IOC Report
628df1368bdb5.dll

loading gif

Files

File Path
Type
Category
Malicious
628df1368bdb5.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_2f670449314c9cbe26f2787fed1eece2045eb75_7cac0383_1a8a9c09\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_895e5a36908a521ee0a162e13575c3f3aee3817c_7cac0383_00b9f588\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_8f579be425d8a5cc6392bac965f2eeac594eed7_7cac0383_14da83fd\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C69.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 25 09:18:06 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9081.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER92B4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF019.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 25 09:17:26 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF337.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF461.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDF4.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 25 09:17:29 2022, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\RES10A0.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\RES20CD.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ltvm2t1.11d.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mv15gf43.tzv.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\hpvnexdj\CSC5D09D8212D1C47D8BF5AC4D6502884C9.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\hpvnexdj\hpvnexdj.0.cs
UTF-8 Unicode (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\hpvnexdj\hpvnexdj.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hpvnexdj\hpvnexdj.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\hpvnexdj\hpvnexdj.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\vebwfha3\CSC57533E6B898B4B7BB8DAE45DDD64B0AA.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\vebwfha3\vebwfha3.0.cs
UTF-8 Unicode (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\vebwfha3\vebwfha3.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vebwfha3\vebwfha3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vebwfha3\vebwfha3.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
modified
C:\Users\user\Documents\20220525\PowerShell_transcript.414408.cCtJuFkM.20220525111811.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\TestLocal.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\WhiteBook.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\628df1368bdb5.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\628df1368bdb5.dll",#1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name sdiwcaphnc -value gp; new-alias -name ixgamvji -value iex; ixgamvji ([System.Text.Encoding]::ASCII.GetString((sdiwcaphnc "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
malicious
C:\Windows\System32\control.exe
C:\Windows\system32\control.exe -h
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\628df1368bdb5.dll
malicious
C:\Windows\System32\PING.EXE
ping localhost -n 5
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\628df1368bdb5.dll"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 408
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 416
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 440
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe" "about:<hta:application><script>Qiip='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Qiip).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\vebwfha3\vebwfha3.cmdline
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES10A0.tmp" "c:\Users\user\AppData\Local\Temp\vebwfha3\CSC57533E6B898B4B7BB8DAE45DDD64B0AA.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hpvnexdj\hpvnexdj.cmdline
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES20CD.tmp" "c:\Users\user\AppData\Local\Temp\hpvnexdj\CSC5D09D8212D1C47D8BF5AC4D6502884C9.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://176.10.119.68/
unknown
malicious
http://176.10.119.68/drew/mx2k_2BWD8_2Bui8f24/_2FdLStLGJu_2FNVLvlRqm/y6X2_2B4jlk2h/VQfu7A_2/B4a_2FxyofSjr6xGLTFfL2L/LNdngFf7rn/OvqAM3OC3xoRemh_2/FyMZKFMI26Y0/0mKxky2p8Sr/xj69YBE0ZOhFjW/zbyinwlKMAyzoBoDXw0WW/UcxtZ3YMxhs_2F9U/e4Hd9_2BGaNBJ3P/kN1X2IxLZzGc_2FIhp/HoxIXKFKE/9P_2FQckxF3sFvknjRk2/jU7nTpV83y_2Bc9IDLG/XJnktZ5U4942/cCc.jlk
176.10.119.68
malicious
http://176.10.119.68/drew/9wrEMOTFT/S91lCHc0I9lpMiqK6tED/3HmXCi0GHvk2bfJZ_2B/IWJ0PIriQTQ6c2m4hiKbFG/j7Ui6TupUgqv9/iXqd_2B6/HweqhRNKjLTfXm8aJ5EbULO/aj_2BCnAUF/p4g6MIba6j8L3cgyw/IecwOJcZqkV3/20iagORn0JW/8cL4QeYiL7dSmN/XiKK0HtesQsvb3dvhwxKN/_2FxNHFHozoDft4H/q_2F2UJyAbE0bmM/3E7KjzSrWV7DjWoo4u/DAXZOu_2FTcV_2B8l/611kp.jlk
176.10.119.68
malicious
http://176.10.119.68/drew/mx2k_2BWD8_2Bui8f24/_2FdLStLGJu_2FNVLvlRqm/y6X2_2B4jlk2h/VQfu7A_2/B4a_2Fxy
unknown
malicious
http://176.10.119.68/drew/9wrEMOTFT/S91lCHc0I9lpMiqK6tED/3HmXCi0GHvk2bfJZ_2B/IWJ0PIriQTQ6c2m4hiKbFG/
unknown
malicious
http://176.10.119.68/=i_
unknown
malicious
http://176.10.119.68/drew/9bo_2FGMDS/YX0iJpZn_2FnwDqZp/_2FkwYeVsi9m/tZW52eiU7bn/plbRkJU1Vd8To_/2Fp4VORrrB3C9OpiAUTKW/_2BEa68ZWZM_2F_2/FqQsrqaBoVKq7cT/nta4A0Rkv0C0nGFGba/jEcMhAfEj/i4t0z7q_2FtZbIXHHqGR/Q5KFjk2yTnVCetqf4Mv/o6_2BrnNfrIeaxRno6ljgz/e3ndGuwsYbRUB/3DL_2FNd/OjZb2_2BjErlndqGe5NpZyj/jIT9OJzbG0/KOr4XWJQo/_2FUsze0HrV/HT.jlk
176.10.119.68
malicious
http://176.10.119.68/drew/9bo_2FGMDS/YX0iJpZn_2FnwDqZp/_2FkwYeVsi9m/tZW52eiU7bn/plbRkJU1Vd8To_/2Fp4V
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://constitution.org/usdeclar.txt
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://constitution.org/usdeclar.txtC:
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://https://file://USER.ID%lu.exe/upd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
l-0007.l-dc-msedge.net
13.107.43.16
malicious

IPs

IP
Domain
Country
Malicious
176.10.119.68
unknown
Switzerland
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
EnableSPDY3_0
malicious
HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E
FileOptions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E
{1BED482B-BEBF-0564-A07F-D209D423264D}
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7B0000
system
page execute and read and write
malicious
57F8000
heap
page read and write
malicious
7B0000
system
page execute and read and write
malicious
2B63B79C000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
21CBC11E000
trusted library allocation
page read and write
malicious
5129000
heap
page read and write
malicious
65A8000
heap
page read and write
malicious
56FA000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
5779000
heap
page read and write
malicious
21CC440C000
heap
page read and write
malicious
11A0000
unclassified section
page execute and read and write
malicious
57F8000
heap
page read and write
malicious
2B63B79C000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
2B63B79C000
heap
page read and write
malicious
55FC000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
2B63B79C000
heap
page read and write
malicious
57F8000
heap
page read and write
malicious
65A8000
heap
page read and write
malicious
7B0000
system
page execute and read and write
malicious
547F000
heap
page read and write
malicious
1683A84D000
heap
page read and write
50E8000
unkown
page read and write
7E9000
system
page execute and read and write
416000
unkown
page write copy
DAA0000
unkown
page read and write
18A20240000
trusted library allocation
page read and write
21CC38B7000
heap
page read and write
811B000
stack
page read and write
3F40000
unkown
page read and write
E6E6000
unkown
page read and write
15397A66000
heap
page read and write
7FF5052C5000
unkown
page readonly
528C000
unkown
page read and write
539C000
unkown
page read and write
7FF4E584F000
unkown
page readonly
E6EB000
unkown
page read and write
E8B000
heap
page read and write
52C0000
unkown
page read and write
21CAB459000
trusted library allocation
page read and write
2510000
unkown
page readonly
4680000
unkown
page read and write
4F0000
unkown
page readonly
26DF000
stack
page read and write
7FF505679000
unkown
page readonly
1FA0525A000
trusted library allocation
page read and write
E8B000
heap
page read and write
184A55DD000
heap
page read and write
271CC4EB000
heap
page read and write
7FF50523E000
unkown
page readonly
7FF50524F000
unkown
page readonly
3D1A000
unkown
page read and write
5F5F000
trusted library allocation
page read and write
1FA05285000
trusted library allocation
page read and write
21CAF545000
trusted library allocation
page read and write
7FF5052D9000
unkown
page readonly
184A55D5000
heap
page read and write
21CC3BE0000
trusted library allocation
page read and write
5F7B000
unkown
page read and write
21CC3BC0000
trusted library allocation
page read and write
2D9EA393000
heap
page read and write
1EF2324E000
heap
page read and write
2D9EA39B000
heap
page read and write
2D9E9A3C000
heap
page read and write
7FF5050F8000
unkown
page readonly
7E5A87B000
stack
page read and write
18A20381000
trusted library allocation
page read and write
520000
unkown
page read and write
21B855A0000
heap
page read and write
4520000
unkown
page readonly
1351000
unclassified section
page execute read
13F1A040000
heap
page read and write
7FF5050FD000
unkown
page readonly
1FA02DB1000
heap
page read and write
75093FC000
stack
page read and write
7FF5055BA000
unkown
page readonly
5429000
unkown
page read and write
1F2003A7000
heap
page read and write
7FFFEA3B5000
unkown
page read and write
7FF5056A3000
unkown
page readonly
205A000
stack
page read and write
E6A3000
unkown
page read and write
2570000
unkown
page read and write
490E000
stack
page read and write
4260000
unkown
page read and write
7617000
stack
page read and write
5C8000
heap
page read and write
FA091FE000
unkown
page read and write
860000
remote allocation
page execute and read and write
2D9EA381000
heap
page read and write
25DC000
unkown
page read and write
5377000
unkown
page read and write
24B0000
unkown
page readonly
869B000
stack
page read and write
2D9E9A2C000
heap
page read and write
2D9E9A60000
heap
page read and write
7FF50568A000
unkown
page readonly
1E0000
unkown
page read and write
1FA0525E000
trusted library allocation
page read and write
514F000
unkown
page read and write
7FF5050C0000
unkown
page readonly
3D00000
unkown
page read and write
21CA989D000
heap
page read and write
201027E0000
direct allocation
page read and write
50D9000
unkown
page read and write
5443000
unkown
page read and write
1FA02DA1000
heap
page read and write
50B8000
unkown
page read and write
6A0D000
unkown
page readonly
2017F660000
heap
page read and write
27F0000
unkown
page readonly
468C000
unkown
page read and write
5367000
unkown
page read and write
40A4000
unkown
page read and write
21CA98E8000
heap
page read and write
7DD617D000
stack
page read and write
21CC3B90000
trusted library allocation
page read and write
271CDFAF000
direct allocation
page read and write
271CC4B4000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
7FF505452000
unkown
page readonly
7DF403671000
unkown
page execute read
851B000
stack
page read and write
21B85613000
heap
page read and write
FA08EF7000
stack
page read and write
50BD000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
53EF000
stack
page read and write
21B85602000
heap
page read and write
1EFCDC80000
heap
page read and write
7FF5053E3000
unkown
page readonly
2010288F000
direct allocation
page read and write
18A1AB60000
heap
page read and write
CD594FE000
stack
page read and write
40A4000
unkown
page read and write
2017F6E7000
heap
page read and write
6734000
direct allocation
page read and write
21CAB365000
heap
page read and write
5388000
unkown
page read and write
2D9E9A5C000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
66A0000
unkown
page readonly
27E6000
stack
page read and write
5377000
unkown
page read and write
3518000
heap
page read and write
7FF505723000
unkown
page readonly
6AD7000
unkown
page readonly
6025000
trusted library allocation
page read and write
2017F733000
heap
page read and write
1683A876000
heap
page read and write
7FF5053AF000
unkown
page readonly
7FF50561E000
unkown
page readonly
1320000
direct allocation
page read and write
1EF23200000
heap
page read and write
1FA02DBA000
heap
page read and write
3510000
heap
page read and write
21CBB597000
trusted library allocation
page read and write
CA54A7C000
stack
page read and write
1683A856000
heap
page read and write
F89E000
stack
page read and write
851B000
stack
page read and write
2D9EA39B000
heap
page read and write
21CA98A9000
heap
page read and write
7820000
unkown
page read and write
7165000
unkown
page read and write
2B6397B0000
unkown
page read and write
760000
unkown
page readonly
1359000
unclassified section
page readonly
3D80000
unkown
page read and write
75257FE000
stack
page read and write
7FFFEA220000
unkown
page readonly
8619000
stack
page read and write
25DC000
unkown
page read and write
7FF5054A1000
unkown
page readonly
46B6000
unkown
page read and write
7FF505790000
unkown
page readonly
7FF505090000
unkown
page readonly
21CC3BE0000
trusted library allocation
page read and write
21CC3B80000
trusted library allocation
page read and write
1EFCDCCA000
heap
page read and write
4010000
unkown
page readonly
50A4000
unkown
page read and write
1FA05257000
trusted library allocation
page read and write
851B000
stack
page read and write
2D9E9A5F000
heap
page read and write
7FF504F82000
unkown
page readonly
1EFCDCCA000
heap
page read and write
5C9E000
stack
page read and write
21CC3BD0000
trusted library allocation
page read and write
3DB0000
unkown
page readonly
4020000
unkown
page read and write
2D9EA38F000
heap
page read and write
809D000
stack
page read and write
50CB000
unkown
page read and write
3A099FB000
stack
page read and write
2624000
unkown
page read and write
1320000
direct allocation
page read and write
5BFB77D000
stack
page read and write
5371000
unkown
page read and write
5065D1F000
stack
page read and write
7FF50509B000
unkown
page readonly
CD0000
trusted library allocation
page read and write
740000
unkown
page readonly
2017F6D9000
heap
page read and write
7FF50525F000
unkown
page readonly
216728A0000
heap
page read and write
5132000
unkown
page read and write
271CC5F0000
direct allocation
page read and write
1FA02DB1000
heap
page read and write
258A000
unkown
page read and write
7FF5052E1000
unkown
page readonly
7E6000
system
page read and write
21CAF536000
trusted library allocation
page read and write
7FF505515000
unkown
page readonly
21CC3B80000
trusted library allocation
page read and write
783B000
unkown
page read and write
3DB0000
unkown
page readonly
1F20039F000
heap
page read and write
468C000
unkown
page read and write
3D80000
unkown
page read and write
46B8000
unkown
page read and write
7FF5052A2000
unkown
page readonly
3F00000
unkown
page read and write
271CC4D9000
heap
page read and write
7FF505238000
unkown
page readonly
2A30000
unkown
page read and write
271CC4E2000
heap
page read and write
21CC3CDD000
heap
page read and write
1320000
direct allocation
page read and write
21CC3CF0000
heap
page read and write
7FF505344000
unkown
page readonly
7FF5054E5000
unkown
page readonly
51EE000
unkown
page read and write
4260000
unkown
page read and write
6DC5000
unkown
page readonly
2CC0344C000
heap
page read and write
7B5000
heap
page read and write
AE19000
stack
page read and write
1320000
direct allocation
page read and write
2B63B49F000
heap
page read and write
6C34000
unkown
page readonly
184A55F0000
heap
page read and write
B49B000
stack
page read and write
2017F6F7000
heap
page read and write
53EA000
unkown
page read and write
20102840000
direct allocation
page read and write
21CC3C10000
trusted library allocation
page read and write
184A55E1000
heap
page read and write
1BD4FFE000
stack
page read and write
99C000
stack
page read and write
7FF505304000
unkown
page readonly
25DC000
unkown
page read and write
205A000
stack
page read and write
46B8000
unkown
page read and write
7FF50553F000
unkown
page readonly
22F5B7F000
stack
page read and write
401000
unkown
page execute read
2120000
heap
page read and write
1683A842000
heap
page read and write
7FF504F82000
unkown
page readonly
7FF5050C4000
unkown
page readonly
1FA02DBA000
heap
page read and write
21CC3B51000
trusted library allocation
page read and write
6630000
unkown
page readonly
AE19000
stack
page read and write
AB9B000
stack
page read and write
B219000
stack
page read and write
D94317B000
stack
page read and write
21672B00000
heap
page read and write
2B63B69D000
heap
page read and write
21CC3BE0000
trusted library allocation
page read and write
7FF50539C000
unkown
page readonly
34F5000
heap
page read and write
21B85600000
heap
page read and write
7FF505682000
unkown
page readonly
4A34000
unkown
page read and write
769C000
stack
page read and write
50BD000
unkown
page read and write
264E000
unkown
page read and write
2120000
heap
page read and write
26DF000
stack
page read and write
21B8566B000
heap
page read and write
7FF504F7C000
unkown
page readonly
5380000
unkown
page read and write
1EF23000000
heap
page read and write
22F5A7E000
stack
page read and write
2017FC07000
direct allocation
page read and write
40D000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
2017F709000
heap
page read and write
57F8000
heap
page read and write
3F40000
unkown
page read and write
2CC03448000
heap
page read and write
5EFF000
unkown
page read and write
2D9EA39D000
heap
page read and write
461000
unkown
page readonly
53EB000
unkown
page read and write
7847000
unkown
page read and write
6B95000
unkown
page readonly
5367000
unkown
page read and write
6ED2000
unkown
page readonly
2017F6F7000
heap
page read and write
21672A8E000
heap
page read and write
750927C000
stack
page read and write
E80000
heap
page read and write
7FF5056B7000
unkown
page readonly
2D9EA802000
heap
page read and write
5E30000
trusted library allocation
page read and write
6B8E000
unkown
page readonly
21CC3B60000
trusted library allocation
page read and write
537E000
stack
page read and write
2010288F000
direct allocation
page read and write
2120000
heap
page read and write
AF9E000
stack
page read and write
1F2003AD000
heap
page read and write
1EF2325B000
heap
page read and write
7FF505714000
unkown
page readonly
5520000
unkown
page read and write
690000
remote allocation
page read and write
271CC4A7000
heap
page read and write
490E000
stack
page read and write
413000
unkown
page read and write
22F58FE000
stack
page read and write
CA54AFE000
stack
page read and write
4440000
unkown
page read and write
25DEA629000
heap
page read and write
6CAA000
unkown
page readonly
7596000
stack
page read and write
7FF505258000
unkown
page readonly
540000
unkown
page readonly
7617000
stack
page read and write
6109000
trusted library allocation
page read and write
510C000
unkown
page read and write
7FF505799000
unkown
page readonly
21CAF582000
trusted library allocation
page read and write
5F7F000
unkown
page read and write
6A0D000
unkown
page readonly
7FF5054D8000
unkown
page readonly
7FF505246000
unkown
page readonly
18A1AD25000
heap
page read and write
1FA05264000
trusted library allocation
page read and write
1FA02D56000
heap
page read and write
21673202000
trusted library allocation
page read and write
CA54AFE000
stack
page read and write
1F20036E000
heap
page read and write
4108000
unkown
page read and write
66CE000
unkown
page readonly
6EA9000
unkown
page readonly
7FF505246000
unkown
page readonly
2D9EA39B000
heap
page read and write
1E8EC675000
heap
page read and write
7FF50576F000
unkown
page readonly
2F1DDFE000
stack
page read and write
1320000
direct allocation
page read and write
1FA05262000
trusted library allocation
page read and write
4330000
unkown
page readonly
153979E0000
trusted library allocation
page read and write
7B0000
heap
page read and write
21CC3BB0000
trusted library allocation
page read and write
21CAF228000
trusted library allocation
page read and write
21CBB6B8000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
2B6397B0000
unkown
page read and write
1FA05285000
trusted library allocation
page read and write
6360000
unkown
page read and write
881B000
stack
page read and write
1FA05186000
heap
page read and write
7FF50569C000
unkown
page readonly
40E000
unkown
page write copy
88B3000
unkown
page read and write
2750000
unkown
page read and write
7FF4E5872000
unkown
page readonly
7FF50524B000
unkown
page readonly
413000
unkown
page read and write
2B639810000
remote allocation
page read and write
114E000
stack
page read and write
51D2000
unkown
page read and write
B41E000
stack
page read and write
21CC3BC3000
trusted library allocation
page read and write
21CC3CD6000
heap
page read and write
65C0000
direct allocation
page read and write
3F00000
unkown
page read and write
65C0000
direct allocation
page read and write
50C7000
unkown
page read and write
3D0A000
unkown
page read and write
4F04CFF000
stack
page read and write
6033000
trusted library allocation
page read and write
68E000
heap
page read and write
7FF50524B000
unkown
page readonly
271CC46F000
heap
page read and write
7FF5056B7000
unkown
page readonly
510C000
unkown
page read and write
6721000
direct allocation
page read and write
1FA05257000
trusted library allocation
page read and write
FA090F9000
stack
page read and write
271CC420000
direct allocation
page read and write
51AC000
unkown
page read and write
21CAF3FD000
trusted library allocation
page read and write
881B000
stack
page read and write
2017FBC0000
direct allocation
page read and write
50BD000
unkown
page read and write
7FF50529E000
unkown
page readonly
2B63B49F000
heap
page read and write
1683A87C000
heap
page read and write
2B639A06000
heap
page read and write
21CC38C5000
heap
page read and write
50C9000
unkown
page read and write
271CC505000
heap
page read and write
470000
unkown
page readonly
570000
unkown
page readonly
21CA991D000
heap
page read and write
6B0000
remote allocation
page read and write
5F80000
heap
page read and write
4888000
stack
page read and write
7FF5056C4000
unkown
page readonly
769C000
stack
page read and write
2B639977000
heap
page read and write
4020000
unkown
page read and write
CA54A7C000
stack
page read and write
2B639910000
heap
page read and write
2B639B00000
heap
page read and write
50C9000
unkown
page read and write
1EF24BE0000
remote allocation
page read and write
7FF505723000
unkown
page readonly
2D9E9AAE000
heap
page read and write
AC1C000
stack
page read and write
1F200396000
heap
page read and write
2560000
unkown
page read and write
CD0000
trusted library allocation
page read and write
6A8000
heap
page read and write
50A4000
unkown
page read and write
8831000
unkown
page read and write
1F200388000
heap
page read and write
6AD7000
unkown
page readonly
21672B08000
heap
page read and write
401000
unkown
page execute read
7FF5057DA000
unkown
page readonly
18A1AC79000
heap
page read and write
7FF505659000
unkown
page readonly
819C000
stack
page read and write
7FFFEA427000
unkown
page readonly
2D9EA34C000
heap
page read and write
20E0000
unkown
page readonly
263F000
unkown
page read and write
21CC3BD0000
trusted library allocation
page read and write
1F200331000
heap
page read and write
1F20037E000
heap
page read and write
21CC3CF0000
heap
page read and write
18A20502000
heap
page read and write
21CC3937000
heap
page read and write
5610000
unkown
page read and write
21CAF58C000
trusted library allocation
page read and write
4806000
stack
page read and write
5452000
unkown
page read and write
1F2004B0000
heap
page read and write
40B000
unkown
page execute read
4249000
stack
page read and write
7FF505647000
unkown
page readonly
1683A7C0000
trusted library allocation
page read and write
6005000
unkown
page read and write
25DEA66C000
heap
page read and write
7FF505659000
unkown
page readonly
3D2A000
unkown
page read and write
416000
unkown
page write copy
271CC502000
heap
page read and write
1E8EC67F000
heap
page read and write
25DEA66B000
heap
page read and write
7E5A77F000
stack
page read and write
1E8EC4D0000
heap
page read and write
271CC4ED000
heap
page read and write
7FF505279000
unkown
page readonly
18A206C0000
remote allocation
page read and write
25DEA66A000
heap
page read and write
6D0C000
unkown
page readonly
7FF5053E3000
unkown
page readonly
7A0000
unkown
page read and write
21CA9950000
heap
page read and write
2D9EA37E000
heap
page read and write
7165000
unkown
page read and write
22F5D7E000
stack
page read and write
7FF5056F8000
unkown
page readonly
1F2003BB000
heap
page read and write
5393000
unkown
page read and write
1FA05265000
trusted library allocation
page read and write
520000
unkown
page read and write
7FF5052FE000
unkown
page readonly
CD0000
trusted library allocation
page read and write
54EA000
heap
page read and write
18A203D0000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
2017F6F3000
heap
page read and write
1F2002F9000
heap
page read and write
7FF5055ED000
unkown
page readonly
1F200600000
trusted library allocation
page read and write
7E9000
system
page readonly
5360000
unkown
page read and write
E5F000
stack
page read and write
46A9000
unkown
page read and write
7FF505586000
unkown
page readonly
6E7E000
unkown
page readonly
7B0000
heap
page read and write
5EAB000
unkown
page read and write
18A1C1C0000
trusted library allocation
page read and write
21CC3BA0000
trusted library allocation
page read and write
20E0000
unkown
page readonly
2D9EA802000
heap
page read and write
7FF5056CA000
unkown
page readonly
7FF50562C000
unkown
page readonly
4680000
unkown
page read and write
76DD57F000
stack
page read and write
184A55D4000
heap
page read and write
3EF0000
unkown
page read and write
135A000
unclassified section
page read and write
3F20000
unkown
page read and write
CA54CFE000
stack
page read and write
2B6399A6000
heap
page read and write
10000
heap
page read and write
FE1B000
stack
page read and write
2520000
unkown
page readonly
7FF5054D0000
unkown
page readonly
7FF505513000
unkown
page readonly
21CBB453000
trusted library allocation
page read and write
752639F000
stack
page read and write
42C0000
unkown
page write copy
2B639977000
heap
page read and write
DAA0000
unkown
page read and write
7FF5056FF000
unkown
page readonly
24E1000
unkown
page read and write
7FF50540D000
unkown
page readonly
760000
unkown
page readonly
7FF5057AB000
unkown
page readonly
7C0000
unkown
page readonly
89C000
stack
page read and write
7FF50568D000
unkown
page readonly
2D9E9A5E000
heap
page read and write
21CC3B80000
trusted library allocation
page read and write
21CC3B80000
trusted library allocation
page read and write
89C000
stack
page read and write
2017F6D6000
heap
page read and write
5065C9A000
stack
page read and write
7853000
unkown
page read and write
2D9E9ABF000
heap
page read and write
1FA05270000
trusted library allocation
page read and write
7FF5054D8000
unkown
page readonly
7FF4E14CC000
unkown
page readonly
26EC000
stack
page read and write
21CA9938000
heap
page read and write
536F000
unkown
page read and write
18A201D0000
trusted library allocation
page read and write
3D00000
unkown
page read and write
6B51000
unkown
page readonly
1FA02DB1000
heap
page read and write
5E55000
trusted library allocation
page read and write
676000
heap
page read and write
7525F4E000
stack
page read and write
25EA000
unkown
page read and write
1EF24BA0000
trusted library allocation
page read and write
7FFFEA3B5000
unkown
page read and write
46B6000
unkown
page read and write
50C3000
unkown
page read and write
21CC3BE0000
trusted library allocation
page read and write
7FF50562C000
unkown
page readonly
1F20030D000
heap
page read and write
4249000
stack
page read and write
7FF4E586A000
unkown
page readonly
1FA02DB1000
heap
page read and write
821F000
stack
page read and write
2017F717000
heap
page read and write
184A55D2000
heap
page read and write
1FA0517F000
heap
page read and write
271CC41F000
direct allocation
page read and write
21CC3B8D000
trusted library allocation
page read and write
7EE000
system
page readonly
271CC504000
heap
page read and write
790000
unkown
page readonly
21CC391F000
heap
page read and write
5237000
unkown
page read and write
20000
unkown
page read and write
7FF50523B000
unkown
page readonly
B31B000
stack
page read and write
7FF4E588A000
unkown
page readonly
1FA02DC1000
heap
page read and write
1F200383000
heap
page read and write
811B000
stack
page read and write
1FA05167000
heap
page read and write
15397B02000
heap
page read and write
5C5E000
stack
page read and write
4680000
unkown
page read and write
21CC3BC4000
trusted library allocation
page read and write
859C000
stack
page read and write
21CC3B60000
trusted library allocation
page read and write
21CC3B80000
trusted library allocation
page read and write
5379000
unkown
page read and write
1FA0525E000
trusted library allocation
page read and write
51D2000
unkown
page read and write
B219000
stack
page read and write
1F200372000
heap
page read and write
6AD7000
unkown
page readonly
18A20515000
heap
page read and write
7FFFEA309000
unkown
page readonly
7FFFEA3DA000
unkown
page readonly
21CAB270000
trusted library allocation
page read and write
4B05000
stack
page read and write
1F201F4D000
heap
page read and write
6DC5000
unkown
page readonly
5379000
unkown
page read and write
5FFD000
unkown
page read and write
1F20039A000
heap
page read and write
1320000
direct allocation
page read and write
66CB000
unkown
page readonly
5EA7000
unkown
page read and write
6EB5000
unkown
page readonly
1EF23010000
heap
page read and write
46B8000
unkown
page read and write
12C0000
heap
page read and write
2D9EA3AC000
heap
page read and write
4440000
unkown
page read and write
3D0A000
unkown
page read and write
18A1B718000
heap
page read and write
7FF5054E5000
unkown
page readonly
1F20039A000
heap
page read and write
21CAF42A000
trusted library allocation
page read and write
2D9EA39B000
heap
page read and write
262D000
unkown
page read and write
6BAF000
unkown
page readonly
6D0C000
unkown
page readonly
7FF4E57EA000
unkown
page readonly
184A5410000
heap
page read and write
2100000
unkown
page read and write
4F04BFF000
stack
page read and write
15397AE0000
heap
page read and write
539C000
unkown
page read and write
7FF505374000
unkown
page readonly
5520000
unkown
page read and write
1EF23170000
trusted library allocation
page read and write
1F200398000
heap
page read and write
66E3000
unkown
page readonly
1FA05264000
trusted library allocation
page read and write
21CC3BB0000
trusted library allocation
page read and write
2510000
unkown
page readonly
506617E000
stack
page read and write
5240000
unkown
page read and write
184A55C6000
heap
page read and write
3F40000
unkown
page read and write
5237000
unkown
page read and write
F91E000
stack
page read and write
1F200398000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
21CC3B50000
trusted library allocation
page read and write
831F000
stack
page read and write
7E5A67B000
stack
page read and write
F59A000
stack
page read and write
869B000
stack
page read and write
50B0000
unkown
page read and write
2D9EA391000
heap
page read and write
5443000
unkown
page read and write
2733000
unkown
page read and write
50A0000
unkown
page read and write
3DC0000
unkown
page readonly
21CC3D8A000
heap
page read and write
6E2C000
unkown
page readonly
1FA0525A000
trusted library allocation
page read and write
B91F000
stack
page read and write
CD0000
trusted library allocation
page read and write
2F1DEFE000
stack
page read and write
7FF505720000
unkown
page readonly
D10000
heap
page read and write
7FF505236000
unkown
page readonly
7FF50557F000
unkown
page readonly
E6EB000
unkown
page read and write
1FA05255000
trusted library allocation
page read and write
18A204A7000
heap
page read and write
7FF505511000
unkown
page readonly
3C011F9000
stack
page read and write
5446000
unkown
page read and write
271CC4FC000
heap
page read and write
1FA02DC1000
heap
page read and write
480000
trusted library allocation
page read and write
D5E000
stack
page read and write
1E8EC628000
heap
page read and write
7FF50573B000
unkown
page readonly
8831000
unkown
page read and write
7FFFEA3BA000
unkown
page read and write
20E0000
unkown
page readonly
1FA02DBA000
heap
page read and write
271CC407000
direct allocation
page read and write
5364000
unkown
page read and write
2D9EA39D000
heap
page read and write
416000
unkown
page write copy
D10000
heap
page read and write
419C000
stack
page read and write
4A80000
unkown
page readonly
271CC4A7000
heap
page read and write
5779000
heap
page read and write
D40000
heap
page read and write
184A55E1000
heap
page read and write
CD5947E000
stack
page read and write
21B8568A000
heap
page read and write
1FA05266000
trusted library allocation
page read and write
5BFB67F000
stack
page read and write
7FF50573B000
unkown
page readonly
4000000
unkown
page readonly
1EF23318000
heap
page read and write
2560000
unkown
page read and write
7FF505795000
unkown
page readonly
2CC03481000
heap
page read and write
21672B13000
heap
page read and write
76DD67C000
stack
page read and write
7FF50563D000
unkown
page readonly
18A1AC73000
heap
page read and write
5364000
unkown
page read and write
6C34000
unkown
page readonly
1F201F40000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
3F11000
unkown
page read and write
3D20000
unkown
page read and write
5373000
unkown
page read and write
2D9EA3A0000
heap
page read and write
3D30000
unkown
page read and write
5F7B000
unkown
page read and write
7FF505799000
unkown
page readonly
51A5000
unkown
page read and write
44E0000
unkown
page read and write
860000
remote allocation
page execute and read and write
642D000
heap
page read and write
21CC3B70000
trusted library allocation
page read and write
271CC492000
heap
page read and write
18A20502000
heap
page read and write
25B1000
unkown
page read and write
1F20038B000
heap
page read and write
416000
unkown
page write copy
7FF505696000
unkown
page readonly
2A30000
unkown
page read and write
430000
unkown
page readonly
6BA7000
unkown
page readonly
1F2003AD000
heap
page read and write
1320000
direct allocation
page read and write
25DEA671000
heap
page read and write
20102872000
direct allocation
page read and write
1200000
direct allocation
page read and write
A99E000
stack
page read and write
89C000
stack
page read and write
18A20450000
heap
page read and write
6690000
unkown
page readonly
6EA9000
unkown
page readonly
21CC3BA0000
trusted library allocation
page read and write
2D9EA3A1000
heap
page read and write
7FF5057D0000
unkown
page readonly
869B000
stack
page read and write
2017F6F1000
heap
page read and write
1EFCDEC0000
heap
page read and write
7FF50545B000
unkown
page readonly
7596000
stack
page read and write
2661000
unkown
page read and write
3D40000
unkown
page read and write
2D9EA1E0000
remote allocation
page read and write
2D9E9AE0000
heap
page read and write
66D2000
unkown
page readonly
3D80000
unkown
page read and write
18A2036E000
trusted library allocation
page read and write
7FF505591000
unkown
page readonly
7FF505795000
unkown
page readonly
7FF50576A000
unkown
page readonly
7FF50561E000
unkown
page readonly
E5F000
stack
page read and write
53EA000
unkown
page read and write
4440000
unkown
page read and write
4000000
unkown
page readonly
3EF0000
unkown
page read and write
26EC000
stack
page read and write
3D00000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
18A1B759000
heap
page read and write
51A9000
unkown
page read and write
5137000
unkown
page read and write
21CC3BA0000
trusted library allocation
page read and write
2017F6E6000
heap
page read and write
7FFFEA221000
unkown
page execute read
50AA000
unkown
page read and write
1F2003B6000
heap
page read and write
5354000
unkown
page read and write
CD599FC000
stack
page read and write
21CC3B80000
trusted library allocation
page read and write
25ED000
unkown
page read and write
21CC3937000
heap
page read and write
21CC3C00000
trusted library allocation
page read and write
7FF50525D000
unkown
page readonly
21CAF59C000
trusted library allocation
page read and write
5360000
unkown
page read and write
50C5000
unkown
page read and write
2B639B00000
heap
page read and write
3D20000
unkown
page read and write
2123000
heap
page read and write
7FF5052E1000
unkown
page readonly
430000
unkown
page readonly
5373000
unkown
page read and write
1320000
direct allocation
page read and write
B99B000
stack
page read and write
851B000
stack
page read and write
1F200396000
heap
page read and write
7FF505452000
unkown
page readonly
4F0487C000
stack
page read and write
B298000
stack
page read and write
5429000
unkown
page read and write
3D1A000
unkown
page read and write
520000
unkown
page read and write
216731B0000
trusted library allocation
page read and write
51A5000
unkown
page read and write
7FF5050DD000
unkown
page readonly
1FA02DB1000
heap
page read and write
781A000
stack
page read and write
1B65C029000
heap
page read and write
3D30000
unkown
page read and write
E42A000
heap
page read and write
21CC3B60000
trusted library allocation
page read and write
7FF5050D3000
unkown
page readonly
1320000
direct allocation
page read and write
E8B000
heap
page read and write
1F20061E000
heap
page read and write
3D40000
unkown
page read and write
5090000
unkown
page read and write
2733000
unkown
page read and write
4986000
stack
page read and write
261B56E0000
heap
page read and write
21CAB3F1000
trusted library allocation
page read and write
50C3000
unkown
page read and write
6B0000
remote allocation
page read and write
7FF505513000
unkown
page readonly
21CA994B000
heap
page read and write
7FF5056A3000
unkown
page readonly
2510000
unkown
page readonly
2D9EA1E0000
remote allocation
page read and write
184A58A0000
heap
page read and write
2B6397B0000
unkown
page read and write
99C000
stack
page read and write
25DEA700000
heap
page read and write
3DC0000
unkown
page readonly
7FF505448000
unkown
page readonly
1FA0525A000
trusted library allocation
page read and write
271CC4B4000
heap
page read and write
A89F000
stack
page read and write
7FF4E14D0000
unkown
page readonly
1FA02DA1000
heap
page read and write
24E1000
unkown
page read and write
21CC3B95000
trusted library allocation
page read and write
811B000
stack
page read and write
821F000
stack
page read and write
6B8E000
unkown
page readonly
4680000
unkown
page read and write
2017F721000
heap
page read and write
5452000
unkown
page read and write
25DEA500000
heap
page read and write
7E9000
system
page execute and read and write
1FA05251000
trusted library allocation
page read and write
401000
unkown
page execute read
52C7000
unkown
page read and write
7FFFEA220000
unkown
page readonly
7FF5054EB000
unkown
page readonly
477B000
unkown
page read and write
6D9C000
unkown
page readonly
4F052FE000
stack
page read and write
51D2000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
18A20461000
heap
page read and write
2D9E9AC6000
heap
page read and write
642D000
heap
page read and write
258A000
unkown
page read and write
7FF4E5872000
unkown
page readonly
21CAB3C0000
heap
page execute and read and write
3F30000
unkown
page read and write
50A4000
unkown
page read and write
779D000
stack
page read and write
25EA000
unkown
page read and write
A919000
stack
page read and write
271CC4BF000
heap
page read and write
2B63B69D000
heap
page read and write
D5E000
stack
page read and write
2D9E9AB4000
heap
page read and write
5452000
unkown
page read and write
6D5E000
unkown
page readonly
264E000
unkown
page read and write
1FA02D67000
heap
page read and write
6721000
direct allocation
page read and write
7FF505634000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
7FF5057A1000
unkown
page readonly
2A30000
unkown
page read and write
2B639B05000
heap
page read and write
2100000
unkown
page read and write
400000
unkown
page readonly
1FA05264000
trusted library allocation
page read and write
7FF5056EC000
unkown
page readonly
21CC3B89000
trusted library allocation
page read and write
50660F8000
stack
page read and write
1E8EC700000
heap
page read and write
1320000
direct allocation
page read and write
6E8C000
unkown
page readonly
1F200331000
heap
page read and write
781A000
stack
page read and write
66E3000
unkown
page readonly
6630000
unkown
page readonly
2D9E9A13000
heap
page read and write
2B6399D6000
heap
page read and write
2017F75B000
heap
page read and write
7FF505370000
unkown
page readonly
6DEE000
unkown
page readonly
1F200250000
heap
page read and write
7FF5050D8000
unkown
page readonly
2017F701000
heap
page read and write
76DD77D000
stack
page read and write
1F2003B9000
heap
page read and write
4650000
unkown
page read and write
18A1B5F3000
trusted library allocation
page read and write
2D9EA38F000
heap
page read and write
4B90000
unkown
page read and write
2100000
unkown
page read and write
21CC3B80000
trusted library allocation
page read and write
1FA02DBF000
heap
page read and write
2D9E9AAA000
heap
page read and write
5134000
unkown
page read and write
21CC3BD0000
trusted library allocation
page read and write
50C9000
unkown
page read and write
1683A858000
heap
page read and write
7DD5BFB000
stack
page read and write
830000
unkown
page read and write
25DEA655000
heap
page read and write
3F60000
unkown
page read and write
7FF50525F000
unkown
page readonly
263F000
unkown
page read and write
76DD37F000
stack
page read and write
7FF4E587E000
unkown
page readonly
2928000
stack
page read and write
18A203A4000
trusted library allocation
page read and write
4000000
unkown
page readonly
7FF505344000
unkown
page readonly
6B51000
unkown
page readonly
809D000
stack
page read and write
D5E000
stack
page read and write
7FF505650000
unkown
page readonly
7FF50504E000
unkown
page readonly
2123000
heap
page read and write
51A9000
unkown
page read and write
535D000
unkown
page read and write
21CC3B90000
trusted library allocation
page read and write
5371000
unkown
page read and write
E420000
heap
page read and write
50C5000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
271CC462000
heap
page read and write
51A9000
unkown
page read and write
DC237FF000
stack
page read and write
21CA989B000
heap
page read and write
413000
unkown
page read and write
1F201EE0000
heap
page read and write
1F2003A7000
heap
page read and write
18A203A0000
trusted library allocation
page read and write
1FA05264000
trusted library allocation
page read and write
50C3000
unkown
page read and write
2B639910000
heap
page read and write
2CC03C02000
trusted library allocation
page read and write
7FF4E584C000
unkown
page readonly
21CAD422000
trusted library allocation
page read and write
D94307F000
stack
page read and write
13F1A020000
heap
page read and write
1FA02550000
trusted library allocation
page read and write
7FF505507000
unkown
page readonly
1FD7000
stack
page read and write
7FF5053AF000
unkown
page readonly
4A0E000
stack
page read and write
5240000
unkown
page read and write
6EB5000
unkown
page readonly
7FF5050DF000
unkown
page readonly
7FF50556D000
unkown
page readonly
2B639990000
heap
page read and write
D10000
heap
page read and write
20102800000
direct allocation
page read and write
1FA05261000
trusted library allocation
page read and write
21CC3B60000
trusted library allocation
page read and write
577A000
heap
page read and write
4340000
unkown
page readonly
3A09E7E000
stack
page read and write
7FF4E5875000
unkown
page readonly
1FA0525A000
trusted library allocation
page read and write
1FA052D0000
trusted library allocation
page execute
1F200383000
heap
page read and write
480000
heap
page read and write
5446000
unkown
page read and write
21CAF5BB000
trusted library allocation
page read and write
1683A790000
heap
page read and write
7FF5054A1000
unkown
page readonly
1EF2326B000
heap
page read and write
6C42000
unkown
page readonly
1EF24BE0000
remote allocation
page read and write
6E8C000
unkown
page readonly
468E000
unkown
page read and write
99C000
stack
page read and write
7FF505268000
unkown
page readonly
1B65C013000
heap
page read and write
7FF505347000
unkown
page readonly
76DCDCC000
stack
page read and write
44E0000
unkown
page read and write
7FF505443000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
66CB000
unkown
page readonly
21CC3954000
trusted library allocation
page read and write
6E55000
unkown
page readonly
18A2041F000
heap
page read and write
1FD7000
stack
page read and write
4330000
unkown
page readonly
1F200390000
heap
page read and write
1F2002C0000
heap
page read and write
5429000
unkown
page read and write
7FF5050A6000
unkown
page readonly
7FF5054CE000
unkown
page readonly
52BD000
stack
page read and write
1FA05285000
trusted library allocation
page read and write
21CC3BF0000
trusted library allocation
page read and write
2A2A000
stack
page read and write
6E8C000
unkown
page readonly
1FA02DA3000
heap
page read and write
E80000
heap
page read and write
51AC000
unkown
page read and write
7FF50541E000
unkown
page readonly
1F200338000
heap
page read and write
46A9000
unkown
page read and write
21CC3BC0000
trusted library allocation
page read and write
4A0000
unkown
page readonly
7FF505644000
unkown
page readonly
21CC3C10000
trusted library allocation
page read and write
1683A813000
heap
page read and write
7FF4E5836000
unkown
page readonly
1E8EC602000
heap
page read and write
2CC03508000
heap
page read and write
1F2003AD000
heap
page read and write
15397A3E000
heap
page read and write
1F2004E4000
heap
page read and write
1FA05257000
trusted library allocation
page read and write
51EE000
unkown
page read and write
7FF50569C000
unkown
page readonly
3510000
heap
page read and write
3F60000
unkown
page read and write
40B000
unkown
page execute read
7FF4E57E5000
unkown
page readonly
21CC3D8A000
heap
page read and write
25DEA63C000
heap
page read and write
7FF4E57E0000
unkown
page readonly
18A1ABC0000
heap
page read and write
15397AC9000
heap
page read and write
2D9EA395000
heap
page read and write
21CC3B80000
trusted library allocation
page read and write
7FF5052DB000
unkown
page readonly
5240000
unkown
page read and write
21CAB360000
heap
page read and write
29AA000
stack
page read and write
1E8EC613000
heap
page read and write
1EFCDCCB000
heap
page read and write
7FF4E5868000
unkown
page readonly
15397A13000
heap
page read and write
271CC505000
heap
page read and write
114E000
stack
page read and write
3D1A000
unkown
page read and write
21CC3B30000
trusted library allocation
page read and write
468E000
unkown
page read and write
21CBB6BE000
trusted library allocation
page read and write
AB1B000
stack
page read and write
2120000
heap
page read and write
B41E000
stack
page read and write
5132000
unkown
page read and write
E8B000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
3D60000
unkown
page read and write
18A1AC00000
heap
page read and write
1683A86C000
heap
page read and write
7FFFEA3BC000
unkown
page read and write
2661000
unkown
page read and write
1E8EC713000
heap
page read and write
18A203D0000
trusted library allocation
page read and write
1EF23300000
heap
page read and write
B11E000
stack
page read and write
21CC3BF0000
trusted library allocation
page read and write
5438000
unkown
page read and write
21CC3B40000
trusted library allocation
page read and write
3FE9000
stack
page read and write
1F200490000
heap
page read and write
32CACFD000
stack
page read and write
21CC3BE0000
trusted library allocation
page read and write
535D000
unkown
page read and write
18A20505000
heap
page read and write
7FF505790000
unkown
page readonly
7FF505679000
unkown
page readonly
7FF5057A1000
unkown
page readonly
400000
unkown
page readonly
3EF0000
unkown
page read and write
3DD0000
unkown
page read and write
871D000
stack
page read and write
5ED5000
unkown
page read and write
7FF505268000
unkown
page readonly
4A80000
unkown
page readonly
8619000
stack
page read and write
21672A29000
heap
page read and write
50CB000
unkown
page read and write
1FA05159000
heap
page read and write
22F5C7E000
stack
page read and write
5360000
unkown
page read and write
5EA7000
unkown
page read and write
21CC3BD0000
trusted library allocation
page read and write
50B8000
unkown
page read and write
21CC3B8A000
trusted library allocation
page read and write
21CC3BC0000
trusted library allocation
page read and write
3DC0000
unkown
page readonly
5C1E000
stack
page read and write
859C000
stack
page read and write
2D9E9A5B000
heap
page read and write
1FA05257000
trusted library allocation
page read and write
2D9EA802000
heap
page read and write
1EFCDCB6000
heap
page read and write
18A1B615000
heap
page read and write
5C0000
heap
page read and write
7FF505372000
unkown
page readonly
3D30000
unkown
page read and write
6E93000
unkown
page readonly
5EA0000
trusted library allocation
page read and write
53A0000
heap
page read and write
2110000
unkown
page read and write
5375000
unkown
page read and write
21CA9AB5000
heap
page read and write
2624000
unkown
page read and write
50C7000
unkown
page read and write
2D9EA395000
heap
page read and write
21CA9AB0000
heap
page read and write
7FF4E586A000
unkown
page readonly
50B5000
unkown
page read and write
D942EFE000
stack
page read and write
461000
unkown
page readonly
BA9F000
stack
page read and write
6B51000
unkown
page readonly
4888000
stack
page read and write
5BFBB7E000
stack
page read and write
5371000
unkown
page read and write
1FA05264000
trusted library allocation
page read and write
21CAB2E0000
heap
page read and write
2B639910000
heap
page read and write
7FF505254000
unkown
page readonly
AB1B000
stack
page read and write
20102870000
direct allocation
page read and write
C6000
stack
page read and write
21CC3C10000
trusted library allocation
page read and write
3DD0000
unkown
page read and write
E8B000
heap
page read and write
7596000
stack
page read and write
21CADE28000
trusted library allocation
page read and write
2CC03370000
trusted library allocation
page read and write
1FA02D67000
heap
page read and write
7FF5056CA000
unkown
page readonly
50A8000
unkown
page read and write
65C0000
direct allocation
page read and write
6721000
direct allocation
page read and write
E5F000
stack
page read and write
7B5000
heap
page read and write
57A7000
heap
page read and write
25DEA613000
heap
page read and write
2520000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
50D9000
unkown
page read and write
4A0E000
stack
page read and write
510C000
unkown
page read and write
5F51000
trusted library allocation
page read and write
7617000
stack
page read and write
1EFCDCCA000
heap
page read and write
461000
unkown
page readonly
2B639B05000
heap
page read and write
3C00FFB000
stack
page read and write
740000
unkown
page readonly
871D000
stack
page read and write
1D0000
unkown
page readonly
2B639970000
heap
page read and write
7FFFEA3BD000
unkown
page write copy
2570000
unkown
page read and write
21CC3BC0000
trusted library allocation
page read and write
18A204FC000
heap
page read and write
51F7000
unkown
page read and write
18A1AD00000
heap
page read and write
DAA0000
unkown
page read and write
560C000
stack
page read and write
2D9EA3B3000
heap
page read and write
21CC3B80000
trusted library allocation
page read and write
3D40000
unkown
page read and write
271CC4D6000
heap
page read and write
E722000
unkown
page read and write
7FF5057D0000
unkown
page readonly
1683A83A000
heap
page read and write
7FF50572D000
unkown
page readonly
21CC3B51000
trusted library allocation
page read and write
271CC360000
heap
page read and write
1FA02DC1000
heap
page read and write
1FA05264000
trusted library allocation
page read and write
2A60000
unkown
page read and write
2D9E9AA3000
heap
page read and write
879B000
stack
page read and write
879B000
stack
page read and write
1F2003BB000
heap
page read and write
2017FC1B000
direct allocation
page read and write
51EB000
unkown
page read and write
1FA0515D000
heap
page read and write
7FF5050B3000
unkown
page readonly
7FF4E57EA000
unkown
page readonly
2CC03500000
heap
page read and write
7FFFEA221000
unkown
page execute read
271CC504000
heap
page read and write
20102860000
direct allocation
page read and write
CD591BC000
stack
page read and write
B19B000
stack
page read and write
271CC5D0000
direct allocation
page read and write
7270000
unkown
page read and write
2D9EA393000
heap
page read and write
21B85713000
heap
page read and write
2D9E9B02000
heap
page read and write
53EB000
unkown
page read and write
7847000
unkown
page read and write
50B5000
unkown
page read and write
21CC386D000
heap
page read and write
6A8000
heap
page read and write
1FA02DBA000
heap
page read and write
6EB5000
unkown
page readonly
271CC495000
heap
page read and write
6B95000
unkown
page readonly
25ED000
unkown
page read and write
CA54B7E000
stack
page read and write
7FF4E57E5000
unkown
page readonly
1F200610000
heap
page read and write
6B95000
unkown
page readonly
B31B000
stack
page read and write
21CC3B50000
trusted library allocation
page read and write
21CC3B20000
trusted library allocation
page read and write
7FF50509B000
unkown
page readonly
57A6000
heap
page read and write
4F04D7C000
stack
page read and write
57FB000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
7DD647F000
stack
page read and write
7FF5050C2000
unkown
page readonly
4A0000
unkown
page readonly
536F000
unkown
page read and write
6EBC000
unkown
page readonly
5F7B000
unkown
page read and write
6D9C000
unkown
page readonly
4A0E000
stack
page read and write
1350000
unclassified section
page read and write
7FF50525D000
unkown
page readonly
1320000
direct allocation
page read and write
271CC49D000
heap
page read and write
21CC3C00000
trusted library allocation
page read and write
99C000
stack
page read and write
7FF505434000
unkown
page readonly
20000
unkown
page read and write
405B000
unkown
page read and write
2D9EA38D000
heap
page read and write
271CC4D9000
heap
page read and write
528C000
unkown
page read and write
5EA7000
unkown
page read and write
1F20031F000
heap
page read and write
D10000
heap
page read and write
271CC400000
direct allocation
page read and write
5443000
unkown
page read and write
7FF5050E5000
unkown
page readonly
18A1B5F0000
trusted library allocation
page read and write
4330000
unkown
page readonly
65C0000
direct allocation
page read and write
DEB000
stack
page read and write
21CA9840000
heap
page read and write
262D000
unkown
page read and write
7DF403671000
unkown
page execute read
4010000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
7FF5052D9000
unkown
page readonly
76DD47E000
stack
page read and write
3A0A077000
stack
page read and write
2B6398F0000
heap
page read and write
21CC3B20000
trusted library allocation
page read and write
65C0000
direct allocation
page read and write
1FA02DC1000
heap
page read and write
6BA7000
unkown
page readonly
6E7E000
unkown
page readonly
CA54AFE000
stack
page read and write
7FF5057AB000
unkown
page readonly
7FF5056C4000
unkown
page readonly
528C000
unkown
page read and write
7FF5053DA000
unkown
page readonly
5443000
unkown
page read and write
F89E000
stack
page read and write
461000
unkown
page readonly
1B65C05C000
heap
page read and write
480000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
1E8EC622000
heap
page read and write
1EF231C0000
trusted library allocation
page read and write
51F7000
unkown
page read and write
2017F755000
heap
page read and write
7596000
stack
page read and write
790000
unkown
page readonly
42C0000
unkown
page write copy
271CDFE0000
heap
page read and write
1F2003AD000
heap
page read and write
B298000
stack
page read and write
6EBC000
unkown
page readonly
27E6000
stack
page read and write
75256F7000
stack
page read and write
18A1AC96000
heap
page read and write
CA54AFE000
stack
page read and write
3F20000
unkown
page read and write
6BAF000
unkown
page readonly
1683A885000
heap
page read and write
5ED5000
unkown
page read and write
1FA05264000
trusted library allocation
page read and write
25DEA560000
heap
page read and write
153979B0000
heap
page read and write
2D9EA386000
heap
page read and write
1FA02440000
heap
page read and write
7FF505430000
unkown
page readonly
7FF50565E000
unkown
page readonly
7FF50531E000
unkown
page readonly
CD596FC000
stack
page read and write
1320000
direct allocation
page read and write
7FF50543D000
unkown
page readonly
2D9E99D0000
trusted library allocation
page read and write
7FF4E5879000
unkown
page readonly
271CDFAF000
direct allocation
page read and write
1D0000
unkown
page readonly
7FF5053E7000
unkown
page readonly
3D10000
unkown
page read and write
21CA994C000
heap
page read and write
7525C4E000
stack
page read and write
5BFC6CF000
stack
page read and write
7FF505434000
unkown
page readonly
263F000
unkown
page read and write
1F200390000
heap
page read and write
3C00C7F000
stack
page read and write
7FF4E5879000
unkown
page readonly
53A5000
unkown
page read and write
7FF505500000
unkown
page readonly
5D10000
trusted library allocation
page read and write
7FF4E14D0000
unkown
page readonly
3D60000
unkown
page read and write
3C019FF000
stack
page read and write
4000000
unkown
page readonly
6EA7000
unkown
page readonly
4520000
unkown
page readonly
21CA9A60000
heap
page read and write
261B58E0000
heap
page read and write
6DC5000
unkown
page readonly
1320000
direct allocation
page read and write
1F200343000
heap
page read and write
2A50000
unkown
page readonly
D94327F000
stack
page read and write
27F0000
unkown
page readonly
7853000
unkown
page read and write
533A000
stack
page read and write
20DF000
stack
page read and write
5380000
trusted library allocation
page read and write
4A0000
unkown
page readonly
7FF5050C4000
unkown
page readonly
480000
heap
page read and write
60FB000
trusted library allocation
page read and write
21CACB9E000
trusted library allocation
page read and write
2110000
unkown
page read and write
15397B13000
heap
page read and write
6734000
direct allocation
page read and write
1683A875000
heap
page read and write
FA08CFB000
stack
page read and write
CA54DFB000
stack
page read and write
7E0000
system
page readonly
CA54A7C000
stack
page read and write
809D000
stack
page read and write
7853000
unkown
page read and write
2CC03429000
heap
page read and write
2D9E9AD7000
heap
page read and write
5BFBBFE000
stack
page read and write
20E0000
unkown
page readonly
5F3A000
trusted library allocation
page read and write
7FFFEA41F000
unkown
page readonly
271CC610000
direct allocation
page read and write
7FF5052F6000
unkown
page readonly
2B6398F0000
heap
page read and write
352A000
heap
page read and write
5373000
unkown
page read and write
E422000
heap
page read and write
6EA9000
unkown
page readonly
2A60000
unkown
page read and write
7FF505714000
unkown
page readonly
3D00000
unkown
page read and write
413000
unkown
page read and write
21CC3B60000
trusted library allocation
page read and write
2D9EA38B000
heap
page read and write
2B639AD0000
heap
page read and write
21CAF54B000
trusted library allocation
page read and write
3DD0000
unkown
page read and write
2CC0344B000
heap
page read and write
7FF5052FB000
unkown
page readonly
7FF505562000
unkown
page readonly
1F200394000
heap
page read and write
1F20030D000
heap
page read and write
AF9E000
stack
page read and write
4340000
unkown
page readonly
18A20250000
trusted library allocation
page read and write
5C8000
heap
page read and write
7FF50553F000
unkown
page readonly
1EF2326B000
heap
page read and write
7FF50539C000
unkown
page readonly
7FF50540D000
unkown
page readonly
EC20EFC000
stack
page read and write
560C000
stack
page read and write
21CC430D000
heap
page read and write
6ED2000
unkown
page readonly
D94357F000
stack
page read and write
1FA02DBB000
heap
page read and write
3F30000
unkown
page read and write
1FA02444000
heap
page read and write
3564000
heap
page read and write
21CC3B90000
trusted library allocation
page read and write
21CC3BF0000
trusted library allocation
page read and write
A89F000
stack
page read and write
2B639970000
heap
page read and write
15397ACB000
heap
page read and write
2B639810000
remote allocation
page read and write
5D91000
trusted library allocation
page read and write
6EC9000
unkown
page readonly
3D40000
unkown
page read and write
40E000
unkown
page write copy
21CC3B20000
trusted library allocation
page read and write
3D20000
unkown
page read and write
50A8000
unkown
page read and write
18A204A5000
heap
page read and write
480000
trusted library allocation
page read and write
416000
unkown
page write copy
50661FC000
stack
page read and write
21CC3B60000
trusted library allocation
page read and write
6D5E000
unkown
page readonly
7FF5050DD000
unkown
page readonly
21CC3939000
heap
page read and write
2017F6D9000
heap
page read and write
1E0000
unkown
page read and write
4B05000
stack
page read and write
7FF505086000
unkown
page readonly
1EF23070000
heap
page read and write
3DB0000
unkown
page readonly
1683A827000
heap
page read and write
1F20031F000
heap
page read and write
468E000
unkown
page read and write
21CC3B80000
trusted library allocation
page read and write
4B90000
unkown
page read and write
B50000
unkown
page readonly
3C00EFA000
stack
page read and write
1FA05264000
trusted library allocation
page read and write
18A203D0000
trusted library allocation
page read and write
2017F768000
heap
page read and write
66A0000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
7FF505448000
unkown
page readonly
2CC03210000
heap
page read and write
4F050FE000
stack
page read and write
5F7F000
unkown
page read and write
430000
unkown
page readonly
7FF5057C4000
unkown
page readonly
271CC488000
heap
page read and write
1B65BF70000
trusted library allocation
page read and write
1F200338000
heap
page read and write
1F200302000
heap
page read and write
29AA000
stack
page read and write
1320000
direct allocation
page read and write
1EF23190000
trusted library allocation
page read and write
2017F73E000
heap
page read and write
75259FE000
stack
page read and write
355F000
heap
page read and write
7FF505626000
unkown
page readonly
4050000
unkown
page read and write
4F0000
unkown
page readonly
40B000
unkown
page execute read
7FF50546B000
unkown
page readonly
21CC3BE0000
trusted library allocation
page read and write
4690000
unkown
page read and write
3F00000
unkown
page read and write
5BFB97F000
stack
page read and write
4249000
stack
page read and write
5364000
unkown
page read and write
4888000
stack
page read and write
264E000
unkown
page read and write
1EF2332B000
heap
page read and write
2017F75B000
heap
page read and write
66CE000
unkown
page readonly
5400000
heap
page read and write
7FF5050C0000
unkown
page readonly
4F04E7D000
stack
page read and write
1E0000
unkown
page read and write
E764000
unkown
page read and write
1F20038B000
heap
page read and write
EC210FF000
stack
page read and write
1F20036E000
heap
page read and write
21672A5B000
heap
page read and write
7FF505347000
unkown
page readonly
21CC3DAF000
heap
page read and write
1FA05264000
trusted library allocation
page read and write
1EF23313000
heap
page read and write
1F2003B1000
heap
page read and write
7FF5057DA000
unkown
page readonly
5393000
unkown
page read and write
2017F743000
heap
page read and write
CA54B7E000
stack
page read and write
21CC3B90000
trusted library allocation
page read and write
25DEA713000
heap
page read and write
1F2003BB000
heap
page read and write
7FF505650000
unkown
page readonly
AC99000
stack
page read and write
E764000
unkown
page read and write
AD90000
heap
page read and write
5BFB3DF000
stack
page read and write
2B639970000
heap
page read and write
1F2004F9000
heap
page read and write
CA54BFE000
stack
page read and write
21CBB6CD000
trusted library allocation
page read and write
50B8000
unkown
page read and write
4A80000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
18A20443000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
676000
heap
page read and write
2570000
unkown
page read and write
1F2003AD000
heap
page read and write
7FF4E588A000
unkown
page readonly
18A204B2000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
7165000
unkown
page read and write
B99B000
stack
page read and write
18A1B702000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
830000
unkown
page read and write
21B8565B000
heap
page read and write
1FA02DBF000
heap
page read and write
B219000
stack
page read and write
6E55000
unkown
page readonly
2A2A000
stack
page read and write
7FF5050B3000
unkown
page readonly
750957E000
stack
page read and write
7FF505511000
unkown
page readonly
7DD5E7D000
stack
page read and write
4986000
stack
page read and write
7FF4E14CC000
unkown
page readonly
CD0000
trusted library allocation
page read and write
7FF50531A000
unkown
page readonly
7B0000
heap
page read and write
7FF5054D0000
unkown
page readonly
2A60000
unkown
page read and write
2D9E9B16000
heap
page read and write
5610000
unkown
page read and write
6A0D000
unkown
page readonly
2D9E9A6A000
heap
page read and write
50A0000
unkown
page read and write
7FF5054EE000
unkown
page readonly
1683A857000
heap
page read and write
7FF4E57E2000
unkown
page readonly
50A8000
unkown
page read and write
D5E000
stack
page read and write
2D9EA391000
heap
page read and write
50C9000
unkown
page read and write
2CC03502000
heap
page read and write
2A70000
unkown
page readonly
21CC3B90000
trusted library allocation
page read and write
21CA9AA0000
trusted library allocation
page read and write
3C010FF000
stack
page read and write
7FF505341000
unkown
page readonly
263F000
unkown
page read and write
5D98000
trusted library allocation
page read and write
1F20039E000
heap
page read and write
3D2A000
unkown
page read and write
21CC3910000
heap
page read and write
461000
unkown
page readonly
89C000
stack
page read and write
7FF505591000
unkown
page readonly
7896000
unkown
page read and write
E6A3000
unkown
page read and write
1F20039E000
heap
page read and write
570000
unkown
page readonly
7FF4E584C000
unkown
page readonly
21CC3937000
heap
page read and write
26EE000
stack
page read and write
18A203F0000
trusted library allocation
page read and write
5BFBCFB000
stack
page read and write
21CBBF1E000
trusted library allocation
page read and write
50A0000
unkown
page read and write
25AD000
unkown
page read and write
3F60000
unkown
page read and write
7896000
unkown
page read and write
2B63B3A0000
heap
page read and write
46A9000
unkown
page read and write
1FA05159000
heap
page read and write
7FFFEA3BA000
unkown
page read and write
1FA02DBF000
heap
page read and write
4F04FFC000
stack
page read and write
5EFF000
unkown
page read and write
271CC4ED000
heap
page read and write
21CA97D0000
heap
page read and write
B19B000
stack
page read and write
21672A62000
heap
page read and write
480000
heap
page read and write
1F20039A000
heap
page read and write
2017F743000
heap
page read and write
6B78000
unkown
page readonly
1683A87F000
heap
page read and write
2D9EA38B000
heap
page read and write
401000
unkown
page execute read
570000
unkown
page readonly
271CC464000
heap
page read and write
18A20360000
trusted library allocation
page read and write
1EFCDCB6000
heap
page read and write
2017F732000
heap
page read and write
1E8EC530000
heap
page read and write
1200000
direct allocation
page read and write
258A000
unkown
page read and write
7FF5052A2000
unkown
page readonly
1683A730000
heap
page read and write
1E8EC670000
heap
page read and write
464C000
stack
page read and write
1200000
direct allocation
page read and write
4F051FC000
stack
page read and write
1683A862000
heap
page read and write
6EA9000
unkown
page readonly
7FF505437000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
1683A861000
heap
page read and write
6DEE000
unkown
page readonly
50A4000
unkown
page read and write
2661000
unkown
page read and write
2D9EA311000
heap
page read and write
4B90000
unkown
page read and write
40E000
unkown
page write copy
21CC3BD1000
trusted library allocation
page read and write
66E3000
unkown
page readonly
6005000
unkown
page read and write
7FF5056B0000
unkown
page readonly
21B85678000
heap
page read and write
1F200396000
heap
page read and write
21CAF432000
trusted library allocation
page read and write
3C017FC000
stack
page read and write
50A0000
unkown
page read and write
6E55000
unkown
page readonly
2B639B05000
heap
page read and write
1EFCDDB0000
heap
page read and write
271CC41D000
direct allocation
page read and write
271CC450000
heap
page read and write
3D70000
unkown
page read and write
1EF2325B000
heap
page read and write
1F20036C000
heap
page read and write
7FF505634000
unkown
page readonly
7FF50523B000
unkown
page readonly
CA54A78000
stack
page read and write
25DEA702000
heap
page read and write
271CC650000
heap
page read and write
21CAD424000
trusted library allocation
page read and write
1EF23202000
heap
page read and write
50D9000
unkown
page read and write
5134000
unkown
page read and write
21CAB3E0000
heap
page execute and read and write
25EA000
unkown
page read and write
18A204EC000
heap
page read and write
539C000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
21B86002000
trusted library allocation
page read and write
676000
heap
page read and write
464C000
stack
page read and write
B298000
stack
page read and write
40B000
unkown
page execute read
27E6000
stack
page read and write
57FC000
heap
page read and write
99C000
stack
page read and write
750977D000
stack
page read and write
6E93000
unkown
page readonly
2CC03470000
heap
page read and write
783B000
unkown
page read and write
21CC3B80000
trusted library allocation
page read and write
2017F71A000
heap
page read and write
18A207D0000
trusted library allocation
page read and write
2017F6DA000
heap
page read and write
3FE9000
stack
page read and write
3D2A000
unkown
page read and write
477B000
unkown
page read and write
1B65BFA0000
remote allocation
page read and write
61B0000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
65C0000
direct allocation
page read and write
184A5560000
heap
page read and write
7FF505757000
unkown
page readonly
7FF50575D000
unkown
page readonly
2D9EA385000
heap
page read and write
416000
unkown
page write copy
4108000
unkown
page read and write
2A70000
unkown
page readonly
7FF50575D000
unkown
page readonly
18A1AD02000
heap
page read and write
7FF505552000
unkown
page readonly
21CC3BA0000
trusted library allocation
page read and write
3A09C7E000
stack
page read and write
40A4000
unkown
page read and write
AB9B000
stack
page read and write
21CC3BC0000
trusted library allocation
page read and write
6734000
direct allocation
page read and write
21CC3B70000
trusted library allocation
page read and write
6721000
direct allocation
page read and write
18A20690000
trusted library allocation
page read and write
2D9EA313000
heap
page read and write
CA54BFE000
stack
page read and write
7270000
unkown
page read and write
18A206A0000
trusted library allocation
page read and write
740000
unkown
page readonly
7FF505370000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
1F200352000
heap
page read and write
1F200386000
heap
page read and write
7FF505783000
unkown
page readonly
7FF505236000
unkown
page readonly
7FF505265000
unkown
page readonly
3533000
heap
page read and write
271CC475000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
21CAB79E000
trusted library allocation
page read and write
271CC4FC000
heap
page read and write
25DC000
unkown
page read and write
21CC3B80000
trusted library allocation
page read and write
21CC3B70000
trusted library allocation
page read and write
400000
unkown
page readonly
261B571A000
heap
page read and write
21B85676000
heap
page read and write
4260000
unkown
page read and write
3506000
heap
page read and write
2017F761000
heap
page read and write
21CC38C7000
heap
page read and write
6D5E000
unkown
page readonly
2D9EA385000
heap
page read and write
21CC3B60000
trusted library allocation
page read and write
5375000
unkown
page read and write
E664000
unkown
page read and write
21B8564C000
heap
page read and write
1683A800000
heap
page read and write
FA089FF000
stack
page read and write
22F55BC000
stack
page read and write
1FA02DBF000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
24B0000
unkown
page readonly
25DEA66F000
heap
page read and write
1B65C040000
heap
page read and write
2A50000
unkown
page readonly
50D9000
unkown
page read and write
11E0000
trusted library allocation
page readonly
1E8EC640000
heap
page read and write
7FF5054EB000
unkown
page readonly
21B8563D000
heap
page read and write
25ED000
unkown
page read and write
1FA0525E000
trusted library allocation
page read and write
5446000
unkown
page read and write
32CADFF000
stack
page read and write
3530000
heap
page read and write
1F201F00000
heap
page read and write
2017FC20000
direct allocation
page read and write
18A20390000
trusted library allocation
page read and write
6EB5000
unkown
page readonly
536F000
unkown
page read and write
7FF505500000
unkown
page readonly
1F200356000
heap
page read and write
FA088FB000
stack
page read and write
5066079000
stack
page read and write
7DD57CB000
stack
page read and write
5BFB9FE000
stack
page read and write
7FF50550B000
unkown
page readonly
7FF50576A000
unkown
page readonly
DC235FE000
stack
page read and write
5134000
unkown
page read and write
2D9EA3C2000
heap
page read and write
461000
unkown
page readonly
1FA0516D000
heap
page read and write
E5F000
stack
page read and write
7FF505271000
unkown
page readonly
7FFFEA427000
unkown
page readonly
2D9EA387000
heap
page read and write
7FF505271000
unkown
page readonly
205A000
stack
page read and write
7FF5054EE000
unkown
page readonly
50C5000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
57F8000
heap
page read and write
27F0000
unkown
page readonly
3D10000
unkown
page read and write
5090000
unkown
page read and write
1200000
direct allocation
page read and write
271CC4B8000
heap
page read and write
18A204F4000
heap
page read and write
2017FC00000
direct allocation
page read and write
2B6398F0000
heap
page read and write
21CC3BE0000
trusted library allocation
page read and write
3D90000
unkown
page readonly
400000
unkown
page readonly
18A1ACA5000
heap
page read and write
AE9A000
stack
page read and write
7FF5052FE000
unkown
page readonly
51A5000
unkown
page read and write
40D000
unkown
page readonly
2017F6E7000
heap
page read and write
7E5A12C000
stack
page read and write
3F40000
unkown
page read and write
18A1B700000
heap
page read and write
4520000
unkown
page readonly
6D73000
unkown
page readonly
3D60000
unkown
page read and write
1FA052F0000
heap
page readonly
6E2C000
unkown
page readonly
57F8000
heap
page read and write
2017F717000
heap
page read and write
21672A3C000
heap
page read and write
6630000
unkown
page readonly
1197000
heap
page read and write
5EA7000
unkown
page read and write
6734000
direct allocation
page read and write
18A201C0000
trusted library allocation
page read and write
6CAA000
unkown
page readonly
6734000
direct allocation
page read and write
44E0000
unkown
page read and write
21CC3BF0000
trusted library allocation
page read and write
21CC3B50000
trusted library allocation
page read and write
7FF5056F8000
unkown
page readonly
7FF505304000
unkown
page readonly
21CAB280000
heap
page readonly
4690000
unkown
page read and write
2D9EA1E0000
remote allocation
page read and write
2B639B05000
heap
page read and write
50B0000
unkown
page read and write
271CC5B0000
direct allocation
page read and write
21CC3C00000
trusted library allocation
page read and write
1683A83C000
heap
page read and write
3D10000
unkown
page read and write
52C7000
unkown
page read and write
46A9000
unkown
page read and write
114E000
stack
page read and write
18A20400000
heap
page read and write
21CC3DA1000
heap
page read and write
21CC3BF0000
trusted library allocation
page read and write
7617000
stack
page read and write
2A70000
unkown
page readonly
821F000
stack
page read and write
66A0000
unkown
page readonly
CD598FE000
stack
page read and write
6BBF000
unkown
page readonly
7FF50571C000
unkown
page readonly
18A1ACAC000
heap
page read and write
3F11000
unkown
page read and write
2017F764000
heap
page read and write
50E8000
unkown
page read and write
7FF5053A4000
unkown
page readonly
7DD627F000
stack
page read and write
7FF5050E5000
unkown
page readonly
E80000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
7DD607F000
stack
page read and write
7FF50576F000
unkown
page readonly
21CA9939000
heap
page read and write
7DF5057FB000
unkown
page readonly
7B5000
heap
page read and write
4F0000
unkown
page readonly
1320000
direct allocation
page read and write
AD90000
heap
page read and write
5F81000
heap
page read and write
21CAD426000
trusted library allocation
page read and write
7FF50531A000
unkown
page readonly
FA0897E000
stack
page read and write
783B000
unkown
page read and write
21CBB400000
trusted library allocation
page read and write
7FF5053A7000
unkown
page readonly
5132000
unkown
page read and write
1320000
direct allocation
page read and write
2017F6D0000
heap
page read and write
2D9EA385000
heap
page read and write
271CC457000
heap
page read and write
2D9EA3B3000
heap
page read and write
2D9EA3AC000
heap
page read and write
3F30000
unkown
page read and write
2017FC03000
direct allocation
page read and write
26DF000
stack
page read and write
7FF50537A000
unkown
page readonly
7FF505552000
unkown
page readonly
5429000
unkown
page read and write
5C8000
heap
page read and write
3503000
heap
page read and write
7FF505265000
unkown
page readonly
831F000
stack
page read and write
6005000
unkown
page read and write
5C8000
heap
page read and write
1683B202000
trusted library allocation
page read and write
AE19000
stack
page read and write
401000
unkown
page execute read
21CBB5A5000
trusted library allocation
page read and write
1F2003A7000
heap
page read and write
3A0A27F000
stack
page read and write
1F200338000
heap
page read and write
1FA02DBA000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
18A20411000
heap
page read and write
21CC3BC0000
trusted library allocation
page read and write
50C1000
unkown
page read and write
6EBC000
unkown
page readonly
21CAF594000
trusted library allocation
page read and write
468E000
unkown
page read and write
5610000
unkown
page read and write
1F2004E0000
heap
page read and write
7DD637F000
stack
page read and write
1683A878000
heap
page read and write
781A000
stack
page read and write
6ED2000
unkown
page readonly
261B000
unkown
page read and write
1F2003AD000
heap
page read and write
5360000
unkown
page read and write
1F200392000
heap
page read and write
5371000
unkown
page read and write
15397A00000
heap
page read and write
5452000
unkown
page read and write
2D9EA385000
heap
page read and write
2017F6B0000
heap
page read and write
7FF50548F000
unkown
page readonly
528C000
unkown
page read and write
7A0000
unkown
page read and write
871D000
stack
page read and write
1FA02DA3000
heap
page read and write
21CA9869000
heap
page read and write
790000
unkown
page readonly
E5F000
stack
page read and write
1E8EC4C0000
heap
page read and write
18A1AB50000
heap
page read and write
52C0000
unkown
page read and write
470000
unkown
page readonly
1FA0525E000
trusted library allocation
page read and write
1FA05264000
trusted library allocation
page read and write
75094FD000
stack
page read and write
5C0000
heap
page read and write
470000
unkown
page readonly
5ED5000
unkown
page read and write
1FA0525A000
trusted library allocation
page read and write
536C000
unkown
page read and write
D5E000
stack
page read and write
2B639977000
heap
page read and write
184A55E4000
heap
page read and write
3534000
heap
page read and write
1683A85A000
heap
page read and write
2D9EA39B000
heap
page read and write
2D9EA800000
heap
page read and write
7820000
unkown
page read and write
416000
unkown
page write copy
2CC03449000
heap
page read and write
5388000
unkown
page read and write
50B5000
unkown
page read and write
2510000
unkown
page readonly
5EA2000
trusted library allocation
page read and write
2D9EA386000
heap
page read and write
6B78000
unkown
page readonly
6CAA000
unkown
page readonly
CA54AFE000
stack
page read and write
2CC03413000
heap
page read and write
871D000
stack
page read and write
560C000
stack
page read and write
7165000
unkown
page read and write
1F200386000
heap
page read and write
1683A859000
heap
page read and write
25AD000
unkown
page read and write
2D9EA3D6000
heap
page read and write
50B8000
unkown
page read and write
2D9E9A5A000
heap
page read and write
2017F7B0000
heap
page read and write
779D000
stack
page read and write
CD0000
trusted library allocation
page read and write
5377000
unkown
page read and write
6EA7000
unkown
page readonly
21B85629000
heap
page read and write
40B000
unkown
page execute read
2B6398F0000
heap
page read and write
B31B000
stack
page read and write
6EC9000
unkown
page readonly
D942FFC000
stack
page read and write
2017F6F7000
heap
page read and write
6C34000
unkown
page readonly
34AA000
heap
page read and write
6A0D000
unkown
page readonly
10000
heap
page read and write
1683A840000
heap
page read and write
CD595FB000
stack
page read and write
7FFFEA41F000
unkown
page readonly
4260000
unkown
page read and write
6DEE000
unkown
page readonly
1B65C802000
trusted library allocation
page read and write
3DC0000
unkown
page readonly
7DD5D7E000
stack
page read and write
5373000
unkown
page read and write
1FA05285000
trusted library allocation
page read and write
50E8000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
6D5E000
unkown
page readonly
25B1000
unkown
page read and write
15398513000
heap
page read and write
1F2003B5000
heap
page read and write
5D90000
trusted library allocation
page read and write
2017F709000
heap
page read and write
1B65C058000
heap
page read and write
6BAF000
unkown
page readonly
271CC4E9000
heap
page read and write
5E47000
trusted library allocation
page read and write
4010000
unkown
page readonly
5377000
unkown
page read and write
7FF5050D3000
unkown
page readonly
535D000
unkown
page read and write
6E2C000
unkown
page readonly
1FA02D56000
heap
page read and write
21CAD428000
trusted library allocation
page read and write
21CAB5FF000
trusted library allocation
page read and write
21CC3B30000
trusted library allocation
page read and write
4108000
unkown
page read and write
5BFB295000
stack
page read and write
841D000
stack
page read and write
E722000
unkown
page read and write
184A55DD000
heap
page read and write
2D9EA802000
heap
page read and write
271CDF90000
direct allocation
page read and write
15397A68000
heap
page read and write
5375000
unkown
page read and write
184A58A5000
heap
page read and write
5C0000
heap
page read and write
15397AE7000
heap
page read and write
3DF0000
unkown
page read and write
860000
remote allocation
page execute and read and write
6EA0000
unkown
page readonly
15397A2A000
heap
page read and write
1EFCDB40000
heap
page read and write
25DEA600000
heap
page read and write
1FA0525E000
trusted library allocation
page read and write
21CC3BC0000
trusted library allocation
page read and write
1FA0525E000
trusted library allocation
page read and write
1F20030E000
heap
page read and write
5BCF000
stack
page read and write
AE9A000
stack
page read and write
26DF000
stack
page read and write
40E000
unkown
page write copy
264E000
unkown
page read and write
184A55E4000
heap
page read and write
7A0000
unkown
page read and write
1F20039C000
heap
page read and write
4650000
unkown
page read and write
5BFB7FF000
stack
page read and write
18A20502000
heap
page read and write
1F0000
unkown
page readonly
21CC3BC0000
trusted library allocation
page read and write
1FA02D87000
heap
page read and write
201027C0000
direct allocation
page read and write
18A1B602000
heap
page read and write
CA54B7E000
stack
page read and write
600E000
trusted library allocation
page read and write
3DA0000
unkown
page readonly
1683A85C000
heap
page read and write
8831000
unkown
page read and write
1683A844000
heap
page read and write
18A1ACBE000
heap
page read and write
21B85702000
heap
page read and write
879B000
stack
page read and write
68E000
heap
page read and write
760000
unkown
page readonly
66E3000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
7FF505372000
unkown
page readonly
EC20FFF000
stack
page read and write
21CC3B80000
trusted library allocation
page read and write
2017F580000
remote allocation
page read and write
21CC3BC0000
trusted library allocation
page read and write
1B65BE00000
heap
page read and write
2123000
heap
page read and write
1F200305000
heap
page read and write
261B5670000
heap
page read and write
2CC0344F000
heap
page read and write
7FFFEA3BC000
unkown
page read and write
271CDF92000
direct allocation
page read and write
7FF50545B000
unkown
page readonly
18A1ACA9000
heap
page read and write
4B0000
unkown
page read and write
1FA05285000
trusted library allocation
page read and write
7FF505240000
unkown
page readonly
1E0000
unkown
page read and write
18A1ACAE000
heap
page read and write
2017F768000
heap
page read and write
51A5000
unkown
page read and write
21CC3B90000
trusted library allocation
page read and write
1BD51FE000
stack
page read and write
752649B000
stack
page read and write
AF9E000
stack
page read and write
7FF4E5860000
unkown
page readonly
7FF505686000
unkown
page readonly
2D9EA802000
heap
page read and write
6005000
unkown
page read and write
2D9E9A29000
heap
page read and write
1267000
direct allocation
page read and write
7847000
unkown
page read and write
7FF5052A6000
unkown
page readonly
15397A6F000
heap
page read and write
66CB000
unkown
page readonly
535D000
unkown
page read and write
1EFCDB90000
unkown
page readonly
859C000
stack
page read and write
271CC4D9000
heap
page read and write
7FF5052A6000
unkown
page readonly
15397A89000
heap
page read and write
20102820000
direct allocation
page read and write
1F2002F9000
heap
page read and write
271CC488000
heap
page read and write
18A1AC40000
heap
page read and write
B19B000
stack
page read and write
21CC3C00000
trusted library allocation
page read and write
6D35000
unkown
page readonly
26DF000
stack
page read and write
1FA02DA3000
heap
page read and write
6C42000
unkown
page readonly
1EF24C02000
trusted library allocation
page read and write
769C000
stack
page read and write
6D73000
unkown
page readonly
5364000
unkown
page read and write
7E9000
system
page execute and read and write
50C7000
unkown
page read and write
258A000
unkown
page read and write
3564000
heap
page read and write
5520000
unkown
page read and write
7FF505737000
unkown
page readonly
7A0000
unkown
page read and write
3534000
heap
page read and write
830000
unkown
page read and write
21CA9860000
heap
page read and write
53A5000
unkown
page read and write
1EF2326A000
heap
page read and write
21672A13000
heap
page read and write
15397940000
heap
page read and write
1F2003B6000
heap
page read and write
1F20036B000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
1FA02DA1000
heap
page read and write
4050000
unkown
page read and write
5438000
unkown
page read and write
50C5000
unkown
page read and write
271CDFA0000
direct allocation
page read and write
1FA02DBF000
heap
page read and write
2A2A000
stack
page read and write
E8B000
heap
page read and write
2606000
unkown
page read and write
57FB000
heap
page read and write
21672910000
heap
page read and write
3D1A000
unkown
page read and write
5359000
unkown
page read and write
1320000
direct allocation
page read and write
540000
unkown
page readonly
18A1B759000
heap
page read and write
21CC3C20000
trusted library allocation
page read and write
22F587E000
stack
page read and write
2733000
unkown
page read and write
4F0000
unkown
page readonly
6E8C000
unkown
page readonly
430000
unkown
page readonly
18A2042C000
heap
page read and write
B49B000
stack
page read and write
7FF50568A000
unkown
page readonly
2017F743000
heap
page read and write
2017FC1F000
direct allocation
page read and write
E5F000
stack
page read and write
271CC260000
remote allocation
page read and write
1EFCDBA0000
unkown
page read and write
779D000
stack
page read and write
40D000
unkown
page readonly
740000
unkown
page readonly
24E1000
unkown
page read and write
1F2003BA000
heap
page read and write
2017F580000
remote allocation
page read and write
3D90000
unkown
page readonly
2B639977000
heap
page read and write
560C000
stack
page read and write
6B95000
unkown
page readonly
1F200352000
heap
page read and write
21CC3BC1000
trusted library allocation
page read and write
271CC260000
remote allocation
page read and write
7FFFEA3C3000
unkown
page readonly
11F0000
trusted library allocation
page read and write
3D0A000
unkown
page read and write
514F000
unkown
page read and write
51F7000
unkown
page read and write
52FD000
stack
page read and write
1FA05165000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
21CAE828000
trusted library allocation
page read and write
4020000
unkown
page read and write
4A0E000
stack
page read and write
25B1000
unkown
page read and write
1FA02DB1000
heap
page read and write
7EB000
system
page read and write
6B0000
remote allocation
page read and write
2928000
stack
page read and write
3DD0000
unkown
page read and write
21CC3CF2000
heap
page read and write
1683A902000
heap
page read and write
E422000
heap
page read and write
271CC490000
heap
page read and write
1FA05275000
trusted library allocation
page read and write
2560000
unkown
page read and write
2B639970000
heap
page read and write
AB9B000
stack
page read and write
25ED000
unkown
page read and write
50B5000
unkown
page read and write
75097FE000
stack
page read and write
2017F6EE000
heap
page read and write
6EA7000
unkown
page readonly
7FF50546D000
unkown
page readonly
5F7B000
unkown
page read and write
6EC9000
unkown
page readonly
271CC4A2000
heap
page read and write
1F200343000
heap
page read and write
7FFFEA3C0000
unkown
page read and write
480000
heap
page read and write
1B65C102000
heap
page read and write
3D0A000
unkown
page read and write
6D73000
unkown
page readonly
5FFD000
unkown
page read and write
1FA0516E000
heap
page read and write
3C012FB000
stack
page read and write
1B65C000000
heap
page read and write
184A55E1000
heap
page read and write
536C000
unkown
page read and write
184A55B0000
heap
page read and write
5C0000
heap
page read and write
8619000
stack
page read and write
B11E000
stack
page read and write
5E90000
trusted library allocation
page read and write
1FA0525E000
trusted library allocation
page read and write
4A34000
unkown
page read and write
8619000
stack
page read and write
FE1B000
stack
page read and write
1F200374000
heap
page read and write
3D90000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
7FF5050DF000
unkown
page readonly
21CA98A7000
heap
page read and write
AC1C000
stack
page read and write
401000
unkown
page execute read
6E7E000
unkown
page readonly
2D9EA202000
heap
page read and write
21CC3BD0000
trusted library allocation
page read and write
51EB000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
7FF505750000
unkown
page readonly
7FF50550B000
unkown
page readonly
468C000
unkown
page read and write
477B000
unkown
page read and write
6E03000
unkown
page readonly
18A1B713000
heap
page read and write
6CAA000
unkown
page readonly
1EFCDB80000
unkown
page readonly
50C1000
unkown
page read and write
21CC3B51000
trusted library allocation
page read and write
7FF50546D000
unkown
page readonly
2D9E9A8A000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
21CC3B60000
trusted library allocation
page read and write
6D0C000
unkown
page readonly
184A55DD000
heap
page read and write
21CC3C00000
trusted library allocation
page read and write
4806000
stack
page read and write
CA54B7E000
stack
page read and write
6ED2000
unkown
page readonly
CA54B7E000
stack
page read and write
6E03000
unkown
page readonly
B49B000
stack
page read and write
5BFBAFE000
stack
page read and write
1EF23302000
heap
page read and write
271CC41B000
direct allocation
page read and write
5F7F000
unkown
page read and write
1FA02DC1000
heap
page read and write
21CC3B90000
trusted library allocation
page read and write
7FF505507000
unkown
page readonly
21CC3DAF000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
261B000
unkown
page read and write
6D9C000
unkown
page readonly
2CC03200000
heap
page read and write
2D9EA803000
heap
page read and write
1195000
heap
page read and write
E80000
heap
page read and write
7FF505238000
unkown
page readonly
7FF504F7C000
unkown
page readonly
6E03000
unkown
page readonly
2B639930000
heap
page readonly
5065D9E000
stack
page read and write
3D90000
unkown
page readonly
21CC3C30000
trusted library allocation
page read and write
21CC3B60000
trusted library allocation
page read and write
21CAF3EB000
trusted library allocation
page read and write
7270000
unkown
page read and write
6D35000
unkown
page readonly
4D90000
heap
page read and write
271CC4D4000
heap
page read and write
2110000
unkown
page read and write
53A5000
unkown
page read and write
536C000
unkown
page read and write
841D000
stack
page read and write
1F0000
unkown
page readonly
21CC3BF0000
trusted library allocation
page read and write
10000
heap
page read and write
40E000
unkown
page write copy
21CC3C10000
trusted library allocation
page read and write
21672A5A000
heap
page read and write
18A1B704000
heap
page read and write
352A000
heap
page read and write
6E2C000
unkown
page readonly
6A8000
heap
page read and write
1FA02DBF000
heap
page read and write
3F20000
unkown
page read and write
7FF50546B000
unkown
page readonly
6EA0000
unkown
page readonly
1683A831000
heap
page read and write
1200000
direct allocation
page read and write
2A50000
unkown
page readonly
52C0000
unkown
page read and write
860000
remote allocation
page execute and read and write
3F30000
unkown
page read and write
21B855D0000
trusted library allocation
page read and write
21CA994B000
heap
page read and write
1F2003B0000
heap
page read and write
76DD97C000
stack
page read and write
830000
unkown
page read and write
2D9E9A64000
heap
page read and write
2CC03488000
heap
page read and write
7FF505295000
unkown
page readonly
21CC3CF0000
heap
page read and write
3DF0000
unkown
page read and write
1683A86A000
heap
page read and write
2123000
heap
page read and write
46B6000
unkown
page read and write
2D9E9AEB000
heap
page read and write
21672A00000
heap
page read and write
18A20670000
trusted library allocation
page read and write
25DEA708000
heap
page read and write
3D2A000
unkown
page read and write
6B8E000
unkown
page readonly
7FF50563D000
unkown
page readonly
7E5A97E000
stack
page read and write
3D80000
unkown
page read and write
2D9EA391000
heap
page read and write
66D2000
unkown
page readonly
1320000
direct allocation
page read and write
6721000
direct allocation
page read and write
1683A867000
heap
page read and write
7FFFEA3BE000
unkown
page read and write
7FF5055BA000
unkown
page readonly
26EC000
stack
page read and write
7FF505279000
unkown
page readonly
4A34000
unkown
page read and write
1FA0515E000
heap
page read and write
1683A87B000
heap
page read and write
18A20680000
trusted library allocation
page read and write
15398402000
heap
page read and write
1FA05267000
trusted library allocation
page read and write
1EF2322A000
heap
page read and write
3D30000
unkown
page read and write
7FF505086000
unkown
page readonly
5367000
unkown
page read and write
1B65BE70000
heap
page read and write
1FD7000
stack
page read and write
21CC3B90000
trusted library allocation
page read and write
21CC3B60000
trusted library allocation
page read and write
7FF5057C4000
unkown
page readonly
262D000
unkown
page read and write
7FF5054F4000
unkown
page readonly
21CC3BE0000
trusted library allocation
page read and write
D5E000
stack
page read and write
4A0000
unkown
page readonly
3F60000
unkown
page read and write
811B000
stack
page read and write
7FF505682000
unkown
page readonly
2B639B05000
heap
page read and write
2017F6F5000
heap
page read and write
18A1B600000
heap
page read and write
413000
unkown
page read and write
3FE9000
stack
page read and write
1BD4DF7000
stack
page read and write
42C0000
unkown
page write copy
5137000
unkown
page read and write
2017F520000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
1683A85F000
heap
page read and write
7FF505757000
unkown
page readonly
21CC3BA0000
trusted library allocation
page read and write
7FF5052F6000
unkown
page readonly
21CC3CF0000
heap
page read and write
F91E000
stack
page read and write
21CC3B20000
trusted library allocation
page read and write
25DEA674000
heap
page read and write
42C0000
unkown
page write copy
B11E000
stack
page read and write
6BBF000
unkown
page readonly
7B0000
heap
page read and write
271CC509000
heap
page read and write
18A1AC7D000
heap
page read and write
5090000
unkown
page read and write
6360000
unkown
page read and write
4806000
stack
page read and write
5520000
unkown
page read and write
51F7000
unkown
page read and write
7FF50567E000
unkown
page readonly
6B78000
unkown
page readonly
18A207B0000
trusted library allocation
page read and write
1EFCDCB7000
heap
page read and write
1F200343000
heap
page read and write
2B639B00000
heap
page read and write
2D9E9A00000
heap
page read and write
CA54D7E000
stack
page read and write
29AA000
stack
page read and write
66CE000
unkown
page readonly
1FA05264000
trusted library allocation
page read and write
2520000
unkown
page readonly
1F200388000
heap
page read and write
3518000
heap
page read and write
7FF5054F4000
unkown
page readonly
2D9EA395000
heap
page read and write
1FA02DBF000
heap
page read and write
7FF505731000
unkown
page readonly
355F000
heap
page read and write
6734000
direct allocation
page read and write
1F0000
unkown
page readonly
2B639910000
heap
page read and write
5ED5000
unkown
page read and write
413000
unkown
page read and write
50A8000
unkown
page read and write
D10000
heap
page read and write
2606000
unkown
page read and write
7FF4E5860000
unkown
page readonly
1FA02DA3000
heap
page read and write
7FF50567E000
unkown
page readonly
1B65BE10000
heap
page read and write
114E000
stack
page read and write
809D000
stack
page read and write
21CC3BC0000
trusted library allocation
page read and write
5393000
unkown
page read and write
21CA98BB000
heap
page read and write
7FF5050CD000
unkown
page readonly
2D9EA30E000
heap
page read and write
7FF505720000
unkown
page readonly
570000
unkown
page readonly
5380000
unkown
page read and write
783B000
unkown
page read and write
4340000
unkown
page readonly
18A1AD02000
heap
page read and write
5354000
unkown
page read and write
7FF5052F1000
unkown
page readonly
3DF0000
unkown
page read and write
1E8EC560000
trusted library allocation
page read and write
5F74000
trusted library allocation
page read and write
34A0000
heap
page read and write
6BBF000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
51A8000
heap
page read and write
405B000
unkown
page read and write
7FF505374000
unkown
page readonly
1FA0515E000
heap
page read and write
7FF50548F000
unkown
page readonly
5237000
unkown
page read and write
1320000
direct allocation
page read and write
1FA05255000
trusted library allocation
page read and write
4690000
unkown
page read and write
D10000
heap
page read and write
271CC4D9000
heap
page read and write
2017F766000
heap
page read and write
99C000
stack
page read and write
271CDF80000
direct allocation
page read and write
7FF505240000
unkown
page readonly
21672A2F000
heap
page read and write
AD90000
heap
page read and write
7B1000
system
page execute read
7FFFEA3B3000
unkown
page read and write
1FA05150000
heap
page read and write
1F20037E000
heap
page read and write
4440000
unkown
page read and write
413000
unkown
page read and write
5BFB31E000
stack
page read and write
FA08FFE000
stack
page read and write
831F000
stack
page read and write
75258FE000
stack
page read and write
879B000
stack
page read and write
5EFF000
unkown
page read and write
5F76000
trusted library allocation
page read and write
3C015FF000
stack
page read and write
18A206C0000
remote allocation
page read and write
21CC389B000
heap
page read and write
20DF000
stack
page read and write
5F7F000
unkown
page read and write
1FA02D50000
heap
page read and write
1FA05264000
trusted library allocation
page read and write
1FA05264000
trusted library allocation
page read and write
18A204B4000
heap
page read and write
5FFD000
unkown
page read and write
52C7000
unkown
page read and write
7FF5057C0000
unkown
page readonly
5388000
unkown
page read and write
20000
unkown
page read and write
B99B000
stack
page read and write
5438000
unkown
page read and write
7FF50504E000
unkown
page readonly
6721000
direct allocation
page read and write
2D9EA38B000
heap
page read and write
8831000
unkown
page read and write
5EFF000
unkown
page read and write
4A34000
unkown
page read and write
5132000
unkown
page read and write
7FF4E587E000
unkown
page readonly
6AD7000
unkown
page readonly
66D2000
unkown
page readonly
1F201F44000
heap
page read and write
2750000
unkown
page read and write
21CA9A30000
heap
page read and write
21CAC19E000
trusted library allocation
page read and write
1683A82A000
heap
page read and write
13F1A2A0000
heap
page read and write
819C000
stack
page read and write
1FA0525A000
trusted library allocation
page read and write
7C0000
unkown
page readonly
1F20030B000
heap
page read and write
6630000
unkown
page readonly
7FF50523E000
unkown
page readonly
7FFFEA3DA000
unkown
page readonly
2D9EA802000
heap
page read and write
477B000
unkown
page read and write
1E8ED002000
trusted library allocation
page read and write
25B1000
unkown
page read and write
1FA05186000
heap
page read and write
DAB000
stack
page read and write
FA092F8000
stack
page read and write
7FF50571C000
unkown
page readonly
6690000
unkown
page readonly
5359000
unkown
page read and write
3DA0000
unkown
page readonly
7FF505737000
unkown
page readonly
271CC489000
heap
page read and write
40E000
unkown
page write copy
6690000
unkown
page readonly
18A1AC91000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
2017FC1D000
direct allocation
page read and write
7FF5052C5000
unkown
page readonly
7B5000
heap
page read and write
6B51000
unkown
page readonly
2D9EA3C2000
heap
page read and write
5BFB8FE000
stack
page read and write
50BD000
unkown
page read and write
E80000
heap
page read and write
271CC502000
heap
page read and write
B91F000
stack
page read and write
4986000
stack
page read and write
2D9EA385000
heap
page read and write
2D9EA38B000
heap
page read and write
2624000
unkown
page read and write
21CC3BC0000
trusted library allocation
page read and write
21CBB3F1000
trusted library allocation
page read and write
1F20039C000
heap
page read and write
25AD000
unkown
page read and write
5CDF000
stack
page read and write
D5E000
stack
page read and write
18A1AD00000
heap
page read and write
40B000
unkown
page execute read
50CB000
unkown
page read and write
6E93000
unkown
page readonly
6EBC000
unkown
page readonly
7FF505322000
unkown
page readonly
6EC9000
unkown
page readonly
6D35000
unkown
page readonly
1683A846000
heap
page read and write
4B0000
unkown
page read and write
15398500000
heap
page read and write
2CC03402000
heap
page read and write
26EE000
stack
page read and write
7FF5050CD000
unkown
page readonly
18A20384000
trusted library allocation
page read and write
881B000
stack
page read and write
13F1A060000
heap
page read and write
21CC3B80000
trusted library allocation
page read and write
7FF5050A6000
unkown
page readonly
6E93000
unkown
page readonly
BA9F000
stack
page read and write
1FA02D53000
heap
page read and write
184A55D6000
heap
page read and write
271CC200000
heap
page read and write
1FA05260000
trusted library allocation
page read and write
21CC3B80000
trusted library allocation
page read and write
4986000
stack
page read and write
2B639B00000
heap
page read and write
819C000
stack
page read and write
5EAB000
unkown
page read and write
2D9E9870000
heap
page read and write
18A204B0000
trusted library allocation
page read and write
1FA02DBF000
heap
page read and write
18A20360000
trusted library allocation
page read and write
1FA02DA3000
heap
page read and write
D942E7E000
stack
page read and write
4650000
unkown
page read and write
2D9EA3A0000
heap
page read and write
6C42000
unkown
page readonly
401000
unkown
page execute read
7FFFEA3B3000
unkown
page read and write
21CC3CF0000
heap
page read and write
5BFB6FF000
stack
page read and write
1683A86E000
heap
page read and write
7FF505295000
unkown
page readonly
DC233F7000
stack
page read and write
7FFFEA3BE000
unkown
page read and write
6A8000
heap
page read and write
7FF505750000
unkown
page readonly
7FF50524F000
unkown
page readonly
1FA05264000
trusted library allocation
page read and write
CA54BFE000
stack
page read and write
184A55F1000
heap
page read and write
1F200353000
heap
page read and write
21CC3C17000
trusted library allocation
page read and write
50AA000
unkown
page read and write
AE9A000
stack
page read and write
7FF5050C2000
unkown
page readonly
7FFFEA3BD000
unkown
page write copy
21672A57000
heap
page read and write
65C0000
direct allocation
page read and write
760000
unkown
page readonly
2017F6EB000
heap
page read and write
89C000
stack
page read and write
7FF505731000
unkown
page readonly
5E60000
unkown
page read and write
7853000
unkown
page read and write
21CC3BF0000
trusted library allocation
page read and write
2F1DCFC000
stack
page read and write
5375000
unkown
page read and write
3DA0000
unkown
page readonly
7FF5056FF000
unkown
page readonly
539C000
unkown
page read and write
18A2045E000
heap
page read and write
6D0C000
unkown
page readonly
15397ABA000
heap
page read and write
1B65BFA0000
remote allocation
page read and write
4B05000
stack
page read and write
C6000
stack
page read and write
7820000
unkown
page read and write
184A5540000
heap
page read and write
66D2000
unkown
page readonly
2928000
stack
page read and write
2D9E9A4D000
heap
page read and write
CD0000
trusted library allocation
page read and write
D94347F000
stack
page read and write
2D9EA802000
heap
page read and write
2017F7E0000
heap
page read and write
18A204FA000
heap
page read and write
1EF2323D000
heap
page read and write
4249000
stack
page read and write
18A1ABF0000
trusted library allocation
page read and write
18A204C0000
trusted library allocation
page read and write
4888000
stack
page read and write
2017F761000
heap
page read and write
114E000
stack
page read and write
1FA05168000
heap
page read and write
6721000
direct allocation
page read and write
1E8EC654000
heap
page read and write
25DEA66E000
heap
page read and write
400000
unkown
page readonly
7525E4C000
stack
page read and write
40D000
unkown
page readonly
2606000
unkown
page read and write
5FFD000
unkown
page read and write
21CC3BC0000
trusted library allocation
page read and write
2017F764000
heap
page read and write
7FF505562000
unkown
page readonly
2017F6E9000
heap
page read and write
7FF505325000
unkown
page readonly
2A50000
unkown
page readonly
25DEA590000
trusted library allocation
page read and write
2CC03400000
heap
page read and write
D943377000
stack
page read and write
A99E000
stack
page read and write
1EFCDEC9000
heap
page read and write
5367000
unkown
page read and write
21CC3B80000
trusted library allocation
page read and write
1FA02DC0000
heap
page read and write
7FF50537A000
unkown
page readonly
21672A60000
heap
page read and write
21CC3B80000
trusted library allocation
page read and write
2110000
unkown
page read and write
18A1AC13000
heap
page read and write
7FF5050F8000
unkown
page readonly
B50000
unkown
page readonly
46B8000
unkown
page read and write
3D70000
unkown
page read and write
5090000
unkown
page read and write
50CB000
unkown
page read and write
21CC3BE0000
trusted library allocation
page read and write
5BFBC7E000
stack
page read and write
21CC3B80000
trusted library allocation
page read and write
114E000
stack
page read and write
21CC3BC0000
trusted library allocation
page read and write
2CC03447000
heap
page read and write
15397A85000
heap
page read and write
1FA02D87000
heap
page read and write
1EF2325A000
heap
page read and write
262D000
unkown
page read and write
D10000
heap
page read and write
6DC5000
unkown
page readonly
E80000
heap
page read and write
2017F6FC000
heap
page read and write
3FE9000
stack
page read and write
7FF50541E000
unkown
page readonly
89C000
stack
page read and write
2750000
unkown
page read and write
4DB0000
heap
page read and write
21CC3B70000
trusted library allocation
page read and write
21CC3B50000
trusted library allocation
page read and write
7FF505437000
unkown
page readonly
4B05000
stack
page read and write
5446000
unkown
page read and write
1190000
heap
page read and write
20000
unkown
page read and write
830000
unkown
page read and write
261B000
unkown
page read and write
7FF505644000
unkown
page readonly
6360000
unkown
page read and write
2017F6E7000
heap
page read and write
21CC3B80000
trusted library allocation
page read and write
4050000
unkown
page read and write
75098FD000
stack
page read and write
184A55E4000
heap
page read and write
2CC0344D000
heap
page read and write
205A000
stack
page read and write
21CC3B70000
trusted library allocation
page read and write
6BA7000
unkown
page readonly
6B0000
remote allocation
page read and write
21CC3B90000
trusted library allocation
page read and write
5379000
unkown
page read and write
51AC000
unkown
page read and write
7270000
unkown
page read and write
7FF5056B0000
unkown
page readonly
7FF5053A4000
unkown
page readonly
A919000
stack
page read and write
5393000
unkown
page read and write
4B90000
unkown
page read and write
57F8000
heap
page read and write
1B65C002000
heap
page read and write
21CC3BB0000
trusted library allocation
page read and write
88B3000
unkown
page read and write
F59A000
stack
page read and write
21CC3B60000
trusted library allocation
page read and write
AB1B000
stack
page read and write
2100000
unkown
page read and write
1FA05169000
heap
page read and write
1683A841000
heap
page read and write
831F000
stack
page read and write
21672A5D000
heap
page read and write
21CAF55D000
trusted library allocation
page read and write
405B000
unkown
page read and write
1D0000
unkown
page readonly
21CC3B50000
trusted library allocation
page read and write
44E0000
unkown
page read and write
7FF5052FB000
unkown
page readonly
6D73000
unkown
page readonly
7FFFEA3C0000
unkown
page read and write
5388000
unkown
page read and write
6690000
unkown
page readonly
7FF50543D000
unkown
page readonly
21CC3960000
trusted library allocation
page read and write
536C000
unkown
page read and write
1170000
direct allocation
page execute and read and write
4806000
stack
page read and write
1220000
direct allocation
page read and write
3A09CFD000
stack
page read and write
25EA000
unkown
page read and write
18A1AC59000
heap
page read and write
7FF50531E000
unkown
page readonly
27F0000
unkown
page readonly
E5F000
stack
page read and write
405B000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
5237000
unkown
page read and write
1F200616000
heap
page read and write
2D9E9860000
heap
page read and write
1FA05285000
trusted library allocation
page read and write
E420000
heap
page read and write
419C000
stack
page read and write
1EFCDCB0000
heap
page read and write
1EFCDEC9000
heap
page read and write
4108000
unkown
page read and write
21CA9910000
heap
page read and write
527E000
stack
page read and write
2928000
stack
page read and write
21CAF554000
trusted library allocation
page read and write
E6E6000
unkown
page read and write
21CC3CF2000
heap
page read and write
34F5000
heap
page read and write
20DF000
stack
page read and write
40D000
unkown
page readonly
CA54C7E000
stack
page read and write
1683A860000
heap
page read and write
3DF0000
unkown
page read and write
2D9EA38F000
heap
page read and write
1EF23225000
heap
page read and write
21CAF5BE000
trusted library allocation
page read and write
5438000
unkown
page read and write
52C0000
unkown
page read and write
1320000
direct allocation
page read and write
25DEB002000
trusted library allocation
page read and write
2D9E9AF5000
heap
page read and write
6DEE000
unkown
page readonly
53A5000
unkown
page read and write
40D000
unkown
page readonly
1F0000
unkown
page readonly
66CE000
unkown
page readonly
B50000
unkown
page readonly
B91F000
stack
page read and write
1FA02DA7000
heap
page read and write
2A60000
unkown
page read and write
18A20505000
heap
page read and write
BA9F000
stack
page read and write
7FF505341000
unkown
page readonly
24B0000
unkown
page readonly
21CC3C40000
trusted library allocation
page read and write
68E000
heap
page read and write
21CC3BE0000
trusted library allocation
page read and write
18A1BD40000
trusted library allocation
page read and write
7FF505430000
unkown
page readonly
15397950000
heap
page read and write
7DD667F000
stack
page read and write
2A30000
unkown
page read and write
5EAB000
unkown
page read and write
18A1AD07000
heap
page read and write
1200000
direct allocation
page read and write
7FF50556D000
unkown
page readonly
1F200398000
heap
page read and write
1F20039C000
heap
page read and write
1FA0525E000
trusted library allocation
page read and write
821F000
stack
page read and write
7FF505090000
unkown
page readonly
536F000
unkown
page read and write
E42A000
heap
page read and write
52C7000
unkown
page read and write
271CC4F6000
heap
page read and write
470000
unkown
page readonly
7FF505258000
unkown
page readonly
7B0000
system
page read and write
21CC3C20000
trusted library allocation
page read and write
5137000
unkown
page read and write
21CC3B50000
trusted library allocation
page read and write
7847000
unkown
page read and write
271CC340000
heap
page read and write
1F200331000
heap
page read and write
2B639910000
heap
page read and write
2017F744000
heap
page read and write
464C000
stack
page read and write
21CC3B50000
trusted library allocation
page read and write
CA54A7C000
stack
page read and write
6BBF000
unkown
page readonly
7FF4E5875000
unkown
page readonly
7896000
unkown
page read and write
2017F6B9000
heap
page read and write
2D9E9B13000
heap
page read and write
830000
heap
page read and write
7FF4E57E0000
unkown
page readonly
21CC3DA1000
heap
page read and write
5E60000
unkown
page read and write
21672A79000
heap
page read and write
3C00DF7000
stack
page read and write
21CA9950000
heap
page read and write
25AD000
unkown
page read and write
7FF505586000
unkown
page readonly
6D35000
unkown
page readonly
881B000
stack
page read and write
2560000
unkown
page read and write
12C7000
heap
page read and write
50C7000
unkown
page read and write
2750000
unkown
page read and write
5BFB39E000
stack
page read and write
5134000
unkown
page read and write
3F00000
unkown
page read and write
25DEA626000
heap
page read and write
400000
unkown
page readonly
25DEA4F0000
heap
page read and write
5E60000
unkown
page read and write
3D20000
unkown
page read and write
7DD657F000
stack
page read and write
21CC3BD0000
trusted library allocation
page read and write
1EFCDB80000
unkown
page readonly
769C000
stack
page read and write
7FF505254000
unkown
page readonly
781A000
stack
page read and write
E664000
unkown
page read and write
C6000
stack
page read and write
4690000
unkown
page read and write
1BD53FE000
stack
page read and write
1B65BFA0000
remote allocation
page read and write
CA54BFE000
stack
page read and write
841D000
stack
page read and write
2B639977000
heap
page read and write
7820000
unkown
page read and write
2D9EA3C4000
heap
page read and write
21CC3B50000
trusted library allocation
page read and write
3A0A17F000
stack
page read and write
271CC48E000
heap
page read and write
216728B0000
heap
page read and write
468C000
unkown
page read and write
FA0917E000
stack
page read and write
3D10000
unkown
page read and write
7FF50529E000
unkown
page readonly
20102880000
direct allocation
page read and write
7FF505626000
unkown
page readonly
830000
unkown
page read and write
5BFB87F000
stack
page read and write
510C000
unkown
page read and write
6BAF000
unkown
page readonly
E8B000
heap
page read and write
7896000
unkown
page read and write
13F19FB0000
heap
page read and write
6EA0000
unkown
page readonly
21CC3BB0000
trusted library allocation
page read and write
2624000
unkown
page read and write
21B85530000
heap
page read and write
7DF5057FB000
unkown
page readonly
3D60000
unkown
page read and write
261B5A30000
heap
page read and write
490E000
stack
page read and write
2520000
unkown
page readonly
1F2002D4000
heap
page read and write
7FF5056EC000
unkown
page readonly
13F1A06B000
heap
page read and write
40D000
unkown
page readonly
18A20390000
trusted library allocation
page read and write
5354000
unkown
page read and write
1FA0525F000
trusted library allocation
page read and write
21CC3B80000
trusted library allocation
page read and write
271CC487000
heap
page read and write
21CA98E3000
heap
page read and write
21CC3BC0000
trusted library allocation
page read and write
2D9EA36B000
heap
page read and write
89C000
stack
page read and write
2D9E9A68000
heap
page read and write
859C000
stack
page read and write
3A09DFB000
stack
page read and write
A99E000
stack
page read and write
7FF505686000
unkown
page readonly
7FF505614000
unkown
page readonly
1F200352000
heap
page read and write
50C1000
unkown
page read and write
7FF4E584F000
unkown
page readonly
1F200385000
heap
page read and write
261B5710000
heap
page read and write
5379000
unkown
page read and write
18A1B718000
heap
page read and write
2017F6F1000
heap
page read and write
604A000
trusted library allocation
page read and write
7FF505515000
unkown
page readonly
A919000
stack
page read and write
21CAB290000
trusted library allocation
page read and write
184A55BD000
heap
page read and write
50E8000
unkown
page read and write
1FA05165000
heap
page read and write
6EA7000
unkown
page readonly
7FF5055ED000
unkown
page readonly
7FF5057C0000
unkown
page readonly
4010000
unkown
page readonly
7FF4E5836000
unkown
page readonly
18A2048A000
heap
page read and write
21CC3913000
heap
page read and write
3DB0000
unkown
page readonly
88B3000
unkown
page read and write
24E1000
unkown
page read and write
3510000
heap
page read and write
261B000
unkown
page read and write
5610000
unkown
page read and write
6C34000
unkown
page readonly
7FF5053DA000
unkown
page readonly
18A1AC8D000
heap
page read and write
21B85540000
heap
page read and write
3C009AB000
stack
page read and write
68E000
heap
page read and write
21CC3950000
trusted library allocation
page read and write
2D9EA38B000
heap
page read and write
4330000
unkown
page readonly
21CC391F000
heap
page read and write
2B639B00000
heap
page read and write
2606000
unkown
page read and write
5EAB000
unkown
page read and write
21CC3C20000
trusted library allocation
page read and write
26EE000
stack
page read and write
2CC03270000
heap
page read and write
184A55C6000
heap
page read and write
6B8E000
unkown
page readonly
7FF50568D000
unkown
page readonly
3D70000
unkown
page read and write
4050000
unkown
page read and write
2017F755000
heap
page read and write
5137000
unkown
page read and write
2017F73E000
heap
page read and write
819C000
stack
page read and write
24B0000
unkown
page readonly
7FF5050D8000
unkown
page readonly
540000
unkown
page readonly
AC1C000
stack
page read and write
2D9E9B08000
heap
page read and write
184A55BB000
heap
page read and write
7FF505614000
unkown
page readonly
464C000
stack
page read and write
2D9E9A66000
heap
page read and write
7EF000
system
page execute and read and write
520000
unkown
page read and write
2017FD10000
heap
page read and write
27E6000
stack
page read and write
7FF50572D000
unkown
page readonly
6EA0000
unkown
page readonly
3506000
heap
page read and write
21CC3B20000
trusted library allocation
page read and write
1FA0525E000
trusted library allocation
page read and write
1FA0517F000
heap
page read and write
18A20380000
trusted library allocation
page read and write
21CC3B60000
trusted library allocation
page read and write
7FF5052DB000
unkown
page readonly
7FFFEA309000
unkown
page readonly
21CC3B80000
trusted library allocation
page read and write
3518000
heap
page read and write
1E8EC702000
heap
page read and write
690000
remote allocation
page read and write
50B0000
unkown
page read and write
25DEA65E000
heap
page read and write
21CC3BC0000
trusted library allocation
page read and write
1FA02DBF000
heap
page read and write
271CC48B000
heap
page read and write
AC99000
stack
page read and write
50C1000
unkown
page read and write
271CC4DA000
heap
page read and write
7FF505647000
unkown
page readonly
18A1AC29000
heap
page read and write
21672A85000
heap
page read and write
B50000
unkown
page readonly
25DEA672000
heap
page read and write
5359000
unkown
page read and write
20DF000
stack
page read and write
51AC000
unkown
page read and write
C6000
stack
page read and write
21CC3CEF000
heap
page read and write
271CC590000
direct allocation
page read and write
271CC3C0000
direct allocation
page read and write
21CA9950000
heap
page read and write
21CC3BA0000
trusted library allocation
page read and write
5BFBA7E000
stack
page read and write
21672B02000
heap
page read and write
65AF000
heap
page read and write
26DF000
stack
page read and write
2D9EA300000
heap
page read and write
66CB000
unkown
page readonly
21CBC2FF000
trusted library allocation
page read and write
1FA05285000
trusted library allocation
page read and write
6B78000
unkown
page readonly
D942BEB000
stack
page read and write
E80000
heap
page read and write
2B6398F0000
heap
page read and write
6C42000
unkown
page readonly
2D9EA802000
heap
page read and write
1F200394000
heap
page read and write
7FF505783000
unkown
page readonly
51A9000
unkown
page read and write
21CC3BE0000
trusted library allocation
page read and write
2D9E98D0000
heap
page read and write
21CC3BA0000
trusted library allocation
page read and write
841D000
stack
page read and write
1EF2329C000
heap
page read and write
5B8E000
stack
page read and write
4650000
unkown
page read and write
5380000
unkown
page read and write
57F8000
heap
page read and write
7FF505696000
unkown
page readonly
51D2000
unkown
page read and write
7FF505443000
unkown
page readonly
676000
heap
page read and write
26DF000
stack
page read and write
5E60000
unkown
page read and write
779D000
stack
page read and write
1683A845000
heap
page read and write
135C000
unclassified section
page readonly
21CC3BCA000
trusted library allocation
page read and write
7FF50565E000
unkown
page readonly
50AA000
unkown
page read and write
1320000
direct allocation
page read and write
21CAB320000
trusted library allocation
page read and write
7FF5053E7000
unkown
page readonly
201027A0000
direct allocation
page read and write
21672A58000
heap
page read and write
7FF50557F000
unkown
page readonly
1EFCDB90000
unkown
page readonly
2B6397B0000
unkown
page read and write
2D9EA389000
heap
page read and write
1FD7000
stack
page read and write
6D9C000
unkown
page readonly
26EC000
stack
page read and write
46B6000
unkown
page read and write
1D0000
unkown
page readonly
540000
unkown
page readonly
490E000
stack
page read and write
7FF505518000
unkown
page readonly
3F11000
unkown
page read and write
1EFCDBA0000
unkown
page read and write
CA54BFE000
stack
page read and write
7FF505518000
unkown
page readonly
461000
unkown
page readonly
7C0000
unkown
page readonly
1320000
direct allocation
page read and write
4F04A7B000
stack
page read and write
3A09F7B000
stack
page read and write
4F04EFB000
stack
page read and write
7FFFEA3C3000
unkown
page readonly
1E8EC600000
heap
page read and write
400000
unkown
page readonly
40A4000
unkown
page read and write
1F20039E000
heap
page read and write
B41E000
stack
page read and write
419C000
stack
page read and write
271CC403000
direct allocation
page read and write
4340000
unkown
page readonly
2D9EA3A0000
heap
page read and write
2CC0343C000
heap
page read and write
2661000
unkown
page read and write
1FA05285000
trusted library allocation
page read and write
3F20000
unkown
page read and write
1FA0525E000
trusted library allocation
page read and write
2D9EA820000
heap
page read and write
40B000
unkown
page execute read
99C000
stack
page read and write
6734000
direct allocation
page read and write
3EF0000
unkown
page read and write
7FF4E57E2000
unkown
page readonly
1EFCDEC5000
heap
page read and write
4A80000
unkown
page readonly
1F2004FD000
heap
page read and write
7FF5050FD000
unkown
page readonly
2017F6E7000
heap
page read and write
21CC3B60000
trusted library allocation
page read and write
21672A54000
heap
page read and write
1E8EC679000
heap
page read and write
2D9EA387000
heap
page read and write
1320000
direct allocation
page read and write
4520000
unkown
page readonly
6360000
unkown
page read and write
50C3000
unkown
page read and write
1320000
direct allocation
page read and write
1320000
direct allocation
page read and write
5240000
unkown
page read and write
271CC550000
heap
page read and write
419C000
stack
page read and write
1FA05165000
heap
page read and write
3DA0000
unkown
page readonly
18A206C0000
remote allocation
page read and write
5380000
unkown
page read and write
66A0000
unkown
page readonly
21CAB776000
trusted library allocation
page read and write
2570000
unkown
page read and write
6E03000
unkown
page readonly
50B0000
unkown
page read and write
21CAF3F4000
trusted library allocation
page read and write
A89F000
stack
page read and write
7FF5052F1000
unkown
page readonly
2017F680000
heap
page read and write
3D70000
unkown
page read and write
4020000
unkown
page read and write
2B639970000
heap
page read and write
10000
heap
page read and write
7FF5053A7000
unkown
page readonly
1FA02DBA000
heap
page read and write
1FA02D87000
heap
page read and write
790000
unkown
page readonly
2A70000
unkown
page readonly
FA08DF7000
stack
page read and write
7FF4E5868000
unkown
page readonly
2733000
unkown
page read and write
CD597F7000
stack
page read and write
7FF5054CE000
unkown
page readonly
1EF24BE0000
remote allocation
page read and write
1683A720000
heap
page read and write
1539853A000
heap
page read and write
AC99000
stack
page read and write
6E55000
unkown
page readonly
6E7E000
unkown
page readonly
26EE000
stack
page read and write
2017F6F7000
heap
page read and write
1320000
direct allocation
page read and write
7C0000
unkown
page readonly
2D9EA387000
heap
page read and write
50AA000
unkown
page read and write
2D9EA38D000
heap
page read and write
271CC570000
direct allocation
page read and write
18A20368000
trusted library allocation
page read and write
18A203A0000
trusted library allocation
page read and write
1EF23213000
heap
page read and write
2A2A000
stack
page read and write
21CC3BD0000
trusted library allocation
page read and write
1FA05264000
trusted library allocation
page read and write
114E000
stack
page read and write
869B000
stack
page read and write
5354000
unkown
page read and write
7FF505325000
unkown
page readonly
5359000
unkown
page read and write
1F2003A7000
heap
page read and write
184A55C1000
heap
page read and write
7FF505322000
unkown
page readonly
6080000
trusted library allocation
page read and write
3F11000
unkown
page read and write
29AA000
stack
page read and write
6BA7000
unkown
page readonly
2B6397B0000
heap
page read and write
2CC03513000
heap
page read and write
40E000
unkown
page write copy
There are 3212 hidden memdumps, click here to show them.