
page read and write
76A0000
unkown
page read and write
7FF5ED625000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
95DC000
stack
page read and write
7DF4F3030000
unkown
page readonly
4C39000
heap
page read and write
9879000
unkown
page read and write
761B000
heap
page read and write
3ABE000
heap
page read and write
4DEC000
heap
page read and write
4B13000
heap
page read and write
8B60000
unkown
page readonly
7FF5ED933000
unkown
page readonly
4ECC000
heap
page read and write
4B1F000
heap
page read and write
7751000
heap
page read and write
97A9000
unkown
page read and write
4F08000
heap
page read and write
44CD000
heap
page read and write
1250000
heap
page read and write
B22B000
stack
page read and write
2AB8000
heap
page read and write
7FF5ED9C8000
unkown
page readonly
7FF5ED1D6000
unkown
page readonly
8BA9000
heap
page read and write
8DA0000
unkown
page read and write
5008000
heap
page read and write
E1E000
stack
page read and write
7FF5ED59E000
unkown
page readonly
8E3A000
heap
page read and write
9300000
heap
page read and write
8BA3000
heap
page read and write
A32A000
unkown
page read and write
5064000
heap
page read and write
7BDE000
heap
page read and write
800B000
stack
page read and write
5090000
heap
page read and write
4607000
heap
page read and write
621000
heap
page read and write
4B21000
heap
page read and write
3A9A000
heap
page read and write
7FF5ED93B000
unkown
page readonly
4431000
heap
page read and write
7FDA000
heap
page read and write
7B9B000
heap
page read and write
FBD1000
unkown
page read and write
CA42000
unkown
page read and write
46F0000
trusted library allocation
page read and write
1240000
heap
page read and write
6030000
heap
page read and write
7FF5ED81B000
unkown
page readonly
A1CF000
heap
page read and write
7FF5ED867000
unkown
page readonly
9881000
unkown
page read and write
A265000
heap
page read and write
1436000
stack
page read and write
7763000
heap
page read and write
7FF5ED507000
unkown
page readonly
4D63000
heap
page read and write
83E0000
unkown
page readonly
8B15000
heap
page read and write
2B3F000
heap
page read and write
A02F000
stack
page read and write
2B60000
unkown
page readonly
7AF5000
stack
page read and write
37E0000
heap
page read and write
25FC000
stack
page read and write
85FC000
stack
page read and write
8C65000
heap
page read and write
5E30000
heap
page read and write
A6A8000
heap
page read and write
268A000
stack
page read and write
8A3F000
heap
page read and write
4D75000
heap
page read and write
5331000
heap
page read and write
276E000
stack
page read and write
7FF5ED3F3000
unkown
page readonly
4675000
heap
page read and write
7796000
heap
page read and write
8A4F000
heap
page read and write
7FF5ED586000
unkown
page readonly
7FF5EDA0B000
unkown
page readonly
4A40000
trusted library allocation
page read and write
50AA000
heap
page read and write
677000
heap
page read and write
50BE000
heap
page read and write
45B8000
heap
page read and write
8B19000
heap
page read and write
871C000
heap
page read and write
C563000
unkown
page read and write
7FF5ED9AE000
unkown
page readonly
8609000
stack
page read and write
7FF5ED872000
unkown
page readonly
5076000
heap
page read and write
4C50000
unkown
page read and write
7A43000
heap
page read and write
7031000
heap
page read and write
4F1A000
heap
page read and write
7FF5ED793000
unkown
page readonly
43B3000
heap
page read and write
33E9000
stack
page read and write
4E0A000
heap
page read and write
4CB0000
heap
page read and write
DF6000
stack
page read and write
70D1000
heap
page read and write
8710000
unkown
page readonly
50C1000
heap
page read and write
4F40000
trusted library allocation
page read and write
1095000
stack
page read and write
C6D8000
unkown
page read and write
4CCD000
heap
page read and write
8668000
heap
page read and write
3797000
unkown
page read and write
5032000
heap
page read and write
3137000
stack
page read and write
C84D000
unkown
page read and write
1514000
heap
page read and write
1451000
unkown
page readonly
3AD3000
heap
page read and write
8012000
heap
page read and write
33C0000
heap
page read and write
8C0F000
stack
page read and write
9815000
unkown
page read and write
7A9E000
stack
page read and write
333E000
stack
page read and write
3844000
heap
page read and write
331E000
stack
page read and write
A0F0000
heap
page read and write
DC0000
heap
page read and write
7CC0000
unkown
page readonly
6EB1000
heap
page read and write
7BB4000
heap
page read and write
4BE3000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
597B000
heap
page read and write
A49E000
unkown
page read and write
4F33000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
4717000
heap
page read and write
5226000
heap
page read and write
3738000
unkown
page read and write
4407000
heap
page read and write
2CC9000
stack
page read and write
4CC4000
heap
page read and write
501D000
heap
page read and write
4BAB000
heap
page read and write
8108000
stack
page read and write
4B98000
heap
page read and write
7C80000
unkown
page read and write
797D000
unkown
page read and write
5066000
heap
page read and write
811E000
stack
page read and write
4AF0000
heap
page read and write
866A000
heap
page read and write
4B8B000
unkown
page read and write
31AC000
stack
page read and write
4AB0000
trusted library allocation
page read and write
7D2A000
stack
page read and write
7DF4F3061000
unkown
page execute read
5BB0000
direct allocation
page read and write
3419000
stack
page read and write
7A30000
heap
page read and write
4C18000
unkown
page read and write
4C15000
heap
page read and write
5678000
heap
page read and write
93DB000
stack
page read and write
4C6A000
heap
page read and write
4FB2000
heap
page read and write
2B56000
heap
page read and write
7F2E000
stack
page read and write
874E000
heap
page read and write
9550000
unkown
page readonly
3459000
stack
page read and write
73E5000
heap
page read and write
FBE4000
unkown
page read and write
7E20000
trusted library section
page readonly
308A000
stack
page read and write
58BC000
heap
page read and write
CA7C000
unkown
page read and write
A255000
heap
page read and write
4F8C000
heap
page read and write
4BE3000
unkown
page read and write
8BB1000
heap
page read and write
A502000
unkown
page read and write
A4AE000
unkown
page read and write
4580000
heap
page read and write
820000
heap
page read and write
2AEF000
heap
page read and write
9AC0000
heap
page read and write
B140000
heap
page read and write
9929000
unkown
page read and write
343D000
stack
page read and write
7FF5ED9ED000
unkown
page readonly
4D41000
heap
page read and write
A966000
heap
page read and write
4E78000
heap
page read and write
1500000
heap
page read and write
5880000
heap
page read and write
8FD0000
heap
page read and write
31AD000
stack
page read and write
A284000
heap
page read and write
4E94000
heap
page read and write
4DE2000
heap
page read and write
C5A3000
unkown
page read and write
8ACE000
heap
page read and write
10C0000
unkown
page readonly
9E6C000
stack
page read and write
4FCB000
heap
page read and write
7FF5ED755000
unkown
page readonly
7DF4F3061000
unkown
page execute read
9ACC000
stack
page read and write
A7B0000
heap
page read and write
401000
unkown
page execute read
3700000
unkown
page read and write
B8C0000
unkown
page readonly
8CEE000
stack
page read and write
7FF5ED41C000
unkown
page readonly
2AE7000
heap
page read and write
8AAC000
stack
page read and write
7AF6000
heap
page read and write
4431000
heap
page read and write
5890000
heap
page read and write
7A3B000
heap
page read and write
784A000
unkown
page read and write
79FB000
unkown
page read and write
7C0B000
heap
page read and write
10C0000
heap
page read and write
36E0000
heap
page read and write
7A34000
unkown
page read and write
7FF5ED814000
unkown
page readonly
256A000
stack
page read and write
29CE000
stack
page read and write
2FDF000
stack
page read and write
9CC000
stack
page read and write
4B5A000
heap
page read and write
502E000
direct allocation
page read and write
8B85000
heap
page read and write
447F000
heap
page read and write
7751000
heap
page read and write
7C6E000
stack
page read and write
C4D0000
unkown
page read and write
4DD7000
heap
page read and write
C9FB000
unkown
page read and write
872F000
heap
page read and write
7FF5ED43A000
unkown
page readonly
3AA0000
heap
page read and write
AA90000
unkown
page read and write
7F2E000
stack
page read and write
4E4A000
heap
page read and write
C5A0000
unkown
page read and write
FBDE000
unkown
page read and write
1FC0000
heap
page read and write
7B90000
unkown
page readonly
7D80000
trusted library allocation
page read and write
7FF5ED8FF000
unkown
page readonly
A37D000
unkown
page read and write
3241000
heap
page read and write
3580000
unkown
page readonly
A7F0000
heap
page read and write
5047000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
1200000
heap
page read and write
4397000
heap
page read and write
10D0000
heap
page read and write
C857000
unkown
page read and write
520000
heap
page read and write
7FF5ED426000
unkown
page readonly
987F000
unkown
page read and write
7857000
unkown
page read and write
7D53000
unkown
page read and write
C9F3000
unkown
page read and write
A3BE000
unkown
page read and write
7DFC000
stack
page read and write
4A24000
heap
page read and write
2AE7000
heap
page read and write
4502000
heap
page read and write
7ECB000
stack
page read and write
7FF5ED849000
unkown
page readonly
7FF5ED7E9000
unkown
page readonly
8B82000
heap
page read and write
4E1C000
stack
page read and write
14C5000
heap
page read and write
4D2B000
heap
page read and write
7B5B000
heap
page read and write
C893000
unkown
page read and write
52B1000
heap
page read and write
A257000
heap
page read and write
3AEE000
heap
page read and write
7F40000
unkown
page readonly
1330000
heap
page read and write
51E000
stack
page read and write
7C0B000
heap
page read and write
4BAF000
heap
page read and write
4CB0000
direct allocation
page read and write
7FF5ED43A000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
14C2000
heap
page read and write
1183000
heap
page read and write
8633000
heap
page read and write
7FF5ED779000
unkown
page readonly
7FF5ED451000
unkown
page readonly
8C65000
heap
page read and write
BDC0000
unkown
page readonly
5050000
heap
page read and write
7FF5ED85F000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
A976000
heap
page read and write
7FF5ED8C1000
unkown
page readonly
4E4E000
heap
page read and write
51E2000
heap
page read and write
4D29000
heap
page read and write
50CE000
heap
page read and write
CB45000
unkown
page read and write
7031000
heap
page read and write
4D47000
heap
page read and write
7FF5ED68F000
unkown
page readonly
6DBC000
direct allocation
page read and write
61B0000
heap
page read and write
A494000
unkown
page read and write
3AC7000
heap
page read and write
497F000
heap
page read and write
9881000
unkown
page read and write
7B83000
heap
page read and write
495D000
heap
page read and write
80A9000
heap
page read and write
C962000
unkown
page read and write
3210000
unkown
page read and write
3A84000
heap
page read and write
AC8F000
stack
page read and write
7FF5ED46E000
unkown
page readonly
2B01000
heap
page read and write
830E000
stack
page read and write
8F4D000
heap
page read and write
6EF1000
heap
page read and write
59B0000
direct allocation
page read and write
B650000
unkown
page read and write
8BF8000
heap
page read and write
1785000
heap
page read and write
871C000
heap
page read and write
4BDC000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
98A8000
unkown
page read and write
7DE9000
unkown
page readonly
1495000
heap
page read and write
7FF5ED670000
unkown
page readonly
4C50000
heap
page read and write
8034000
heap
page read and write
4D75000
heap
page read and write
9602000
heap
page read and write
1483000
heap
page read and write
914000
heap
page read and write
F889000
unkown
page read and write
4CC0000
unkown
page read and write
97AD000
unkown
page read and write
7FF5ED445000
unkown
page readonly
4D47000
heap
page read and write
922F000
stack
page read and write
7FF5ED97A000
unkown
page readonly
52CF000
heap
page read and write
4CD0000
unkown
page read and write
CA0A000
unkown
page read and write
3AD1000
heap
page read and write
7E5E000
stack
page read and write
A0B2000
heap
page read and write
7FF5ED505000
unkown
page readonly
80CE000
stack
page read and write
787C000
unkown
page read and write
A68F000
heap
page read and write
4F88000
heap
page read and write
7FF5ED714000
unkown
page readonly
5F2000
heap
page read and write
4BA2000
heap
page read and write
1294000
stack
page read and write
4CB4000
heap
page read and write
977A000
unkown
page read and write
1254000
heap
page read and write
B6A0000
heap
page read and write
677000
heap
page read and write
8A5E000
heap
page read and write
7FF5ED445000
unkown
page readonly
4E21000
heap
page read and write
799E000
stack
page read and write
4F7B000
heap
page read and write
FC00000
unkown
page read and write
9F79000
unkown
page readonly
3AD1000
heap
page read and write
870A000
stack
page read and write
477B000
heap
page read and write
33C0000
heap
page read and write
A14E000
stack
page read and write
4B1F000
heap
page read and write
7255000
heap
page read and write
8F3E000
heap
page read and write
7FF5ED850000
unkown
page readonly
7FF5ED412000
unkown
page readonly
5074000
heap
page read and write
791C000
stack
page read and write
4C20000
heap
page read and write
A255000
heap
page read and write
44A1000
heap
page read and write
4F62000
heap
page read and write
4E45000
heap
page read and write
7FF5ED71B000
unkown
page readonly
4631000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
1500000
heap
page read and write
9170000
heap
page read and write
A97A000
heap
page read and write
7A11000
heap
page read and write
6FF1000
heap
page read and write
1510000
unkown
page readonly
87AE000
heap
page read and write
7070000
heap
page read and write
8FBB000
stack
page read and write
811C000
stack
page read and write
7764000
heap
page read and write
A3BE000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
2B56000
heap
page read and write
7A8E000
heap
page read and write
A60000
heap
page read and write
37BF000
heap
page read and write
A364000
unkown
page read and write
946000
heap
page read and write
1436000
stack
page read and write
9B80000
heap
page read and write
899F000
stack
page read and write
A6C0000
heap
page read and write
7FF5ED9A1000
unkown
page readonly
5530000
heap
page read and write
5022000
heap
page read and write
7E9B000
stack
page read and write
7C84000
heap
page read and write
7859000
unkown
page read and write
5096000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
876C000
heap
page read and write
4C84000
heap
page read and write
478A000
heap
page read and write
A966000
heap
page read and write
7847000
unkown
page read and write
ACBE000
stack
page read and write
5093000
heap
page read and write
F87B000
unkown
page read and write
9879000
unkown
page read and write
7031000
heap
page read and write
7FF5ED956000
unkown
page readonly
A95B000
heap
page read and write
37AE000
unkown
page read and write
89E0000
unkown
page read and write
8724000
heap
page read and write
3460000
unkown
page read and write
7FF5ED418000
unkown
page readonly
FEC000
heap
page read and write
7FF5ED937000
unkown
page readonly
DD0000
unkown
page readonly
9BB1000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
7FF5ED65C000
unkown
page readonly
CA16000
unkown
page read and write
37A8000
unkown
page read and write
2B49000
heap
page read and write
6E30000
heap
page read and write
9B5B000
stack
page read and write
7FF5EDA38000
unkown
page readonly
5085000
heap
page read and write
A278000
heap
page read and write
447F000
heap
page read and write
50B1000
heap
page read and write
9877000
unkown
page read and write
2D60000
heap
page read and write
7857000
unkown
page read and write
4E0A000
heap
page read and write
7FF5ED750000
unkown
page readonly
3817000
heap
page read and write
2B57000
stack
page read and write
36A0000
heap
page read and write
8B8D000
heap
page read and write
5557000
stack
page read and write
7C80000
unkown
page read and write
BD98000
stack
page read and write
C507000
unkown
page read and write
6EB0000
heap
page read and write
8DA0000
unkown
page read and write
7FF5ED670000
unkown
page readonly
498A000
heap
page read and write
7FF5ED55F000
unkown
page readonly
C4A0000
unkown
page read and write
32A6000
stack
page read and write
BB0000
heap
page read and write
50B7000
heap
page read and write
71AD000
heap
page read and write
152C000
heap
page read and write
8066000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
4CE0000
unkown
page read and write
8630000
heap
page read and write
A281000
heap
page read and write
58B1000
heap
page read and write
1350000
unkown
page readonly
A59D000
heap
page read and write
4E56000
heap
page read and write
7E60000
unkown
page read and write
A69D000
heap
page read and write
4B18000
heap
page read and write
75A0000
heap
page read and write
4522000
heap
page read and write
6DF1000
heap
page read and write
FBE4000
unkown
page read and write
4B8F000
heap
page read and write
5883000
heap
page read and write
7B9B000
heap
page read and write
800B000
stack
page read and write
4AE8000
heap
page read and write
9795000
unkown
page read and write
A310000
unkown
page read and write
2966000
stack
page read and write
4940000
heap
page read and write
7FF5ED821000
unkown
page readonly
A934000
heap
page read and write
4CB4000
heap
page read and write
A540000
heap
page read and write
8CCC000
heap
page read and write
CA1E000
unkown
page read and write
7DF4F3040000
unkown
page readonly
843A000
stack
page read and write
8634000
heap
page read and write
7FF5ED342000
unkown
page readonly
4C4B000
unkown
page read and write
C9C4000
unkown
page read and write
87BE000
stack
page read and write
7869000
unkown
page read and write
871C000
heap
page read and write
12CE000
stack
page read and write
D41000
heap
page read and write
7F40000
unkown
page readonly
C544000
unkown
page read and write
7D20000
unkown
page readonly
5226000
heap
page read and write
37E3000
heap
page read and write
5072000
heap
page read and write
4F0B000
heap
page read and write
7255000
heap
page read and write
2E4F000
stack
page read and write
4F57000
heap
page read and write
506A000
heap
page read and write
5532000
heap
page read and write
7FF5ED409000
unkown
page readonly
5071000
heap
page read and write
AA90000
unkown
page read and write
4CB4000
heap
page read and write
A276000
heap
page read and write
A276000
heap
page read and write
A968000
heap
page read and write
1203000
heap
page read and write
7FF5ED77C000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
8AB6000
heap
page read and write
527B000
heap
page read and write
5030000
heap
page read and write
7FF5ED349000
unkown
page readonly
785F000
unkown
page read and write
C89C000
unkown
page read and write
7CFE000
stack
page read and write
4D3B000
heap
page read and write
7B9B000
heap
page read and write
7DC9000
stack
page read and write
A39B000
unkown
page read and write
A250000
heap
page read and write
4713000
heap
page read and write
75A9000
heap
page read and write
64F1000
heap
page read and write
A01C000
stack
page read and write
9ADA000
stack
page read and write
CA1E000
unkown
page read and write
63F0000
heap
page read and write
400000
unkown
page readonly
3ABE000
heap
page read and write
7BE9000
unkown
page readonly
4BC9000
unkown
page read and write
FD80000
heap
page read and write
4431000
heap
page read and write
959D000
heap
page read and write
4DB1000
heap
page read and write
95A9000
heap
page read and write
7FF5ED40D000
unkown
page readonly
7FF5ED8A4000
unkown
page readonly
9A40000
heap
page read and write
FC00000
unkown
page read and write
37A0000
unkown
page read and write
4479000
heap
page read and write
379E000
unkown
page read and write
4BB8000
heap
page read and write
8A4D000
heap
page read and write
33B9000
stack
page read and write
7FF5ED8AC000
unkown
page readonly
C9C4000
unkown
page read and write
49AD000
heap
page read and write
7FF5ED48A000
unkown
page readonly
7695000
stack
page read and write
4B5A000
heap
page read and write
71C9000
heap
page read and write
7FF5ED4EF000
unkown
page readonly
5226000
heap
page read and write
9B80000
heap
page read and write
7370000
heap
page read and write
CA63000
unkown
page read and write
BD1D000
stack
page read and write
5471000
heap
page read and write
7FF5ED937000
unkown
page readonly
37F6000
unkown
page read and write
A991000
heap
page read and write
7FF5ED2A9000
unkown
page readonly
1210000
unkown
page readonly
7FF5ED9AE000
unkown
page readonly
7FF5ED928000
unkown
page readonly
37F6000
unkown
page read and write
7B9B000
heap
page read and write
64B2000
heap
page read and write
A50B000
unkown
page read and write
6FB1000
heap
page read and write
4423000
heap
page read and write
98A8000
unkown
page read and write
A283000
heap
page read and write
7FF5ED847000
unkown
page readonly
3A84000
heap
page read and write
8000000
unkown
page read and write
4FC0000
trusted library allocation
page read and write
8A9F000
stack
page read and write
7FF5ED9F2000
unkown
page readonly
C43000
heap
page read and write
3AD5000
heap
page read and write
4C57000
heap
page read and write
4983000
heap
page read and write
8B19000
heap
page read and write
A19F000
stack
page read and write
52F1000
heap
page read and write
7FF5ED9D6000
unkown
page readonly
52B1000
heap
page read and write
CA14000
unkown
page read and write
9F1E000
stack
page read and write
4B2C000
heap
page read and write
7FF5ED1CF000
unkown
page readonly
9798000
unkown
page read and write
5053000
heap
page read and write
7FF5ED5C1000
unkown
page readonly
8CCC000
heap
page read and write
5DF1000
heap
page read and write
7867000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
7031000
heap
page read and write
3795000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
4B30000
heap
page read and write
800000
heap
page read and write
4D45000
heap
page read and write
FD80000
heap
page read and write
7455000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
7FF5ED6B9000
unkown
page readonly
A69D000
heap
page read and write
4FDD000
heap
page read and write
36D5000
stack
page read and write
4DE9000
heap
page read and write
7031000
heap
page read and write
530F000
heap
page read and write
AB5B000
unkown
page read and write
9BF4000
heap
page read and write
5FF0000
heap
page read and write
54B0000
heap
page read and write
3AD7000
heap
page read and write
4CBB000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
7AAC000
stack
page read and write
8BF9000
heap
page read and write
7FF5ED867000
unkown
page readonly
99B0000
heap
page read and write
4B87000
heap
page read and write
C5AA000
unkown
page read and write
AAF6000
unkown
page read and write
B10D000
stack
page read and write
9910000
heap
page read and write
5047000
heap
page read and write
50C6000
direct allocation
page read and write
7FF5ED980000
unkown
page readonly
4C71000
heap
page read and write
4D98000
heap
page read and write
3210000
unkown
page read and write
785D000
unkown
page read and write
4E7B000
heap
page read and write
680000
heap
page read and write
7863000
unkown
page read and write
3AD7000
heap
page read and write
7FF5ED80C000
unkown
page readonly
339E000
stack
page read and write
37A0000
unkown
page read and write
89AE000
stack
page read and write
7FF5ED4A1000
unkown
page readonly
710C000
heap
page read and write
716B000
heap
page read and write
8F95000
heap
page read and write
8A54000
heap
page read and write
C50A000
unkown
page read and write
43E1000
heap
page read and write
3110000
unkown
page read and write
888F000
stack
page read and write
7FF5EDA08000
unkown
page readonly
37F9000
unkown
page read and write
96B1000
heap
page read and write
4FCA000
heap
page read and write
9692000
heap
page read and write
7FF5ED872000
unkown
page readonly
C852000
unkown
page read and write
7869000
unkown
page read and write
1683000
heap
page read and write
66F000
heap
page read and write
37C3000
heap
page read and write
7071000
heap
page read and write
77DE000
stack
page read and write
955C000
heap
page read and write
7FF5ED26E000
unkown
page readonly
8AD0000
heap
page read and write
3844000
heap
page read and write
23A3000
heap
page read and write
A6BE000
stack
page read and write
945A000
stack
page read and write
6DD6000
direct allocation
page read and write
7ADD000
heap
page read and write
3AD9000
heap
page read and write
B5AE000
stack
page read and write
2FC7000
stack
page read and write
818E000
stack
page read and write
4C2C000
heap
page read and write
8EFD000
heap
page read and write
CA16000
unkown
page read and write
DE0000
unkown
page readonly
AADB000
unkown
page read and write
A7F0000
heap
page read and write
7377000
heap
page read and write
7FF5ED8E7000
unkown
page readonly
4F26000
heap
page read and write
79D3000
unkown
page read and write
8A63000
heap
page read and write
3ACD000
heap
page read and write
A6A8000
heap
page read and write
4C64000
heap
page read and write
8B85000
heap
page read and write
A0B4000
heap
page read and write
3A9A000
heap
page read and write
761B000
heap
page read and write
4BCD000
heap
page read and write
4407000
heap
page read and write
7A10000
heap
page read and write
7222000
heap
page read and write
95DC000
stack
page read and write
550000
heap
page read and write
9854000
unkown
page read and write
4B66000
heap
page read and write
8A6E000
stack
page read and write
3350000
unkown
page readonly
4F22000
heap
page read and write
4BAC000
heap
page read and write
4513000
heap
page read and write
135E000
stack
page read and write
A7B4000
heap
page read and write
8210000
unkown
page read and write
8732000
heap
page read and write
5061000
heap
page read and write
4C5A000
heap
page read and write
A970000
heap
page read and write
50C0000
trusted library allocation
page read and write
5055000
heap
page read and write
7FF5ED337000
unkown
page readonly
A263000
heap
page read and write
49E5000
heap
page read and write
45D5000
heap
page read and write
A0EA000
heap
page read and write
5062000
heap
page read and write
4C10000
trusted library allocation
page read and write
4EE7000
heap
page read and write
3A9A000
heap
page read and write
CAE6000
unkown
page read and write
4FD0000
heap
page read and write
331E000
stack
page read and write
7F4C000
stack
page read and write
5041000
heap
page read and write
7FF5ED80C000
unkown
page readonly
5169000
heap
page read and write
87C6000
heap
page read and write
724D000
heap
page read and write
37E5000
heap
page read and write
3AD5000
heap
page read and write
7FF5ED516000
unkown
page readonly
A020000
unkown
page readonly
A310000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
7900000
unkown
page read and write
A263000
heap
page read and write
7FF5ED295000
unkown
page readonly
70E3000
heap
page read and write
5099000
heap
page read and write
4F5A000
heap
page read and write
B650000
unkown
page read and write
7DC0000
direct allocation
page read and write
70B6000
heap
page read and write
7FF5ED71E000
unkown
page readonly
7858000
stack
page read and write
7FF5ED660000
unkown
page readonly
13C5000
heap
page read and write
7FF5ED714000
unkown
page readonly
7A20000
heap
page read and write
63B1000
heap
page read and write
4DE0000
trusted library allocation
page read and write
6430000
heap
page read and write
4456000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
7BED000
heap
page read and write
8B1C000
heap
page read and write
4B29000
heap
page read and write
7ADF000
heap
page read and write
505D000
heap
page read and write
7D48000
stack
page read and write
7FF5ED847000
unkown
page readonly
7FF5ED94A000
unkown
page readonly
88EE000
stack
page read and write
96DF000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
2676000
stack
page read and write
9596000
heap
page read and write
4B29000
heap
page read and write
AB39000
unkown
page read and write
44E2000
heap
page read and write
A5A4000
heap
page read and write
8C01000
heap
page read and write
51F3000
heap
page read and write
516000
stack
page read and write
9850000
heap
page read and write
7610000
heap
page read and write
332E000
stack
page read and write
447F000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
6EF0000
heap
page read and write
4ADC000
heap
page read and write
2A59000
stack
page read and write
7FF5ED810000
unkown
page readonly
BA6000
heap
page read and write
8EFB000
heap
page read and write
AD7F000
stack
page read and write
58CE000
heap
page read and write
E76000
stack
page read and write
7FF5ED94A000
unkown
page readonly
9D64000
unkown
page read and write
C6F8000
unkown
page read and write
2F50000
trusted library allocation
page read and write
5678000
heap
page read and write
7FF5EDA08000
unkown
page readonly
2690000
trusted library allocation
page read and write
C92D000
unkown
page read and write
1780000
heap
page read and write
3AB6000
heap
page read and write
5E71000
heap
page read and write
7FF5ED735000
unkown
page readonly
7FF5ED4C2000
unkown
page readonly
45ED000
heap
page read and write
A972000
heap
page read and write
9534000
heap
page read and write
A11F000
stack
page read and write
7FF5ED5A8000
unkown
page readonly
7FF5ED697000
unkown
page readonly
8ACE000
heap
page read and write
4EDF000
heap
page read and write
4787000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
8AC3000
heap
page read and write
50AA000
heap
page read and write
C9F3000
unkown
page read and write
79E000
stack
page read and write
2AC6000
heap
page read and write
310E000
stack
page read and write
3180000
unkown
page readonly
A7B4000
heap
page read and write
A7F5000
heap
page read and write
AB5B000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
7F30000
unkown
page read and write
33EB000
stack
page read and write
6071000
heap
page read and write
3220000
unkown
page readonly
A95B000
heap
page read and write
70C3000
heap
page read and write
7FF5ED6B9000
unkown
page readonly
2A60000
heap
page read and write
44D0000
trusted library allocation
page read and write
7BAF000
heap
page read and write
B6A0000
heap
page read and write
4D63000
heap
page read and write
4660000
heap
page read and write
5213000
heap
page read and write
5024000
heap
page read and write
4B21000
heap
page read and write
7724000
heap
page read and write
CA0A000
unkown
page read and write
A361000
unkown
page read and write
2EDF000
stack
page read and write
3AC5000
heap
page read and write
5013000
heap
page read and write
9596000
heap
page read and write
E73000
heap
page read and write
50BE000
heap
page read and write
7AB9000
heap
page read and write
AADB000
unkown
page read and write
293E000
stack
page read and write
890F000
stack
page read and write
7FF5ED5F7000
unkown
page readonly
1221000
heap
page read and write
7FF5ED4B4000
unkown
page readonly
7098000
heap
page read and write
9460000
heap
page read and write
4423000
heap
page read and write
2B0C000
heap
page read and write
B8B0000
unkown
page read and write
7B80000
unkown
page read and write
3A7B000
heap
page read and write
3580000
unkown
page readonly
7AE0000
heap
page read and write
7FF5ED471000
unkown
page readonly
4270000
trusted library allocation
page read and write
C6F8000
unkown
page read and write
8B0D000
heap
page read and write
3756000
unkown
page read and write
6431000
heap
page read and write
5EB0000
heap
page read and write
7FF5ED4B4000
unkown
page readonly
2B49000
heap
page read and write
70A8000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
C40000
heap
page read and write
C52C000
unkown
page read and write
7396000
heap
page read and write
B82A000
stack
page read and write
3110000
direct allocation
page read and write
7FF5ED76D000
unkown
page readonly
A42F000
stack
page read and write
7D40000
unkown
page read and write
2D90000
unkown
page readonly
4B32000
heap
page read and write
7FF5ED674000
unkown
page readonly
5051000
heap
page read and write
9E89000
unkown
page readonly
8BF0000
heap
page read and write
49F1000
heap
page read and write
95AF000
heap
page read and write
44C0000
trusted library allocation
page read and write
7D20000
unkown
page readonly
C964000
unkown
page read and write
7859000
unkown
page read and write
4F0F000
heap
page read and write
A92000
heap
page read and write
CB40000
unkown
page read and write
4D45000
stack
page read and write
73B0000
stack
page readonly
7FF5ED4A1000
unkown
page readonly
3A73000
heap
page read and write
4726000
heap
page read and write
7FF5ED265000
unkown
page readonly
9877000
unkown
page read and write
8663000
heap
page read and write
7FF5ECED2000
unkown
page readonly
630000
heap
page read and write
42EC000
heap
page read and write
352C000
stack
page read and write
C92D000
unkown
page read and write
51F6000
heap
page read and write
7FF5ED735000
unkown
page readonly
4645000
heap
page read and write
86CD000
heap
page read and write
AD3000
heap
page read and write
2A6E000
stack
page read and write
CA0A000
unkown
page read and write
7653000
heap
page read and write
7FF5ED821000
unkown
page readonly
C563000
unkown
page read and write
7AE8000
heap
page read and write
4CBB000
heap
page read and write
7FF5ED9FF000
unkown
page readonly
5064000
heap
page read and write
50BD000
heap
page read and write
4777000
heap
page read and write
7FF5ED451000
unkown
page readonly
5211000
heap
page read and write
359C000
stack
page read and write
AB64000
unkown
page read and write
73B0000
trusted library allocation
page read and write
7BB4000
heap
page read and write
5072000
heap
page read and write
A96000
stack
page read and write
85AC000
stack
page read and write
527F000
heap
page read and write
7FFE000
stack
page read and write
2A5E000
stack
page read and write
43C1000
heap
page read and write
7CA0000
unkown
page read and write
2AED000
stack
page read and write
C88B000
unkown
page read and write
4630000
heap
page read and write
A364000
unkown
page read and write
4700000
heap
page read and write
4CA8000
heap
page read and write
A4E000
stack
page read and write
7FF5ED9C8000
unkown
page readonly
7A6B000
heap
page read and write
A930000
heap
page read and write
CA0A000
unkown
page read and write
4DD3000
heap
page read and write
C92D000
unkown
page read and write
5051000
heap
page read and write
A543000
heap
page read and write
308E000
stack
page read and write
7FF5ED7E0000
unkown
page readonly
7FF5ED295000
unkown
page readonly
C503000
unkown
page read and write
92B0000
unkown
page readonly
5EE000
stack
page read and write
9B0B000
heap
page read and write
CB40000
unkown
page read and write
45BF000
heap
page read and write
47CB000
heap
page read and write
2C66000
stack
page read and write
A502000
unkown
page read and write
AB5B000
unkown
page read and write
7FF5ED986000
unkown
page readonly
8722000
heap
page read and write
45F1000
heap
page read and write
7FF5ED64F000
unkown
page readonly
7255000
heap
page read and write
4AD0000
heap
page read and write
5EB0000
heap
page read and write
99A0000
heap
page read and write
2B2F000
heap
page read and write
A5E0000
heap
page read and write
8640000
heap
page read and write
3700000
unkown
page read and write
7562000
heap
page read and write
C6F2000
unkown
page read and write
3738000
unkown
page read and write
7AF9000
unkown
page readonly
45B0000
heap
page read and write
6DE8000
direct allocation
page read and write
8B5E000
heap
page read and write
1255000
heap
page read and write
78A0000
unkown
page read and write
8B82000
heap
page read and write
A479000
unkown
page read and write
7FF5ED279000
unkown
page readonly
5641000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
4616000
heap
page read and write
97A9000
unkown
page read and write
4C84000
heap
page read and write
9384000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
8ADE000
heap
page read and write
C08A000
stack
page read and write
7FF5ED800000
unkown
page readonly
986B000
unkown
page read and write
4D07000
heap
page read and write
7FF5ED803000
unkown
page readonly
2BF3000
heap
page read and write
7FF5ED818000
unkown
page readonly
CA7C000
unkown
page read and write
C544000
unkown
page read and write
37BD000
unkown
page read and write
FBDD000
unkown
page read and write
2BD0000
trusted library allocation
page read and write
CB10000
unkown
page read and write
4B2C000
heap
page read and write
FD8A000
heap
page read and write
86CC000
heap
page read and write
4BDC000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
4CCC000
heap
page read and write
8E36000
heap
page read and write
915B000
stack
page read and write
7A6B000
stack
page read and write
42DB000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
BF0000
heap
page read and write
6DF1000
heap
page read and write
7FF5EDA11000
unkown
page readonly
91DA000
stack
page read and write
4C1E000
unkown
page read and write
4640000
heap
page read and write
75C5000
heap
page read and write
5001000
heap
page read and write
C51E000
unkown
page read and write
BEE000
stack
page read and write
37F9000
unkown
page read and write
3170000
unkown
page read and write
8B5E000
heap
page read and write
FC03000
unkown
page read and write
C4A0000
unkown
page read and write
A494000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
7F7A000
stack
page read and write
8B11000
heap
page read and write
7BE6000
heap
page read and write
1680000
heap
page read and write
9B70000
heap
page read and write
C88B000
unkown
page read and write
4960000
trusted library allocation
page read and write
4B3F000
heap
page read and write
37D2000
unkown
page read and write
2ADF000
heap
page read and write
A14C000
heap
page read and write
2AE3000
heap
page read and write
8B82000
heap
page read and write
5EB0000
heap
page read and write
7A56000
heap
page read and write
3756000
unkown
page read and write
4B9A000
heap
page read and write
91B9000
stack
page read and write
9AE0000
heap
page read and write
7FF5ED556000
unkown
page readonly
B729000
stack
page read and write
62D000
heap
page read and write
9AAE000
stack
page read and write
7FF5ED62F000
unkown
page readonly
4D30000
direct allocation
page read and write
2B01000
heap
page read and write
A6C0000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
9BB3000
heap
page read and write
4485000
stack
page read and write
4FC1000
heap
page read and write
7BF7000
heap
page read and write
4C5A000
heap
page read and write
C8E1000
unkown
page read and write
5240000
heap
page read and write
7FF5ED52F000
unkown
page readonly
8B85000
heap
page read and write
95C8000
stack
page read and write
7CCE000
stack
page read and write
4C49000
heap
page read and write
503B000
heap
page read and write
7FF5EDA14000
unkown
page readonly
3209000
stack
page read and write
8F40000
unkown
page readonly
A684000
heap
page read and write
977A000
unkown
page read and write
50C6000
heap
page read and write
15AE000
stack
page read and write
B640000
unkown
page read and write
40E5000
stack
page read and write
447F000
heap
page read and write
A1CF000
heap
page read and write
26A3000
heap
page read and write
78AD000
unkown
page read and write
4F6B000
heap
page read and write
43E1000
heap
page read and write
95B6000
heap
page read and write
B300000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
9977000
unkown
page read and write
7B6B000
stack
page read and write
C6CF000
unkown
page read and write
7FF5ED519000
unkown
page readonly
CE4000
heap
page read and write
3748000
unkown
page read and write
7FF5ED800000
unkown
page readonly
4D94000
heap
page read and write
2DCA000
stack
page read and write
2B2F000
heap
page read and write
8EB3000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
2FBB000
stack
page read and write
4B30000
heap
page read and write
7FF5ED86B000
unkown
page readonly
C54A000
unkown
page read and write
5093000
heap
page read and write
459000
unkown
page readonly
4478000
heap
page read and write
50B5000
heap
page read and write
7FF5ED337000
unkown
page readonly
B510000
heap
page read and write
801B000
stack
page read and write
7FF5ED8F9000
unkown
page readonly
4C66000
heap
page read and write
4740000
heap
page read and write
A24C000
heap
page read and write
7AB9000
heap
page read and write
7FC5000
heap
page read and write
1490000
unkown
page read and write
8BF0000
unkown
page readonly
8860000
unkown
page read and write
C700000
unkown
page read and write
7A32000
heap
page read and write
6E70000
heap
page read and write
7FF5ED5C5000
unkown
page readonly
7FF5ED755000
unkown
page readonly
7AA0000
unkown
page readonly
839C000
stack
page read and write
824B000
stack
page read and write
7FF5ED4E8000
unkown
page readonly
97AD000
unkown
page read and write
7FF5ED996000
unkown
page readonly
5303000
heap
page read and write
927B000
stack
page read and write
8E27000
heap
page read and write
A12E000
stack
page read and write
CA63000
unkown
page read and write
4CAC000
heap
page read and write
8CC3000
heap
page read and write
71B5000
heap
page read and write
4E55000
heap
page read and write
4C50000
heap
page read and write
4C6A000
heap
page read and write
7FF5ED86B000
unkown
page readonly
470F000
heap
page read and write
7FF5ED87D000
unkown
page readonly
7C6B000
stack
page read and write
4977000
heap
page read and write
356E000
stack
page read and write
588C000
heap
page read and write
8631000
heap
page read and write
9F79000
unkown
page readonly
987B000
unkown
page read and write
3AD5000
heap
page read and write
4479000
heap
page read and write
471E000
heap
page read and write
7DF4F3071000
unkown
page execute read
3167000
stack
page read and write
731A000
stack
page read and write
858E000
stack
page read and write
4715000
heap
page read and write
BDA0000
unkown
page readonly
13CD000
stack
page read and write
954A000
stack
page read and write
58AD000
heap
page read and write
93C000
heap
page read and write
76F9000
heap
page read and write
3730000
heap
page read and write
9A5B000
unkown
page read and write
A265000
heap
page read and write
9E6C000
stack
page read and write
4B3F000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
7FF5ED74A000
unkown
page readonly
50BE000
heap
page read and write
FFF000
stack
page read and write
9B5A000
heap
page read and write
8D6B000
stack
page read and write
F00000
heap
page read and write
980000
heap
page read and write
AEBE000
stack
page read and write
8989000
stack
page read and write
4D08000
heap
page read and write
7FF5ED586000
unkown
page readonly
4CCC000
heap
page read and write
718E000
heap
page read and write
3807000
stack
page read and write
517D000
heap
page read and write
8F07000
heap
page read and write
8B82000
heap
page read and write
1230000
heap
page read and write
719C000
heap
page read and write
A49E000
unkown
page read and write
504E000
heap
page read and write
AB4D000
unkown
page read and write
4DD0000
trusted library allocation
page read and write
9BD0000
heap
page read and write
4799000
heap
page read and write
7BF5000
heap
page read and write
957F000
heap
page read and write
C6E3000
unkown
page read and write
522D000
heap
page read and write
5036000
heap
page read and write
7FF5ED7F1000
unkown
page readonly
2B12000
heap
page read and write
9815000
unkown
page read and write
13E0000
heap
page read and write
7FF5ED8FF000
unkown
page readonly
3AB6000
heap
page read and write
C8E1000
unkown
page read and write
DBC000
stack
page read and write
43E3000
heap
page read and write
4F7E000
heap
page read and write
8A7E000
heap
page read and write
7FF5ED7C4000
unkown
page readonly
47D4000
heap
page read and write
49F5000
stack
page read and write
9871000
unkown
page read and write
8DAB000
stack
page read and write
7ADD000
heap
page read and write
A944000
heap
page read and write
CA16000
unkown
page read and write
71C9000
heap
page read and write
4A2A000
heap
page read and write
4B2E000
heap
page read and write
8C77000
heap
page read and write
C846000
unkown
page read and write
950E000
stack
page read and write
CA0A000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
A21E000
stack
page read and write
9869000
unkown
page read and write
A050000
heap
page read and write
4F86000
heap
page read and write
4F5A000
heap
page read and write
B190000
unkown
page read and write
8B0D000
heap
page read and write
8A9C000
heap
page read and write
2CCA000
stack
page read and write
5283000
heap
page read and write
C6BF000
unkown
page read and write
915F000
stack
page read and write
5085000
heap
page read and write
5085000
heap
page read and write
7FF5ED5C1000
unkown
page readonly
7FF5ED669000
unkown
page readonly
5071000
heap
page read and write
7FF5ED73D000
unkown
page readonly
4C15000
heap
page read and write
6E70000
heap
page read and write
53B2000
heap
page read and write
51F7000
heap
page read and write
957A000
heap
page read and write
4C84000
heap
page read and write
49ED000
heap
page read and write
4EE9000
heap
page read and write
AB41000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
34E9000
stack
page read and write
4C6A000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
8BE9000
stack
page read and write
7AB9000
heap
page read and write
C9C2000
unkown
page read and write
4B2E000
heap
page read and write
A270000
heap
page read and write
349B000
stack
page read and write
3AEE000
heap
page read and write
A079000
unkown
page readonly
4780000
trusted library allocation
page read and write
1096000
stack
page read and write
34DE000
stack
page read and write
C561000
unkown
page read and write
8C30000
heap
page read and write
121C000
stack
page read and write
9591000
heap
page read and write
4B56000
unkown
page read and write
1510000
unkown
page readonly
CA7C000
unkown
page read and write
CA64000
unkown
page read and write
CA7C000
unkown
page read and write
60D000
heap
page read and write
4AE4000
heap
page read and write
5074000
heap
page read and write
8E8C000
heap
page read and write
9970000
heap
page read and write
1490000
heap
page read and write
4FB8000
heap
page read and write
4E46000
heap
page read and write
A45B000
stack
page read and write
7FF5ED91A000
unkown
page readonly
505B000
heap
page read and write
7C8C000
stack
page read and write
8B92000
heap
page read and write
9B44000
heap
page read and write
4CB0000
unkown
page read and write
2789000
stack
page read and write
506A000
heap
page read and write
AB3D000
unkown
page read and write
8720000
unkown
page readonly
7FF5ED1F5000
unkown
page readonly
331E000
stack
page read and write
AB39000
unkown
page read and write
51EC000
heap
page read and write
FBD5000
unkown
page read and write
2B7A000
stack
page read and write
71C9000
heap
page read and write
1235000
heap
page read and write
8A4D000
heap
page read and write
379E000
unkown
page read and write
7F30000
unkown
page read and write
A0B4000
heap
page read and write
7FF5ED93E000
unkown
page readonly
C10A000
stack
page read and write
7FF5ED59E000
unkown
page readonly
93D0000
heap
page read and write
5066000
heap
page read and write
4BF5000
heap
page read and write
4B90000
unkown
page read and write
987D000
unkown
page read and write
6331000
heap
page read and write
8560000
trusted library section
page readonly
B140000
unkown
page readonly
2AE3000
heap
page read and write
A503000
heap
page read and write
A270000
heap
page read and write
4F8D000
heap
page read and write
2AD7000
stack
page read and write
7DF4F3041000
unkown
page execute read
75EF000
heap
page read and write
CAB2000
unkown
page read and write
3A6C000
heap
page read and write
4FAF000
heap
page read and write
C6CF000
unkown
page read and write
7FF5ED939000
unkown
page readonly
7671000
heap
page read and write
B8B0000
unkown
page read and write
C41F000
stack
page read and write
3730000
heap
page read and write
465C000
heap
page read and write
8208000
stack
page read and write
58B5000
heap
page read and write
3797000
unkown
page read and write
C6C1000
unkown
page read and write
1490000
unkown
page read and write
B08D000
stack
page read and write
809C000
stack
page read and write
7A8E000
heap
page read and write
8ED7000
heap
page read and write
A0AD000
stack
page read and write
3709000
stack
page read and write
C41F000
stack
page read and write
F92B000
stack
page read and write
3800000
unkown
page readonly
5590000
unkown
page write copy
7FF5ED9D2000
unkown
page readonly
7CE0000
unkown
page read and write
4720000
trusted library allocation
page read and write
75EF000
heap
page read and write
7A6C000
heap
page read and write
A080000
heap
page read and write
906E000
stack
page read and write
507C000
heap
page read and write
9380000
heap
page read and write
ACFE000
stack
page read and write
7FF5ED8E7000
unkown
page readonly
7FF5EDA70000
unkown
page readonly
784A000
unkown
page read and write
1140000
heap
page read and write
3AAE000
heap
page read and write
7FF5ED409000
unkown
page readonly
79FB000
unkown
page read and write
440D000
heap
page read and write
31BF000
stack
page read and write
4F03000
heap
page read and write
7B9E000
heap
page read and write
7A49000
heap
page read and write
785F000
unkown
page read and write
8B60000
heap
page read and write
7FF5ED9FF000
unkown
page readonly
70B4000
heap
page read and write
3AEE000
heap
page read and write
8E36000
heap
page read and write
379F000
heap
page read and write
470D000
heap
page read and write
A986000
heap
page read and write
761B000
heap
page read and write
4F1E000
heap
page read and write
A50B000
unkown
page read and write
7FF5ED1CB000
unkown
page readonly
7AB0000
heap
page read and write
4DE2000
heap
page read and write
3748000
unkown
page read and write
8B1C000
heap
page read and write
7FF5ED418000
unkown
page readonly
7DF4F3050000
unkown
page readonly
451F000
heap
page read and write
7A09000
stack
page read and write
A935000
heap
page read and write
C6C1000
unkown
page read and write
5957000
heap
page read and write
7FF5ED62F000
unkown
page readonly
7FF5ED7E9000
unkown
page readonly
3688000
stack
page read and write
1240000
heap
page read and write
2C7B000
stack
page read and write
A5E0000
heap
page read and write
440D000
heap
page read and write
7DF4F3031000
unkown
page execute read
90A9000
unkown
page readonly
8B7F000
heap
page read and write
45F5000
heap
page read and write
9B7C000
stack
page read and write
4B29000
heap
page read and write
7E7C000
stack
page read and write
808C000
heap
page read and write
33C0000
heap
page read and write
506C000
heap
page read and write
36F0000
unkown
page readonly
79D3000
unkown
page read and write
3821000
heap
page read and write
DE0000
unkown
page readonly
C84D000
unkown
page read and write
9BFF000
heap
page read and write
8EFE000
heap
page read and write
8A58000
heap
page read and write
987F000
unkown
page read and write
4E2F000
heap
page read and write
37D8000
heap
page read and write
2BF0000
heap
page read and write
7861000
unkown
page read and write
5631000
heap
page read and write
7FF5ED9ED000
unkown
page readonly
7BAF000
heap
page read and write
50A1000
heap
page read and write
7FF5ED806000
unkown
page readonly
3AB6000
heap
page read and write
4D45000
heap
page read and write
60D000
heap
page read and write
FBEE000
unkown
page read and write
7FF5ED781000
unkown
page readonly
CA14000
unkown
page read and write
5020000
heap
page read and write
7FF5EDA76000
unkown
page readonly
A1B0000
heap
page read and write
4D45000
heap
page read and write
5064000
heap
page read and write
A6C000
heap
page read and write
310E000
stack
page read and write
AB4C000
unkown
page read and write
A379000
unkown
page read and write
336C000
stack
page read and write
AFE9000
unkown
page readonly
A263000
heap
page read and write
96DF000
unkown
page read and write
3814000
heap
page read and write
44E6000
heap
page read and write
7FF5ED412000
unkown
page readonly
8640000
heap
page read and write
50B1000
heap
page read and write
476E000
heap
page read and write
7FF5ED4B0000
unkown
page readonly
AB4D000
unkown
page read and write
7E11000
unkown
page read and write
7D5E000
stack
page read and write
7FF5ED814000
unkown
page readonly
A479000
unkown
page read and write
C89C000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
8F9C000
heap
page read and write
2C69000
stack
page read and write
4C1D000
heap
page read and write
8AAE000
stack
page read and write
9AFC000
heap
page read and write
95A0000
heap
page read and write
7CC9000
stack
page read and write
A50000
heap
page read and write
56B0000
direct allocation
page read and write
4BBC000
heap
page read and write
CA76000
unkown
page read and write
9B5B000
stack
page read and write
6270000
heap
page read and write
8B0D000
heap
page read and write
8B80000
heap
page read and write
896B000
stack
page read and write
8C18000
heap
page read and write
CAFB000
unkown
page read and write
2BFC000
stack
page read and write
C516000
unkown
page read and write
4D22000
heap
page read and write
7FF5ED349000
unkown
page readonly
7FF5ED7C4000
unkown
page readonly
E4A0000
unkown
page read and write
8CA3000
heap
page read and write
7FF5ED4F3000
unkown
page readonly
7460000
heap
page read and write
801C000
stack
page read and write
4D45000
heap
page read and write
89A0000
unkown
page read and write
7BD6000
heap
page read and write
8F9E000
heap
page read and write
53F2000
heap
page read and write
FD82000
heap
page read and write
7A4D000
heap
page read and write
A66E000
stack
page read and write
7884000
unkown
page read and write
818E000
stack
page read and write
C962000
unkown
page read and write
73C9000
heap
page read and write
3419000
stack
page read and write
479B000
heap
page read and write
7FF5ED92C000
unkown
page readonly
952C000
heap
page read and write
5068000
heap
page read and write
7FF5ED81B000
unkown
page readonly
37AC000
unkown
page read and write
EF0000
unkown
page readonly
AB5D000
unkown
page read and write
7AC2000
heap
page read and write
CA16000
unkown
page read and write
C97C000
unkown
page read and write
11B0000
unkown
page readonly
4CCB000
heap
page read and write
A04D000
stack
page read and write
CB4C000
unkown
page read and write
7FF5ED743000
unkown
page readonly
3750000
heap
page read and write
4B9E000
heap
page read and write
9875000
unkown
page read and write
7FF5ED853000
unkown
page readonly
F7B3000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
A0F0000
heap
page read and write
2B0E000
heap
page read and write
12E0000
heap
page read and write
A4A1000
unkown
page read and write
8A4F000
heap
page read and write
3AC5000
heap
page read and write
A684000
heap
page read and write
88DD000
stack
page read and write
81B8000
stack
page read and write
7FF5ED692000
unkown
page readonly
9591000
heap
page read and write
986F000
unkown
page read and write
7863000
unkown
page read and write
7AB9000
heap
page read and write
13C0000
heap
page read and write
2A7A000
stack
page read and write
7B9E000
heap
page read and write
6DDF000
direct allocation
page read and write
321A000
stack
page read and write
507C000
heap
page read and write
7A30000
heap
page read and write
A69B000
heap
page read and write
9885000
unkown
page read and write
9596000
heap
page read and write
CA1E000
unkown
page read and write
9C30000
heap
page read and write
9C48000
heap
page read and write
2FE7000
stack
page read and write
8CA0000
heap
page read and write
957A000
heap
page read and write
4F9B000
heap
page read and write
9596000
heap
page read and write
A972000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
AF0C000
stack
page read and write
A970000
heap
page read and write
1200000
unkown
page readonly
4B8B000
unkown
page read and write
73A5000
heap
page read and write
446C000
heap
page read and write
7FF5ED495000
unkown
page readonly
8F99000
unkown
page readonly
4F36000
heap
page read and write
8AFD000
heap
page read and write
7BD3000
heap
page read and write
A8A1000
heap
page read and write
2B0C000
heap
page read and write
7060000
heap
page read and write
52F0000
heap
page read and write
7FF5ED961000
unkown
page readonly
7A43000
heap
page read and write
303E000
stack
page read and write
2EE9000
stack
page read and write
7900000
unkown
page read and write
3A9E000
heap
page read and write
4D47000
heap
page read and write
7FF5ED864000
unkown
page readonly
6EF2000
heap
page read and write
There are 3338 hidden memdumps, click here to show them.