IOC Report
VoevdOQpeU.dll

loading gif

Files

File Path
Type
Category
Malicious
VoevdOQpeU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_5a7bdef4ffd6df7a7664cf7158b49db77a1e6c9_7cac0383_164b3f26\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_5f68951fc85ec886a9cff2e6302d69913a8368e_7cac0383_107353c7\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F57.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 23 06:12:08 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER36F9.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3890.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49A5.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Apr 23 06:12:14 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D5F.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4EB8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\RES2392.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES3B60.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4tlk4n5.iwk.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldp1b5en.1s3.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\bscdh0f0\CSCCEA1AC591E3E41DFA7DCA22F6F20A95.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\bscdh0f0\bscdh0f0.0.cs
UTF-8 Unicode (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\bscdh0f0\bscdh0f0.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bscdh0f0\bscdh0f0.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\bscdh0f0\bscdh0f0.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\poet0yxq\CSCB57F583549494C91A9647985948976.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\poet0yxq\poet0yxq.0.cs
UTF-8 Unicode (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\poet0yxq\poet0yxq.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\poet0yxq\poet0yxq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\poet0yxq\poet0yxq.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
modified
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VoevdOQpeU.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\VoevdOQpeU.dll",#1
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe" "about:<hta:application><script>Xf38='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Xf38).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name uqcywglb -value gp; new-alias -name kiubrmsyn -value iex; kiubrmsyn ([System.Text.Encoding]::ASCII.GetString((uqcywglb "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
malicious
C:\Windows\System32\control.exe
C:\Windows\system32\control.exe -h
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\VoevdOQpeU.dll
malicious
C:\Windows\System32\PING.EXE
ping localhost -n 5
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\VoevdOQpeU.dll"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 608
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 616
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 608
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\poet0yxq\poet0yxq.cmdline
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2392.tmp" "c:\Users\user\AppData\Local\Temp\poet0yxq\CSCB57F583549494C91A9647985948976.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bscdh0f0\bscdh0f0.cmdline
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES3B60.tmp" "c:\Users\user\AppData\Local\Temp\bscdh0f0\CSCCEA1AC591E3E41DFA7DCA22F6F20A95.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://146.70.35.138/phpadmin/Vo3V1ij8xfQAzbYEppxuGj/YfKBcB_2BiFsK/C5o_2FK1/LFX_2FAQmA1J0Gg2IGK0zii/Cqu4J51vDj/wlNBNCb18BPgk55aw/3DJofkjbHHw_/2F3O9t6XtUN/FhzyouLiXCH4qy/e6m_2F6Bp87emTDJkwB0B/GJSc0pfzfjLvMKIS/Fcz1B6FomHVea2H/3F6nRjbT0qghS0NNIb/kfO6CmRa0/E8U4GDXz2DXZU_2BDOzp/T84va5G8JnhB3/UMJfQ.src
146.70.35.138
malicious
http://146.70.35.138/phpadmin/DRUYboFifxi6C3/_2BjVEcKiT1b8A_2BvMed/1ckh5D3V8MdKp2S2/SxMBQuJjSXDeW9Y/7fodbbXY21Jrsa2aXJ/S90Gqb_2B/KDYz_2F5NJsyx14KqPKz/ecUQVATr13lzZyN_2B_/2BoLTTXT06dmMNQURoEaga/M1AdtgAQJw1vj/q_2FSYWg/oo4zTjJDuzf2mz8BRfV3I9z/TX7m3RhRWd/LYr8gkK9WgmQ0jja9/kmBHLi0WTs_2/FFd4Km9NmRn/_2FUZ.src
146.70.35.138
malicious
http://146.70.35.138/phpadmin/GVoID0TbPRvLYlr7up2X9/gD2XQvRshzT0oIvQ/0mEtVI_2FJuzvKC/fbaZh1y3_2FnOqy8_2/B0Y8u0dqv/V11JJbfZHGLCQ043KVhZ/2j3FiaSLUSAIqnVTtEF/p_2F7mTRIgp_2F43j86HIJ/7JamWIlhMtaxW/Qv_2BsMI/GK_2BjMae66_2B0eWRxZare/pyglkGar6g/LD_2FkUNwRZVbFFyN/qmaS1_2FZd3W/iyocOp4EpCY/lkbOHJ4rs/yFlR4ppeN_2/FAS.src
146.70.35.138
malicious
http://https://file://USER.ID%lu.exe/upd
unknown
http://constitution.org/usdeclar.txt
unknown
http://constitution.org/usdeclar.txtC:
unknown

IPs

IP
Domain
Country
Malicious
146.70.35.138
unknown
United Kingdom
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E
FileOptions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4F78000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
5800000
unclassified section
page execute and read and write
malicious
4F78000
heap
page read and write
malicious
4EF9000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
4D7C000
heap
page read and write
malicious
4E7A000
heap
page read and write
malicious
4899000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
1909FD9C000
heap
page read and write
malicious
4BFF000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
5D78000
heap
page read and write
malicious
4F78000
heap
page read and write
malicious
2A50000
unkown
page readonly
22F66BEE000
heap
page read and write
1909F780000
trusted library allocation
page read and write
790000
unkown
page readonly
7FFFEA41F000
unkown
page readonly
15E144D9000
heap
page read and write
22F66C4D000
heap
page read and write
2060F440000
heap
page read and write
7FF50565E000
unkown
page readonly
22F66C54000
heap
page read and write
20FEB202000
heap
page read and write
26EE000
stack
page read and write
435000
unkown
page execute read
66D2000
unkown
page readonly
6E93000
unkown
page readonly
1909F7D0000
trusted library allocation
page read and write
4C06AFE000
stack
page read and write
1909F900000
trusted library allocation
page read and write
4C070FC000
stack
page read and write
22F66B80000
heap
page read and write
22F66C6E000
heap
page read and write
2376B095000
trusted library allocation
page read and write
2A24000
heap
page read and write
13AF000
stack
page read and write
A91B000
stack
page read and write
7FF50529E000
unkown
page readonly
7FF504F89000
unkown
page readonly
1FD7000
stack
page read and write
51AC000
unkown
page read and write
1909F7B0000
trusted library allocation
page read and write
B50000
unkown
page read and write
540000
heap
page read and write
22F66BB7000
heap
page read and write
6EA9000
unkown
page readonly
7B0000
heap
page read and write
13119C02000
trusted library allocation
page read and write
AF9E000
stack
page read and write
490000
unkown
page read and write
3D80000
unkown
page read and write
3F11000
unkown
page read and write
7FF5052A6000
unkown
page readonly
18165F13000
heap
page read and write
22F66D77000
heap
page read and write
1B63507C000
heap
page read and write
1BD30861000
heap
page read and write
283B000
stack
page read and write
540000
heap
page read and write
570000
unkown
page readonly
783A000
unkown
page read and write
5EF1000
direct allocation
page read and write
DAC16FF000
stack
page read and write
7FF505518000
unkown
page readonly
879B000
stack
page read and write
22F66BBC000
heap
page read and write
7B0827B000
stack
page read and write
1E282122000
heap
page read and write
182772E000
stack
page read and write
22F66BC8000
heap
page read and write
7FF505614000
unkown
page readonly
7FF50539A000
unkown
page readonly
2661000
unkown
page read and write
12AE000
stack
page read and write
273A000
heap
page read and write
B99B000
stack
page read and write
1909F920000
trusted library allocation
page read and write
21A79513000
heap
page read and write
3DC0000
unkown
page readonly
4480000
direct allocation
page read and write
3D70000
unkown
page read and write
20FEB302000
heap
page read and write
E566000
unkown
page read and write
126E000
stack
page read and write
22F66B59000
heap
page read and write
401000
unkown
page execute read
DDFB000
unkown
page read and write
1F45C029000
heap
page read and write
8619000
stack
page read and write
6D9C000
unkown
page readonly
809D000
stack
page read and write
7FF50541E000
unkown
page readonly
7FF5052FE000
unkown
page readonly
1909F470000
heap
page read and write
7FF505552000
unkown
page readonly
22F66BC6000
heap
page read and write
22F66D78000
heap
page read and write
7FF4E587E000
unkown
page readonly
4480000
direct allocation
page read and write
15A7D450000
trusted library allocation
page read and write
50C1000
unkown
page read and write
51A7000
unkown
page read and write
1BD307D0000
direct allocation
page read and write
1328306C000
heap
page read and write
809D000
stack
page read and write
22F66BEE000
heap
page read and write
7FF50543D000
unkown
page readonly
6CAA000
unkown
page readonly
15E144BF000
heap
page read and write
4B3A000
stack
page read and write
15E17180000
direct allocation
page read and write
1FD7000
stack
page read and write
E2AD000
unkown
page read and write
5F7F000
unkown
page read and write
7859000
unkown
page read and write
22F66BD9000
heap
page read and write
13282F20000
heap
page read and write
7165000
unkown
page read and write
7FF50565E000
unkown
page readonly
5462000
unkown
page read and write
7FF505304000
unkown
page readonly
15E14542000
heap
page read and write
A85DE7E000
stack
page read and write
540000
heap
page read and write
23768FE8000
heap
page read and write
2376B095000
trusted library allocation
page read and write
7FF505238000
unkown
page readonly
821F000
stack
page read and write
1909F7A0000
trusted library allocation
page read and write
4A6E000
stack
page read and write
470000
unkown
page readonly
23768BA1000
trusted library allocation
page read and write
3DF0000
unkown
page read and write
6C34000
unkown
page readonly
1909F900000
trusted library allocation
page read and write
7FF50576F000
unkown
page readonly
7FF505090000
unkown
page readonly
7FF5053A7000
unkown
page readonly
13119249000
heap
page read and write
DD0B000
unkown
page read and write
50C7000
unkown
page read and write
7FF50562C000
unkown
page readonly
7A0000
unkown
page read and write
F4B000
heap
page read and write
1311924F000
heap
page read and write
2A30000
unkown
page read and write
401000
unkown
page execute read
1909F7C0000
trusted library allocation
page read and write
15A77A57000
heap
page read and write
4020000
unkown
page read and write
7B5000
heap
page read and write
4C068FA000
stack
page read and write
140797F000
stack
page read and write
7FF5050DD000
unkown
page readonly
760000
unkown
page readonly
F40000
heap
page read and write
15E144D6000
heap
page read and write
126E000
stack
page read and write
7FF505254000
unkown
page readonly
B41E000
stack
page read and write
7FF5050D3000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
20FEBA02000
trusted library allocation
page read and write
C885FE000
stack
page read and write
7FF5050A6000
unkown
page readonly
1909F900000
trusted library allocation
page read and write
1BD320B0000
direct allocation
page read and write
1909F940000
trusted library allocation
page read and write
15E15D60000
direct allocation
page read and write
7DF403671000
unkown
page execute read
7FF50573B000
unkown
page readonly
5BFD000
heap
page read and write
490E000
stack
page read and write
7FF5054EB000
unkown
page readonly
1D0000
unkown
page readonly
F91F000
stack
page read and write
7FF505513000
unkown
page readonly
1827B7F000
stack
page read and write
4020000
unkown
page read and write
881B000
stack
page read and write
15E144E8000
heap
page read and write
15E142D0000
remote allocation
page read and write
1BD30869000
heap
page read and write
1909F780000
trusted library allocation
page read and write
66E3000
unkown
page readonly
1909F750000
trusted library allocation
page read and write
4B05000
stack
page read and write
1BD30810000
heap
page read and write
B19B000
stack
page read and write
126E000
stack
page read and write
1909F780000
trusted library allocation
page read and write
18165E61000
heap
page read and write
7FF5052C5000
unkown
page readonly
6E93000
unkown
page readonly
EFC000
stack
page read and write
7FF505304000
unkown
page readonly
4B05000
stack
page read and write
2376B095000
trusted library allocation
page read and write
4680000
unkown
page read and write
21A7AEF0000
remote allocation
page read and write
5EAB000
unkown
page read and write
7845000
unkown
page read and write
2CD0000
heap
page read and write
1827D77000
stack
page read and write
DB44000
unkown
page read and write
6EA0000
unkown
page readonly
18276AB000
stack
page read and write
1909F900000
trusted library allocation
page read and write
2AAB000
heap
page read and write
7FF505347000
unkown
page readonly
23768FD9000
heap
page read and write
E56B000
unkown
page read and write
53CF000
stack
page read and write
7FF505372000
unkown
page readonly
7FF505271000
unkown
page readonly
22F66BB6000
heap
page read and write
68E000
heap
page read and write
2060F460000
heap
page read and write
1909F980000
trusted library allocation
page read and write
7EC0000
heap
page read and write
6D9C000
unkown
page readonly
DB27000
unkown
page read and write
6E03000
unkown
page readonly
7FF50576A000
unkown
page readonly
20FEB240000
heap
page read and write
5520000
unkown
page read and write
3D60000
unkown
page read and write
7856000
unkown
page read and write
7FF50546B000
unkown
page readonly
50C3000
unkown
page read and write
7FF505500000
unkown
page readonly
50A8000
unkown
page read and write
4918000
heap
page read and write
3DA0000
unkown
page readonly
7FF50504C000
unkown
page readonly
430000
unkown
page readonly
18165E74000
heap
page read and write
22F66BD9000
heap
page read and write
2120000
heap
page read and write
781D000
stack
page read and write
7B5000
heap
page read and write
7FF505437000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
5F7B000
unkown
page read and write
78F6000
unkown
page read and write
7FF5052F1000
unkown
page readonly
21A794F6000
heap
page read and write
1909F780000
trusted library allocation
page read and write
DE89000
unkown
page read and write
1BD308C1000
heap
page read and write
EFC000
stack
page read and write
7FF50556D000
unkown
page readonly
1F45C102000
heap
page read and write
22F66BE4000
heap
page read and write
1DAAA7B000
stack
page read and write
3D1A000
unkown
page read and write
23768FAF000
heap
page read and write
1909F790000
trusted library allocation
page read and write
7FF50531E000
unkown
page readonly
1909F930000
trusted library allocation
page read and write
1BD3357F000
direct allocation
page read and write
1F45C05B000
heap
page read and write
DEAC000
unkown
page read and write
7FF505515000
unkown
page readonly
6E55000
unkown
page readonly
7879000
unkown
page read and write
400000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
12AE000
stack
page read and write
5EAB000
unkown
page read and write
7C0000
unkown
page readonly
7856000
unkown
page read and write
6EBC000
unkown
page readonly
4806000
stack
page read and write
51A5000
unkown
page read and write
1F45C041000
heap
page read and write
44E0000
unkown
page read and write
1909F790000
trusted library allocation
page read and write
435000
unkown
page execute read
7FF505511000
unkown
page readonly
7165000
unkown
page read and write
66D2000
unkown
page readonly
50A4000
unkown
page read and write
15E144B2000
heap
page read and write
1BD33570000
direct allocation
page read and write
1B634EC0000
heap
page read and write
8619000
stack
page read and write
B50000
unkown
page read and write
7894000
unkown
page read and write
6B8E000
unkown
page readonly
1D0000
unkown
page readonly
7FF5056CA000
unkown
page readonly
3F00000
unkown
page read and write
1F45C045000
heap
page read and write
441000
unkown
page readonly
22F66BC8000
heap
page read and write
2060F1F0000
heap
page read and write
7FF5057C0000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
126E000
stack
page read and write
50A0000
unkown
page read and write
23768B9E000
trusted library allocation
page read and write
6D0C000
unkown
page readonly
7FFFEA220000
unkown
page readonly
7879000
unkown
page read and write
23768FAF000
heap
page read and write
1BD308B4000
heap
page read and write
3D10000
unkown
page read and write
490000
unkown
page read and write
13283013000
heap
page read and write
5367000
unkown
page read and write
490E000
stack
page read and write
7FF4E14D0000
unkown
page readonly
7FFFEA427000
unkown
page readonly
46B8000
unkown
page read and write
432000
unkown
page execute read
7887000
unkown
page read and write
405B000
unkown
page read and write
22F66BD9000
heap
page read and write
B99B000
stack
page read and write
7FF5052DB000
unkown
page readonly
237689F0000
heap
page read and write
5700000
heap
page read and write
1909F900000
trusted library allocation
page read and write
F3DEA4C000
stack
page read and write
23768FE8000
heap
page read and write
7FF5050DF000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
7FF50568D000
unkown
page readonly
15E143D0000
heap
page read and write
537E000
unkown
page read and write
5F04000
direct allocation
page read and write
42D000
unkown
page execute read
7FF5054EB000
unkown
page readonly
1BD30847000
heap
page read and write
7FF5055BA000
unkown
page readonly
E08A000
unkown
page read and write
53CF000
unkown
page read and write
F20000
trusted library allocation
page read and write
EFC000
stack
page read and write
1909F901000
trusted library allocation
page read and write
2A50000
unkown
page readonly
1909F470000
heap
page read and write
24A0000
unkown
page readonly
50BD000
unkown
page read and write
20FEB1D0000
trusted library allocation
page read and write
1ADF9FB0000
heap
page read and write
1909F780000
trusted library allocation
page read and write
4EF9000
heap
page read and write
3D00000
unkown
page read and write
DD86000
unkown
page read and write
1F45C058000
heap
page read and write
4F78000
heap
page read and write
18165E2A000
heap
page read and write
23768FCB000
heap
page read and write
1F0000
unkown
page readonly
7FF5057DA000
unkown
page readonly
400000
unkown
page readonly
22F66B10000
heap
page read and write
424A000
stack
page read and write
DD07000
unkown
page read and write
4480000
direct allocation
page read and write
BBC000
stack
page read and write
BA9F000
stack
page read and write
15E14270000
heap
page read and write
2376B080000
trusted library allocation
page read and write
7FF5056A3000
unkown
page readonly
DAC14FE000
stack
page read and write
DB20000
unkown
page read and write
497000
unkown
page read and write
7FF505757000
unkown
page readonly
7FF5050DD000
unkown
page readonly
7FFFEA3BC000
unkown
page read and write
4A34000
unkown
page read and write
50D9000
unkown
page read and write
7FF5057AB000
unkown
page readonly
7FF5050E5000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
22F66BBB000
heap
page read and write
22F66BEE000
heap
page read and write
7FF5054EE000
unkown
page readonly
1909F7B0000
trusted library allocation
page read and write
6C34000
unkown
page readonly
54A0000
trusted library allocation
page read and write
15E144C8000
heap
page read and write
1827F7F000
stack
page read and write
6DEE000
unkown
page readonly
1909F750000
trusted library allocation
page read and write
4680000
unkown
page read and write
7FF505586000
unkown
page readonly
21A7942A000
heap
page read and write
546F000
stack
page read and write
400000
unkown
page readonly
1BD30848000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
15A7D3B0000
trusted library allocation
page read and write
22F66BCE000
heap
page read and write
44E0000
unkown
page read and write
13283802000
trusted library allocation
page read and write
5E60000
unkown
page read and write
5367000
unkown
page read and write
15E1454E000
heap
page read and write
1BD30855000
heap
page read and write
6E03000
unkown
page readonly
432000
unkown
page execute read
7FF4E14D0000
unkown
page readonly
7FF505452000
unkown
page readonly
E0A7000
unkown
page read and write
25EA000
unkown
page read and write
4480000
direct allocation
page read and write
6690000
unkown
page readonly
1BD320D0000
direct allocation
page read and write
50C5000
unkown
page read and write
53BE000
unkown
page read and write
26EE000
stack
page read and write
24FA000
unkown
page read and write
4A80000
unkown
page readonly
4750000
unkown
page read and write
1FD7000
stack
page read and write
15E144C8000
heap
page read and write
15E17200000
direct allocation
page read and write
20000
unkown
page read and write
3D2A000
unkown
page read and write
7FF5055BA000
unkown
page readonly
23768B9A000
trusted library allocation
page read and write
1F45C04E000
heap
page read and write
1311924A000
heap
page read and write
1909F910000
trusted library allocation
page read and write
537E000
unkown
page read and write
6360000
unkown
page read and write
22F66BC2000
heap
page read and write
7FF505507000
unkown
page readonly
DC13000
unkown
page read and write
4987000
stack
page read and write
7FF505790000
unkown
page readonly
20E0000
unkown
page readonly
871D000
stack
page read and write
7FF5057AB000
unkown
page readonly
2376B095000
trusted library allocation
page read and write
1909F780000
trusted library allocation
page read and write
2123000
heap
page read and write
1BD30720000
heap
page read and write
264E000
unkown
page read and write
7FF5056FF000
unkown
page readonly
15A779E0000
heap
page read and write
27E6000
stack
page read and write
21BA6BB0000
heap
page read and write
83494FE000
stack
page read and write
1F45C047000
heap
page read and write
6D35000
unkown
page readonly
1909F7E0000
trusted library allocation
page read and write
5090000
unkown
page read and write
F4B000
heap
page read and write
1909F790000
trusted library allocation
page read and write
2661000
unkown
page read and write
1909F7D0000
trusted library allocation
page read and write
1909F52C000
heap
page read and write
7FF505696000
unkown
page readonly
760000
unkown
page readonly
15E14539000
heap
page read and write
22F66B47000
heap
page read and write
273A000
heap
page read and write
BBC000
stack
page read and write
1BD308AE000
heap
page read and write
7FF505430000
unkown
page readonly
4806000
stack
page read and write
7FF50575D000
unkown
page readonly
50A4000
unkown
page read and write
4B90000
unkown
page read and write
E398DFF000
stack
page read and write
7FF505626000
unkown
page readonly
22F66BC2000
heap
page read and write
7FF505240000
unkown
page readonly
23768B9A000
trusted library allocation
page read and write
8699000
stack
page read and write
22F66BCE000
heap
page read and write
7FFFEA221000
unkown
page execute read
7FF505614000
unkown
page readonly
2123000
heap
page read and write
51A7000
unkown
page read and write
5442000
unkown
page read and write
22F66B53000
heap
page read and write
15E14510000
heap
page read and write
544D000
unkown
page read and write
4C067F7000
stack
page read and write
6BAF000
unkown
page readonly
7FF505325000
unkown
page readonly
7FF5052E1000
unkown
page readonly
1909F7C5000
trusted library allocation
page read and write
3DC0000
unkown
page readonly
4260000
unkown
page read and write
7FF5052FE000
unkown
page readonly
2570000
unkown
page read and write
2060F230000
unkown
page readonly
5520000
trusted library allocation
page read and write
7FF4E5875000
unkown
page readonly
22F66BBE000
heap
page read and write
3D1A000
unkown
page read and write
DAC15FE000
stack
page read and write
4EFA000
heap
page read and write
15A77A29000
heap
page read and write
7FF50550B000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
1909F34A000
heap
page read and write
E523000
unkown
page read and write
1311928D000
heap
page read and write
1909F900000
trusted library allocation
page read and write
7FF505341000
unkown
page readonly
4B90000
unkown
page read and write
E12A000
unkown
page read and write
490000
unkown
page read and write
22F66B8E000
heap
page read and write
4480000
direct allocation
page read and write
3DD0000
unkown
page read and write
7FF5057C0000
unkown
page readonly
1909F970000
trusted library allocation
page read and write
4000000
unkown
page readonly
7FF5054E5000
unkown
page readonly
5240000
unkown
page read and write
22F66BA5000
heap
page read and write
23768B97000
trusted library allocation
page read and write
482000
unkown
page write copy
7FF505258000
unkown
page readonly
7B0877D000
stack
page read and write
22F66BDA000
heap
page read and write
1909F780000
trusted library allocation
page read and write
5F04000
direct allocation
page read and write
23768FEA000
heap
page read and write
22F66B5C000
heap
page read and write
1E282177000
heap
page read and write
E0EC000
unkown
page read and write
430000
unkown
page readonly
7FF505783000
unkown
page readonly
6A8000
heap
page read and write
3EF0000
unkown
page read and write
1BD30875000
heap
page read and write
7FF505341000
unkown
page readonly
1407A7F000
stack
page read and write
740000
unkown
page readonly
140717B000
stack
page read and write
5C0000
heap
page read and write
E215000
unkown
page read and write
7C0000
unkown
page readonly
7FF4E584F000
unkown
page readonly
23768FC9000
heap
page read and write
2970000
heap
page read and write
5C8000
heap
page read and write
1909F930000
trusted library allocation
page read and write
1F45C057000
heap
page read and write
1909F920000
trusted library allocation
page read and write
6EA7000
unkown
page readonly
1909F790000
trusted library allocation
page read and write
2060F35A000
heap
page read and write
7FF5054F4000
unkown
page readonly
15E144A0000
heap
page read and write
7618000
stack
page read and write
F91F000
stack
page read and write
1909F950000
trusted library allocation
page read and write
15E14507000
heap
page read and write
21A7AEF0000
remote allocation
page read and write
7FF4E5836000
unkown
page readonly
7FFFEA3BA000
unkown
page read and write
464C000
stack
page read and write
27CF9D90000
heap
page read and write
5310000
heap
page read and write
7FF505515000
unkown
page readonly
C6000
stack
page read and write
15A7D4D0000
trusted library allocation
page read and write
25ED000
unkown
page read and write
3FE9000
stack
page read and write
7FF5050CD000
unkown
page readonly
6E8C000
unkown
page readonly
2A48000
heap
page read and write
A85E27C000
stack
page read and write
B19B000
stack
page read and write
1BD30640000
remote allocation
page read and write
15E15D43000
direct allocation
page read and write
540000
unkown
page readonly
7FF5050C2000
unkown
page readonly
23768FE9000
heap
page read and write
A91B000
stack
page read and write
DC07000
unkown
page read and write
21BA6A59000
heap
page read and write
5EA7000
unkown
page read and write
263F000
unkown
page read and write
6D73000
unkown
page readonly
B49B000
stack
page read and write
18165E63000
heap
page read and write
480000
unkown
page readonly
6BA7000
unkown
page readonly
7FF505679000
unkown
page readonly
7FF50553F000
unkown
page readonly
22F66BD9000
heap
page read and write
537E000
unkown
page read and write
22F66BC6000
heap
page read and write
769C000
stack
page read and write
4B80000
heap
page read and write
7FF5050C0000
unkown
page readonly
15A7D3C0000
trusted library allocation
page read and write
7FF505591000
unkown
page readonly
7FF50504C000
unkown
page readonly
2A30000
unkown
page read and write
13119202000
heap
page read and write
22F66BC0000
heap
page read and write
22F66BBB000
heap
page read and write
4340000
unkown
page readonly
7596000
stack
page read and write
6AD7000
unkown
page readonly
22F66BAB000
heap
page read and write
23768FD9000
heap
page read and write
21A79413000
heap
page read and write
DB7A000
unkown
page read and write
5EA7000
unkown
page read and write
7FF5053E3000
unkown
page readonly
22F66BB6000
heap
page read and write
1909F790000
trusted library allocation
page read and write
22F66BB7000
heap
page read and write
1BD33560000
direct allocation
page read and write
23768FB2000
heap
page read and write
15A77A55000
heap
page read and write
1909F920000
trusted library allocation
page read and write
22F66C08000
heap
page read and write
7FF5053DA000
unkown
page readonly
22F66BD9000
heap
page read and write
7FF4E5860000
unkown
page readonly
DC0B000
unkown
page read and write
1BD308B4000
heap
page read and write
497000
unkown
page read and write
22F66B5F000
heap
page read and write
2AAE000
heap
page read and write
3D2A000
unkown
page read and write
1ADFA213000
heap
page read and write
1BD30740000
heap
page read and write
1909F900000
trusted library allocation
page read and write
7FF5052A2000
unkown
page readonly
4A34000
unkown
page read and write
16E93FF000
stack
page read and write
4A0D000
stack
page read and write
1909F488000
heap
page read and write
20DF000
stack
page read and write
50C9000
unkown
page read and write
7FF5056FF000
unkown
page readonly
15A77AB7000
heap
page read and write
1BD305E0000
heap
page read and write
1909F7BD000
trusted library allocation
page read and write
4C06D7E000
stack
page read and write
AE19000
stack
page read and write
7FF50548F000
unkown
page readonly
6A0D000
unkown
page readonly
441000
unkown
page readonly
5D90000
direct allocation
page read and write
7FF505634000
unkown
page readonly
52C5000
unkown
page read and write
1F45C05F000
heap
page read and write
1909F900000
trusted library allocation
page read and write
88B3000
unkown
page read and write
AE9A000
stack
page read and write
1909F900000
trusted library allocation
page read and write
25AD000
unkown
page read and write
23768BA4000
trusted library allocation
page read and write
15E14502000
heap
page read and write
3D60000
unkown
page read and write
22F66BED000
heap
page read and write
4A0000
unkown
page readonly
1909F920000
trusted library allocation
page read and write
7FF50576F000
unkown
page readonly
841D000
stack
page read and write
1E281FA0000
remote allocation
page read and write
1328302A000
heap
page read and write
21A794CC000
heap
page read and write
419C000
stack
page read and write
7FF505731000
unkown
page readonly
15E14533000
heap
page read and write
15A7D388000
trusted library allocation
page read and write
5D90000
direct allocation
page read and write
21A7948B000
heap
page read and write
23768B9A000
trusted library allocation
page read and write
7FF50575D000
unkown
page readonly
26EC000
stack
page read and write
7FF505511000
unkown
page readonly
B31B000
stack
page read and write
2100000
unkown
page read and write
7FF505430000
unkown
page readonly
66E3000
unkown
page readonly
66CB000
unkown
page readonly
1909F7D0000
trusted library allocation
page read and write
21A793C0000
trusted library allocation
page read and write
7FF50523E000
unkown
page readonly
50D9000
unkown
page read and write
7B084FF000
stack
page read and write
834957B000
stack
page read and write
22F66BDF000
heap
page read and write
23768B9E000
trusted library allocation
page read and write
468A000
unkown
page read and write
273A000
heap
page read and write
83493FE000
stack
page read and write
7FF5052A6000
unkown
page readonly
4B05000
stack
page read and write
1BD30851000
heap
page read and write
400000
unkown
page readonly
7820000
unkown
page read and write
2AA5000
heap
page read and write
1909F483000
heap
page read and write
7FF5054E5000
unkown
page readonly
2928000
stack
page read and write
3D00000
unkown
page read and write
7FF5056EC000
unkown
page readonly
436E000
stack
page read and write
44E0000
unkown
page read and write
23768FCB000
heap
page read and write
42A000
unkown
page execute read
8831000
unkown
page read and write
A99E000
stack
page read and write
5442000
unkown
page read and write
53CF000
unkown
page read and write
1F45C05A000
heap
page read and write
42C0000
unkown
page write copy
1B635102000
heap
page read and write
790000
unkown
page readonly
22F66B8E000
heap
page read and write
F4B000
heap
page read and write
7FF50571C000
unkown
page readonly
DC7E000
unkown
page read and write
3D0A000
unkown
page read and write
22F66BCE000
heap
page read and write
190853CC000
heap
page read and write
2490000
unkown
page readonly
7FF505591000
unkown
page readonly
7FF50545B000
unkown
page readonly
B4459FF000
stack
page read and write
4330000
unkown
page readonly
46A8000
unkown
page read and write
7FF505518000
unkown
page readonly
2060F35A000
heap
page read and write
5483000
unkown
page read and write
7894000
unkown
page read and write
23768FC9000
heap
page read and write
1909F7B9000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
7FF5057D0000
unkown
page readonly
18165DF0000
trusted library allocation
page read and write
51D2000
unkown
page read and write
20FEB9A0000
remote allocation
page read and write
21A792E0000
heap
page read and write
1B63500B000
heap
page read and write
23768FE8000
heap
page read and write
7FF505720000
unkown
page readonly
23768B9E000
trusted library allocation
page read and write
66CE000
unkown
page readonly
13119190000
heap
page read and write
7FF5053A4000
unkown
page readonly
1F0000
unkown
page readonly
831F000
stack
page read and write
6EC9000
unkown
page readonly
24E0000
unkown
page read and write
7FF50576A000
unkown
page readonly
58D0000
direct allocation
page read and write
23768FD9000
heap
page read and write
42A000
unkown
page execute read
6B51000
unkown
page readonly
7FF505750000
unkown
page readonly
15E143F0000
heap
page read and write
23768FD9000
heap
page read and write
3D1A000
unkown
page read and write
7FF5054F4000
unkown
page readonly
DD82000
unkown
page read and write
4C069F9000
stack
page read and write
1ADFAB12000
heap
page read and write
5464000
unkown
page read and write
49F9000
unclassified section
page readonly
2490000
unkown
page readonly
7FF505799000
unkown
page readonly
1909F920000
trusted library allocation
page read and write
22F66BBE000
heap
page read and write
AC1A000
stack
page read and write
4480000
direct allocation
page read and write
258A000
unkown
page read and write
2928000
stack
page read and write
116E000
stack
page read and write
23768BA0000
trusted library allocation
page read and write
1909F780000
trusted library allocation
page read and write
DAC0F8E000
stack
page read and write
22F66B85000
heap
page read and write
7FF50525D000
unkown
page readonly
7FF50540D000
unkown
page readonly
5455000
unkown
page read and write
5483000
unkown
page read and write
497000
unkown
page read and write
570000
unkown
page readonly
2060F250000
unkown
page read and write
66D2000
unkown
page readonly
1050000
heap
page read and write
20FEB9A0000
remote allocation
page read and write
23768F80000
heap
page read and write
7FF5057C4000
unkown
page readonly
1909F7C0000
trusted library allocation
page read and write
21BA6B50000
heap
page read and write
7863000
unkown
page read and write
E086000
unkown
page read and write
25AD000
unkown
page read and write
480000
unkown
page readonly
22F66C02000
heap
page read and write
E4E4000
unkown
page read and write
2A2A000
stack
page read and write
15A77ABB000
heap
page read and write
5455000
unkown
page read and write
22F66B8E000
heap
page read and write
13AF000
stack
page read and write
13283000000
heap
page read and write
7FF5050C4000
unkown
page readonly
EFC000
stack
page read and write
25ED000
unkown
page read and write
7FF5050CD000
unkown
page readonly
AE19000
stack
page read and write
7FF505647000
unkown
page readonly
5C0000
heap
page read and write
1B635013000
heap
page read and write
263F000
unkown
page read and write
7FF505562000
unkown
page readonly
3DB0000
unkown
page readonly
DF3E000
unkown
page read and write
1DAB0FF000
stack
page read and write
15E14480000
heap
page read and write
23768BA4000
trusted library allocation
page read and write
A99E000
stack
page read and write
1909F900000
trusted library allocation
page read and write
13119120000
heap
page read and write
140737E000
stack
page read and write
264E000
unkown
page read and write
779D000
stack
page read and write
66A0000
unkown
page readonly
DAC13FE000
stack
page read and write
482000
unkown
page write copy
22F66B19000
heap
page read and write
7FF505731000
unkown
page readonly
6B51000
unkown
page readonly
7FF50556D000
unkown
page readonly
1BD308BD000
heap
page read and write
22F66BE8000
heap
page read and write
779D000
stack
page read and write
6EB5000
unkown
page readonly
7270000
unkown
page read and write
7FF505448000
unkown
page readonly
DAC127E000
stack
page read and write
15E144A9000
heap
page read and write
7FF505437000
unkown
page readonly
F40000
heap
page read and write
25DC000
stack
page read and write
1909F780000
trusted library allocation
page read and write
4BC27FE000
stack
page read and write
7DF4035E1000
unkown
page execute read
1ADFA313000
heap
page read and write
22F66B80000
heap
page read and write
F3DEB4E000
stack
page read and write
1827AFB000
stack
page read and write
22F66BC2000
heap
page read and write
1909F790000
trusted library allocation
page read and write
7FF5054CE000
unkown
page readonly
1909F920000
trusted library allocation
page read and write
6C42000
unkown
page readonly
2732000
heap
page read and write
6EA9000
unkown
page readonly
7FF505650000
unkown
page readonly
2661000
unkown
page read and write
1DAAAFE000
stack
page read and write
7FF505634000
unkown
page readonly
7FF505682000
unkown
page readonly
6B78000
unkown
page readonly
1909F525000
heap
page read and write
1B634EB0000
heap
page read and write
4B53000
unkown
page read and write
4A34000
unkown
page read and write
50D9000
unkown
page read and write
1909F957000
trusted library allocation
page read and write
22F66BC6000
heap
page read and write
1909F7C0000
trusted library allocation
page read and write
23768BC4000
heap
page read and write
7FF4E14CC000
unkown
page readonly
5FFB000
unkown
page read and write
7FF50539C000
unkown
page readonly
DC6E000
unkown
page read and write
7FF505723000
unkown
page readonly
6C42000
unkown
page readonly
1909F7BA000
trusted library allocation
page read and write
1909F7B0000
trusted library allocation
page read and write
831F000
stack
page read and write
E398CFD000
stack
page read and write
5462000
unkown
page read and write
480000
unkown
page readonly
760000
unkown
page readonly
B11E000
stack
page read and write
15E1450E000
heap
page read and write
7FF505434000
unkown
page readonly
6D5E000
unkown
page readonly
432000
unkown
page execute read
7FF5050FE000
unkown
page readonly
23768B9E000
trusted library allocation
page read and write
7FF50563D000
unkown
page readonly
432000
unkown
page execute read
40A4000
unkown
page read and write
7FF505500000
unkown
page readonly
B50000
unkown
page read and write
116E000
stack
page read and write
DB5A000
unkown
page read and write
DB54000
unkown
page read and write
7FFFEA3C3000
unkown
page readonly
6EA9000
unkown
page readonly
5EFF000
unkown
page read and write
7FF505714000
unkown
page readonly
22F66BE4000
heap
page read and write
1909F960000
trusted library allocation
page read and write
A89F000
stack
page read and write
5388000
unkown
page read and write
51A5000
unkown
page read and write
23768BA2000
trusted library allocation
page read and write
2376B095000
trusted library allocation
page read and write
22F66BBE000
heap
page read and write
1909F750000
trusted library allocation
page read and write
879B000
stack
page read and write
42A000
unkown
page execute read
23768B9E000
trusted library allocation
page read and write
27F0000
unkown
page readonly
22F66BC4000
heap
page read and write
4440000
unkown
page read and write
432000
unkown
page execute read
2060F240000
unkown
page readonly
42A000
unkown
page execute read
1909F780000
trusted library allocation
page read and write
401000
unkown
page execute read
4650000
unkown
page read and write
497000
unkown
page read and write
20FEB070000
heap
page read and write
42D000
unkown
page execute read
22F66D7D000
heap
page read and write
20FEB229000
heap
page read and write
DC91000
unkown
page read and write
464C000
stack
page read and write
7FF50545B000
unkown
page readonly
AC9A000
stack
page read and write
1909F930000
trusted library allocation
page read and write
4D0000
remote allocation
page read and write
464C000
stack
page read and write
881B000
stack
page read and write
7FFFEA3DA000
unkown
page readonly
769C000
stack
page read and write
15E17120000
direct allocation
page read and write
15E144C8000
heap
page read and write
7FF4E57E2000
unkown
page readonly
1BD308BC000
heap
page read and write
5F04000
direct allocation
page read and write
400000
unkown
page readonly
7FF505686000
unkown
page readonly
1909F7A0000
trusted library allocation
page read and write
7FF4E587E000
unkown
page readonly
DB5A000
unkown
page read and write
490E000
stack
page read and write
7FF505586000
unkown
page readonly
3D80000
unkown
page read and write
1909F760000
trusted library allocation
page read and write
23768FCB000
heap
page read and write
441000
unkown
page readonly
15E171E0000
direct allocation
page read and write
2376B095000
trusted library allocation
page read and write
22F66BAB000
heap
page read and write
A89F000
stack
page read and write
2A60000
unkown
page read and write
AC1A000
stack
page read and write
4E0000
remote allocation
page read and write
1909F7E0000
trusted library allocation
page read and write
6C34000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
7FF505626000
unkown
page readonly
420000
unkown
page readonly
6A0D000
unkown
page readonly
3D30000
unkown
page read and write
5EF1000
direct allocation
page read and write
10000
heap
page read and write
116E000
stack
page read and write
7FF50523B000
unkown
page readonly
F3DE4FE000
stack
page read and write
15A77A77000
heap
page read and write
22F66BAB000
heap
page read and write
4D0000
remote allocation
page read and write
3D90000
unkown
page readonly
497000
unkown
page read and write
15E15D40000
direct allocation
page read and write
4D0000
remote allocation
page read and write
1909F470000
heap
page read and write
6005000
unkown
page read and write
7FF50523B000
unkown
page readonly
4260000
unkown
page read and write
21A79502000
heap
page read and write
23768BA4000
trusted library allocation
page read and write
7FFFEA3DA000
unkown
page readonly
B31B000
stack
page read and write
1909F90A000
trusted library allocation
page read and write
3F11000
unkown
page read and write
B50000
unkown
page readonly
50A0000
unkown
page read and write
7FF5052DB000
unkown
page readonly
871D000
stack
page read and write
2950000
trusted library allocation
page read and write
22F66BD3000
heap
page read and write
3F11000
unkown
page read and write
140727B000
stack
page read and write
1BD308A5000
heap
page read and write
22F66BD9000
heap
page read and write
21A794E5000
heap
page read and write
92F74FB000
stack
page read and write
20FEB213000
heap
page read and write
4480000
direct allocation
page read and write
5F7F000
unkown
page read and write
2120000
heap
page read and write
22F66BC2000
heap
page read and write
1EE2DB90000
heap
page read and write
15E1452C000
heap
page read and write
1BD3084E000
heap
page read and write
BBC000
stack
page read and write
18165E3C000
heap
page read and write
20E0000
unkown
page readonly
15E14502000
heap
page read and write
15A77AA2000
heap
page read and write
29EA000
heap
page read and write
4F0000
unkown
page readonly
15E1720F000
direct allocation
page read and write
1827E7E000
stack
page read and write
4F0000
unkown
page readonly
56F0000
trusted library allocation
page readonly
2060F630000
heap
page read and write
2CC0000
direct allocation
page execute and read and write
E4E4000
unkown
page read and write
1909F7C0000
trusted library allocation
page read and write
13AF000
stack
page read and write
66CE000
unkown
page readonly
7FF505443000
unkown
page readonly
23768FE8000
heap
page read and write
E223000
unkown
page read and write
7FF50567E000
unkown
page readonly
18165F08000
heap
page read and write
1909F780000
trusted library allocation
page read and write
23768BA4000
trusted library allocation
page read and write
22F66BC8000
heap
page read and write
7FF505236000
unkown
page readonly
420000
unkown
page readonly
7FF5050DF000
unkown
page readonly
1F45C03E000
heap
page read and write
43E000
unkown
page execute read
1909F900000
trusted library allocation
page read and write
1909F960000
trusted library allocation
page read and write
1909F910000
trusted library allocation
page read and write
7FF5054A1000
unkown
page readonly
498000
unkown
page readonly
1BD320B3000
direct allocation
page read and write
1909F7A0000
trusted library allocation
page read and write
7FF4E57E2000
unkown
page readonly
43E000
unkown
page execute read
480000
unkown
page readonly
23768BA7000
trusted library allocation
page read and write
A85E47C000
stack
page read and write
DE7E000
unkown
page read and write
22F66BAE000
heap
page read and write
6EB5000
unkown
page readonly
15E144E4000
heap
page read and write
1909F7E0000
trusted library allocation
page read and write
7FF505682000
unkown
page readonly
20FEB200000
heap
page read and write
1BD33510000
direct allocation
page read and write
5090000
unkown
page read and write
7FF5056B0000
unkown
page readonly
468A000
unkown
page read and write
15E15F00000
heap
page read and write
4BC277E000
stack
page read and write
545E000
unkown
page read and write
4050000
unkown
page read and write
263F000
unkown
page read and write
1B635113000
heap
page read and write
7FFFEA41F000
unkown
page readonly
405B000
unkown
page read and write
7FF505513000
unkown
page readonly
6C42000
unkown
page readonly
46A8000
unkown
page read and write
5610000
unkown
page read and write
7FF4E57EA000
unkown
page readonly
6DC5000
unkown
page readonly
7FF505268000
unkown
page readonly
1909F900000
trusted library allocation
page read and write
22F66BCE000
heap
page read and write
20000
unkown
page read and write
5521000
trusted library allocation
page read and write
480000
unkown
page readonly
22F66BCE000
heap
page read and write
15A7D4E0000
remote allocation
page read and write
1B635100000
heap
page read and write
7FF5052FB000
unkown
page readonly
1909F51F000
heap
page read and write
92F76FE000
stack
page read and write
4480000
direct allocation
page read and write
7FF50567E000
unkown
page readonly
DB20000
unkown
page read and write
3D2A000
unkown
page read and write
7FF505443000
unkown
page readonly
419C000
stack
page read and write
1909F920000
trusted library allocation
page read and write
13119250000
heap
page read and write
7DF4035F0000
unkown
page readonly
7FF50529E000
unkown
page readonly
13282EB0000
heap
page read and write
1909F900000
trusted library allocation
page read and write
5EA7000
unkown
page read and write
6E03000
unkown
page readonly
7FF50539C000
unkown
page readonly
DE90000
unkown
page read and write
AC1A000
stack
page read and write
7FF505322000
unkown
page readonly
1E281F40000
heap
page read and write
43E000
unkown
page execute read
13119130000
heap
page read and write
831F000
stack
page read and write
4D0000
remote allocation
page read and write
7FFFEA3B3000
unkown
page read and write
258A000
unkown
page read and write
7FF5053A7000
unkown
page readonly
27CF9FB0000
heap
page read and write
FB9F000
stack
page read and write
1E0000
unkown
page read and write
4BC26FE000
stack
page read and write
1909F7B0000
trusted library allocation
page read and write
7FF50546D000
unkown
page readonly
AB1B000
stack
page read and write
22F66BBC000
heap
page read and write
21A7948A000
heap
page read and write
1909F780000
trusted library allocation
page read and write
6DEE000
unkown
page readonly
140787E000
stack
page read and write
AE9A000
stack
page read and write
7FF4E5875000
unkown
page readonly
E145000
unkown
page read and write
4D0000
remote allocation
page read and write
7FF505238000
unkown
page readonly
2730000
heap
page read and write
13119229000
heap
page read and write
7FF50569C000
unkown
page readonly
1EE2DEC0000
heap
page read and write
5701000
heap
page read and write
7FF5052A2000
unkown
page readonly
1311927E000
heap
page read and write
7EC0000
heap
page read and write
6BA7000
unkown
page readonly
7FF505644000
unkown
page readonly
7894000
unkown
page read and write
424A000
stack
page read and write
B298000
stack
page read and write
22F66C00000
heap
page read and write
20FEB24B000
heap
page read and write
4888000
stack
page read and write
15E14537000
heap
page read and write
544D000
unkown
page read and write
3D80000
unkown
page read and write
7618000
stack
page read and write
1F0000
unkown
page readonly
50B0000
unkown
page read and write
12AE000
stack
page read and write
13AF000
stack
page read and write
4480000
direct allocation
page read and write
23768D00000
heap
page read and write
5360000
unkown
page read and write
435000
unkown
page execute read
DE3F000
unkown
page read and write
46B8000
unkown
page read and write
1BD308BD000
heap
page read and write
22F66BC0000
heap
page read and write
DB84000
unkown
page read and write
22F66BD9000
heap
page read and write
1ADFAB00000
heap
page read and write
2123000
heap
page read and write
AF9E000
stack
page read and write
7FF505240000
unkown
page readonly
22F66BC6000
heap
page read and write
821F000
stack
page read and write
29A9000
stack
page read and write
6005000
unkown
page read and write
7FF5053E7000
unkown
page readonly
401000
unkown
page execute read
25EA000
unkown
page read and write
23768FD9000
heap
page read and write
1EE2DC58000
heap
page read and write
1E2820A0000
heap
page read and write
1BD30818000
heap
page read and write
7FF504F84000
unkown
page readonly
3F00000
unkown
page read and write
4480000
direct allocation
page read and write
7B083FC000
stack
page read and write
4806000
stack
page read and write
7FF50561E000
unkown
page readonly
21BA6B70000
heap
page read and write
13119300000
heap
page read and write
1F45C067000
heap
page read and write
23768B9E000
trusted library allocation
page read and write
F3DE94E000
stack
page read and write
7FF4E588A000
unkown
page readonly
4F78000
heap
page read and write
468C000
unkown
page read and write
1BD308A2000
heap
page read and write
50B5000
unkown
page read and write
53BB000
unkown
page read and write
3FE9000
stack
page read and write
1B634F20000
heap
page read and write
5394000
unkown
page read and write
B11E000
stack
page read and write
7FF50563D000
unkown
page readonly
DB44000
unkown
page read and write
1909F940000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
DCE2000
unkown
page read and write
6DEE000
unkown
page readonly
50AA000
unkown
page read and write
4010000
unkown
page readonly
570000
unkown
page readonly
50C5000
unkown
page read and write
23768FEA000
heap
page read and write
1E28219C000
heap
page read and write
2060F347000
heap
page read and write
B11E000
stack
page read and write
20FEB251000
heap
page read and write
6690000
unkown
page readonly
5F7B000
unkown
page read and write
4650000
unkown
page read and write
22F66BC0000
heap
page read and write
88B3000
unkown
page read and write
2531000
unkown
page read and write
1311926D000
heap
page read and write
FA9E000
stack
page read and write
B50000
unkown
page readonly
490000
unkown
page read and write
15E144D8000
heap
page read and write
50A8000
unkown
page read and write
20DF000
stack
page read and write
7FF5052C5000
unkown
page readonly
25DC000
unkown
page read and write
4330000
unkown
page readonly
468C000
unkown
page read and write
7FF505720000
unkown
page readonly
7FF50524F000
unkown
page readonly
15A7D380000
trusted library allocation
page read and write
482000
unkown
page write copy
7FF4E584F000
unkown
page readonly
1909FC9D000
heap
page read and write
26EE000
stack
page read and write
15A7D3A4000
trusted library allocation
page read and write
7DF5057FB000
unkown
page readonly
2AAB000
heap
page read and write
15E144DB000
heap
page read and write
6D0C000
unkown
page readonly
779D000
stack
page read and write
DCCE000
unkown
page read and write
22F66BF1000
heap
page read and write
7B0000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
15E14550000
heap
page read and write
510C000
unkown
page read and write
1BD30852000
heap
page read and write
420000
unkown
page readonly
23768FE8000
heap
page read and write
58D0000
direct allocation
page read and write
5E60000
unkown
page read and write
15A77A97000
heap
page read and write
7FF505086000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
53AF000
unkown
page read and write
52B7000
unkown
page read and write
1BD308BA000
heap
page read and write
42C0000
unkown
page write copy
BBC000
stack
page read and write
7FF5056B0000
unkown
page readonly
8349277000
stack
page read and write
50B5000
unkown
page read and write
126E000
stack
page read and write
4B0000
remote allocation
page read and write
25B1000
unkown
page read and write
15E144DB000
heap
page read and write
5446000
unkown
page read and write
7596000
stack
page read and write
7DF403671000
unkown
page execute read
1909F900000
trusted library allocation
page read and write
7FF5052FB000
unkown
page readonly
49F0000
unclassified section
page read and write
4480000
direct allocation
page read and write
23768B97000
trusted library allocation
page read and write
13283089000
heap
page read and write
1909F930000
trusted library allocation
page read and write
1F45C060000
heap
page read and write
2A60000
unkown
page read and write
7FF5052E1000
unkown
page readonly
15E144DE000
heap
page read and write
4520000
unkown
page readonly
1F45C078000
heap
page read and write
6DC5000
unkown
page readonly
27CF9EF0000
heap
page read and write
DB20000
unkown
page read and write
1909F7A0000
trusted library allocation
page read and write
50BD000
unkown
page read and write
2376B085000
trusted library allocation
page read and write
7FF50525F000
unkown
page readonly
6EC9000
unkown
page readonly
1909F960000
trusted library allocation
page read and write
B50000
unkown
page read and write
1909F7C0000
trusted library allocation
page read and write
7FFFEA3BE000
unkown
page read and write
1909F46C000
heap
page read and write
2977000
heap
page read and write
401000
unkown
page execute read
7FF5057D0000
unkown
page readonly
42D000
unkown
page execute read
1909F770000
trusted library allocation
page read and write
23768FB2000
heap
page read and write
A85DCFE000
stack
page read and write
7FF50524F000
unkown
page readonly
50AA000
unkown
page read and write
6B95000
unkown
page readonly
3D0A000
unkown
page read and write
1F45BF40000
heap
page read and write
52BC000
unkown
page read and write
790000
unkown
page readonly
50BD000
unkown
page read and write
4C06CFB000
stack
page read and write
15E15D5B000
direct allocation
page read and write
1328305B000
heap
page read and write
5396000
unkown
page read and write
6BA7000
unkown
page readonly
555A000
trusted library allocation
page read and write
1BD30875000
heap
page read and write
15A77AB2000
heap
page read and write
7FF50561E000
unkown
page readonly
3F30000
unkown
page read and write
22F66B80000
heap
page read and write
21A79518000
heap
page read and write
15A77980000
heap
page read and write
DF1E000
unkown
page read and write
5EAB000
unkown
page read and write
2570000
unkown
page read and write
1BD30869000
heap
page read and write
E08D000
unkown
page read and write
23768BB0000
heap
page readonly
23768FE3000
heap
page read and write
13AF000
stack
page read and write
22F66BC4000
heap
page read and write
5364000
unkown
page read and write
2376B095000
trusted library allocation
page read and write
430000
unkown
page readonly
4A80000
unkown
page readonly
7FF505723000
unkown
page readonly
B31B000
stack
page read and write
7FF5050B3000
unkown
page readonly
5483000
unkown
page read and write
1909F940000
trusted library allocation
page read and write
3D90000
unkown
page readonly
7FF5052D9000
unkown
page readonly
468C000
unkown
page read and write
13283060000
heap
page read and write
22F66BEE000
heap
page read and write
1ADFA288000
heap
page read and write
740000
unkown
page readonly
2531000
unkown
page read and write
23768B9E000
trusted library allocation
page read and write
1909F920000
trusted library allocation
page read and write
18165F00000
heap
page read and write
22F66A90000
heap
page read and write
7FF505659000
unkown
page readonly
6EBC000
unkown
page readonly
5364000
unkown
page read and write
52C5000
unkown
page read and write
538C000
unkown
page read and write
6E8C000
unkown
page readonly
1EE2DC71000
heap
page read and write
783A000
unkown
page read and write
7FF5056F8000
unkown
page readonly
811B000
stack
page read and write
2606000
unkown
page read and write
1B635057000
heap
page read and write
3DB0000
unkown
page readonly
2624000
unkown
page read and write
7FF5056C4000
unkown
page readonly
23768FE3000
heap
page read and write
7FF505374000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
1909F7C0000
trusted library allocation
page read and write
6BAF000
unkown
page readonly
5240000
unkown
page read and write
2A5E000
heap
page read and write
7FF5057A1000
unkown
page readonly
1B635068000
heap
page read and write
1B635064000
heap
page read and write
560C000
stack
page read and write
2A48000
heap
page read and write
1F45C032000
heap
page read and write
22F66B9C000
heap
page read and write
1F45C06A000
heap
page read and write
1BD30861000
heap
page read and write
C88BFD000
stack
page read and write
3D10000
unkown
page read and write
15E142D0000
remote allocation
page read and write
6EC9000
unkown
page readonly
15A77A70000
heap
page read and write
15A78559000
heap
page read and write
50B0000
unkown
page read and write
1909F790000
trusted library allocation
page read and write
50C9000
unkown
page read and write
22F66BCE000
heap
page read and write
2624000
unkown
page read and write
2376B095000
trusted library allocation
page read and write
22F66BEE000
heap
page read and write
23768B97000
trusted library allocation
page read and write
F4B000
heap
page read and write
7FF5052F6000
unkown
page readonly
50B8000
unkown
page read and write
7FF50525D000
unkown
page readonly
13119302000
heap
page read and write
4A80000
unkown
page readonly
7FFFEA3B3000
unkown
page read and write
2376B095000
trusted library allocation
page read and write
7FFFEA3B5000
unkown
page read and write
7FF505413000
unkown
page readonly
4B7E000
stack
page read and write
22F66BCE000
heap
page read and write
435000
unkown
page execute read
1BD30881000
heap
page read and write
42A000
unkown
page execute read
432E000
stack
page read and write
4370000
direct allocation
page read and write
1909F900000
trusted library allocation
page read and write
5610000
unkown
page read and write
B91F000
stack
page read and write
676000
heap
page read and write
1BD320CF000
direct allocation
page read and write
1909F7B0000
trusted library allocation
page read and write
6EB5000
unkown
page readonly
53C6000
unkown
page read and write
562E000
trusted library allocation
page read and write
50A8000
unkown
page read and write
F3DE2F7000
stack
page read and write
C6000
stack
page read and write
50C3000
unkown
page read and write
1406D7B000
stack
page read and write
2376B095000
trusted library allocation
page read and write
15E14559000
heap
page read and write
7FF4E5872000
unkown
page readonly
22F66BC4000
heap
page read and write
545E000
unkown
page read and write
8519000
stack
page read and write
7FF5056B7000
unkown
page readonly
5E60000
unkown
page read and write
22F66BC8000
heap
page read and write
3D90000
unkown
page readonly
2CD7000
heap
page read and write
13AF000
stack
page read and write
3F30000
unkown
page read and write
264E000
unkown
page read and write
879B000
stack
page read and write
4C072FE000
stack
page read and write
C8877C000
stack
page read and write
18165E82000
heap
page read and write
2928000
stack
page read and write
3D00000
unkown
page read and write
4C68000
heap
page read and write
7FFFEA309000
unkown
page readonly
21A79440000
heap
page read and write
5FB17FE000
stack
page read and write
6630000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
E5E4000
unkown
page read and write
6B8E000
unkown
page readonly
9F40BFE000
stack
page read and write
6CAA000
unkown
page readonly
7FF505344000
unkown
page readonly
E523000
unkown
page read and write
1BD33562000
direct allocation
page read and write
2570000
heap
page read and write
1BD308A1000
heap
page read and write
9F408FC000
stack
page read and write
22F66B9A000
heap
page read and write
6B78000
unkown
page readonly
4D0000
remote allocation
page read and write
1BD334B0000
direct allocation
page read and write
4F78000
heap
page read and write
3F00000
unkown
page read and write
21A79500000
heap
page read and write
544D000
unkown
page read and write
3F40000
unkown
page read and write
18165E00000
heap
page read and write
6630000
unkown
page readonly
F40000
heap
page read and write
23768D0B000
heap
page read and write
42D000
unkown
page execute read
52BC000
unkown
page read and write
6A8000
heap
page read and write
1ADFA266000
heap
page read and write
6BBF000
unkown
page readonly
15E144D8000
heap
page read and write
22F66BD9000
heap
page read and write
7FF5050A6000
unkown
page readonly
126E000
stack
page read and write
441000
unkown
page readonly
13283067000
heap
page read and write
1909F920000
trusted library allocation
page read and write
5C8000
heap
page read and write
4480000
direct allocation
page read and write
2A5E000
heap
page read and write
22F66BB1000
heap
page read and write
23768BA4000
trusted library allocation
page read and write
15A77A3D000
heap
page read and write
6CAA000
unkown
page readonly
22F66BF1000
heap
page read and write
7FF5055ED000
unkown
page readonly
7FF504F89000
unkown
page readonly
5357000
unkown
page read and write
15A77A8E000
heap
page read and write
52BC000
unkown
page read and write
1F45C07F000
heap
page read and write
7FFFEA309000
unkown
page readonly
4692000
unkown
page read and write
DFC5000
unkown
page read and write
1BD30848000
heap
page read and write
12AE000
stack
page read and write
22F66BAE000
heap
page read and write
5330000
trusted library allocation
page read and write
2060F346000
heap
page read and write
4050000
unkown
page read and write
4480000
direct allocation
page read and write
1909F910000
trusted library allocation
page read and write
3DF0000
unkown
page read and write
419C000
stack
page read and write
22F66BC8000
heap
page read and write
13283070000
heap
page read and write
B41E000
stack
page read and write
DCA7000
unkown
page read and write
21BA6A50000
heap
page read and write
66CE000
unkown
page readonly
205A000
stack
page read and write
22F66BBE000
heap
page read and write
23768BA4000
trusted library allocation
page read and write
68E000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
4AAC000
stack
page read and write
1BD320CB000
direct allocation
page read and write
538C000
unkown
page read and write
6B78000
unkown
page readonly
261B000
unkown
page read and write
1ADFA229000
heap
page read and write
1E282080000
heap
page read and write
1909F7D0000
trusted library allocation
page read and write
7FF50509B000
unkown
page readonly
15A7D38E000
trusted library allocation
page read and write
15E144D8000
heap
page read and write
13283077000
heap
page read and write
5442000
unkown
page read and write
1F45BED0000
heap
page read and write
1BD30894000
heap
page read and write
F40000
heap
page read and write
740000
unkown
page readonly
7FF505644000
unkown
page readonly
540000
trusted library allocation
page read and write
1EE2DB70000
heap
page read and write
25B1000
unkown
page read and write
22F66950000
heap
page read and write
3F30000
unkown
page read and write
49F1000
unclassified section
page execute read
B41E000
stack
page read and write
B49B000
stack
page read and write
C888FB000
stack
page read and write
15A78518000
heap
page read and write
7FF505370000
unkown
page readonly
116E000
stack
page read and write
1909F900000
trusted library allocation
page read and write
1909F7B0000
trusted library allocation
page read and write
5388000
unkown
page read and write
1311924C000
heap
page read and write
15E144EC000
heap
page read and write
821F000
stack
page read and write
29A9000
stack
page read and write
7FF505325000
unkown
page readonly
1909F7C0000
trusted library allocation
page read and write
7FFFEA427000
unkown
page readonly
1909F781000
trusted library allocation
page read and write
7FF505650000
unkown
page readonly
88B3000
unkown
page read and write
7B087FF000
stack
page read and write
7FFFEA3C0000
unkown
page read and write
50C1000
unkown
page read and write
22F66BB1000
heap
page read and write
23768B9A000
trusted library allocation
page read and write
15E144E0000
heap
page read and write
4A0000
unkown
page readonly
22F66BCE000
heap
page read and write
7FF505265000
unkown
page readonly
15E14521000
heap
page read and write
482000
unkown
page write copy
BA9F000
stack
page read and write
1BD3085C000
heap
page read and write
B445AFE000
stack
page read and write
42D000
unkown
page execute read
540000
unkown
page readonly
2730000
heap
page read and write
1909F51D000
heap
page read and write
F40000
heap
page read and write
7820000
unkown
page read and write
23768B9E000
trusted library allocation
page read and write
7FF50543D000
unkown
page readonly
441000
unkown
page readonly
1909F781000
trusted library allocation
page read and write
140777F000
stack
page read and write
1909F7B0000
trusted library allocation
page read and write
781D000
stack
page read and write
22F66BF1000
heap
page read and write
7FF505265000
unkown
page readonly
B50000
unkown
page readonly
23768BA5000
trusted library allocation
page read and write
22F66BE7000
heap
page read and write
15A77A91000
heap
page read and write
18165CF0000
heap
page read and write
7FF505783000
unkown
page readonly
7FF5056A3000
unkown
page readonly
4F0000
unkown
page readonly
1909F7B0000
trusted library allocation
page read and write
7FF505799000
unkown
page readonly
A99E000
stack
page read and write
1BD3084A000
heap
page read and write
53A8000
unkown
page read and write
131191C0000
trusted library allocation
page read and write
1F45C07C000
heap
page read and write
DC85000
unkown
page read and write
1909F904000
trusted library allocation
page read and write
2A30000
unkown
page read and write
7894000
unkown
page read and write
7FF505090000
unkown
page readonly
1909F790000
trusted library allocation
page read and write
1909F790000
trusted library allocation
page read and write
7FF5057DA000
unkown
page readonly
1F45C044000
heap
page read and write
5357000
unkown
page read and write
116E000
stack
page read and write
1311924E000
heap
page read and write
15E144F1000
heap
page read and write
5F7F000
unkown
page read and write
490000
unkown
page read and write
50CB000
unkown
page read and write
1E282110000
heap
page read and write
5357000
unkown
page read and write
22F66D50000
heap
page read and write
F89E000
stack
page read and write
7FF50537A000
unkown
page readonly
7C0000
unkown
page readonly
490000
unkown
page read and write
871D000
stack
page read and write
7FF50509B000
unkown
page readonly
F20000
trusted library allocation
page read and write
525D000
unkown
page read and write
1909F930000
trusted library allocation
page read and write
6B51000
unkown
page readonly
6B95000
unkown
page readonly
78A1000
unkown
page read and write
7FF5050B3000
unkown
page readonly
15A77970000
heap
page read and write
58D0000
direct allocation
page read and write
15A7D3C4000
trusted library allocation
page read and write
7FF5056F8000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
2570000
unkown
page read and write
4C06DFE000
stack
page read and write
1909F900000
trusted library allocation
page read and write
22F66BBC000
heap
page read and write
1909F780000
trusted library allocation
page read and write
2730000
heap
page read and write
1050000
heap
page read and write
E081000
unkown
page read and write
23768B91000
trusted library allocation
page read and write
18165C90000
heap
page read and write
6A0D000
unkown
page readonly
116E000
stack
page read and write
22F66B8E000
heap
page read and write
5090000
unkown
page read and write
7845000
unkown
page read and write
1909F950000
trusted library allocation
page read and write
4520000
unkown
page readonly
6EA7000
unkown
page readonly
B19B000
stack
page read and write
7FF505507000
unkown
page readonly
1BD3083A000
heap
page read and write
7FF50572D000
unkown
page readonly
3F60000
unkown
page read and write
15E14548000
heap
page read and write
1311923C000
heap
page read and write
540000
trusted library allocation
page read and write
7A0000
unkown
page read and write
7FF4E5860000
unkown
page readonly
50B0000
unkown
page read and write
22F66B6B000
heap
page read and write
769C000
stack
page read and write
1BD33490000
direct allocation
page read and write
2490000
unkown
page readonly
7270000
unkown
page read and write
7FF50548F000
unkown
page readonly
6E7E000
unkown
page readonly
22F66C50000
heap
page read and write
F4B000
heap
page read and write
F59A000
stack
page read and write
B219000
stack
page read and write
18165C80000
heap
page read and write
21BA6900000
heap
page read and write
7FF50525F000
unkown
page readonly
4520000
unkown
page readonly
3D40000
unkown
page read and write
1909F7B0000
trusted library allocation
page read and write
E56B000
unkown
page read and write
7FF5053A4000
unkown
page readonly
7879000
unkown
page read and write
7FF505254000
unkown
page readonly
7845000
unkown
page read and write
5610000
unkown
page read and write
4260000
unkown
page read and write
7FFFEA221000
unkown
page execute read
262D000
unkown
page read and write
7FF5056B7000
unkown
page readonly
4010000
unkown
page readonly
15E17140000
direct allocation
page read and write
15E15D5D000
direct allocation
page read and write
7FFFEA3C0000
unkown
page read and write
15A79103000
heap
page read and write
4D0000
remote allocation
page read and write
881B000
stack
page read and write
6AD7000
unkown
page readonly
20FEB9A0000
remote allocation
page read and write
53BE000
unkown
page read and write
7FF5050FE000
unkown
page readonly
2376B0E0000
trusted library allocation
page execute
23768FAF000
heap
page read and write
22F66BAE000
heap
page read and write
7FF4E5872000
unkown
page readonly
1ADFA020000
heap
page read and write
5980000
heap
page read and write
538E000
stack
page read and write
7FF4E5868000
unkown
page readonly
6690000
unkown
page readonly
7B0857C000
stack
page read and write
5394000
unkown
page read and write
441000
unkown
page readonly
1ADFA302000
heap
page read and write
DC48000
unkown
page read and write
7FF505448000
unkown
page readonly
43E000
unkown
page execute read
B219000
stack
page read and write
2376B095000
trusted library allocation
page read and write
7FFFEA3BD000
unkown
page write copy
1E28214F000
heap
page read and write
4F26000
heap
page read and write
23768FE8000
heap
page read and write
15E144DB000
heap
page read and write
15E14550000
heap
page read and write
7FF504F84000
unkown
page readonly
15E1720F000
direct allocation
page read and write
22F66D70000
heap
page read and write
1909F780000
trusted library allocation
page read and write
7FF505696000
unkown
page readonly
C889FC000
stack
page read and write
2060F240000
unkown
page readonly
DFB5000
unkown
page read and write
22F66BB7000
heap
page read and write
15A77AAB000
heap
page read and write
10000
heap
page read and write
1F45C031000
heap
page read and write
B50000
unkown
page read and write
676000
heap
page read and write
20DF000
stack
page read and write
22F66BEE000
heap
page read and write
10000
heap
page read and write
7FF505279000
unkown
page readonly
83492FE000
stack
page read and write
3DC0000
unkown
page readonly
4F7B000
heap
page read and write
E0E8000
unkown
page read and write
8831000
unkown
page read and write
5F04000
direct allocation
page read and write
51AC000
unkown
page read and write
23768B95000
trusted library allocation
page read and write
50C5000
unkown
page read and write
21A7AE70000
trusted library allocation
page read and write
7FF50539A000
unkown
page readonly
7FF5057A1000
unkown
page readonly
2606000
unkown
page read and write
20FEB060000
heap
page read and write
15E144E8000
heap
page read and write
7FF5050C0000
unkown
page readonly
6E2C000
unkown
page readonly
15E15D5F000
direct allocation
page read and write
15E143B0000
heap
page read and write
7FF4E57E5000
unkown
page readonly
482000
unkown
page write copy
435000
unkown
page execute read
AF9E000
stack
page read and write
42C0000
unkown
page write copy
5C0000
heap
page read and write
C886FE000
stack
page read and write
F20000
trusted library allocation
page read and write
4480000
direct allocation
page read and write
E318000
unkown
page read and write
2732000
heap
page read and write
2650000
unkown
page read and write
1DAAFFE000
stack
page read and write
1DAADFF000
stack
page read and write
43AA000
direct allocation
page read and write
18165E60000
heap
page read and write
7FF505750000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
5520000
unkown
page read and write
1ADFA120000
trusted library allocation
page read and write
43E000
unkown
page execute read
27CF9FE0000
heap
page read and write
2A50000
unkown
page readonly
46B8000
unkown
page read and write
1F45C05E000
heap
page read and write
2A70000
unkown
page readonly
6E55000
unkown
page readonly
27CF9ED0000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
B91F000
stack
page read and write
DFB7000
unkown
page read and write
4B53000
unkown
page read and write
24FA000
unkown
page read and write
6AD7000
unkown
page readonly
23768FCB000
heap
page read and write
7FF4E586A000
unkown
page readonly
50C7000
unkown
page read and write
3D30000
unkown
page read and write
1909F781000
trusted library allocation
page read and write
B99B000
stack
page read and write
25EA000
unkown
page read and write
4AFD000
stack
page read and write
50AA000
unkown
page read and write
7FF5056C4000
unkown
page readonly
1F45C07B000
heap
page read and write
22F66C03000
heap
page read and write
809D000
stack
page read and write
1ADF9FC0000
heap
page read and write
E566000
unkown
page read and write
21A79459000
heap
page read and write
22F66BA1000
heap
page read and write
F20000
trusted library allocation
page read and write
6D73000
unkown
page readonly
7FF505097000
unkown
page readonly
7FF5050F8000
unkown
page readonly
7165000
unkown
page read and write
26EC000
stack
page read and write
1ADFA300000
heap
page read and write
22F66B4E000
heap
page read and write
5394000
unkown
page read and write
B91F000
stack
page read and write
498000
unkown
page readonly
50C1000
unkown
page read and write
140767F000
stack
page read and write
7FF505795000
unkown
page readonly
4108000
unkown
page read and write
538C000
unkown
page read and write
6360000
unkown
page read and write
15E144C5000
heap
page read and write
859C000
stack
page read and write
3D20000
unkown
page read and write
46B6000
unkown
page read and write
1909F790000
trusted library allocation
page read and write
6BBF000
unkown
page readonly
1909F790000
trusted library allocation
page read and write
1909F780000
trusted library allocation
page read and write
22F66BC4000
heap
page read and write
22F66C44000
heap
page read and write
EFC000
stack
page read and write
22F66BEE000
heap
page read and write
5240000
unkown
page read and write
53C6000
unkown
page read and write
AC9A000
stack
page read and write
6E2C000
unkown
page readonly
22F66AB0000
heap
page read and write
51D2000
unkown
page read and write
5396000
unkown
page read and write
6B95000
unkown
page readonly
4B0000
remote allocation
page read and write
1311924B000
heap
page read and write
1BD30830000
heap
page read and write
52B7000
unkown
page read and write
22F66BF1000
heap
page read and write
18165E5A000
heap
page read and write
2060F250000
unkown
page read and write
1B635040000
heap
page read and write
23768FD0000
heap
page read and write
DC78000
unkown
page read and write
560C000
stack
page read and write
1F45C013000
heap
page read and write
7894000
unkown
page read and write
1909F7B0000
trusted library allocation
page read and write
50E8000
unkown
page read and write
23768FE4000
heap
page read and write
482000
unkown
page write copy
116E000
stack
page read and write
F40000
heap
page read and write
66CB000
unkown
page readonly
7B088FD000
stack
page read and write
258A000
unkown
page read and write
4680000
unkown
page read and write
22F66C01000
heap
page read and write
1F45C046000
heap
page read and write
1EE2DEC5000
heap
page read and write
4F7B000
heap
page read and write
7856000
unkown
page read and write
27F0000
unkown
page readonly
7FF4E5879000
unkown
page readonly
1909F900000
trusted library allocation
page read and write
7618000
stack
page read and write
6D35000
unkown
page readonly
510C000
unkown
page read and write
50CB000
unkown
page read and write
7FF505295000
unkown
page readonly
22F66C69000
heap
page read and write
3D30000
unkown
page read and write
7FF5054CE000
unkown
page readonly
3FE9000
stack
page read and write
1BD308BD000
heap
page read and write
2AA5000
heap
page read and write
DC8F000
unkown
page read and write
7FF5052F1000
unkown
page readonly
1D0000
unkown
page readonly
1F45C06C000
heap
page read and write
2A60000
unkown
page read and write
7FFFEA220000
unkown
page readonly
3DA0000
unkown
page readonly
AE19000
stack
page read and write
53BB000
unkown
page read and write
20E0000
unkown
page readonly
7FF4E57E0000
unkown
page readonly
4440000
unkown
page read and write
23768B9A000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
7FF505086000
unkown
page readonly
7FF5054EE000
unkown
page readonly
23768BA4000
trusted library allocation
page read and write
2060F230000
unkown
page readonly
15A7D4E0000
trusted library allocation
page read and write
C88CFF000
stack
page read and write
E2A5000
unkown
page read and write
1BD30869000
heap
page read and write
7DF4035E0000
unkown
page readonly
4C06E7F000
stack
page read and write
7FF505647000
unkown
page readonly
7FF5054D8000
unkown
page readonly
A85DF7E000
stack
page read and write
51D2000
unkown
page read and write
7B5000
heap
page read and write
E22E000
unkown
page read and write
25AD000
unkown
page read and write
2376B095000
trusted library allocation
page read and write
1EE2DBF0000
heap
page read and write
1909F7A0000
trusted library allocation
page read and write
F3DE3FE000
stack
page read and write
819C000
stack
page read and write
2A2A000
stack
page read and write
1BD30851000
heap
page read and write
20000
unkown
page read and write
4692000
unkown
page read and write
8699000
stack
page read and write
22F66BB1000
heap
page read and write
24A0000
unkown
page readonly
AB9B000
stack
page read and write
42D000
unkown
page execute read
1BD33530000
direct allocation
page read and write
4650000
unkown
page read and write
1ADFA23E000
heap
page read and write
DB73000
unkown
page read and write
7FF50557F000
unkown
page readonly
2060F35A000
heap
page read and write
1050000
heap
page read and write
1BD32270000
heap
page read and write
7FF505279000
unkown
page readonly
4000000
unkown
page readonly
7FF50524B000
unkown
page readonly
1909F910000
trusted library allocation
page read and write
1F45C03A000
heap
page read and write
7FF5054D8000
unkown
page readonly
53BE000
unkown
page read and write
3F20000
unkown
page read and write
4480000
direct allocation
page read and write
7FF5057C4000
unkown
page readonly
22F66BDE000
heap
page read and write
1909F46D000
heap
page read and write
DE08000
unkown
page read and write
15E144DA000
heap
page read and write
542E000
stack
page read and write
E5E4000
unkown
page read and write
15E17160000
direct allocation
page read and write
530F000
stack
page read and write
F40000
heap
page read and write
DB44000
unkown
page read and write
68E000
heap
page read and write
23768BA6000
trusted library allocation
page read and write
22F66BC2000
heap
page read and write
470000
unkown
page readonly
520000
unkown
page read and write
23768B95000
trusted library allocation
page read and write
2A60000
heap
page read and write
6B8E000
unkown
page readonly
480000
unkown
page readonly
DFAE000
unkown
page read and write
15E144D7000
heap
page read and write
21A79340000
heap
page read and write
21A79449000
heap
page read and write
22F66B6B000
heap
page read and write
22F66BC6000
heap
page read and write
2060F346000
heap
page read and write
1909F7C0000
trusted library allocation
page read and write
F3DEF9B000
stack
page read and write
7894000
unkown
page read and write
15E14440000
direct allocation
page read and write
126E000
stack
page read and write
6EA0000
unkown
page readonly
1909F470000
heap
page read and write
7FF505246000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
22F66BBE000
heap
page read and write
676000
heap
page read and write
190853BE000
heap
page read and write
520000
unkown
page read and write
7FF505737000
unkown
page readonly
23768FD9000
heap
page read and write
1E2822C5000
heap
page read and write
23768FB2000
heap
page read and write
498000
unkown
page readonly
1E282177000
heap
page read and write
49FA000
unclassified section
page read and write
2A70000
unkown
page readonly
53CF000
unkown
page read and write
13119252000
heap
page read and write
7FF5053E7000
unkown
page readonly
22F66B5B000
heap
page read and write
261B000
unkown
page read and write
23768BA4000
trusted library allocation
page read and write
DC93000
unkown
page read and write
1909F910000
trusted library allocation
page read and write
1ADFAA02000
heap
page read and write
859C000
stack
page read and write
92F6F9B000
stack
page read and write
480000
unkown
page readonly
27E6000
stack
page read and write
21A7949B000
heap
page read and write
4C06BFA000
stack
page read and write
811B000
stack
page read and write
15A78518000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
22F66B80000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
4987000
stack
page read and write
22F66BC0000
heap
page read and write
2110000
unkown
page read and write
1ADFA2C9000
heap
page read and write
5EF1000
direct allocation
page read and write
9F40AFE000
stack
page read and write
3DF0000
unkown
page read and write
6BBF000
unkown
page readonly
22F66BC4000
heap
page read and write
262D000
unkown
page read and write
1BD30640000
remote allocation
page read and write
13283113000
heap
page read and write
AC9A000
stack
page read and write
2060F635000
heap
page read and write
3D0A000
unkown
page read and write
40A4000
unkown
page read and write
4888000
stack
page read and write
1909F7B0000
trusted library allocation
page read and write
2120000
heap
page read and write
1909F7B0000
trusted library allocation
page read and write
841D000
stack
page read and write
1EE2DA30000
heap
page read and write
AB1B000
stack
page read and write
5EFF000
unkown
page read and write
7FF4E57EA000
unkown
page readonly
18165E5E000
heap
page read and write
B4458FC000
stack
page read and write
50C7000
unkown
page read and write
7FF505372000
unkown
page readonly
1F45C061000
heap
page read and write
1909F920000
trusted library allocation
page read and write
52C5000
unkown
page read and write
F3DEE9F000
stack
page read and write
424A000
stack
page read and write
1B635028000
heap
page read and write
7FF505737000
unkown
page readonly
22F66BD9000
heap
page read and write
6DC5000
unkown
page readonly
1050000
heap
page read and write
7FF50537A000
unkown
page readonly
15E14534000
heap
page read and write
2110000
unkown
page read and write
1BD30875000
heap
page read and write
5FFB000
unkown
page read and write
4480000
direct allocation
page read and write
7FF50531E000
unkown
page readonly
AE9A000
stack
page read and write
13119213000
heap
page read and write
7FF4E584C000
unkown
page readonly
2732000
heap
page read and write
7FF4E5836000
unkown
page readonly
B298000
stack
page read and write
3D40000
unkown
page read and write
3F20000
unkown
page read and write
525D000
unkown
page read and write
1DAAD7B000
stack
page read and write
432000
unkown
page execute read
DCB9000
unkown
page read and write
5FFB000
unkown
page read and write
23768FD9000
heap
page read and write
3D20000
unkown
page read and write
27E6000
stack
page read and write
66A0000
unkown
page readonly
7FF505370000
unkown
page readonly
23768FE3000
heap
page read and write
497000
unkown
page read and write
7FF50571C000
unkown
page readonly
2650000
unkown
page read and write
50E8000
unkown
page read and write
FB1D000
stack
page read and write
13283002000
heap
page read and write
15A77A93000
heap
page read and write
DB63000
unkown
page read and write
E523000
unkown
page read and write
21A7B002000
trusted library allocation
page read and write
29E0000
heap
page read and write
22F66BBE000
heap
page read and write
7FF505097000
unkown
page readonly
AB9B000
stack
page read and write
DCF2000
unkown
page read and write
2376B095000
trusted library allocation
page read and write
12AE000
stack
page read and write
7A0000
unkown
page read and write
22F66BBC000
heap
page read and write
7FFFEA3BA000
unkown
page read and write
1909F7E0000
trusted library allocation
page read and write
22F66D76000
heap
page read and write
E2AF000
unkown
page read and write
29A9000
stack
page read and write
2624000
unkown
page read and write
92F75FE000
stack
page read and write
1909F7C0000
trusted library allocation
page read and write
4E0000
remote allocation
page read and write
49FC000
unclassified section
page readonly
7FF505679000
unkown
page readonly
22F66B47000
heap
page read and write
7596000
stack
page read and write
23768B9E000
trusted library allocation
page read and write
24E0000
unkown
page read and write
15A7D380000
trusted library allocation
page read and write
BA9F000
stack
page read and write
3D70000
unkown
page read and write
1E0000
unkown
page read and write
78A0000
unkown
page read and write
18165E13000
heap
page read and write
525D000
unkown
page read and write
50B8000
unkown
page read and write
1DAAB7E000
stack
page read and write
22F66BF1000
heap
page read and write
4520000
heap
page read and write
2100000
unkown
page read and write
21A792D0000
heap
page read and write
2060F340000
heap
page read and write
140757D000
stack
page read and write
4340000
unkown
page readonly
24A0000
unkown
page readonly
15E144E8000
heap
page read and write
1909F780000
trusted library allocation
page read and write
7FF505790000
unkown
page readonly
12AE000
stack
page read and write
400000
unkown
page readonly
5446000
unkown
page read and write
5EF1000
direct allocation
page read and write
498000
unkown
page readonly
1909F940000
trusted library allocation
page read and write
3F20000
unkown
page read and write
1F45C085000
heap
page read and write
7FFFEA3BC000
unkown
page read and write
497000
unkown
page read and write
5364000
unkown
page read and write
261B000
unkown
page read and write
1F45C062000
heap
page read and write
5F7B000
unkown
page read and write
42A000
unkown
page execute read
405B000
unkown
page read and write
B49B000
stack
page read and write
7270000
unkown
page read and write
23768FCB000
heap
page read and write
3D70000
unkown
page read and write
540000
unkown
page readonly
1BD30836000
heap
page read and write
7FF505562000
unkown
page readonly
1BD3084C000
heap
page read and write
6EA7000
unkown
page readonly
4108000
unkown
page read and write
16E91FE000
stack
page read and write
2060F639000
heap
page read and write
15E144F7000
heap
page read and write
50B8000
unkown
page read and write
6EA0000
unkown
page readonly
7FF50573B000
unkown
page readonly
24E0000
unkown
page read and write
22F66BF1000
heap
page read and write
6ED2000
unkown
page readonly
1BD308BC000
heap
page read and write
1BD30893000
heap
page read and write
23768BC0000
heap
page read and write
15E14511000
heap
page read and write
21A79370000
trusted library allocation
page read and write
22F66D7D000
heap
page read and write
6ED2000
unkown
page readonly
2376B095000
trusted library allocation
page read and write
22F66BC8000
heap
page read and write
DC56000
unkown
page read and write
401000
unkown
page execute read
DB75000
unkown
page read and write
470000
unkown
page readonly
1909F900000
trusted library allocation
page read and write
8831000
unkown
page read and write
43E000
unkown
page execute read
23768F90000
heap
page read and write
4480000
direct allocation
page read and write
21A7949B000
heap
page read and write
1050000
heap
page read and write
EFC000
stack
page read and write
7FF505714000
unkown
page readonly
785F000
unkown
page read and write
A85D88B000
stack
page read and write
3D20000
unkown
page read and write
3F40000
unkown
page read and write
6D9C000
unkown
page readonly
50A0000
unkown
page read and write
7FF5050C4000
unkown
page readonly
15A7D3A1000
trusted library allocation
page read and write
4A0D000
stack
page read and write
3D60000
unkown
page read and write
441000
unkown
page readonly
8619000
stack
page read and write
18277AF000
stack
page read and write
7FF505659000
unkown
page readonly
498000
unkown
page readonly
1BD320B7000
direct allocation
page read and write
22F66C40000
heap
page read and write
22F66BC0000
heap
page read and write
22F66BA5000
heap
page read and write
1E28213E000
heap
page read and write
1909F910000
trusted library allocation
page read and write
3F60000
unkown
page read and write
13283041000
heap
page read and write
1BD30780000
heap
page read and write
25B1000
unkown
page read and write
859C000
stack
page read and write
4020000
unkown
page read and write
7FF505686000
unkown
page readonly
7FFFEA3C3000
unkown
page readonly
7FF5052D9000
unkown
page readonly
1B635002000
heap
page read and write
205A000
stack
page read and write
7FFFEA3BE000
unkown
page read and write
1BD3357F000
direct allocation
page read and write
5360000
unkown
page read and write
1DAAEF7000
stack
page read and write
5C8000
heap
page read and write
7FF50523E000
unkown
page readonly
1BD30848000
heap
page read and write
F20000
trusted library allocation
page read and write
7FF5053DA000
unkown
page readonly
C8887D000
stack
page read and write
1909F911000
trusted library allocation
page read and write
2A78000
heap
page read and write
23768FC9000
heap
page read and write
22F66BC8000
heap
page read and write
22F66BC6000
heap
page read and write
22F66BB6000
heap
page read and write
7FF505271000
unkown
page readonly
BBC000
stack
page read and write
1BD334F0000
direct allocation
page read and write
1909F900000
trusted library allocation
page read and write
42A000
unkown
page execute read
7FF4E584C000
unkown
page readonly
27F0000
unkown
page readonly
540000
heap
page read and write
50C3000
unkown
page read and write
23768B97000
trusted library allocation
page read and write
1BD308BA000
heap
page read and write
560C000
stack
page read and write
1ADFA268000
heap
page read and write
1909F7D0000
trusted library allocation
page read and write
8519000
stack
page read and write
1909F900000
trusted library allocation
page read and write
53A8000
unkown
page read and write
1ADFA200000
heap
page read and write
15E171A0000
direct allocation
page read and write
7FF4E5879000
unkown
page readonly
819C000
stack
page read and write
23768D2C000
heap
page read and write
7FF50568A000
unkown
page readonly
7FF50568D000
unkown
page readonly
7FF5056EC000
unkown
page readonly
7FF50546B000
unkown
page readonly
1F45C000000
heap
page read and write
22F66B87000
heap
page read and write
15E171F0000
direct allocation
page read and write
4B53000
unkown
page read and write
66E3000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
1E0000
unkown
page read and write
5360000
unkown
page read and write
18165F02000
heap
page read and write
16E8FF7000
stack
page read and write
1909F780000
trusted library allocation
page read and write
4540000
unkown
page read and write
6005000
unkown
page read and write
E128000
unkown
page read and write
4480000
direct allocation
page read and write
1B635000000
heap
page read and write
22F66BC2000
heap
page read and write
46B6000
unkown
page read and write
2A70000
heap
page read and write
E5A2000
unkown
page read and write
6E7E000
unkown
page readonly
7FF5050F8000
unkown
page readonly
1F45C06E000
heap
page read and write
7FF50569C000
unkown
page readonly
22F66BE3000
heap
page read and write
BBC000
stack
page read and write
1BD334D0000
direct allocation
page read and write
1F45C05C000
heap
page read and write
5367000
unkown
page read and write
DFBC000
unkown
page read and write
4888000
stack
page read and write
15A7D4E0000
remote allocation
page read and write
8519000
stack
page read and write
4692000
unkown
page read and write
1909F780000
trusted library allocation
page read and write
C6000
stack
page read and write
4A0D000
stack
page read and write
23768FD9000
heap
page read and write
4F27000
heap
page read and write
7FF50540D000
unkown
page readonly
1EE2DC50000
heap
page read and write
482000
unkown
page write copy
58D0000
direct allocation
page read and write
23768FE3000
heap
page read and write
23768FCB000
heap
page read and write
1B6357C0000
trusted library allocation
page read and write
1909F750000
trusted library allocation
page read and write
15A77A7A000
heap
page read and write
1B635802000
trusted library allocation
page read and write
25DC000
unkown
page read and write
7FF50550B000
unkown
page readonly
7FF505434000
unkown
page readonly
42D000
unkown
page execute read
7FF4E14CC000
unkown
page readonly
4F7C000
heap
page read and write
1909F534000
heap
page read and write
1BD320CD000
direct allocation
page read and write
7FFFEA3B5000
unkown
page read and write
23768B9E000
trusted library allocation
page read and write
1F45CA02000
trusted library allocation
page read and write
3DA0000
unkown
page readonly
23768FE8000
heap
page read and write
21A7AEF0000
remote allocation
page read and write
7FF5053E3000
unkown
page readonly
6D0C000
unkown
page readonly
1909F780000
trusted library allocation
page read and write
E5A2000
unkown
page read and write
520000
unkown
page read and write
4BC267B000
stack
page read and write
6ED2000
unkown
page readonly
834937F000
stack
page read and write
7DF4035F1000
unkown
page execute read
15E171F2000
direct allocation
page read and write
7FF50572D000
unkown
page readonly
4340000
unkown
page readonly
1909F7B0000
trusted library allocation
page read and write
1909F7D0000
trusted library allocation
page read and write
1DAAC7B000
stack
page read and write
AB9B000
stack
page read and write
5FB19FE000
stack
page read and write
1909F950000
trusted library allocation
page read and write
4000000
unkown
page readonly
262D000
unkown
page read and write
23768BA4000
trusted library allocation
page read and write
53A8000
unkown
page read and write
1909F920000
trusted library allocation
page read and write
12AE000
stack
page read and write
26EC000
stack
page read and write
3DD0000
unkown
page read and write
6EBC000
unkown
page readonly
15E144E0000
heap
page read and write
7866000
unkown
page read and write
1909F488000
heap
page read and write
6E2C000
unkown
page readonly
2975000
heap
page read and write
7FF5050D8000
unkown
page readonly
7FF4E57E0000
unkown
page readonly
1909F790000
trusted library allocation
page read and write
22F66C07000
heap
page read and write
132837C0000
trusted library allocation
page read and write
F4B000
heap
page read and write
B50000
heap
page read and write
1909F930000
trusted library allocation
page read and write
15A77A00000
heap
page read and write
1909F910000
trusted library allocation
page read and write
400000
unkown
page readonly
1827C7B000
stack
page read and write
1BD3089D000
heap
page read and write
7FF505347000
unkown
page readonly
15A77A75000
heap
page read and write
1E281FA0000
remote allocation
page read and write
24FA000
unkown
page read and write
7FF505258000
unkown
page readonly
7FF50524B000
unkown
page readonly
C87FEC000
stack
page read and write
50E8000
unkown
page read and write
1909F517000
heap
page read and write
4540000
unkown
page read and write
53AF000
unkown
page read and write
3F60000
unkown
page read and write
1050000
heap
page read and write
50C9000
unkown
page read and write
3D40000
unkown
page read and write
7FF505374000
unkown
page readonly
7820000
unkown
page read and write
4330000
unkown
page readonly
1ADFA2BB000
heap
page read and write
13283102000
heap
page read and write
15A77A13000
heap
page read and write
1909F780000
trusted library allocation
page read and write
E14C000
unkown
page read and write
6E93000
unkown
page readonly
23768FD9000
heap
page read and write
7FF50553F000
unkown
page readonly
2A2A000
stack
page read and write
1909F7B0000
trusted library allocation
page read and write
6D5E000
unkown
page readonly
51AC000
unkown
page read and write
6D35000
unkown
page readonly
23768FE2000
heap
page read and write
22F66B24000
heap
page read and write
1E282119000
heap
page read and write
7FF50541E000
unkown
page readonly
435000
unkown
page execute read
1BD30760000
heap
page read and write
7FF505552000
unkown
page readonly
20FEB0D0000
heap
page read and write
15A78559000
heap
page read and write
15E144F7000
heap
page read and write
7FF505268000
unkown
page readonly
4A0000
unkown
page readonly
7FF505322000
unkown
page readonly
1909F760000
trusted library allocation
page read and write
A91B000
stack
page read and write
7FF5054A1000
unkown
page readonly
13282EC0000
heap
page read and write
490000
unkown
page read and write
3DB0000
unkown
page readonly
56DA000
trusted library allocation
page read and write
23768FE3000
heap
page read and write
E31E000
unkown
page read and write
468A000
unkown
page read and write
1ADFA2CC000
heap
page read and write
23768BA4000
trusted library allocation
page read and write
15E15D47000
direct allocation
page read and write
BBC000
stack
page read and write
2060F639000
heap
page read and write
1F45BEE0000
heap
page read and write
5455000
unkown
page read and write
DAC0F0B000
stack
page read and write
1909F470000
heap
page read and write
51A7000
unkown
page read and write
E4E4000
unkown
page read and write
22F66BC4000
heap
page read and write
2100000
unkown
page read and write
1909F461000
heap
page read and write
23768BA4000
trusted library allocation
page read and write
7FF5050D8000
unkown
page readonly
7FF505452000
unkown
page readonly
13AF000
stack
page read and write
7B0000
heap
page read and write
B50000
unkown
page read and write
7FF5050C2000
unkown
page readonly
498000
unkown
page readonly
F89E000
stack
page read and write
B219000
stack
page read and write
1909F750000
trusted library allocation
page read and write
A85E17C000
stack
page read and write
15E144D8000
heap
page read and write
13119313000
heap
page read and write
7FF4E57E5000
unkown
page readonly
3EF0000
unkown
page read and write
819C000
stack
page read and write
6A8000
heap
page read and write
46A8000
unkown
page read and write
DB42000
unkown
page read and write
43E000
unkown
page execute read
7FF4E586A000
unkown
page readonly
50CB000
unkown
page read and write
841D000
stack
page read and write
53BB000
unkown
page read and write
540000
heap
page read and write
1050000
heap
page read and write
46B6000
unkown
page read and write
52B7000
unkown
page read and write
66CB000
unkown
page readonly
834947E000
stack
page read and write
1909F910000
trusted library allocation
page read and write
6E7E000
unkown
page readonly
15E144E8000
heap
page read and write
510C000
unkown
page read and write
22F66C03000
heap
page read and write
562C000
trusted library allocation
page read and write
22F66B6B000
heap
page read and write
21A79400000
heap
page read and write
5446000
unkown
page read and write
13119200000
heap
page read and write
1909F7D0000
trusted library allocation
page read and write
A85E07E000
stack
page read and write
1909F930000
trusted library allocation
page read and write
811B000
stack
page read and write
3F40000
unkown
page read and write
7DF5057FB000
unkown
page readonly
7FF50531A000
unkown
page readonly
22F66B50000
heap
page read and write
5521000
trusted library allocation
page read and write
50A4000
unkown
page read and write
401000
unkown
page execute read
22F66BF1000
heap
page read and write
21A79390000
trusted library allocation
page read and write
4B90000
unkown
page read and write
498000
unkown
page readonly
1909F940000
trusted library allocation
page read and write
1E283FA0000
heap
page read and write
435000
unkown
page execute read
6E8C000
unkown
page readonly
23768BA4000
trusted library allocation
page read and write
8699000
stack
page read and write
EFC000
stack
page read and write
3EF0000
unkown
page read and write
1F45C03D000
heap
page read and write
7FF50562C000
unkown
page readonly
C883FB000
stack
page read and write
205A000
stack
page read and write
23768FE8000
heap
page read and write
7FF50546D000
unkown
page readonly
7FF50531A000
unkown
page readonly
781D000
stack
page read and write
15E144E2000
heap
page read and write
5396000
unkown
page read and write
2606000
unkown
page read and write
7FF50557F000
unkown
page readonly
15E171C0000
direct allocation
page read and write
22F66B00000
trusted library allocation
page read and write
23768BA4000
trusted library allocation
page read and write
7FFFEA3BD000
unkown
page write copy
1ADFA2E4000
heap
page read and write
25ED000
unkown
page read and write
1E2822C0000
heap
page read and write
7FF505757000
unkown
page readonly
1BD30896000
heap
page read and write
21A7948B000
heap
page read and write
1909F950000
trusted library allocation
page read and write
4050000
unkown
page read and write
2110000
unkown
page read and write
7FF505236000
unkown
page readonly
53C6000
unkown
page read and write
1ADFA26F000
heap
page read and write
1F45BF70000
trusted library allocation
page read and write
5D90000
direct allocation
page read and write
1909F7B0000
trusted library allocation
page read and write
7FF5052F6000
unkown
page readonly
1909F903000
trusted library allocation
page read and write
3D10000
unkown
page read and write
1909F440000
trusted library allocation
page read and write
15A7D4E0000
remote allocation
page read and write
7EC0000
heap
page read and write
27CF9FEB000
heap
page read and write
A89F000
stack
page read and write
40A4000
unkown
page read and write
DB78000
unkown
page read and write
23768BA4000
trusted library allocation
page read and write
23768B9A000
trusted library allocation
page read and write
7FF4E5868000
unkown
page readonly
2531000
unkown
page read and write
53AF000
unkown
page read and write
22F66BC0000
heap
page read and write
5EFF000
unkown
page read and write
2A70000
unkown
page readonly
22F66BF1000
heap
page read and write
DB5A000
unkown
page read and write
13119308000
heap
page read and write
22F66B8E000
heap
page read and write
DC05000
unkown
page read and write
7FF5055ED000
unkown
page readonly
F20000
trusted library allocation
page read and write
4AB0000
heap
page read and write
F59A000
stack
page read and write
18166602000
trusted library allocation
page read and write
5520000
unkown
page read and write
6630000
unkown
page readonly
AB1B000
stack
page read and write
5800000
trusted library allocation
page read and write
7FF505344000
unkown
page readonly
4010000
unkown
page readonly
7FF5056CA000
unkown
page readonly
2376B095000
trusted library allocation
page read and write
3DD0000
unkown
page read and write
1F45C042000
heap
page read and write
F4B000
heap
page read and write
6D5E000
unkown
page readonly
2060F35B000
heap
page read and write
4440000
unkown
page read and write
78A2000
unkown
page read and write
4480000
direct allocation
page read and write
1BD33550000
direct allocation
page read and write
7FF505795000
unkown
page readonly
432000
unkown
page execute read
2650000
unkown
page read and write
7FF505295000
unkown
page readonly
4C063DB000
stack
page read and write
7FF505246000
unkown
page readonly
23768BA4000
trusted library allocation
page read and write
66A0000
unkown
page readonly
6360000
unkown
page read and write
4987000
stack
page read and write
9F409FE000
stack
page read and write
6BAF000
unkown
page readonly
6D73000
unkown
page readonly
6E55000
unkown
page readonly
7FF50568A000
unkown
page readonly
22F66BF1000
heap
page read and write
4108000
unkown
page read and write
5388000
unkown
page read and write
7FF5050E5000
unkown
page readonly
22F66BA5000
heap
page read and write
25DC000
unkown
page read and write
5FB15F7000
stack
page read and write
50B5000
unkown
page read and write
5D90000
direct allocation
page read and write
7FF5050D3000
unkown
page readonly
22F66B5B000
heap
page read and write
783A000
unkown
page read and write
1BD3087A000
heap
page read and write
7FF4E588A000
unkown
page readonly
B298000
stack
page read and write
There are 2646 hidden memdumps, click here to show them.