IOC Report
Statement Of Account.exe

loading gif

Files

File Path
Type
Category
Malicious
Statement Of Account.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp9A8F.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\SdYCcXyq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SdYCcXyq.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Statement Of Account.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0szouwsm.4bb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1cjykfmk.3zy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ilbc0t2.sku.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2jufomu.5gt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psor12ay.l0t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rbc5muss.h2a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjzgj3lt.pxr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ztjbmj0w.vzn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpAA00.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\SdYCcXyq.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Statement Of Account.exe
"C:\Users\user\Desktop\Statement Of Account.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Statement Of Account.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SdYCcXyq.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SdYCcXyq" /XML "C:\Users\user\AppData\Local\Temp\tmp9A8F.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\SdYCcXyq.exe
C:\Users\user\AppData\Roaming\SdYCcXyq.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SdYCcXyq" /XML "C:\Users\user\AppData\Local\Temp\tmpAA00.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\SysWOW64\cmstp.exe
"C:\Windows\SysWOW64\cmstp.exe"
malicious
C:\Windows\SysWOW64\colorcpl.exe
"C:\Windows\SysWOW64\colorcpl.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.airzf.com/gs12/?r6-=DR9+51rACou4eQBXOdoZ4W0ewB14phJf97sbOZAiDLbqJph64OQ6FfPwpwURv63eY6pg&YN=9rKtZn5
154.12.38.29
malicious
http://www.b-a-s-e.net/gs12/?r6-=QIIWKxrtyX7LT6NTTkxUIHQxUymhf5FB+GXjykqQ4dPV8mdQoaOANT6/8pJ3wvHey5SR&YN=9rKtZn5
91.195.240.94
malicious
https://aka.ms/odirmr
unknown
http://www.demandstudiosnews.com/gs12/www.heavydutywearpart.com
unknown
http://www.novistashop.com/gs12/www.nexelab.com
unknown
http://www.hjgd.xyz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.juniavilela.com/gs12/www.lolabeautystudios.com
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.fontbureau.com/designers
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
http://www.b-a-s-e.net/gs12/
unknown
http://www.hjgd.xyz/gs12/www.bodution.website
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.airzf.comReferer:
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.b-a-s-e.netReferer:
unknown
http://www.zdryueva.comReferer:
unknown
http://www.baansbliss.comReferer:
unknown
http://www.lolabeautystudios.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://www.baansbliss.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.juniavilela.com/gs12/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.juniavilela.com
unknown
http://www.zdryueva.com
unknown
http://www.airzf.com
unknown
http://www.b-a-s-e.net
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://wns.windows.com/L
unknown
http://www.kustomequipment.com/gs12/
unknown
https://word.office.com
unknown
http://www.otirugkyt.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
http://www.lolabeautystudios.comReferer:
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://schemas.micr
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://www.lolabeautystudios.com/gs12/
unknown
http://www.udin88b.usReferer:
unknown
http://www.baansbliss.com/gs12/www.otirugkyt.com
unknown
http://www.kustomequipment.com/gs12/www.novistashop.com
unknown
http://www.carterandcone.coml
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.udin88b.us/gs12/
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
http://www.hjgd.xyz/gs12/
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.airzf.com/gs12/
unknown
http://www.demandstudiosnews.com
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://outlook.com_
unknown
http://www.heavydutywearpart.com
unknown
http://www.novistashop.comReferer:
unknown
http://www.bodution.website/gs12/www.juniavilela.com
unknown
http://www.demandstudiosnews.comReferer:
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
http://www.demandstudiosnews.com/gs12/
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://www.bodution.websiteReferer:
unknown
http://www.fontbureau.com/designersG
unknown
http://schemas.mi
unknown
http://www.nexelab.com/gs12/www.udin88b.us
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.lolabeautystudios.com/gs12/www.kustomequipment.com
unknown
http://www.fontbureau.com/designers?
unknown
http://www.heavydutywearpart.com/gs12/www.goldenvistaservices.com
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
http://www.tiro.com
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
http://www.bodution.website/gs12/
unknown
http://www.goodfont.co.kr
unknown
http://www.juniavilela.comReferer:
unknown
http://www.novistashop.com
unknown
http://www.udin88b.us/gs12/www.baansbliss.com
unknown
http://schemas.micro
unknown
http://www.zdryueva.com/gs12/www.hjgd.xyz
unknown
http://www.goldenvistaservices.comReferer:
unknown
http://www.goldenvistaservices.com/gs12/
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
http://www.nexelab.com
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
http://www.fonts.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.airzf.com
154.12.38.29
malicious
www.b-a-s-e.net
91.195.240.94
malicious
www.bodution.website
160.124.174.163
malicious
td-ccm-neg-87-45.wixdns.net
34.149.87.45
malicious
www.zdryueva.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
91.195.240.94
www.b-a-s-e.net
Germany
malicious
154.12.38.29
www.airzf.com
United States
malicious
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
There are 37 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
27B0000
system
page execute and read and write
malicious
4129000
trusted library allocation
page read and write
malicious
4640000
trusted library allocation
page read and write
malicious
2C40000
system
page execute and read and write
malicious
4969000
trusted library allocation
page read and write
malicious
47D8000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4610000
unclassified section
page execute and read and write
malicious
A4AB000
unkown
page read and write
A01A000
stack
page read and write
4B83000
trusted library allocation
page read and write
7FF5ED74A000
unkown
page readonly
4CD0000
unkown
page read and write
7FF5ED996000
unkown
page readonly
30D6000
trusted library allocation
page read and write
C08A000
stack
page read and write
B8C0000
unkown
page readonly
A379000
unkown
page read and write
C6C1000
unkown
page read and write
BCD000
stack
page read and write
D5A000
trusted library allocation
page execute and read and write
7CE0000
unkown
page read and write
2A10000
heap
page read and write
37AE000
unkown
page read and write
2F1B000
heap
page read and write
C6F8000
unkown
page read and write
1480000
direct allocation
page execute and read and write
7DDA000
stack
page read and write
C5A3000
unkown
page read and write
BD98000
stack
page read and write
F9A0000
unkown
page read and write
C700000
unkown
page read and write
89A0000
unkown
page read and write
C962000
unkown
page read and write
4CD0000
unkown
page read and write
3756000
unkown
page read and write
F744000
unkown
page read and write
473B000
heap
page read and write
A300000
trusted library allocation
page read and write
CB81000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
7FF5ED279000
unkown
page readonly
16CE000
stack
page read and write
B70000
heap
page read and write
53FE000
stack
page read and write
4920000
trusted library allocation
page read and write
7FF5ED937000
unkown
page readonly
7208000
heap
page read and write
7FF5D1CCD000
unkown
page readonly
146B000
trusted library allocation
page execute and read and write
C4D0000
unkown
page read and write
979C000
unkown
page read and write
2F2C000
heap
page read and write
A494000
unkown
page read and write
B728000
stack
page read and write
7FF5ED3DA000
unkown
page readonly
F84B000
unkown
page read and write
C544000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
97C3000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
7FF5ED806000
unkown
page readonly
2E60000
heap
page read and write
B52F000
stack
page read and write
7CA0000
unkown
page read and write
7FF5ED3DA000
unkown
page readonly
3220000
unkown
page readonly
7FF5ED586000
unkown
page readonly
7DF4F3031000
unkown
page execute read
B8AB000
stack
page read and write
FB22000
heap
page read and write
55E2000
trusted library allocation
page read and write
FA02000
unkown
page read and write
15A9000
direct allocation
page execute and read and write
C5AA000
unkown
page read and write
B140000
unkown
page readonly
8FB9000
stack
page read and write
1210000
unkown
page readonly
1230000
unkown
page read and write
A3BE000
unkown
page read and write
5A5C000
heap
page read and write
2C79000
heap
page read and write
9885000
unkown
page read and write
F842000
unkown
page read and write
2AC1000
trusted library allocation
page read and write
4C4B000
unkown
page read and write
1510000
unkown
page readonly
2B14000
heap
page read and write
7FF5EDA76000
unkown
page readonly
A37D000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
FD0000
heap
page read and write
C846000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
C6F4000
unkown
page read and write
7FF5ED821000
unkown
page readonly
C92D000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
BC9B000
stack
page read and write
5460000
heap
page read and write
37A8000
unkown
page read and write
3B08000
trusted library allocation
page read and write
3758000
unkown
page read and write
37BD000
unkown
page read and write
7FF5ED814000
unkown
page readonly
7FF5ED942000
unkown
page readonly
2E10000
heap
page read and write
28D0000
heap
page read and write
C9BF000
stack
page read and write
AAF6000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
B37000
stack
page read and write
7FF5ED806000
unkown
page readonly
A4AB000
unkown
page read and write
F380000
unkown
page execute and read and write
7FF5ED625000
unkown
page readonly
C63E000
stack
page read and write
8B60000
unkown
page readonly
58B0000
heap
page read and write
1190000
heap
page read and write
A37B000
unkown
page read and write
AB03000
unkown
page read and write
C5A0000
unkown
page read and write
B640000
unkown
page read and write
AADB000
unkown
page read and write
5470000
heap
page read and write
C6BF000
unkown
page read and write
4617000
trusted library allocation
page read and write
A323000
unkown
page read and write
52C0000
trusted library allocation
page execute and read and write
28BE000
stack
page read and write
106D000
direct allocation
page execute and read and write
7FF5ED9D9000
unkown
page readonly
8720000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
146D000
trusted library allocation
page execute and read and write
7225000
heap
page read and write
7FF5ED735000
unkown
page readonly
2D01000
trusted library allocation
page read and write
767A000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
7CA0000
unkown
page read and write
F9D1000
unkown
page read and write
2C79000
heap
page read and write
5580000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
4AC8000
trusted library allocation
page read and write
7FF5ED8AC000
unkown
page readonly
B82A000
stack
page read and write
F7CB000
unkown
page read and write
9D64000
unkown
page read and write
B5AE000
stack
page read and write
A479000
unkown
page read and write
A327000
unkown
page read and write
1890000
unclassified section
page execute and read and write
4BC9000
unkown
page read and write
C6F2000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
AF8D000
stack
page read and write
3800000
unkown
page readonly
4B78000
unkown
page read and write
58B5000
heap
page read and write
2B14000
heap
page read and write
2BA0000
trusted library allocation
page read and write
7FF5EDA38000
unkown
page readonly
B08D000
stack
page read and write
AE7000
heap
page read and write
8208000
stack
page read and write
977A000
unkown
page read and write
7FF5ED337000
unkown
page readonly
3B37000
trusted library allocation
page read and write
A19F000
stack
page read and write
10C0000
unkown
page readonly
17C0000
heap
page read and write
E64000
heap
page read and write
987D000
unkown
page read and write
9B60000
unkown
page readonly
7FF5ED8A4000
unkown
page readonly
47E1000
heap
page read and write
48DE000
stack
page read and write
3797000
unkown
page read and write
C34000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
1186000
trusted library allocation
page execute and read and write
14B0000
trusted library allocation
page read and write
3700000
unkown
page read and write
4C41000
direct allocation
page execute and read and write
785E000
stack
page read and write
55C0000
heap
page read and write
C8E1000
unkown
page read and write
2DD4000
heap
page read and write
7FF5ED975000
unkown
page readonly
2F2C000
heap
page read and write
7FF5ED872000
unkown
page readonly
7865000
unkown
page read and write
89C0000
unkown
page read and write
B170000
unkown
page readonly
31C0000
heap
page read and write
174D000
direct allocation
page execute and read and write
9740000
trusted library allocation
page execute and read and write
7FF5ED697000
unkown
page readonly
C962000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
9871000
unkown
page read and write
CA7C000
unkown
page read and write
47A000
stack
page read and write
7FF5ED5C9000
unkown
page readonly
10DE000
direct allocation
page execute and read and write
6C8D000
heap
page read and write
797D000
unkown
page read and write
7D53000
unkown
page read and write
CAB3000
unkown
page read and write
4C60000
unkown
page read and write
37F9000
unkown
page read and write
2C73000
heap
page read and write
7F30000
unkown
page read and write
273C000
stack
page read and write
B728000
stack
page read and write
7FF5ED5C9000
unkown
page readonly
4CC6000
unclassified section
page read and write
7FF5ED915000
unkown
page readonly
C6CF000
unkown
page read and write
C6C1000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
CB88000
unkown
page read and write
28CE000
unkown
page read and write
AAD1000
unkown
page read and write
2F26000
heap
page read and write
1173000
trusted library allocation
page read and write
C561000
unkown
page read and write
36D3000
stack
page read and write
D67000
trusted library allocation
page execute and read and write
52B0000
heap
page read and write
C7C5000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
56C3000
unkown
page read and write
17EB000
unclassified section
page execute and read and write
1800000
unclassified section
page execute and read and write
7950000
unkown
page read and write
8208000
stack
page read and write
B150000
unkown
page read and write
1040000
heap
page read and write
43D000
stack
page read and write
17D0000
unclassified section
page execute and read and write
CABB000
unkown
page read and write
D90000
trusted library allocation
page read and write
1490000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
2C6C000
heap
page read and write
A310000
unkown
page read and write
79FB000
unkown
page read and write
2E9E000
stack
page read and write
A21E000
stack
page read and write
3AC9000
trusted library allocation
page read and write
7FF5ED86B000
unkown
page readonly
1480000
heap
page read and write
CBBE000
stack
page read and write
7FF5ED853000
unkown
page readonly
7B0E000
stack
page read and write
7FF5ED850000
unkown
page readonly
7FF5ED886000
unkown
page readonly
B00B000
stack
page read and write
7FF5ED9B8000
unkown
page readonly
7FF5ED7CF000
unkown
page readonly
95DB000
stack
page read and write
379E000
unkown
page read and write
4FC0000
heap
page read and write
7FF5ED8C6000
unkown
page readonly
C5AA000
unkown
page read and write
CA20000
unkown
page read and write
7F2E000
stack
page read and write
C6F8000
unkown
page read and write
56D9000
unkown
page read and write
7FF5ED996000
unkown
page readonly
43D000
stack
page read and write
7847000
unkown
page read and write
9929000
unkown
page read and write
7FF5ED71B000
unkown
page readonly
89A0000
unkown
page read and write
7FF5ED670000
unkown
page readonly
87D1000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
37BD000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
314F000
unkown
page read and write
CABB000
unkown
page read and write
4B93000
unkown
page read and write
491F000
stack
page read and write
1500000
heap
page read and write
7884000
unkown
page read and write
7FF5ED853000
unkown
page readonly
1726000
trusted library allocation
page read and write
4C50000
unkown
page read and write
C54A000
unkown
page read and write
986B000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
8EC6000
unkown
page read and write
1505000
heap
page read and write
7E39000
unkown
page read and write
C8E1000
unkown
page read and write
97C3000
unkown
page read and write
499D000
heap
page read and write
5B50000
trusted library section
page read and write
5641000
unkown
page read and write
4A99000
trusted library allocation
page read and write
D08E000
stack
page read and write
4C1E000
unkown
page read and write
C4A0000
unkown
page read and write
98A8000
unkown
page read and write
89E0000
unkown
page read and write
7FF5ED507000
unkown
page readonly
F783000
unkown
page read and write
258F000
unkown
page read and write
7FF5ED644000
unkown
page readonly
7D7E000
stack
page read and write
A33E000
unkown
page read and write
7FF5ED286000
unkown
page readonly
A4A1000
unkown
page read and write
9877000
unkown
page read and write
C893000
unkown
page read and write
2A40000
trusted library allocation
page read and write
48EA000
heap
page read and write
D20E000
stack
page read and write
C6D9000
unkown
page read and write
BDC0000
unkown
page readonly
4618000
heap
page read and write
37F6000
unkown
page read and write
7FF5EDA47000
unkown
page readonly
7FF5ED39E000
unkown
page readonly
2B14000
heap
page read and write
C73F000
stack
page read and write
7FF5ED864000
unkown
page readonly
7847000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
2C73000
heap
page read and write
7CE0000
unkown
page read and write
37F2000
unkown
page read and write
88EE000
stack
page read and write
4CE0000
unkown
page read and write
FA02000
unkown
page read and write
7FF5ED519000
unkown
page readonly
55F3000
heap
page read and write
D34000
trusted library allocation
page read and write
8860000
unkown
page read and write
1350000
unkown
page readonly
C6BF000
unkown
page read and write
CBB0000
unkown
page read and write
7227000
heap
page read and write
F859000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
7182000
trusted library allocation
page read and write
CBBB000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
4610000
trusted library allocation
page read and write
7200000
heap
page read and write
2B14000
heap
page read and write
860000
system
page execute and read and write
C8BE000
stack
page read and write
3220000
unkown
page readonly
79D3000
unkown
page read and write
7FF5ED534000
unkown
page readonly
37D2000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
B6A0000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
265D000
stack
page read and write
2990000
heap
page read and write
8EFB000
unkown
page read and write
D62000
trusted library allocation
page read and write
7FF5ED93B000
unkown
page readonly
11D1000
heap
page read and write
F7C6000
unkown
page read and write
7F30000
unkown
page read and write
3338000
trusted library allocation
page read and write
283E000
stack
page read and write
7FF5ED8FF000
unkown
page readonly
11B0000
unkown
page readonly
9D64000
unkown
page read and write
7DDA000
stack
page read and write
4ACA000
heap
page read and write
A21E000
stack
page read and write
7DF4F3040000
unkown
page readonly
E4A0000
unkown
page read and write
7FF5ED793000
unkown
page readonly
7FF5ED476000
unkown
page readonly
4BDC000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
3290000
unkown
page read and write
C6F2000
unkown
page read and write
A37B000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
BDC0000
unkown
page readonly
896B000
stack
page read and write
7F40000
unkown
page readonly
7F40000
unkown
page readonly
2B20000
trusted library allocation
page read and write
7953000
unkown
page read and write
B8AB000
stack
page read and write
F84B000
unkown
page read and write
7FF5ED810000
unkown
page readonly
36F0000
unkown
page readonly
7FF5ED818000
unkown
page readonly
7FF5ED5C1000
unkown
page readonly
A39B000
unkown
page read and write
7FF5ED1EA000
unkown
page readonly
9DED000
stack
page read and write
C6CF000
unkown
page read and write
7FF5ED750000
unkown
page readonly
7FF5ED64F000
unkown
page readonly
C507000
unkown
page read and write
3738000
unkown
page read and write
AAF2000
unkown
page read and write
25F7000
heap
page read and write
11F1000
direct allocation
page execute and read and write
7FF5ED1D6000
unkown
page readonly
7FFD000
stack
page read and write
C77E000
stack
page read and write
1210000
unkown
page readonly
37B0000
unkown
page read and write
7867000
unkown
page read and write
37F9000
unkown
page read and write
786B000
unkown
page read and write
7FF5ED342000
unkown
page readonly
7FF5ED1F0000
unkown
page readonly
10D0000
heap
page read and write
4912000
heap
page read and write
A491000
unkown
page read and write
3209000
stack
page read and write
A375000
unkown
page read and write
3700000
unkown
page read and write
7DF4F3041000
unkown
page execute read
7FF5ED534000
unkown
page readonly
7FF5EDA31000
unkown
page readonly
7852000
unkown
page read and write
2B10000
heap
page read and write
306E000
stack
page read and write
987F000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
863000
system
page execute and read and write
784A000
unkown
page read and write
9F1E000
stack
page read and write
2A70000
heap
page read and write
7FF5EDA08000
unkown
page readonly
C4D0000
unkown
page read and write
1720000
trusted library allocation
page read and write
986B000
unkown
page read and write
CE4E000
stack
page read and write
35D0000
unkown
page read and write
47B0000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
2D51000
heap
page read and write
7FF5ED503000
unkown
page readonly
9893000
unkown
page read and write
CA5E000
stack
page read and write
CD0E000
stack
page read and write
2C50000
heap
page read and write
C41F000
stack
page read and write
2F26000
heap
page read and write
9660000
unkown
page read and write
7FF5ED404000
unkown
page readonly
30BB000
trusted library allocation
page read and write
5B80000
trusted library section
page read and write
7FF5ED52F000
unkown
page readonly
4E92000
direct allocation
page execute and read and write
58F0000
trusted library allocation
page read and write
2F26000
heap
page read and write
7FF5ED471000
unkown
page readonly
7FF5EDA69000
unkown
page readonly
CA42000
unkown
page read and write
785B000
unkown
page read and write
D30000
trusted library allocation
page read and write
BD98000
stack
page read and write
4C34000
unkown
page read and write
7FF5ED670000
unkown
page readonly
9ADC000
stack
page read and write
7FF5ED9C6000
unkown
page readonly
A491000
unkown
page read and write
3795000
unkown
page read and write
C87F000
stack
page read and write
3210000
unkown
page read and write
C50A000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
C700000
unkown
page read and write
4B8B000
unkown
page read and write
10D0000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
9795000
unkown
page read and write
785D000
unkown
page read and write
5A0D000
stack
page read and write
2C73000
heap
page read and write
1030000
heap
page read and write
7FF5ED803000
unkown
page readonly
7FF5ED2A9000
unkown
page readonly
4688000
trusted library allocation
page read and write
28A0000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
7FF5ED818000
unkown
page readonly
3240000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
7FF5ED9C6000
unkown
page readonly
7FF5ED9F2000
unkown
page readonly
2DD4000
heap
page read and write
2F1B000
heap
page read and write
10CE000
stack
page read and write
DD0000
unkown
page readonly
7FF5ED8C1000
unkown
page readonly
4C79000
direct allocation
page execute and read and write
97AD000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
97B5000
unkown
page read and write
A37D000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
7FF5ED26E000
unkown
page readonly
AA90000
unkown
page read and write
7D53000
unkown
page read and write
790E000
stack
page read and write
47A000
stack
page read and write
6DFE000
stack
page read and write
7FF5ED669000
unkown
page readonly
AAFF000
unkown
page read and write
7FF5ED4BB000
unkown
page readonly
7DF4F3071000
unkown
page execute read
7867000
unkown
page read and write
CA20000
unkown
page read and write
D56000
trusted library allocation
page execute and read and write
A494000
unkown
page read and write
79B1000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
7FF5ED5C1000
unkown
page readonly
1460000
trusted library allocation
page read and write
4C18000
unkown
page read and write
1490000
heap
page read and write
7FF5ED625000
unkown
page readonly
7884000
unkown
page read and write
2B14000
heap
page read and write
7FF5ED743000
unkown
page readonly
C57F000
unkown
page read and write
AAF6000
unkown
page read and write
7DF4F3071000
unkown
page execute read
7FF5ED7C4000
unkown
page readonly
3580000
unkown
page readonly
2B20000
trusted library allocation
page read and write
9873000
unkown
page read and write
7861000
unkown
page read and write
7857000
unkown
page read and write
F842000
unkown
page read and write
7FF5ED660000
unkown
page readonly
7FF5ED810000
unkown
page readonly
7FF5ED9B8000
unkown
page readonly
4670000
trusted library allocation
page execute and read and write
2B14000
heap
page read and write
1206000
direct allocation
page execute and read and write
2B20000
trusted library allocation
page read and write
A19F000
stack
page read and write
8DA0000
unkown
page read and write
2A66000
trusted library allocation
page read and write
C49E000
stack
page read and write
BDA0000
unkown
page readonly
7FF5ED52F000
unkown
page readonly
C512000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
5600000
trusted library allocation
page execute and read and write
7FF5ED20D000
unkown
page readonly
52F0000
heap
page execute and read and write
2AF0000
heap
page read and write
A32A000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
2F08000
heap
page read and write
943B000
stack
page read and write
7FF5ED68F000
unkown
page readonly
C503000
unkown
page read and write
7852000
unkown
page read and write
7FF5ED975000
unkown
page readonly
5690000
heap
page read and write
7E11000
unkown
page read and write
76C0000
unkown
page read and write
8FB000
stack
page read and write
5A10000
heap
page read and write
9E6C000
stack
page read and write
7FF5ED933000
unkown
page readonly
28FC000
stack
page read and write
73FE000
stack
page read and write
A379000
unkown
page read and write
987B000
unkown
page read and write
A375000
unkown
page read and write
1200000
unkown
page readonly
7FF5ED3F3000
unkown
page readonly
7FF5ED9ED000
unkown
page readonly
B190000
unkown
page read and write
87BE000
stack
page read and write
30B0000
trusted library allocation
page read and write
4B0000
heap
page read and write
7FF5ED750000
unkown
page readonly
9875000
unkown
page read and write
F9DD000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
7C90000
unkown
page read and write
DBE000
heap
page read and write
7FF5ED41C000
unkown
page readonly
29DF000
unkown
page read and write
2B20000
trusted library allocation
page read and write
88EE000
stack
page read and write
C6E3000
unkown
page read and write
2C73000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
B72000
unkown
page readonly
7FF5ED412000
unkown
page readonly
7C7E000
stack
page read and write
2C1E000
stack
page read and write
7FF5ED7C4000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
8720000
unkown
page readonly
7A10000
trusted library allocation
page read and write
3240000
unkown
page read and write
AADB000
unkown
page read and write
7FF5ED779000
unkown
page readonly
1500000
direct allocation
page execute and read and write
1467000
trusted library allocation
page execute and read and write
A3A000
stack
page read and write
2B14000
heap
page read and write
2B14000
heap
page read and write
3AC1000
trusted library allocation
page read and write
768A000
heap
page read and write
C825000
trusted library allocation
page read and write
7FF5ED9CC000
unkown
page readonly
A8E000
stack
page read and write
B8C0000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
310E000
stack
page read and write
7B80000
unkown
page read and write
C964000
unkown
page read and write
DCF000
heap
page read and write
7FF5ED800000
unkown
page readonly
5FC000
stack
page read and write
5680000
trusted library section
page readonly
7FF5ED933000
unkown
page readonly
2BF3000
unclassified section
page execute and read and write
5090000
heap
page read and write
7FF5ED433000
unkown
page readonly
1240000
heap
page read and write
9871000
unkown
page read and write
35A0000
unkown
page readonly
275D000
stack
page read and write
C08A000
stack
page read and write
96DF000
unkown
page read and write
97D4000
unkown
page read and write
7B80000
unkown
page read and write
7FF5ED471000
unkown
page readonly
9792000
unkown
page read and write
7FF5ED507000
unkown
page readonly
7FF5ED68F000
unkown
page readonly
7FF5ED602000
unkown
page readonly
2F26000
heap
page read and write
A4B8000
unkown
page read and write
4121000
trusted library allocation
page read and write
5900000
heap
page execute and read and write
9881000
unkown
page read and write
564E000
stack
page read and write
A01B000
stack
page read and write
197A000
unclassified section
page execute and read and write
37F6000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
6FC0000
trusted library allocation
page execute and read and write
7FF5D1CD4000
unkown
page readonly
C89C000
unkown
page read and write
7FF5ED928000
unkown
page readonly
7FF5ED503000
unkown
page readonly
A364000
unkown
page read and write
7FF5ED961000
unkown
page readonly
D43000
trusted library allocation
page read and write
7FF5ED342000
unkown
page readonly
3290000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
7FF5ED793000
unkown
page readonly
5070000
heap
page read and write
2B14000
heap
page read and write
B140000
unkown
page readonly
4710000
trusted library allocation
page execute and read and write
7FF5ED433000
unkown
page readonly
BAF9000
stack
page read and write
7FF5ED349000
unkown
page readonly
7FF5ED9A6000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
1230000
unkown
page read and write
B80000
heap
page read and write
1731000
direct allocation
page execute and read and write
7FF5ED64F000
unkown
page readonly
37A0000
unkown
page read and write
4970000
direct allocation
page execute and read and write
C544000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
10C3F000
system
page read and write
CA42000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
C846000
unkown
page read and write
14B0000
unkown
page readonly
7FF5ED516000
unkown
page readonly
7FF5ED9A1000
unkown
page readonly
2DD4000
heap
page read and write
F9E6000
unkown
page read and write
3150000
trusted library allocation
page read and write
8210000
unkown
page read and write
2B14000
heap
page read and write
4BA6000
unkown
page read and write
7DF4F3030000
unkown
page readonly
34E9000
stack
page read and write
7FF5ED87D000
unkown
page readonly
9795000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
4CC0000
unkown
page read and write
7FF5ED4E8000
unkown
page readonly
E1E000
stack
page read and write
9873000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
7FF5ED644000
unkown
page readonly
33B9000
stack
page read and write
2900000
trusted library allocation
page read and write
C516000
unkown
page read and write
F859000
unkown
page read and write
7863000
unkown
page read and write
15CF000
stack
page read and write
7DF4F3051000
unkown
page execute read
1480000
heap
page read and write
6FA0000
trusted library allocation
page read and write
D3D000
trusted library allocation
page execute and read and write
7FF5ED77C000
unkown
page readonly
B629000
stack
page read and write
BA6F000
stack
page read and write
D1CC000
stack
page read and write
1164000
trusted library allocation
page read and write
14C0000
heap
page read and write
7FF5ED586000
unkown
page readonly
89E0000
unkown
page read and write
986F000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
C88B000
unkown
page read and write
AC0000
heap
page read and write
9869000
unkown
page read and write
DDF000
stack
page read and write
9815000
unkown
page read and write
3797000
unkown
page read and write
AAF2000
unkown
page read and write
1480000
trusted library allocation
page read and write
7FF5ED451000
unkown
page readonly
5590000
unkown
page write copy
7FF5ED39B000
unkown
page readonly
5560000
trusted library allocation
page read and write
9A10000
unkown
page read and write
7FF5ED850000
unkown
page readonly
C507000
unkown
page read and write
7160000
trusted library allocation
page read and write
7FF5ED409000
unkown
page readonly
DD7000
heap
page read and write
71F0000
trusted library allocation
page read and write
A33E000
unkown
page read and write
4B90000
unkown
page read and write
F2D000
trusted library allocation
page execute and read and write
BD1D000
stack
page read and write
3110000
heap
page execute and read and write
1300000
unclassified section
page execute and read and write
37D2000
unkown
page read and write
FB22000
heap
page read and write
7FF5ED7E9000
unkown
page readonly
2DD4000
heap
page read and write
8A6E000
stack
page read and write
97AD000
unkown
page read and write
9138000
stack
page read and write
AA90000
unkown
page read and write
482E000
stack
page read and write
7FF5ED7FD000
unkown
page readonly
7DF4F3050000
unkown
page readonly
C561000
unkown
page read and write
DD0000
unkown
page readonly
7C80000
unkown
page read and write
C4A0000
unkown
page read and write
30F0000
trusted library allocation
page read and write
7FF5ED74A000
unkown
page readonly
7FF5ED844000
unkown
page readonly
7D00000
unkown
page readonly
7FF5ED9A6000
unkown
page readonly
C6E3000
unkown
page read and write
8EFB000
unkown
page read and write
8B60000
unkown
page readonly
7FF5ED849000
unkown
page readonly
7FF5EDA11000
unkown
page readonly
2915000
trusted library allocation
page read and write
255E000
unkown
page read and write
2A1E000
stack
page read and write
9660000
unkown
page read and write
37A8000
unkown
page read and write
8000000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
B22B000
stack
page read and write
7FF5ED3F3000
unkown
page readonly
7CD0000
unkown
page read and write
965C000
stack
page read and write
A361000
unkown
page read and write
CE0E000
stack
page read and write
A50B000
unkown
page read and write
A11F000
stack
page read and write
1490000
unkown
page read and write
47B0000
trusted library allocation
page read and write
1198000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
7FF5EDA14000
unkown
page readonly
4B50000
direct allocation
page execute and read and write
7FF5ED77C000
unkown
page readonly
12AB000
unclassified section
page execute and read and write
4C5C000
stack
page read and write
9977000
unkown
page read and write
FC0000
trusted library allocation
page read and write
8710000
unkown
page readonly
3180000
unkown
page read and write
F7C6000
unkown
page read and write
47E1000
heap
page read and write
9879000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
7FF5ED660000
unkown
page readonly
3748000
unkown
page read and write
3758000
unkown
page read and write
4BE1000
unkown
page read and write
7FF5ED939000
unkown
page readonly
7FF5ED847000
unkown
page readonly
F704000
unkown
page read and write
78A0000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
7FF5ED210000
unkown
page readonly
7560000
heap
page read and write
26DA000
heap
page read and write
7FF5ED4B0000
unkown
page readonly
BB0000
heap
page read and write
3105000
trusted library allocation
page read and write
7FF5ED602000
unkown
page readonly
A90000
heap
page read and write
259F000
unkown
page read and write
C49E000
stack
page read and write
BD0000
trusted library allocation
page execute and read and write
7FF5EDA0D000
unkown
page readonly
7FF5ED867000
unkown
page readonly
7FF5ED77E000
unkown
page readonly
DE0000
unkown
page readonly
BDD0000
unkown
page readonly
B10D000
stack
page read and write
7FF5ED986000
unkown
page readonly
7FF5ED445000
unkown
page readonly
F91C000
system
page execute and read and write
C54A000
unkown
page read and write
A290000
trusted library section
page read and write
B8B0000
unkown
page read and write
71FA000
trusted library allocation
page read and write
2C6E000
heap
page read and write
7FF5ED81B000
unkown
page readonly
7FF5ED286000
unkown
page readonly
1163000
trusted library allocation
page execute and read and write
2F00000
heap
page read and write
10C0000
unkown
page readonly
4EBF000
unclassified section
page read and write
4C0000
heap
page read and write
7FF5ED451000
unkown
page readonly
4FD2000
trusted library allocation
page read and write
785B000
unkown
page read and write
97D4000
unkown
page read and write
CAB3000
unkown
page read and write
9138000
stack
page read and write
A29E000
stack
page read and write
982D000
unkown
page read and write
27FE000
stack
page read and write
9DED000
stack
page read and write
AB06000
unkown
page read and write
7FF5ED803000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
2910000
trusted library allocation
page read and write
7DF4F3031000
unkown
page execute read
7FF5ED5F7000
unkown
page readonly
D30E000
stack
page read and write
1451000
unkown
page readonly
8BE9000
stack
page read and write
2C73000
heap
page read and write
7D40000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
7FF5ED956000
unkown
page readonly
5465000
heap
page read and write
B22B000
stack
page read and write
9879000
unkown
page read and write
F9E6000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
5A64000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
4A99000
direct allocation
page execute and read and write
C857000
unkown
page read and write
906E000
stack
page read and write
91B9000
stack
page read and write
7FF5ED1CB000
unkown
page readonly
7FF5ED9A1000
unkown
page readonly
B650000
unkown
page read and write
C52C000
unkown
page read and write
7F2E000
stack
page read and write
3590000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
784A000
unkown
page read and write
FC4000
trusted library allocation
page read and write
C516000
unkown
page read and write
5557000
stack
page read and write
97A9000
unkown
page read and write
109DA000
system
page execute and read and write
F9D1000
unkown
page read and write
2930000
heap
page read and write
F7CB000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
1288000
direct allocation
page execute and read and write
5084000
trusted library section
page readonly
C57F000
unkown
page read and write
4CB0000
unkown
page read and write
7FF5ED942000
unkown
page readonly
7FF5ED821000
unkown
page readonly
7CC0000
unkown
page readonly
1170000
trusted library allocation
page read and write
7FF5ED68C000
unkown
page readonly
143B000
stack
page read and write
AE0000
heap
page read and write
7FF5EDA69000
unkown
page readonly
FB2A000
heap
page read and write
7FF5ED814000
unkown
page readonly
C51E000
unkown
page read and write
2BF0000
unclassified section
page execute and read and write
2A61000
trusted library allocation
page read and write
7FF5ED4B4000
unkown
page readonly
1440000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
C893000
unkown
page read and write
4B50000
unkown
page read and write
47EF000
stack
page read and write
2C6A000
heap
page read and write
7FF5ED41C000
unkown
page readonly
7660000
heap
page read and write
4BE3000
unkown
page read and write
7FF5EDA08000
unkown
page readonly
9A5B000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
DBA000
heap
page read and write
987B000
unkown
page read and write
9977000
unkown
page read and write
C557000
unkown
page read and write
3590000
unkown
page read and write
33B9000
stack
page read and write
4C1E000
unkown
page read and write
37A0000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
2B14000
heap
page read and write
7FF5ED743000
unkown
page readonly
47EF000
heap
page read and write
F9A0000
unkown
page read and write
756E000
heap
page read and write
F744000
unkown
page read and write
9F1E000
stack
page read and write
BDA0000
unkown
page readonly
A4AE000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
4AC6000
heap
page read and write
7DF4F3050000
unkown
page readonly
1880000
heap
page read and write
4E1D000
direct allocation
page execute and read and write
506B000
stack
page read and write
BD1D000
stack
page read and write
7FF5ED449000
unkown
page readonly
9883000
unkown
page read and write
7976000
unkown
page read and write
B650000
unkown
page read and write
7953000
unkown
page read and write
78AD000
unkown
page read and write
4B93000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
91B9000
stack
page read and write
7F840000
trusted library allocation
page execute and read and write
37AC000
unkown
page read and write
7FF5ED519000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
1112F000
system
page read and write
7FF5ED9FF000
unkown
page readonly
7865000
unkown
page read and write
B629000
stack
page read and write
C6C9000
unkown
page read and write
7FF5ED714000
unkown
page readonly
56D9000
unkown
page read and write
B2AC000
stack
page read and write
3738000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
1451000
unkown
page readonly
1730000
trusted library allocation
page execute and read and write
1830000
unclassified section
page execute and read and write
AF0A000
stack
page read and write
8210000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
D0CB000
stack
page read and write
9550000
unkown
page readonly
2C6F000
heap
page read and write
970000
heap
page read and write
DC7000
stack
page read and write
7FF5ED62F000
unkown
page readonly
76A0000
unkown
page read and write
A364000
unkown
page read and write
7D40000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
4BE3000
unkown
page read and write
543E000
stack
page read and write
4BE1000
unkown
page read and write
EFB000
stack
page read and write
8000000
unkown
page read and write
7978000
unkown
page read and write
495F000
heap
page read and write
55F0000
heap
page read and write
B4A5000
stack
page read and write
5BA0000
trusted library allocation
page read and write
8108000
stack
page read and write
2C70000
heap
page read and write
C92D000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
9798000
unkown
page read and write
CCBE000
stack
page read and write
A50B000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
5641000
unkown
page read and write
7E3F000
unkown
page read and write
2B14000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
4B50000
unkown
page read and write
2D51000
heap
page read and write
F804000
unkown
page read and write
2CCC000
trusted library allocation
page read and write
89C0000
unkown
page read and write
7FF5ED409000
unkown
page readonly
9550000
unkown
page readonly
4A9D000
direct allocation
page execute and read and write
36D5000
stack
page read and write
AB4E000
unkown
page read and write
7FF5EDA47000
unkown
page readonly
F9AC000
unkown
page read and write
7DF4F3061000
unkown
page execute read
7C80000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
986F000
unkown
page read and write
C563000
unkown
page read and write
10D0000
heap
page read and write
7FF5ED990000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
3439000
stack
page read and write
7FF5ED674000
unkown
page readonly
7FF5ED59E000
unkown
page readonly
7FF5ED7D6000
unkown
page readonly
335F000
trusted library allocation
page read and write
B00B000
stack
page read and write
53AF000
unclassified section
page read and write
4E21000
direct allocation
page execute and read and write
4B0E000
direct allocation
page execute and read and write
3210000
unkown
page read and write
2CA0000
heap
page read and write
87D1000
unkown
page read and write
7FF5ED449000
unkown
page readonly
7FF5ED8C1000
unkown
page readonly
7FF5EDA0B000
unkown
page readonly
DE0000
unkown
page readonly
7FF5ED3D0000
unkown
page readonly
4CC0000
unkown
page read and write
7FF5ED779000
unkown
page readonly
7FF5ED5A8000
unkown
page readonly
7FF5ED556000
unkown
page readonly
14B0000
unkown
page readonly
7FF5ED349000
unkown
page readonly
2A3F000
stack
page read and write
2B20000
trusted library allocation
page read and write
7FF5ED40D000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
143B000
stack
page read and write
7FF5ED71E000
unkown
page readonly
4523000
trusted library allocation
page read and write
C503000
unkown
page read and write
7FF5ED295000
unkown
page readonly
982D000
unkown
page read and write
818E000
stack
page read and write
4439000
trusted library allocation
page read and write
5093000
heap
page read and write
7FF5ED404000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
C89C000
unkown
page read and write
7FF5ED864000
unkown
page readonly
9798000
unkown
page read and write
3209000
stack
page read and write
D20000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
7FF5ED986000
unkown
page readonly
7DF4F3040000
unkown
page readonly
7FF5EDA76000
unkown
page readonly
37AE000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
7FF5ED714000
unkown
page readonly
8BF0000
unkown
page readonly
7695000
stack
page read and write
7FF5ED915000
unkown
page readonly
BF0000
heap
page read and write
9885000
unkown
page read and write
47C1000
heap
page read and write
7FF5ED847000
unkown
page readonly
8860000
unkown
page read and write
5590000
unkown
page write copy
2CFF000
trusted library allocation
page read and write
4BDC000
unkown
page read and write
7FF5ED8B4000
unkown
page readonly
C9FC000
stack
page read and write
4920000
trusted library allocation
page read and write
7FF5ED800000
unkown
page readonly
7FF5ED867000
unkown
page readonly
8810000
heap
page read and write
277C000
stack
page read and write
7976000
unkown
page read and write
2B20000
trusted library allocation
page read and write
46F8000
trusted library allocation
page read and write
93BE000
stack
page read and write
2B20000
trusted library allocation
page read and write
A4AE000
unkown
page read and write
A361000
unkown
page read and write
7FF5EDA38000
unkown
page readonly
52E0000
trusted library allocation
page read and write
3795000
unkown
page read and write
25F0000
heap
page read and write
30CE000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
DB0000
heap
page read and write
3791000
unkown
page read and write
2EDF000
stack
page read and write
C50E000
stack
page read and write
1510000
unkown
page readonly
B190000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
4B90000
unkown
page read and write
2BA0000
trusted library allocation
page read and write
1542000
direct allocation
page execute and read and write
254E000
unkown
page read and write
FB20000
heap
page read and write
7978000
unkown
page read and write
987D000
unkown
page read and write
145E000
stack
page read and write
A49E000
unkown
page read and write
7FF5ED980000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
2C6F000
stack
page read and write
5000000
trusted library allocation
page read and write
3180000
unkown
page read and write
9883000
unkown
page read and write
55E0000
trusted library allocation
page read and write
F704000
unkown
page read and write
2E1F000
stack
page read and write
7FF5ED505000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
7FF5ED86B000
unkown
page readonly
7FF5ED7F1000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
108E000
stack
page read and write
58D0000
trusted library allocation
page execute and read and write
B6A0000
heap
page read and write
F880000
system
page execute and read and write
15A3000
direct allocation
page execute and read and write
3580000
unkown
page readonly
943B000
stack
page read and write
7FF5ED94A000
unkown
page readonly
F90C000
system
page execute and read and write
7E50000
unkown
page readonly
2DC0000
heap
page read and write
2D15000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
4BC9000
unkown
page read and write
37F2000
unkown
page read and write
4C34000
unkown
page read and write
58C0000
heap
page read and write
8BF0000
unkown
page readonly
C10A000
stack
page read and write
7869000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
6C00000
heap
page read and write
A309000
trusted library allocation
page read and write
F804000
unkown
page read and write
25D0000
heap
page read and write
7FF5ED1F0000
unkown
page readonly
7FF5ED412000
unkown
page readonly
459D000
trusted library allocation
page read and write
97B5000
unkown
page read and write
B08D000
stack
page read and write
17C7000
heap
page read and write
7FF5ED844000
unkown
page readonly
7FF5ED4C6000
unkown
page readonly
7900000
unkown
page read and write
7FF5ED476000
unkown
page readonly
7FF5ED418000
unkown
page readonly
CA63000
unkown
page read and write
131F000
stack
page read and write
A502000
unkown
page read and write
B150000
unkown
page read and write
C89A000
unkown
page read and write
7A34000
unkown
page read and write
1182000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
7950000
unkown
page read and write
11CF000
heap
page read and write
135E000
stack
page read and write
C6D9000
unkown
page read and write
8810000
heap
page read and write
7FF5ED1D8000
unkown
page readonly
2920000
trusted library allocation
page read and write
331C000
stack
page read and write
2A90000
trusted library allocation
page read and write
2C68000
heap
page read and write
2AB0000
heap
page execute and read and write
B640000
unkown
page read and write
A49E000
unkown
page read and write
2B20000
trusted library allocation
page read and write
B170000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
D52000
trusted library allocation
page read and write
9877000
unkown
page read and write
D40000
trusted library allocation
page read and write
2B14000
heap
page read and write
7FF5EDA53000
unkown
page readonly
35A0000
unkown
page readonly
9893000
unkown
page read and write
7FF5ED956000
unkown
page readonly
7FF5ED9FF000
unkown
page readonly
9815000
unkown
page read and write
CC9000
stack
page read and write
36D3000
stack
page read and write
C7C5000
unkown
page read and write
BC0000
heap
page read and write
9A10000
unkown
page read and write
7FF5ED495000
unkown
page readonly
7FF5ED8AC000
unkown
page readonly
AAF9000
unkown
page read and write
C5A3000
unkown
page read and write
5080000
trusted library section
page readonly
3659000
stack
page read and write
7FF5ED9D2000
unkown
page readonly
C84D000
unkown
page read and write
BDD0000
unkown
page readonly
B10D000
stack
page read and write
C563000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
B2AE000
stack
page read and write
7FF5EDA70000
unkown
page readonly
370D000
unkown
page read and write
7DF4F3051000
unkown
page execute read
11B7000
heap
page read and write
8BE9000
stack
page read and write
CAFC000
stack
page read and write
7FF5ED735000
unkown
page readonly
5B90000
trusted library section
page read and write
C10000
heap
page read and write
37AC000
unkown
page read and write
A327000
unkown
page read and write
906E000
stack
page read and write
9E6C000
stack
page read and write
CA7C000
unkown
page read and write
2B14000
heap
page read and write
314F000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
F9DD000
unkown
page read and write
FB2A000
heap
page read and write
C41F000
stack
page read and write
C88D000
stack
page read and write
7FF5ED9BE000
unkown
page readonly
7D20000
unkown
page readonly
1095000
stack
page read and write
F40000
direct allocation
page execute and read and write
7FF5ED697000
unkown
page readonly
8730000
unkown
page read and write
7FF5ED210000
unkown
page readonly
B5AE000
stack
page read and write
D80000
heap
page read and write
7FF5ED97E000
unkown
page readonly
7D20000
unkown
page readonly
8EC6000
unkown
page read and write
CB8C000
unkown
page read and write
26D0000
heap
page read and write
C857000
unkown
page read and write
379E000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
B82A000
stack
page read and write
2B20000
trusted library allocation
page read and write
1483000
heap
page read and write
1746000
direct allocation
page execute and read and write
978E000
unkown
page read and write
7FF5ED92C000
unkown
page readonly
2A20000
heap
page read and write
7FF5ED516000
unkown
page readonly
C40E000
stack
page read and write
7FF5ED279000
unkown
page readonly
4FE0000
trusted library allocation
page execute and read and write
7FF5ED980000
unkown
page readonly
4CB0000
unkown
page read and write
7FF5ED674000
unkown
page readonly
7859000
unkown
page read and write
1750000
trusted library allocation
page read and write
1120000
heap
page read and write
B4C000
stack
page read and write
5557000
stack
page read and write
7FF5ED669000
unkown
page readonly
118A000
trusted library allocation
page execute and read and write
4B8B000
unkown
page read and write
4C7D000
direct allocation
page execute and read and write
D4D000
trusted library allocation
page execute and read and write
7FF5ED9CC000
unkown
page readonly
37B0000
unkown
page read and write
2C6E000
heap
page read and write
331E000
stack
page read and write
1240000
heap
page read and write
991D000
unkown
page read and write
D6B000
trusted library allocation
page execute and read and write
7CC0000
unkown
page readonly
2F26000
heap
page read and write
7DF4F3061000
unkown
page execute read
79FB000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
7FF5ED92C000
unkown
page readonly
71F5000
trusted library allocation
page read and write
7FF5ED9D2000
unkown
page readonly
2DD4000
heap
page read and write
5481000
heap
page read and write
7FF5ED39B000
unkown
page readonly
7DF4F3030000
unkown
page readonly
2510000
heap
page read and write
1462000
trusted library allocation
page read and write
7FF5ED849000
unkown
page readonly
7FF5ED8B4000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
7FF5ED65C000
unkown
page readonly
7FF5ED295000
unkown
page readonly
25A0000
heap
page read and write
A502000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
7FF5ED6A5000
unkown
page readonly
C964000
unkown
page read and write
5A20000
heap
page read and write
7FF5ED939000
unkown
page readonly
7FF5ED426000
unkown
page readonly
7FF5ED418000
unkown
page readonly
9792000
unkown
page read and write
78AD000
unkown
page read and write
7E19000
unkown
page read and write
7FF5ED5EB000
unkown
page readonly
76AA000
heap
page read and write
486E000
stack
page read and write
7FF5ED8F9000
unkown
page readonly
7FF5ED990000
unkown
page readonly
3800000
unkown
page readonly
100E000
stack
page read and write
7FF5ED265000
unkown
page readonly
A4A1000
unkown
page read and write
1483000
heap
page read and write
CF8E000
stack
page read and write
DA0000
trusted library allocation
page execute and read and write
2A7C000
heap
page read and write
5B4E000
stack
page read and write
9881000
unkown
page read and write
950000
heap
page read and write
C88B000
unkown
page read and write
4920000
trusted library allocation
page read and write
923E000
stack
page read and write
36F0000
unkown
page readonly
2C73000
heap
page read and write
896B000
stack
page read and write
25B0000
heap
page read and write
3756000
unkown
page read and write
7FF5ED1EA000
unkown
page readonly
7695000
stack
page read and write
CF4F000
stack
page read and write
3748000
unkown
page read and write
2DD4000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
26CE000
stack
page read and write
7A34000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
CB74000
unkown
page read and write
AAD1000
unkown
page read and write
9F9D000
stack
page read and write
A479000
unkown
page read and write
A39B000
unkown
page read and write
122E000
heap
page read and write
7869000
unkown
page read and write
7F9F0000
trusted library allocation
page execute and read and write
7FF5ED28E000
unkown
page readonly
9A5B000
unkown
page read and write
A323000
unkown
page read and write
C50A000
unkown
page read and write
1506000
direct allocation
page execute and read and write
4CEE000
direct allocation
page execute and read and write
B70000
unkown
page readonly
119E000
heap
page read and write
7FF5ED556000
unkown
page readonly
2C58000
heap
page read and write
117D000
trusted library allocation
page execute and read and write
F783000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
1160000
trusted library allocation
page read and write
4C18000
unkown
page read and write
2C3D000
stack
page read and write
7FF5ED46E000
unkown
page readonly
9E0D000
trusted library allocation
page read and write
AAF9000
unkown
page read and write
27B0000
heap
page read and write
C820000
trusted library allocation
page read and write
8710000
unkown
page readonly
F1F000
stack
page read and write
2CBA000
trusted library allocation
page read and write
7FF5ED48A000
unkown
page readonly
7FF5ED8E2000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
F931000
system
page execute and read and write
7FF5ED9ED000
unkown
page readonly
CB43000
unkown
page read and write
FAF000
stack
page read and write
5A57000
heap
page read and write
116D000
trusted library allocation
page execute and read and write
10DE000
stack
page read and write
786B000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
11B0000
unkown
page readonly
785D000
unkown
page read and write
7FF5ED781000
unkown
page readonly
7FF5ED93E000
unkown
page readonly
7FFE000
stack
page read and write
AB03000
unkown
page read and write
2DD4000
heap
page read and write
4768000
trusted library allocation
page read and write
3659000
stack
page read and write
7FF5ED73D000
unkown
page readonly
D50000
trusted library allocation
page read and write
C84D000
unkown
page read and write
7FF5ED445000
unkown
page readonly
1028000
heap
page read and write
2DBE000
stack
page read and write
4C60000
unkown
page read and write
4C3D000
direct allocation
page execute and read and write
3121000
trusted library allocation
page read and write
7E60000
unkown
page read and write
A4B8000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
8108000
stack
page read and write
7857000
unkown
page read and write
FB20000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
2A6D000
trusted library allocation
page read and write
7FF5ED28E000
unkown
page readonly
310E000
stack
page read and write
FB0000
trusted library allocation
page read and write
7FF5ED4C6000
unkown
page readonly
120D000
direct allocation
page execute and read and write
9869000
unkown
page read and write
7863000
unkown
page read and write
7FF5ED695000
unkown
page readonly
79D3000
unkown
page read and write
5610000
trusted library allocation
page read and write
47E0000
heap
page read and write
A11F000
stack
page read and write
1500000
heap
page read and write
D84000
heap
page read and write
48E0000
trusted library allocation
page read and write
7CD0000
unkown
page read and write
1440000
unkown
page read and write
8DA0000
unkown
page read and write
2BA0000
trusted library allocation
page read and write
7FF5ED55F000
unkown
page readonly
4C4B000
unkown
page read and write
8FB9000
stack
page read and write
7FF5ED9F2000
unkown
page readonly
2A4B000
trusted library allocation
page read and write
797D000
unkown
page read and write
C51E000
unkown
page read and write
A433000
unkown
page read and write
2C68000
heap
page read and write
4BA6000
unkown
page read and write
C5A0000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
F66000
direct allocation
page execute and read and write
7FF5ED93E000
unkown
page readonly
4B3B000
heap
page read and write
4B78000
unkown
page read and write
C512000
unkown
page read and write
7FF5ED755000
unkown
page readonly
2C7E000
heap
page read and write
987F000
unkown
page read and write
8A6E000
stack
page read and write
F466000
unkown
page execute and read and write
4CB2000
direct allocation
page execute and read and write
18A0000
unkown
page readonly
A4FC000
unkown
page read and write
36D5000
stack
page read and write
1290000
unclassified section
page execute and read and write
A310000
unkown
page read and write
2DD0000
heap
page read and write
AF0A000
stack
page read and write
7FF5ED886000
unkown
page readonly
CA63000
unkown
page read and write
79B1000
unkown
page read and write
3100000
trusted library allocation
page read and write
2D81000
heap
page read and write
7FF5ED68C000
unkown
page readonly
7D00000
unkown
page readonly
818E000
stack
page read and write
3791000
unkown
page read and write
2DD4000
heap
page read and write
97A9000
unkown
page read and write
1069000
direct allocation
page execute and read and write
978E000
unkown
page read and write
10A46000
system
page read and write
7FF5D1CCD000
unkown
page readonly
12AF000
unclassified section
page execute and read and write
30D1000
trusted library allocation
page read and write
7DF4F3041000
unkown
page execute read
2D50000
heap
page read and write
A391000
unkown
page read and write
C89A000
unkown
page read and write
BE0000
heap
page read and write
567C000
stack
page read and write
A433000
unkown
page read and write
7FF5ED1CB000
unkown
page readonly
977A000
unkown
page read and write
4CE0000
unkown
page read and write
1020000
heap
page read and write
7FF5ED9AE000
unkown
page readonly
7FF5ED692000
unkown
page readonly
7E50000
unkown
page readonly
D0000
system
page execute and read and write
18A1000
unkown
page readonly
7FF5ED7DB000
unkown
page readonly
1180000
trusted library allocation
page read and write
7FF5ED7FD000
unkown
page readonly
7900000
unkown
page read and write
7FF5ED695000
unkown
page readonly
34E9000
stack
page read and write
7FF5EDA2A000
unkown
page readonly
C811000
unkown
page read and write
41F000
remote allocation
page execute and read and write
170E000
stack
page read and write
AB4E000
unkown
page read and write
2DD4000
heap
page read and write
2A5E000
trusted library allocation
page read and write
7FF5ED6B8000
unkown
page readonly
C6C9000
unkown
page read and write
2D51000
heap
page read and write
111E000
stack
page read and write
979C000
unkown
page read and write
BAF9000
stack
page read and write
2B14000
heap
page read and write
76C0000
unkown
page read and write
1350000
unkown
page readonly
DF3000
heap
page read and write
17B0000
trusted library allocation
page read and write
7FF5ED94A000
unkown
page readonly
A25E000
stack
page read and write
35D0000
unkown
page read and write
7FF5ED265000
unkown
page readonly
4C50000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
29CC000
stack
page read and write
6FB0000
trusted library allocation
page read and write
C0D000
stack
page read and write
BC9B000
stack
page read and write
9B5B000
stack
page read and write
9730000
trusted library allocation
page read and write
1200000
unkown
page readonly
7FF5ED2A9000
unkown
page readonly
145F000
stack
page read and write
7E11000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
78A0000
unkown
page read and write
7FF5ED937000
unkown
page readonly
4FF0000
heap
page read and write
7FF5ED337000
unkown
page readonly
1244000
heap
page read and write
47B0000
trusted library allocation
page read and write
965C000
stack
page read and write
7E60000
unkown
page read and write
C6F4000
unkown
page read and write
4B56000
unkown
page read and write
DE5000
heap
page read and write
4B56000
unkown
page read and write
9875000
unkown
page read and write
9B60000
unkown
page readonly
7FF5ED8E7000
unkown
page readonly
AF8D000
stack
page read and write
A32A000
unkown
page read and write
7A0F000
stack
page read and write
1150000
trusted library allocation
page read and write
56C3000
unkown
page read and write
7FF5ED6B8000
unkown
page readonly
2DD4000
heap
page read and write
8730000
unkown
page read and write
98A8000
unkown
page read and write
7FF5ED9CA000
unkown
page readonly
7859000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
CB74000
unkown
page read and write
AB06000
unkown
page read and write
F47000
direct allocation
page execute and read and write
D33000
trusted library allocation
page execute and read and write
785F000
unkown
page read and write
521C000
stack
page read and write
7FF5ED9C8000
unkown
page readonly
7FF5ED505000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
7FF5ED71B000
unkown
page readonly
720A000
heap
page read and write
30AB000
stack
page read and write
C811000
unkown
page read and write
55D0000
heap
page read and write
A3BE000
unkown
page read and write
7FF5ED20D000
unkown
page readonly
FC6000
trusted library allocation
page read and write
787C000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
785F000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
1505000
heap
page read and write
7FF5ED4E8000
unkown
page readonly
2F26000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
A391000
unkown
page read and write
7FF5ED5EB000
unkown
page readonly
308A000
stack
page read and write
7FF5ED755000
unkown
page readonly
7FF5ED46A000
unkown
page readonly
7FF5ED426000
unkown
page readonly
7FF5ED872000
unkown
page readonly
6C0E000
heap
page read and write
C10A000
stack
page read and write
7FF5ED9CA000
unkown
page readonly
B8B0000
unkown
page read and write
7FF5ED495000
unkown
page readonly
96DF000
unkown
page read and write
76A0000
unkown
page read and write
108F0000
system
page execute and read and write
7FF5ED1CF000
unkown
page readonly
7FF5ED961000
unkown
page readonly
7FF5ED692000
unkown
page readonly
7FF5ED781000
unkown
page readonly
7C90000
unkown
page read and write
7861000
unkown
page read and write
C52C000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
C557000
unkown
page read and write
3167000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
A29E000
stack
page read and write
14A0000
trusted library allocation
page execute and read and write
1095000
stack
page read and write
280F000
stack
page read and write
E2F000
heap
page read and write
13E6000
unclassified section
page execute and read and write
48EE000
heap
page read and write
787C000
unkown
page read and write
There are 1648 hidden memdumps, click here to show them.