IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\12C0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3046.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4113.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\98D7.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\A33B.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D8D3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\E4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ECFB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FB61.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\XandETC.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\db.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\llpb1133.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\pliu.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jhevwvt
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\sievwvt
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\sievwvt:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ECFB.exe_c28f7e147f7233fac35d68c9fdcbff1142cbb9f3_c36f58af_10581eb1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5036.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 8 03:45:20 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5392.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER545E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\10PkIt2V82WR
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\LocalLow\2KyP65ecp6T3
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\LocalLow\432zCWSnwm1N
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\LocalLow\cdE656z8QTF7
SQLite 3.x database, last written using SQLite version 3038005, file counter 17, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 17
dropped
C:\Users\user\AppData\LocalLow\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\A33B.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
dropped
C:\Users\user\AppData\Local\Temp\db.dat
data
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Local\Temp\4113.exe
C:\Users\user\AppData\Local\Temp\4113.exe
malicious
C:\Users\user\AppData\Roaming\sievwvt
C:\Users\user\AppData\Roaming\sievwvt
malicious
C:\Users\user\AppData\Local\Temp\3046.exe
C:\Users\user\AppData\Local\Temp\3046.exe
malicious
C:\Users\user\AppData\Local\Temp\A33B.exe
C:\Users\user\AppData\Local\Temp\A33B.exe
malicious
C:\Users\user\AppData\Local\Temp\3046.exe
C:\Users\user\AppData\Local\Temp\3046.exe
malicious
C:\Users\user\AppData\Local\Temp\98D7.exe
C:\Users\user\AppData\Local\Temp\98D7.exe
malicious
C:\Users\user\AppData\Local\Temp\E4.exe
C:\Users\user\AppData\Local\Temp\E4.exe
malicious
C:\Users\user\AppData\Local\Temp\ECFB.exe
C:\Users\user\AppData\Local\Temp\ECFB.exe
malicious
C:\Users\user\AppData\Local\Temp\D8D3.exe
C:\Users\user\AppData\Local\Temp\D8D3.exe
malicious
C:\Users\user\AppData\Local\Temp\llpb1133.exe
"C:\Users\user\AppData\Local\Temp\llpb1133.exe"
malicious
C:\Users\user\AppData\Local\Temp\pliu.exe
"C:\Users\user\AppData\Local\Temp\pliu.exe"
malicious
C:\Users\user\AppData\Local\Temp\XandETC.exe
"C:\Users\user\AppData\Local\Temp\XandETC.exe"
malicious
C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe
"C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe
C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe --Task
malicious
C:\Users\user\AppData\Local\Temp\3046.exe
"C:\Users\user\AppData\Local\Temp\3046.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\Temp\pliu.exe
"C:\Users\user\AppData\Local\Temp\pliu.exe" -h
malicious
C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe
"C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0\3046.exe" --AutoStart
malicious
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\user\AppData\Local\09cc62dd-ff65-4927-b82d-d455eaaeb9f0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 520
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://flytourchip.com.br/systems/ChromeSetup.exe
158.69.96.67
malicious
http://perficut.at/tmp/
195.158.3.162
malicious
http://potunulit.org/
188.114.96.3
malicious
http://soryytlic4.net/
malicious
http://novanosa5org.org/
malicious
http://golilopaster.org/
malicious
http://bihsy.com/lancer/get.php
malicious
https://xv.yxzgamen.com/2701.html
188.114.97.3
malicious
http://bulimu55t.net/
malicious
https://xv.yxzgamen.com/logo.png
188.114.97.3
malicious
http://hujukui3.net/
malicious
http://77.73.134.27/llpb1133.exe
77.73.134.27
malicious
http://bukubuka1.net/
malicious
http://newzelannd66.org/
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://static.xx.fbcdn.net/rsrc.php/v3i7M54/yX/l/en_US/WYC6LbamQUd.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://62.204.41.134/2bdc6e9a1ce82117657287e1bc36e6044
unknown
http://siaoheg.aappatey.com/K
unknown
https://duckduckgo.com/ac/?q=
unknown
http://62.204.41.134/_
unknown
https://messenger.com/
unknown
https://www.facebook.com/login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing
157.240.253.35
https://search.yahoo.com?fr=crmas_sfpf
unknown
http://siaoheg.aappatey.com/check/?sid=288019&key=8611a052d7ff506dc761df9a028c28ef
unknown
http://www.openssl.org/support/faq.html
unknown
http://iueg.aappatey.com/check/safeXdkojlmpp
unknown
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
unknown
http://siaoheg.aappatey.com/r
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yR/r/n9ktzHPknGx.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://perficut.at/
unknown
http://siaoheg.aappatey.com/
unknown
http://siaoheg.aappatey.com:80/check/?sid=288019&key=8611a052d7ff506dc761df9a028c28ef
unknown
http://iueg.aappatey.com/check/safeB
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yW/l/0
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/ya/l/0
unknown
http://iueg.aappatey.com:80/check/safe
unknown
http://iueg.aappatey.com/m
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yi/l/0
unknown
http://62.204.41.134/
62.204.41.134
https://static.xx.fbcdn.net/rsrc.php/v3/yM/r/4x04rJtLVMo.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://siaoheg.aappatey.com/check/?sid=287855&key=53966fc5c1f009ecd22e4b74973b5675preseMu
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yG/l/0
unknown
http://62.204.41.134/2bdc6e9a1ce82117657287e1bc36e604
62.204.41.134
https://static.xx.fbcdn.net/rsrc.php/v3/yb/r/mkZZ0EnRB0x.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://iueg.aappatey.com/check/safei
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yY/r/ue_OWlkLDZP.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yE/l/0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://perw.facebook.cueg.aappatey.com/check/safe
unknown
http://siaoheg.aappatey.com/check/?sid=287855&key=53966fc5c1f009ecd22e4b74973b5675
unknown
http://siaoheg.aappatey.com/check/?sid=287855&key=53966fc5c1f009ecd22e4b74973b5675?
unknown
http://62.204.41.134/ll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://62.204.41.134/2bdc6e9a1ce82117657287e1bc36e604o
unknown
http://62.204.41.134/2bdc6e9a1ce82117657287e1bc36e604n
unknown
http://iueg.aappatey.com/check/safeT7-16b8-4
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yO/r/_tJ17sGyxOX.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://api.2ip.ua/geo.json
162.0.217.254
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
unknown
http://siaoheg.aappatey.com/check/?sid=286587&key=075ea35c9751668450c9ec4c0067c0f6
45.66.159.142
http://siaoheg.aappatey.com/check/?sid=288019&key=8611a052d7ff506dc761df9a028c28efcfBb4E4
unknown
http://siaoheg.aappatey.com/check/?sid=288019&key=8611a052d7ff506dc761df9a028c28efcohor
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/ym/r/2Z9gzYPL3TW.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://search.yahoo.com?fr=crmas_sfp
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/y-/r/qu9vi-bmWl3.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://siaoheg.aappatey.com/check/?sid=287855&key=53966fc5c1f009ecd22e4b74973b5675c
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/y0/l/0
unknown
http://iueg.aappatey.com/check/safe
45.66.159.142
https://www.facebook.com/ads/manager/account_settings/account_billing
157.240.253.35
https://static.xx.fbcdn.net/rsrc.php/v3/y9/l/0
unknown
http://iueg.aapp
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/ym/l/0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 66 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
perficut.at
195.158.3.162
malicious
potunulit.org
188.114.96.3
malicious
flytourchip.com.br
158.69.96.67
malicious
star-mini.c10r.facebook.com
157.240.253.35
siaoheg.aappatey.com
45.66.159.142
api.2ip.ua
162.0.217.254
xv.yxzgamen.com
188.114.97.3
iueg.aappatey.com
45.66.159.142
www.facebook.com
unknown

IPs

IP
Domain
Country
Malicious
37.34.248.24
unknown
Kuwait
malicious
190.219.54.242
unknown
Panama
malicious
23.106.124.133
unknown
Singapore
malicious
195.158.3.162
perficut.at
Uzbekistan
malicious
158.69.96.67
flytourchip.com.br
Canada
malicious
188.114.96.3
potunulit.org
European Union
malicious
77.73.134.27
unknown
Kazakhstan
malicious
45.66.159.142
siaoheg.aappatey.com
Russian Federation
62.204.41.134
unknown
United Kingdom
188.114.97.3
xv.yxzgamen.com
European Union
162.0.217.254
api.2ip.ua
Canada
157.240.253.35
star-mini.c10r.facebook.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.106
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.104
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006027A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000902A8
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\uneqm\NccQngn\Ybpny\09pp62qq-ss65-4927-o82q-q455rnnro9s0\3046.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C0
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203C0
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\uneqm\NccQngn\Ybpny\Grzc\cyvh.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000902A8
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006027A
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C0
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\uneqm\NccQngn\Ybpny\09pp62qq-ss65-4927-o82q-q455rnnro9s0\3046.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203C0
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
SysHelper
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C008291BDE00
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
87E000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
87C000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
874000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
2350000
direct allocation
page execute and read and write
malicious
83A000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
851000
unclassified section
page read and write
malicious
720000
direct allocation
page read and write
malicious
87E000
heap
page read and write
malicious
7E0000
direct allocation
page read and write
malicious
87E000
heap
page read and write
malicious
87E000
heap
page read and write
malicious
2350000
direct allocation
page execute and read and write
malicious
21E1000
unclassified section
page read and write
malicious
2330000
direct allocation
page execute and read and write
malicious
2380000
direct allocation
page execute and read and write
malicious
1423000
heap
page read and write
7FF534DE7000
unkown
page readonly
640000
direct allocation
page execute and read and write
34C0000
heap
page read and write
3646000
stack
page read and write
100B5000
unkown
page read and write
4CF000
heap
page read and write
7FF534FEB000
unkown
page readonly
4C15000
trusted library allocation
page read and write
7FF5B1F45000
unkown
page readonly
9AF000
stack
page read and write
94F000
stack
page read and write
EAFB57E000
stack
page read and write
FB4657B000
stack
page read and write
21D0000
heap
page read and write
885000
heap
page read and write
4C5000
heap
page read and write
4D6000
heap
page read and write
2F4F000
stack
page read and write
4BC0000
unkown
page readonly
2205A98E000
heap
page read and write
4D1000
heap
page read and write
623F000
unkown
page read and write
8AE000
heap
page read and write
7FF53500F000
unkown
page readonly
F656000
unkown
page read and write
7F3C000
unkown
page readonly
138D000
heap
page read and write
25E0000
heap
page read and write
5730000
unkown
page read and write
1380000
heap
page read and write
78A000
heap
page read and write
7FF534BDB000
unkown
page readonly
22858350000
heap
page read and write
750000
heap
page read and write
1F0000
remote allocation
page read and write
41A000
unkown
page write copy
2205B230000
heap
page read and write
2205A870000
heap
page read and write
F4F1000
unkown
page read and write
30000
heap
page read and write
22858402000
unkown
page read and write
108E4000
unkown
page read and write
59F0000
unkown
page read and write
5800000
unkown
page read and write
4C7000
heap
page read and write
843000
heap
page read and write
22858813000
heap
page read and write
58A0000
unkown
page read and write
F516000
unkown
page read and write
5730000
unkown
page read and write
504000
heap
page read and write
275F000
stack
page read and write
5800000
unkown
page read and write
4BA000
heap
page read and write
414000
unkown
page readonly
9C000
stack
page read and write
5AEA000
stack
page read and write
62D5000
unkown
page read and write
14061F000
unkown
page readonly
140000000
unkown
page readonly
496000
heap
page read and write
8A6000
heap
page read and write
84C000
heap
page read and write
57E0000
unkown
page read and write
267E000
stack
page read and write
102A7000
stack
page read and write
4DA000
heap
page read and write
8A3000
heap
page read and write
7FF534F96000
unkown
page readonly
4AB000
unkown
page read and write
418000
unkown
page execute read
928E000
unkown
page read and write
7F0000
unclassified section
page read and write
5940000
unkown
page read and write
14114000
unkown
page read and write
4BA0000
unkown
page readonly
4D5000
heap
page read and write
58A0000
unkown
page read and write
29BE000
stack
page read and write
57F0000
unkown
page read and write
5720000
unkown
page read and write
7FF5B1F3F000
unkown
page readonly
14522D50000
heap
page read and write
8FC1000
unkown
page read and write
58A0000
unkown
page read and write
5F0000
heap
page read and write
501000
heap
page read and write
5730000
unkown
page read and write
4211000
trusted library allocation
page read and write
2069E402000
trusted library allocation
page read and write
867000
heap
page read and write
522000
heap
page read and write
50D000
heap
page read and write
535000
heap
page read and write
84F000
heap
page read and write
418000
unkown
page execute read
9C000
stack
page read and write
7F9C000
unkown
page readonly
55A000
unkown
page readonly
867000
heap
page read and write
2205A88B000
heap
page read and write
2898000
heap
page read and write
7FFC1B4F3000
unkown
page readonly
57E0000
unkown
page read and write
2682F03A000
heap
page read and write
192FC28C000
heap
page read and write
5710000
unkown
page read and write
EAFB97E000
stack
page read and write
F6A0000
unkown
page read and write
EE5000
stack
page read and write
2F70000
heap
page read and write
7FF5350AF000
unkown
page readonly
7FF534B55000
unkown
page readonly
F759000
unkown
page read and write
4D6000
heap
page read and write
14F0000
unkown
page read and write
84F000
heap
page read and write
3371000
unkown
page read and write
55B6000
stack
page read and write
7FF534EC9000
unkown
page readonly
7FF534FF2000
unkown
page readonly
7FF534D3C000
unkown
page readonly
7D44000
unkown
page readonly
93B3000
unkown
page read and write
14F0000
unkown
page read and write
199000
stack
page read and write
2BBF000
stack
page read and write
7FF535074000
unkown
page readonly
5D9000
unkown
page readonly
5931000
unkown
page read and write
57F0000
unkown
page read and write
414000
unkown
page readonly
392F2FB000
stack
page read and write
8F33000
unkown
page read and write
4D6000
heap
page read and write
507000
heap
page read and write
7FF534B5C000
unkown
page readonly
4A0000
heap
page read and write
4D6000
heap
page read and write
6230000
unkown
page read and write
2841000
heap
page read and write
5F6E000
stack
page read and write
F45A000
unkown
page read and write
1F0000
remote allocation
page read and write
5370000
unkown
page readonly
338C000
unkown
page read and write
8A9000
heap
page read and write
7E45000
unkown
page readonly
5291000
unkown
page read and write
25E1000
heap
page read and write
22BAF000000
unkown
page readonly
8F14000
unkown
page read and write
F72B000
unkown
page read and write
1350000
heap
page read and write
58A0000
unkown
page read and write
E40000
unkown
page read and write
7FF535107000
unkown
page readonly
7FF6EC770000
unkown
page readonly
885000
heap
page read and write
2380000
heap
page read and write
14F0000
unkown
page read and write
F4C8000
unkown
page read and write
15F0000
unkown
page readonly
5730000
unkown
page read and write
58A0000
unkown
page read and write
BCF9000
stack
page read and write
24F0000
heap
page read and write
51E000
heap
page read and write
93F000
stack
page read and write
4B0000
heap
page read and write
521000
heap
page read and write
51E000
heap
page read and write
545000
heap
page read and write
22BAF460000
unkown
page read and write
4A8000
heap
page read and write
14D0000
heap
page read and write
509000
heap
page read and write
28938041000
heap
page read and write
4BF000
heap
page read and write
4AB000
heap
page read and write
558000
heap
page read and write
5940000
unkown
page read and write
414000
unkown
page readonly
5730000
unkown
page read and write
7FF534C27000
unkown
page readonly
210C000
stack
page read and write
85FEF7F000
stack
page read and write
7FF534E02000
unkown
page readonly
11AB7000
stack
page read and write
4B43000
unkown
page read and write
2CBE000
stack
page read and write
1820000
trusted library allocation
page read and write
740000
heap
page read and write
57E0000
unkown
page read and write
4F5000
heap
page read and write
53A000
heap
page read and write
552000
heap
page read and write
501000
heap
page read and write
14F0000
unkown
page read and write
140000000
unkown
page readonly
5940000
unkown
page read and write
57F0000
unkown
page read and write
2069DC29000
heap
page read and write
A09C67B000
stack
page read and write
654000
heap
page read and write
22858413000
unkown
page read and write
5810000
unkown
page read and write
595000
heap
page read and write
14F4E000
unkown
page read and write
57E0000
unkown
page read and write
538000
heap
page read and write
400000
unkown
page readonly
8A3000
heap
page read and write
2682F048000
heap
page read and write
4A4000
heap
page read and write
52A000
heap
page read and write
4BE000
heap
page read and write
180000
heap
page read and write
8A6000
heap
page read and write
5730000
unkown
page read and write
7FF5B2018000
unkown
page readonly
14A3000
trusted library allocation
page execute and read and write
2AEE8100000
heap
page read and write
90F000
stack
page read and write
57E0000
unkown
page read and write
874000
heap
page read and write
7EAC000
unkown
page readonly
76B000
heap
page read and write
2AEE7F90000
heap
page read and write
3EA4000
heap
page read and write
55A000
unkown
page readonly
7FF534F7F000
unkown
page readonly
B879000
stack
page read and write
7FF6EC771000
unkown
page execute read
867000
heap
page read and write
11258000
unkown
page read and write
73C76FF000
stack
page read and write
21CECBC0000
heap
page read and write
4F8000
heap
page read and write
4A3000
heap
page read and write
21DE000
stack
page read and write
22AF000
stack
page read and write
50E000
heap
page read and write
5800000
unkown
page read and write
4DA000
heap
page read and write
401000
unkown
page execute read
28938013000
heap
page read and write
2682F029000
heap
page read and write
5CB000
heap
page read and write
57E0000
unkown
page read and write
A0A000
stack
page read and write
7FF534D2A000
unkown
page readonly
15D0000
unkown
page read and write
816000
heap
page execute and read and write
84F000
heap
page read and write
41A000
unkown
page write copy
1F0000
heap
page read and write
401000
unkown
page execute read
4D6000
heap
page read and write
84C000
heap
page read and write
14F0000
unkown
page read and write
503000
heap
page read and write
14522D80000
trusted library allocation
page read and write
918000
heap
page read and write
5800000
remote allocation
page read and write
84F000
heap
page read and write
7F65000
unkown
page readonly
5C1000
heap
page read and write
8EF000
stack
page read and write
14F0000
unkown
page read and write
8BF000
heap
page read and write
7FF535121000
unkown
page readonly
19C000
stack
page read and write
102B0000
unkown
page read and write
1402E9000
unkown
page execute read
58A0000
unkown
page read and write
14214000
unkown
page read and write
5933000
unkown
page read and write
2682F02E000
heap
page read and write
627C000
unkown
page read and write
593A000
unkown
page read and write
57E0000
unkown
page read and write
22BAF4C0000
unkown
page read and write
82F88FF000
stack
page read and write
77B0000
unkown
page readonly
532000
heap
page read and write
7FF53493C000
unkown
page readonly
2F6E000
heap
page read and write
D8EB000
unkown
page read and write
3100000
heap
page execute and read and write
409000
unkown
page execute read
4BE0000
unkown
page readonly
293F000
stack
page read and write
4EE000
heap
page read and write
7FF5B1ECE000
unkown
page readonly
5850000
unkown
page read and write
885000
heap
page read and write
5730000
unkown
page read and write
57E0000
unkown
page read and write
14522CF0000
heap
page read and write
885000
heap
page read and write
522000
heap
page read and write
2889000
heap
page read and write
70C000
stack
page read and write
502000
heap
page read and write
5800000
unkown
page read and write
222E000
heap
page execute and read and write
100A8000
stack
page read and write
5A50000
unkown
page readonly
77E2000
unkown
page readonly
4F88000
stack
page read and write
400000
unkown
page readonly
7FF5B1ECA000
unkown
page readonly
F41C000
unkown
page read and write
4D5000
heap
page read and write
7FF534FB7000
unkown
page readonly
57E0000
unkown
page read and write
192FE1C0000
remote allocation
page read and write
5810000
unkown
page read and write
41A000
unkown
page write copy
F270000
unkown
page read and write
590000
heap
page read and write
8E46BFC000
stack
page read and write
7FF534E65000
unkown
page readonly
2300000
heap
page read and write
148E000
stack
page read and write
7FF534BA6000
unkown
page readonly
B7E000
stack
page read and write
2205A630000
heap
page read and write
7FF534B76000
unkown
page readonly
2A3D000
stack
page read and write
62C8000
unkown
page read and write
1A0000
heap
page read and write
30F0000
trusted library allocation
page execute and read and write
22BAF390000
unkown
page readonly
28DE000
stack
page read and write
843000
heap
page read and write
4D6000
heap
page read and write
7FF5347FE000
unkown
page readonly
6261000
unkown
page read and write
7FF534B7D000
unkown
page readonly
F5D0000
unkown
page read and write
14F0000
unkown
page read and write
2110000
heap
page read and write
EAFABBF000
stack
page read and write
7FFC1B4ED000
unkown
page write copy
7FD9000
unkown
page readonly
4BF000
heap
page read and write
E9EF000
stack
page read and write
30000
heap
page read and write
70E000
stack
page read and write
3EBC000
heap
page read and write
885000
heap
page read and write
287F000
stack
page read and write
22BAEE41000
unkown
page read and write
1F0000
heap
page read and write
4C7000
heap
page read and write
2069DC77000
heap
page read and write
7FF534950000
unkown
page readonly
7FF534EDE000
unkown
page readonly
7FF53496E000
unkown
page readonly
180B000
trusted library allocation
page execute and read and write
5800000
unkown
page read and write
5730000
unkown
page read and write
2069DD13000
heap
page read and write
400000
unkown
page readonly
41A000
unkown
page write copy
7FB7000
unkown
page readonly
58A0000
unkown
page read and write
A4F000
stack
page read and write
11268000
unkown
page read and write
5730000
unkown
page read and write
925F000
unkown
page read and write
1F0000
heap
page read and write
2AEE806F000
heap
page read and write
926000
heap
page execute and read and write
57F0000
unkown
page read and write
7FF534DB3000
unkown
page readonly
22BAEE57000
unkown
page read and write
192FC302000
heap
page read and write
7FF534B62000
unkown
page readonly
4C00000
unkown
page readonly
557000
unkown
page read and write
14F0000
unkown
page read and write
57E0000
unkown
page read and write
4D40000
unkown
page read and write
5730000
unkown
page read and write
7FF5348AC000
unkown
page readonly
279E000
stack
page read and write
21B0000
direct allocation
page read and write
4C1000
heap
page read and write
192FC1F0000
trusted library allocation
page read and write
51E000
heap
page read and write
57F0000
unkown
page read and write
5730000
unkown
page read and write
1F0000
remote allocation
page read and write
90F000
stack
page read and write
6274000
unkown
page read and write
11236000
unkown
page read and write
843000
heap
page read and write
57F0000
unkown
page read and write
3EA6000
heap
page read and write
57F0000
unkown
page read and write
5730000
unkown
page read and write
82F8BFC000
stack
page read and write
7FF534F12000
unkown
page readonly
2205B16D000
heap
page read and write
7FF53502F000
unkown
page readonly
1F0000
remote allocation
page read and write
D864000
unkown
page read and write
57F0000
unkown
page read and write
3EBC000
heap
page read and write
14F0000
unkown
page read and write
137C9000
stack
page read and write
C100000
unkown
page read and write
4F7000
heap
page read and write
58A0000
unkown
page read and write
57F0000
unkown
page read and write
629D000
unkown
page read and write
321C000
trusted library allocation
page read and write
84C000
heap
page read and write
401000
unkown
page execute read
417000
unkown
page execute read
1980000
unkown
page readonly
7FF534DAB000
unkown
page readonly
8A3000
heap
page read and write
874000
heap
page read and write
140000000
unkown
page readonly
2205A827000
heap
page read and write
6FE000
stack
page read and write
1F0000
heap
page read and write
5CF0000
unkown
page read and write
57F0000
unkown
page read and write
1220000
unkown
page readonly
2682F044000
heap
page read and write
90D6000
unkown
page read and write
14F0000
unkown
page read and write
2205A855000
heap
page read and write
4EA000
heap
page read and write
401000
unkown
page execute read
1384E000
stack
page read and write
400000
unkown
page execute and read and write
3EBA000
heap
page read and write
4BF0000
unkown
page read and write
FB46DFF000
stack
page read and write
7FF534F85000
unkown
page readonly
535000
heap
page read and write
8F97000
unkown
page read and write
14F0000
unkown
page read and write
22BAEE5E000
unkown
page read and write
2205A877000
heap
page read and write
2540000
heap
page read and write
5810000
unkown
page read and write
7FF5349C6000
unkown
page readonly
2682F084000
heap
page read and write
57F0000
unkown
page read and write
F367000
unkown
page read and write
2682F102000
heap
page read and write
140130000
unkown
page read and write
F069000
stack
page read and write
2069DC41000
heap
page read and write
8A9000
heap
page read and write
253F79F0000
heap
page read and write
7FF534FB2000
unkown
page readonly
A09C57F000
stack
page read and write
7FF534D17000
unkown
page readonly
9E0000
heap
page read and write
400000
unkown
page execute and read and write
14F0000
unkown
page read and write
108EA000
unkown
page read and write
5940000
unkown
page read and write
7FF534D1C000
unkown
page readonly
8A3000
heap
page read and write
15E5000
heap
page read and write
8B2000
heap
page read and write
21CECB60000
heap
page read and write
108E3000
unkown
page read and write
2FEC000
stack
page read and write
F5DA000
unkown
page read and write
22858360000
trusted library allocation
page read and write
401000
unkown
page execute read
2CFF000
stack
page read and write
8F42000
unkown
page read and write
5DEE000
stack
page read and write
3250000
heap
page read and write
593A000
unkown
page read and write
1F0000
heap
page read and write
6246000
unkown
page read and write
51F000
heap
page read and write
7FF534F9E000
unkown
page readonly
8A3000
heap
page read and write
22BAEE13000
unkown
page read and write
253F5FC9000
heap
page read and write
41A000
unkown
page write copy
4F5000
heap
page read and write
5D9000
unkown
page readonly
563E000
stack
page read and write
1290000
unkown
page read and write
33A9000
unkown
page read and write
501000
heap
page read and write
5D9000
unkown
page readonly
2205B223000
heap
page read and write
57F0000
unkown
page read and write
EB1E000
unkown
page read and write
42C000
unkown
page read and write
57E0000
unkown
page read and write
519000
heap
page read and write
4BF000
heap
page read and write
760000
heap
page read and write
640000
heap
page read and write
570000
heap
page read and write
7FF5B1ECE000
unkown
page readonly
3DAE000
heap
page read and write
7FF534EE6000
unkown
page readonly
84F000
heap
page read and write
1168C000
unkown
page read and write
7FF534C25000
unkown
page readonly
31C9000
stack
page read and write
28E9000
heap
page read and write
F40000
heap
page read and write
22D0000
heap
page read and write
14F0000
unkown
page read and write
2682F045000
heap
page read and write
6CE000
stack
page read and write
EB10000
unkown
page read and write
418000
unkown
page execute read
4A6000
heap
page read and write
5730000
unkown
page read and write
885000
heap
page read and write
62E5000
unkown
page read and write
7FF534D83000
unkown
page readonly
58A0000
unkown
page read and write
2205A874000
heap
page read and write
57F0000
unkown
page read and write
83E000
heap
page read and write
30000
heap
page read and write
380B000
stack
page read and write
F582000
unkown
page read and write
19B000
stack
page read and write
7FF5B1FB2000
unkown
page readonly
7FF6ECAFE000
unkown
page write copy
2AEE8079000
heap
page read and write
8A9000
heap
page read and write
2440000
heap
page read and write
320F000
stack
page read and write
192FC060000
heap
page read and write
843000
heap
page read and write
529000
heap
page read and write
7FF5349B9000
unkown
page readonly
2AEE8002000
heap
page read and write
21CED350000
remote allocation
page read and write
85F000
heap
page read and write
557000
unkown
page read and write
4D1000
heap
page read and write
7FF534E4C000
unkown
page readonly
30000
heap
page read and write
7FF535090000
unkown
page readonly
7FE2000
unkown
page readonly
57F0000
unkown
page read and write
2837000
heap
page read and write
14F0000
unkown
page read and write
7FF534FC5000
unkown
page readonly
1378000
heap
page read and write
14522F13000
heap
page read and write
7FF5B1F4B000
unkown
page readonly
570000
heap
page read and write
874000
heap
page read and write
58A0000
unkown
page read and write
400000
unkown
page readonly
7FF6EC771000
unkown
page execute read
4F8000
heap
page read and write
400000
unkown
page readonly
843000
heap
page read and write
7FF5B2011000
unkown
page readonly
74F000
stack
page read and write
8F2D000
unkown
page read and write
5360000
unkown
page read and write
8AE000
heap
page read and write
22BA000
heap
page execute and read and write
4F7000
heap
page read and write
4C6000
heap
page read and write
57F0000
unkown
page read and write
3146000
stack
page read and write
4F7000
heap
page read and write
521000
heap
page read and write
411000
unkown
page write copy
4215000
trusted library allocation
page read and write
4A5000
heap
page read and write
593A000
unkown
page read and write
56A000
heap
page read and write
392F3FD000
stack
page read and write
2AEE804E000
heap
page read and write
D60D5FF000
stack
page read and write
2205A690000
heap
page read and write
22858515000
trusted library allocation
page read and write
568000
heap
page read and write
2D5C000
heap
page read and write
21CECC5F000
heap
page read and write
13C3000
heap
page read and write
867000
heap
page read and write
2FAD000
stack
page read and write
593A000
unkown
page read and write
8A3000
heap
page read and write
F5E4000
unkown
page read and write
58A0000
unkown
page read and write
84C000
heap
page read and write
348F000
unkown
page read and write
22BAF602000
unkown
page read and write
8B0000
heap
page read and write
14F0000
unkown
page read and write
192FE1C0000
remote allocation
page read and write
58A0000
unkown
page read and write
526000
heap
page read and write
51B9000
stack
page read and write
4C6000
heap
page read and write
84C000
heap
page read and write
84F000
stack
page read and write
7FF5B1F53000
unkown
page readonly
58A0000
unkown
page read and write
7FF5B1CCE000
unkown
page readonly
7FF534D9F000
unkown
page readonly
2069DB60000
heap
page read and write
2290000
heap
page execute and read and write
3EBC000
heap
page read and write
138E000
heap
page read and write
FB46AFF000
stack
page read and write
843000
heap
page read and write
14F0000
unkown
page read and write
3570000
heap
page read and write
538000
heap
page read and write
5E3000
heap
page read and write
14F0000
unkown
page read and write
4A6000
heap
page read and write
519000
heap
page read and write
8A6000
heap
page read and write
7FFC1B50A000
unkown
page readonly
7FFC1B350000
unkown
page readonly
7FF534FD2000
unkown
page readonly
11541000
unkown
page read and write
8AE000
heap
page read and write
62C6000
unkown
page read and write
5730000
unkown
page read and write
4ED000
heap
page read and write
84C000
heap
page read and write
1419B000
unkown
page read and write
57F0000
unkown
page read and write
F4C4000
unkown
page read and write
770000
direct allocation
page read and write
8AE000
heap
page read and write
4BA000
heap
page read and write
501000
heap
page read and write
2205B227000
heap
page read and write
2205A893000
heap
page read and write
22F0000
heap
page read and write
5740000
unkown
page read and write
6325000
unkown
page read and write
7FFC1B4EA000
unkown
page read and write
7FF5B1F27000
unkown
page readonly
88AB000
stack
page read and write
56A0000
trusted library allocation
page read and write
14FCF000
stack
page read and write
14F0000
unkown
page read and write
100B0000
unkown
page read and write
FCAD000
stack
page read and write
57E0000
unkown
page read and write
1400EE000
unkown
page readonly
7FF5B1F61000
unkown
page readonly
4C8000
heap
page read and write
73B000
heap
page read and write
4EA000
heap
page read and write
58A0000
unkown
page read and write
760000
heap
page read and write
8E5000
heap
page read and write
4C5000
heap
page read and write
9157000
unkown
page read and write
885000
heap
page read and write
28BA000
heap
page read and write
14196000
unkown
page read and write
1445000
heap
page read and write
36CA000
stack
page read and write
251E000
stack
page read and write
3E96000
heap
page read and write
5010000
unkown
page read and write
253F5FC4000
heap
page read and write
57E0000
unkown
page read and write
7FFC1B4E3000
unkown
page read and write
7FF534DA5000
unkown
page readonly
57E0000
unkown
page read and write
8A7000
heap
page read and write
57F0000
unkown
page read and write
261F000
stack
page read and write
55A000
unkown
page readonly
533000
heap
page read and write
62BF000
unkown
page read and write
7FF534EB3000
unkown
page readonly
58A0000
unkown
page read and write
7FF535114000
unkown
page readonly
22858460000
heap
page read and write
52C000
heap
page read and write
5830000
unkown
page read and write
401000
unkown
page execute read
19A000
stack
page read and write
C7F000
stack
page read and write
22858902000
heap
page read and write
960000
heap
page read and write
22858917000
heap
page read and write
F5E6000
unkown
page read and write
4E4000
heap
page read and write
4D6000
heap
page read and write
1340000
unkown
page read and write
501000
heap
page read and write
885000
heap
page read and write
14F0000
unkown
page read and write
16AF000
stack
page read and write
4BA000
heap
page read and write
57F0000
unkown
page read and write
2540000
heap
page read and write
9297000
unkown
page read and write
22BAF460000
unkown
page read and write
57F0000
unkown
page read and write
552000
heap
page read and write
F621000
unkown
page read and write
400000
unkown
page readonly
5730000
unkown
page read and write
D88E000
unkown
page read and write
4A6000
heap
page read and write
7FF53490A000
unkown
page readonly
2682F060000
heap
page read and write
4C7000
heap
page read and write
22858418000
unkown
page read and write
2682F041000
heap
page read and write
28937E70000
heap
page read and write
5BAE000
stack
page read and write
2682F05E000
heap
page read and write
E28E1AB000
stack
page read and write
6254000
unkown
page read and write
874000
heap
page read and write
7FF5B1EC4000
unkown
page readonly
D60D07B000
stack
page read and write
418000
unkown
page execute read
400000
unkown
page readonly
3EA7000
heap
page read and write
F749000
unkown
page read and write
5E2E000
stack
page read and write
D60D0FE000
stack
page read and write
22BAEEAB000
unkown
page read and write
58A0000
unkown
page read and write
22BAEF02000
unkown
page read and write
595000
heap
page read and write
2903000
heap
page read and write
57E0000
unkown
page read and write
867000
heap
page read and write
22858523000
heap
page read and write
623C000
unkown
page read and write
57F0000
unkown
page read and write
885000
heap
page read and write
57E0000
unkown
page read and write
5730000
unkown
page read and write
73E000
stack
page read and write
460000
heap
page read and write
843000
heap
page read and write
D898000
unkown
page read and write
2AFD000
stack
page read and write
5730000
unkown
page read and write
4EA000
heap
page read and write
F661000
unkown
page read and write
86F000
stack
page read and write
7FF5B1CBF000
unkown
page readonly
57F0000
unkown
page read and write
497000
heap
page read and write
594000
heap
page read and write
7FFC1B4EC000
unkown
page read and write
1F0000
remote allocation
page read and write
57E0000
unkown
page read and write
920F000
unkown
page read and write
8566000
unkown
page read and write
16EE000
stack
page read and write
253F6000000
heap
page read and write
7FF534EEE000
unkown
page readonly
885000
heap
page read and write
28B8000
heap
page read and write
2DB7000
heap
page read and write
401000
unkown
page execute read
212E8768000
heap
page read and write
57E0000
unkown
page read and write
30000
heap
page read and write
EAFB37F000
stack
page read and write
2205A913000
heap
page read and write
4BE000
heap
page read and write
14D5000
heap
page read and write
885000
heap
page read and write
80A000
heap
page read and write
7FF535086000
unkown
page readonly
5730000
unkown
page read and write
8EF0000
unkown
page read and write
57F0000
unkown
page read and write
4A6000
heap
page read and write
22BAEDE0000
unkown
page readonly
4F8000
heap
page read and write
57E0000
unkown
page read and write
4B90000
unkown
page read and write
2205B154000
heap
page read and write
82F8CFC000
stack
page read and write
7FF534B64000
unkown
page readonly
885000
heap
page read and write
507000
heap
page read and write
533000
heap
page read and write
D60D2FE000
stack
page read and write
2205A620000
heap
page read and write
58A0000
unkown
page read and write
2069DC13000
heap
page read and write
212E8730000
heap
page read and write
FB467FF000
stack
page read and write
30000
heap
page read and write
510000
heap
page read and write
14B0000
heap
page read and write
470000
heap
page read and write
28938047000
heap
page read and write
EAFB47A000
stack
page read and write
1354B000
stack
page read and write
58A0000
unkown
page read and write
8A3000
heap
page read and write
417000
unkown
page execute read
2682F030000
heap
page read and write
7FF534F2E000
unkown
page readonly
4D6000
heap
page read and write
52E0000
unkown
page readonly
535000
heap
page read and write
392F6FE000
stack
page read and write
57E0000
unkown
page read and write
40B000
unkown
page write copy
4D20000
unkown
page read and write
509000
heap
page read and write
5730000
unkown
page read and write
3340000
unkown
page read and write
7FF534FBA000
unkown
page readonly
726000
heap
page execute and read and write
57E0000
unkown
page read and write
867000
heap
page read and write
66E000
stack
page read and write
57E0000
unkown
page read and write
606F000
stack
page read and write
3EA7000
heap
page read and write
2682F046000
heap
page read and write
4EE000
heap
page read and write
22BAEE24000
unkown
page read and write
228F000
stack
page read and write
30000
heap
page read and write
4C5000
heap
page read and write
7FF534C0F000
unkown
page readonly
7FF5348E4000
unkown
page readonly
7FF534D73000
unkown
page readonly
2ABF000
stack
page read and write
5120000
unkown
page readonly
49E000
heap
page read and write
5730000
unkown
page read and write
885000
heap
page read and write
2A7F000
stack
page read and write
2AEE803D000
heap
page read and write
14F0000
unkown
page read and write
57F0000
unkown
page read and write
4D6000
heap
page read and write
885000
heap
page read and write
523C000
stack
page read and write
14F0000
unkown
page read and write
5D9000
unkown
page readonly
500A000
stack
page read and write
58A0000
unkown
page read and write
4BA000
heap
page read and write
212E8680000
heap
page read and write
4EB5000
trusted library allocation
page read and write
7FF534D23000
unkown
page readonly
7FF535024000
unkown
page readonly
392F27D000
stack
page read and write
7FF534B41000
unkown
page readonly
2682F000000
heap
page read and write
1F0000
remote allocation
page read and write
4C7000
heap
page read and write
F2C3000
unkown
page read and write
140A9000
unkown
page read and write
2205B213000
heap
page read and write
8A9000
heap
page read and write
7ED5000
unkown
page readonly
5830000
unkown
page read and write
14F0000
unkown
page read and write
31C0000
heap
page read and write
50C000
heap
page read and write
EB20000
unkown
page read and write
530000
heap
page read and write
2205B800000
direct allocation
page execute and read and write
8E6E000
stack
page read and write
7FF534944000
unkown
page readonly
401000
unkown
page execute read
22BAEF02000
unkown
page read and write
FF0000
unkown
page readonly
57E0000
unkown
page read and write
52F0000
unkown
page write copy
55A000
unkown
page readonly
212E86B0000
heap
page read and write
5730000
unkown
page read and write
400000
unkown
page execute and read and write
21CECC3A000
heap
page read and write
57E0000
unkown
page read and write
4D6000
heap
page read and write
885000
heap
page read and write
8545000
unkown
page read and write
5CAF000
stack
page read and write
8AE000
heap
page read and write
253F5F20000
heap
page read and write
8A8000
heap
page read and write
4C7000
heap
page read and write
7F8E000
unkown
page readonly
7FF534B48000
unkown
page readonly
874000
heap
page read and write
5690000
trusted library allocation
page read and write
22BAF4C0000
unkown
page read and write
10CD6000
unkown
page read and write
35CB000
stack
page read and write
4AE000
heap
page read and write
4EE000
heap
page read and write
708A000
unkown
page read and write
5D9000
unkown
page readonly
4C8000
heap
page read and write
84C000
heap
page read and write
7C61000
unkown
page readonly
2682F013000
heap
page read and write
8A9000
heap
page read and write
28937F70000
trusted library allocation
page read and write
8AE000
heap
page read and write
1F0000
heap
page read and write
297E000
stack
page read and write
57F0000
unkown
page read and write
800000
heap
page read and write
F49C000
unkown
page read and write
F30000
heap
page read and write
4BA000
heap
page read and write
4C7000
heap
page read and write
6FEB000
stack
page read and write
14F0000
unkown
page read and write
40E000
unkown
page readonly
8D68000
stack
page read and write
8AE000
heap
page read and write
7FF5B1F57000
unkown
page readonly
29DF000
stack
page read and write
146000
stack
page read and write
93B4D2F000
unkown
page read and write
538000
heap
page read and write
7FF5349B7000
unkown
page readonly
192FC1D0000
trusted library allocation
page read and write
F4E9000
unkown
page read and write
347C000
stack
page read and write
14F0000
unkown
page read and write
593A000
unkown
page read and write
3DCC000
heap
page read and write
8E4671B000
stack
page read and write
3E97000
heap
page read and write
7DBA000
unkown
page readonly
28938000000
heap
page read and write
2682F07A000
heap
page read and write
2120000
direct allocation
page read and write
7FF534ED3000
unkown
page readonly
7FF535047000
unkown
page readonly
B700000
unkown
page read and write
58A0000
unkown
page read and write
22BAF000000
unkown
page readonly
568000
heap
page read and write
885000
heap
page read and write
212EA160000
heap
page read and write
7FF5B2011000
unkown
page readonly
53A000
heap
page read and write
28938054000
heap
page read and write
57E0000
unkown
page read and write
7FF534F21000
unkown
page readonly
8E46E7D000
stack
page read and write
7B1D000
unkown
page readonly
4B9000
heap
page read and write
6AE000
stack
page read and write
253F6170000
heap
page read and write
418000
unkown
page execute read
40E000
unkown
page readonly
FF0000
heap
page read and write
57E0000
unkown
page read and write
146000
stack
page read and write
192FC22A000
heap
page read and write
5730000
unkown
page read and write
8EEB000
stack
page read and write
5830000
unkown
page read and write
58A0000
unkown
page read and write
22A0000
heap
page read and write
885000
heap
page read and write
F5EC000
unkown
page read and write
7FF5B1FA2000
unkown
page readonly
885000
heap
page read and write
8A9000
heap
page read and write
28937E20000
heap
page read and write
7FF5350AA000
unkown
page readonly
515000
heap
page read and write
1573000
heap
page read and write
57E0000
unkown
page read and write
8D0000
heap
page read and write
140130000
unkown
page read and write
22BAEC90000
heap
page read and write
650000
heap
page read and write
BDF8000
stack
page read and write
57E0000
unkown
page read and write
417000
unkown
page execute read
57F0000
unkown
page read and write
7FFC1B54F000
unkown
page readonly
7FF534EA5000
unkown
page readonly
4F6000
heap
page read and write
14F0000
unkown
page read and write
7FF5B1FBA000
unkown
page readonly
57F0000
unkown
page read and write
2069DD02000
heap
page read and write
4D1000
heap
page read and write
100BC000
unkown
page read and write
5800000
remote allocation
page read and write
780000
heap
page read and write
7F52000
unkown
page readonly
2E20000
remote allocation
page read and write
58A0000
unkown
page read and write
140001000
unkown
page execute read
2205AE60000
heap
page readonly
354C000
stack
page read and write
7FF535101000
unkown
page readonly
2A7C000
stack
page read and write
7B0000
heap
page read and write
7E6E000
unkown
page readonly
5880000
unkown
page read and write
7FF534DBF000
unkown
page readonly
513000
heap
page read and write
8E46FFD000
stack
page read and write
3EAE000
heap
page read and write
13ED000
heap
page read and write
593A000
unkown
page read and write
14F0000
unkown
page read and write
8581000
unkown
page read and write
49A000
heap
page read and write
57E0000
unkown
page read and write
7FF5B1FA5000
unkown
page readonly
4A8000
heap
page read and write
1490000
trusted library allocation
page read and write
57F0000
unkown
page read and write
9D000
stack
page read and write
2AEE7FC0000
trusted library allocation
page read and write
593A000
unkown
page read and write
100B6000
unkown
page read and write
14F0000
unkown
page read and write
1400EE000
unkown
page readonly
4C8000
heap
page read and write
8F31000
unkown
page read and write
9D000
stack
page read and write
4DA000
heap
page read and write
5935000
unkown
page read and write
4C10000
unkown
page read and write
EAFB67B000
stack
page read and write
1310000
unkown
page readonly
2C80000
heap
page read and write
1359000
heap
page read and write
1123C000
unkown
page read and write
8B2000
heap
page read and write
496000
heap
page read and write
F74B000
unkown
page read and write
A30000
heap
page read and write
84C000
heap
page read and write
BD77000
stack
page read and write
212E87DE000
heap
page read and write
281F000
stack
page read and write
30AC000
stack
page read and write
8E1000
heap
page read and write
22BAEDE0000
unkown
page readonly
82F877C000
stack
page read and write
524E000
stack
page read and write
58A0000
unkown
page read and write
950000
remote allocation
page read and write
400000
unkown
page readonly
A09C67B000
stack
page read and write
1410000
heap
page read and write
7FF534BF6000
unkown
page readonly
5FB000
heap
page read and write
739000
heap
page read and write
843000
heap
page read and write
22BAED00000
heap
page read and write
3256000
heap
page read and write
12F8000
stack
page read and write
5730000
unkown
page read and write
8A3000
heap
page read and write
470000
heap
page read and write
57F0000
unkown
page read and write
D6F0000
unkown
page read and write
7FF5350A2000
unkown
page readonly
531000
heap
page read and write
7FF535008000
unkown
page readonly
22BAF470000
remote allocation
page execute and read and write
2892000
heap
page read and write
7FF534EC7000
unkown
page readonly
9331000
unkown
page read and write
867000
heap
page read and write
7FF534960000
unkown
page readonly
5D9000
unkown
page readonly
7BE7000
unkown
page readonly
522000
heap
page read and write
4E08000
stack
page read and write
7FF5347D9000
unkown
page readonly
22BAF5B0000
unkown
page readonly
5296000
unkown
page read and write
7FF534916000
unkown
page readonly
49F000
heap
page read and write
ECAAF7F000
stack
page read and write
7FFC1B557000
unkown
page readonly
5F2E000
stack
page read and write
2682F07B000
heap
page read and write
41A000
unkown
page write copy
57F0000
unkown
page read and write
5810000
unkown
page read and write
867000
heap
page read and write
52E000
heap
page read and write
400000
unkown
page readonly
14F0000
unkown
page read and write
92DD000
unkown
page read and write
7FF5348EF000
unkown
page readonly
5800000
unkown
page read and write
7FF5B1F61000
unkown
page readonly
132CC000
stack
page read and write
52F000
heap
page read and write
7EA5000
unkown
page readonly
451000
unkown
page readonly
14F0000
unkown
page read and write
7FF5B1CAD000
unkown
page readonly
192FDBC0000
trusted library allocation
page read and write
84C000
heap
page read and write
FB46EFF000
stack
page read and write
4D5000
heap
page read and write
14522E00000
heap
page read and write
5932000
unkown
page read and write
84F000
heap
page read and write
288C000
heap
page read and write
8AF000
heap
page read and write
7FF53503B000
unkown
page readonly
14C0000
trusted library allocation
page read and write
2682EF70000
heap
page read and write
950000
remote allocation
page read and write
7FF534FE4000
unkown
page readonly
6FF0000
unkown
page read and write
4D6000
heap
page read and write
4EF000
heap
page read and write
90B1000
unkown
page read and write
2E65000
heap
page read and write
EAFAE7F000
stack
page read and write
84C000
heap
page read and write
7FF534932000
unkown
page readonly
22858400000
unkown
page read and write
4DA000
heap
page read and write
58A0000
unkown
page read and write
22BAEE3C000
unkown
page read and write
885000
heap
page read and write
7FF5347D7000
unkown
page readonly
3DAE000
heap
page read and write
4C7000
heap
page read and write
7FF534CD0000
unkown
page readonly
57E0000
unkown
page read and write
57F0000
unkown
page read and write
47C000
heap
page read and write
57E0000
unkown
page read and write
8AB000
heap
page read and write
84C000
heap
page read and write
7FF534BD4000
unkown
page readonly
12B0000
unkown
page readonly
8A9000
heap
page read and write
57E0000
unkown
page read and write
2205B790000
direct allocation
page read and write
5800000
unkown
page read and write
7FF535095000
unkown
page readonly
8E4717F000
stack
page read and write
49E000
heap
page read and write
838000
heap
page read and write
7FF534FB4000
unkown
page readonly
885000
heap
page read and write
2205A9E5000
heap
page read and write
8A9000
heap
page read and write
40E000
unkown
page readonly
560000
heap
page read and write
7FF5349C1000
unkown
page readonly
14013C000
unkown
page execute read
8E46D7F000
stack
page read and write
4CF000
heap
page read and write
75B000
heap
page read and write
4EA000
heap
page read and write
57E0000
unkown
page read and write
116A0000
unkown
page read and write
10000
heap
page read and write
19C000
stack
page read and write
5730000
unkown
page read and write
885000
heap
page read and write
22BAEE00000
unkown
page read and write
4D10000
unkown
page read and write
219F000
stack
page read and write
7FF534F4B000
unkown
page readonly
874000
heap
page read and write
843000
heap
page read and write
57E0000
unkown
page read and write
FAD000
stack
page read and write
192FC25B000
heap
page read and write
8AE000
heap
page read and write
55A000
unkown
page readonly
7B2000
unkown
page readonly
53B000
heap
page read and write
14F0000
unkown
page read and write
41A000
unkown
page write copy
4EB000
heap
page read and write
7FFC1B351000
unkown
page execute read
84F000
heap
page read and write
2AEE8013000
heap
page read and write
4AB000
unkown
page read and write
5D6000
unkown
page read and write
1370000
heap
page read and write
84C000
heap
page read and write
680000
direct allocation
page execute and read and write
400000
unkown
page readonly
843000
heap
page read and write
253F7BE0000
heap
page read and write
2290000
heap
page read and write
192FC0D0000
heap
page read and write
57F0000
unkown
page read and write
596000
heap
page read and write
7FF534C19000
unkown
page readonly
2205B202000
heap
page read and write
82F8AFF000
stack
page read and write
2865000
heap
page read and write
22BAEE41000
unkown
page read and write
401000
unkown
page execute read
58A0000
unkown
page read and write
509000
heap
page read and write
411000
unkown
page read and write
4F2000
heap
page read and write
2682F049000
heap
page read and write
84C000
heap
page read and write
57E0000
unkown
page read and write
2893804E000
heap
page read and write
4F5000
heap
page read and write
4EA000
heap
page read and write
519000
heap
page read and write
A09C27C000
stack
page read and write
93B4CAB000
stack
page read and write
33E0000
heap
page read and write
58A0000
unkown
page read and write
57F0000
unkown
page read and write
519000
heap
page read and write
400000
unkown
page readonly
84C000
heap
page read and write
14522EC9000
heap
page read and write
589D000
unkown
page read and write
56CE000
stack
page read and write
4F7000
heap
page read and write
676C000
stack
page read and write
57E0000
unkown
page read and write
4ED000
heap
page read and write
2205B100000
heap
page read and write
7FF6ECAFA000
unkown
page readonly
80E000
stack
page read and write
14F0000
unkown
page read and write
19B000
stack
page read and write
D867000
unkown
page read and write
42C000
unkown
page read and write
90B5000
unkown
page read and write
666B000
unkown
page read and write
8A9000
heap
page read and write
57F0000
unkown
page read and write
94E000
stack
page read and write
140132000
unkown
page readonly
58A0000
unkown
page read and write
4D50000
unkown
page read and write
A09C27C000
stack
page read and write
289F000
heap
page read and write
7EFE000
unkown
page readonly
417000
unkown
page execute read
4C5000
heap
page read and write
1364E000
stack
page read and write
3890000
unkown
page readonly
14153000
unkown
page read and write
61E000
stack
page read and write
22858428000
heap
page read and write
580000
heap
page read and write
9D000
stack
page read and write
14522E13000
heap
page read and write
8A3C000
stack
page read and write
7C9E000
unkown
page readonly
430000
heap
page read and write
21CECBF0000
trusted library allocation
page read and write
57E0000
unkown
page read and write
730000
unclassified section
page read and write
7FF534F73000
unkown
page readonly
3577000
heap
page read and write
22858802000
heap
page read and write
25F1000
heap
page read and write
84F000
heap
page read and write
5730000
unkown
page read and write
2130000
heap
page read and write
2205B122000
heap
page read and write
33CC000
unkown
page read and write
22BAEC90000
heap
page read and write
D875000
unkown
page read and write
551000
heap
page read and write
2682F740000
trusted library allocation
page read and write
51E000
heap
page read and write
4AB000
heap
page read and write
4B10000
unkown
page read and write
33EE000
unkown
page read and write
4A8000
heap
page read and write
14522F02000
heap
page read and write
4F0000
heap
page read and write
8AE000
heap
page read and write
84F000
heap
page read and write
4EA000
heap
page read and write
2880000
heap
page read and write
5D9000
unkown
page readonly
418000
unkown
page execute read
4F5000
heap
page read and write
7FF534A99000
unkown
page readonly
4C7000
heap
page read and write
14522E3E000
heap
page read and write
7FF6EC770000
unkown
page readonly
15E0000
heap
page read and write
7FF5B1F3D000
unkown
page readonly
55A000
unkown
page readonly
6E0000
direct allocation
page read and write
14F0000
unkown
page read and write
2682EF80000
heap
page read and write
417000
unkown
page execute read
7FF534E77000
unkown
page readonly
101AB000
stack
page read and write
57F0000
unkown
page read and write
85FF179000
stack
page read and write
245F000
stack
page read and write
496000
heap
page read and write
57E0000
unkown
page read and write
58A0000
unkown
page read and write
736B000
stack
page read and write
EAFAB3C000
stack
page read and write
7FF5B1F45000
unkown
page readonly
4F7000
heap
page read and write
9C000
stack
page read and write
7FF5B2031000
unkown
page readonly
3EAE000
heap
page read and write
57E0000
unkown
page read and write
7FF534B3E000
unkown
page readonly
5BE5000
stack
page read and write
843000
heap
page read and write
867000
heap
page read and write
8A9000
heap
page read and write
7FF535004000
unkown
page readonly
57E0000
unkown
page read and write
A7F000
stack
page read and write
522000
heap
page read and write
7FF534C80000
unkown
page readonly
1133A000
heap
page read and write
8A9000
heap
page read and write
58A0000
unkown
page read and write
6D0000
direct allocation
page read and write
2069DC02000
heap
page read and write
4BF000
heap
page read and write
9289000
unkown
page read and write
58A0000
unkown
page read and write
F80E000
unkown
page read and write
19A000
stack
page read and write
261F000
stack
page read and write
7FF534F2A000
unkown
page readonly
7FF534DAF000
unkown
page readonly
7FF534DBC000
unkown
page readonly
22858913000
heap
page read and write
253F601C000
heap
page read and write
841000
heap
page read and write
EAFB0FF000
stack
page read and write
7FF5B1FB2000
unkown
page readonly
7FF534E86000
unkown
page readonly
710000
heap
page read and write
58A0000
unkown
page read and write
5810000
unkown
page read and write
25F0000
heap
page read and write
4F07000
stack
page read and write
6FE000
stack
page read and write
4D5000
heap
page read and write
72E000
stack
page read and write
11244000
unkown
page read and write
84F000
heap
page read and write
8A3000
heap
page read and write
401000
unkown
page execute read
6CE000
stack
page read and write
84F000
heap
page read and write
57E0000
unkown
page read and write
874000
heap
page read and write
7FF534AA6000
unkown
page readonly
5130000
unkown
page readonly
4A8000
heap
page read and write
5730000
unkown
page read and write
7FF534F52000
unkown
page readonly
57E0000
unkown
page read and write
885000
heap
page read and write
4ED000
heap
page read and write
57F0000
unkown
page read and write
212E878A000
heap
page read and write
5730000
unkown
page read and write
1F0000
heap
page read and write
7FF534D0F000
unkown
page readonly
57F0000
unkown
page read and write
3820000
unkown
page readonly
5D6000
unkown
page read and write
5EC000
heap
page read and write
507000
heap
page read and write
7FF51EC9E000
unkown
page readonly
509000
heap
page read and write
108ED000
unkown
page read and write
4B60000
unkown
page read and write
277F000
stack
page read and write
8A3000
heap
page read and write
257C000
stack
page read and write
F2AC000
unkown
page read and write
14092000
unkown
page read and write
593A000
unkown
page read and write
7FF6EC77C000
unkown
page write copy
7FF5348D7000
unkown
page readonly
11474000
unkown
page read and write
628B000
unkown
page read and write
632D000
unkown
page read and write
8A3000
heap
page read and write
7FF6ECB2C000
unkown
page readonly
867000
heap
page read and write
84F000
heap
page read and write
192FC300000
heap
page read and write
7FF534C34000
unkown
page readonly
A09C47B000
stack
page read and write
1300000
unkown
page read and write
EAFAF7E000
stack
page read and write
594C000
unkown
page read and write
14F0000
unkown
page read and write
289E000
heap
page read and write
E964000
stack
page read and write
D881000
unkown
page read and write
401000
unkown
page execute read
8BF000
stack
page read and write
57F0000
unkown
page read and write
8E0000
heap
page read and write
401000
unkown
page execute read
14AD000
trusted library allocation
page execute and read and write
5730000
unkown
page read and write
77DE000
unkown
page readonly
57E0000
unkown
page read and write
7FF5B2031000
unkown
page readonly
57F0000
unkown
page read and write
7FF6ECAFE000
unkown
page write copy
507000
heap
page read and write
7FF5B1F99000
unkown
page readonly
108EF000
unkown
page read and write
140001000
unkown
page execute read
846000
heap
page read and write
2E3C000
stack
page read and write
1A0000
heap
page read and write
83F000
stack
page read and write
2540000
heap
page read and write
5D9000
unkown
page readonly
885000
heap
page read and write
52C000
heap
page read and write
290F000
heap
page read and write
30D0000
heap
page read and write
418000
unkown
page execute read
7FF534BA2000
unkown
page readonly
7FB9000
unkown
page readonly
7FF5B1F96000
unkown
page readonly
8A0000
heap
page read and write
21CECD02000
heap
page read and write
4DA000
heap
page read and write
14F0000
unkown
page read and write
7FF5349D4000
unkown
page readonly
22858502000
trusted library allocation
page read and write
401000
unkown
page execute read
4F5000
heap
page read and write
F5EA000
unkown
page read and write
21CECB50000
heap
page read and write
505000
heap
page read and write
4C1000
heap
page read and write
2682F063000
heap
page read and write
3350000
unkown
page read and write
8BF000
heap
page read and write
7FF534F44000
unkown
page readonly
8AE000
heap
page read and write
57F0000
unkown
page read and write
854E000
unkown
page read and write
867000
heap
page read and write
400000
unkown
page readonly
6267000
unkown
page read and write
7FF534F6C000
unkown
page readonly
11341000
unkown
page read and write
400000
unkown
page readonly
4F8000
heap
page read and write
392EDFC000
stack
page read and write
7FF5B1F82000
unkown
page readonly
2682F04E000
heap
page read and write
57F0000
unkown
page read and write
41A000
unkown
page write copy
2682F047000
heap
page read and write
B4BB000
stack
page read and write
21CECC41000
heap
page read and write
2350000
heap
page read and write
9D000
stack
page read and write
192FC318000
heap
page read and write
7FF5B1F14000
unkown
page readonly
8F2A000
unkown
page read and write
2682F04F000
heap
page read and write
392E99B000
stack
page read and write
87C000
heap
page read and write
9D000
stack
page read and write
F5E2000
unkown
page read and write
5730000
unkown
page read and write
4F8000
heap
page read and write
56A0000
trusted library allocation
page read and write
4F8000
heap
page read and write
4DA000
heap
page read and write
2682F056000
heap
page read and write
58A0000
unkown
page read and write
2ABE000
stack
page read and write
9D000
stack
page read and write
7E1C000
unkown
page readonly
89B0000
unkown
page readonly
84C000
heap
page read and write
11330000
heap
page read and write
1F0000
heap
page read and write
401000
unkown
page execute read
2205A869000
heap
page read and write
7FF534E6A000
unkown
page readonly
7FF5B1F53000
unkown
page readonly
192FDE00000
trusted library allocation
page read and write
52A000
heap
page read and write
265E000
stack
page read and write
B43B000
stack
page read and write
542000
heap
page read and write
7FF534C14000
unkown
page readonly
57F0000
unkown
page read and write
4D70000
unkown
page read and write
4BB0000
unkown
page readonly
8A3000
heap
page read and write
8E46C7E000
stack
page read and write
5EB000
heap
page read and write
7FF5B1F39000
unkown
page readonly
7FF534A9E000
unkown
page readonly
5400000
unkown
page readonly
3587000
heap
page read and write
57E0000
unkown
page read and write
28938029000
heap
page read and write
B979000
stack
page read and write
9C000
stack
page read and write
401000
unkown
page execute read
2AEE8113000
heap
page read and write
14522E87000
heap
page read and write
51E000
heap
page read and write
E28E97B000
stack
page read and write
4B0000
heap
page read and write
5730000
unkown
page read and write
400000
unkown
page readonly
7BA000
heap
page read and write
11230000
unkown
page read and write
42C000
unkown
page read and write
192FC24B000
heap
page read and write
8A3000
heap
page read and write
9C000
stack
page read and write
2E5E000
stack
page read and write
84F000
heap
page read and write
17EF000
stack
page read and write
192FC23D000
heap
page read and write
7FF534D9D000
unkown
page readonly
2682F050000
heap
page read and write
253F7930000
heap
page read and write
509000
heap
page read and write
6AE000
stack
page read and write
7FF535019000
unkown
page readonly
27FF000
stack
page read and write
14013C000
unkown
page execute read
7FF6ECB01000
unkown
page write copy
52F000
heap
page read and write
928B000
unkown
page read and write
6B0000
heap
page read and write
7FF5B1F34000
unkown
page readonly
14F0000
unkown
page read and write
93B50FF000
stack
page read and write
874000
heap
page read and write
22CD000
stack
page read and write
2205B1D3000
heap
page read and write
30000
heap
page read and write
4F7000
heap
page read and write
7FF53502D000
unkown
page readonly
7FF6ECB2C000
unkown
page readonly
41A000
unkown
page write copy
9D000
stack
page read and write
507000
heap
page read and write
842000
heap
page read and write
2AEE7F30000
heap
page read and write
8F0C000
unkown
page read and write
28937E10000
heap
page read and write
41A000
unkown
page write copy
5106000
unkown
page read and write
4A4000
heap
page read and write
8A3000
heap
page read and write
7C88000
unkown
page readonly
193000
stack
page read and write
7FF535017000
unkown
page readonly
7FF534D2D000
unkown
page readonly
843000
heap
page read and write
192FC070000
heap
page read and write
D60D3FE000
stack
page read and write
7FF534CAE000
unkown
page readonly
4F7000
heap
page read and write
EAFAEFE000
stack
page read and write
2682F06A000
heap
page read and write
7FF534A71000
unkown
page readonly
521000
heap
page read and write
241C000
stack
page read and write
2640000
heap
page read and write
5730000
unkown
page read and write
1409B000
unkown
page read and write
57E0000
unkown
page read and write
14F0000
unkown
page read and write
5CEE000
stack
page read and write
21CECC13000
heap
page read and write
1402A2000
unkown
page execute read
552000
heap
page read and write
11541000
unkown
page read and write
7FF534FFE000
unkown
page readonly
8E46EFE000
stack
page read and write
33F6000
unkown
page read and write
58E000
stack
page read and write
1560000
unkown
page readonly
10AA0000
unkown
page read and write
2B7E000
stack
page read and write
8D0000
heap
page read and write
7DE000
stack
page read and write
519000
heap
page read and write
2205B1BC000
heap
page read and write
14522E6D000
heap
page read and write
5A20000
unkown
page readonly
41A000
unkown
page write copy
7FF534F0B000
unkown
page readonly
7FFC1B4EE000
unkown
page read and write
529000
remote allocation
page execute and read and write
465000
heap
page read and write
7FF5348A7000
unkown
page readonly
271E000
stack
page read and write
77DB000
unkown
page readonly
57E0000
unkown
page read and write
2682F05E000
heap
page read and write
30000
heap
page read and write
4DA000
heap
page read and write
B57E000
stack
page read and write
856F000
unkown
page read and write
4EF000
heap
page read and write
867000
heap
page read and write
4EF000
heap
page read and write
8A9000
heap
page read and write
5830000
unkown
page read and write
51E000
heap
page read and write
4EF000
heap
page read and write
5730000
unkown
page read and write
57F0000
unkown
page read and write
8D7000
heap
page read and write
D60D17E000
stack
page read and write
F5D6000
unkown
page read and write
418000
unkown
page execute read
212E8760000
heap
page read and write
631C000
unkown
page read and write
5B67000
stack
page read and write
4C7000
heap
page read and write
196000
stack
page read and write
14522EC0000
heap
page read and write
7FF534FCF000
unkown
page readonly
57E0000
unkown
page read and write
5810000
unkown
page read and write
57F0000
unkown
page read and write
5933000
unkown
page read and write
516000
heap
page read and write
7FF5349E7000
unkown
page readonly
392EFFF000
stack
page read and write
2682F06D000
heap
page read and write
7FF535051000
unkown
page readonly
192FC24A000
heap
page read and write
7FF5B1F82000
unkown
page readonly
7FF5349D2000
unkown
page readonly
519000
heap
page read and write
288E000
heap
page read and write
509000
heap
page read and write
30000
heap
page read and write
885000
heap
page read and write
A09CA7C000
stack
page read and write
29E0000
heap
page read and write
411000
unkown
page write copy
885000
heap
page read and write
4F7000
heap
page read and write
33DB000
unkown
page read and write
7CA5000
unkown
page readonly
7FF534F37000
unkown
page readonly
2F71000
heap
page read and write
418000
unkown
page execute read
40D000
unkown
page write copy
8AE000
heap
page read and write
8AE000
heap
page read and write
324E000
stack
page read and write
84F000
heap
page read and write
2B3A000
stack
page read and write
910000
heap
page read and write
14061F000
unkown
page readonly
58A0000
unkown
page read and write
8A7000
heap
page read and write
7FF5B1F65000
unkown
page readonly
8558000
unkown
page read and write
2682F067000
heap
page read and write
D8DE000
unkown
page read and write
7FF534DC9000
unkown
page readonly
2069DB90000
trusted library allocation
page read and write
5730000
unkown
page read and write
F10000
unkown
page readonly
42C000
unkown
page read and write
2D1D000
heap
page read and write
57F0000
unkown
page read and write
531000
heap
page read and write
4F6000
heap
page read and write
140000000
unkown
page readonly
9C000
stack
page read and write
885000
heap
page read and write
22BAECA0000
heap
page read and write
51E000
heap
page read and write
843000
heap
page read and write
8E3000
heap
page read and write
192FDC02000
trusted library allocation
page read and write
401000
unkown
page execute read
57F0000
unkown
page read and write
302E000
stack
page read and write
557000
unkown
page read and write
283D000
stack
page read and write
57E0000
unkown
page read and write
2135000
heap
page read and write
4EF000
heap
page read and write
26FE000
stack
page read and write
4A6000
heap
page read and write
57F0000
unkown
page read and write
57E0000
unkown
page read and write
57E0000
unkown
page read and write
7FF5B2017000
unkown
page readonly
8BF000
heap
page read and write
4C7000
heap
page read and write
2AEE8802000
trusted library allocation
page read and write
253F79F5000
heap
page read and write
8A0000
heap
page read and write
57E0000
unkown
page read and write
91CD000
unkown
page read and write
B4F0000
unkown
page read and write
4F7000
heap
page read and write
83E000
heap
page read and write
52C000
heap
page read and write
7FF534FBE000
unkown
page readonly
2682F065000
heap
page read and write
11266000
unkown
page read and write
22BAF530000
unkown
page execute and read and write
512000
heap
page read and write
52F000
heap
page read and write
7FF534C67000
unkown
page readonly
28938002000
heap
page read and write
7FA3000
unkown
page readonly
4DC000
heap
page read and write
4C5000
heap
page read and write
7FF534B6A000
unkown
page readonly
496000
heap
page read and write
84F000
heap
page read and write
7FF534B33000
unkown
page readonly
73E000
stack
page read and write
7FF53509B000
unkown
page readonly
58A0000
unkown
page read and write
400000
unkown
page readonly
89AF000
stack
page read and write
57E0000
unkown
page read and write
7FF534DCF000
unkown
page readonly
60A000
heap
page read and write
22BAF390000
unkown
page readonly
57E0000
unkown
page read and write
8A3000
heap
page read and write
8F10000
unkown
page read and write
33B6000
unkown
page read and write
7FF5B1CCC000
unkown
page readonly
4EA000
heap
page read and write
7FF534D12000
unkown
page readonly
2682F07E000
heap
page read and write
D733000
unkown
page read and write
4A1000
heap
page read and write
4B33000
unkown
page read and write
57E0000
unkown
page read and write
52B000
remote allocation
page execute and read and write
552000
heap
page read and write
57F0000
unkown
page read and write
2682EFE0000
heap
page read and write
7FF534E7C000
unkown
page readonly
57F0000
unkown
page read and write
57F0000
unkown
page read and write
6238000
unkown
page read and write
2250000
heap
page read and write
832000
heap
page read and write
392F17C000
stack
page read and write
1F0000
heap
page read and write
23AF000
stack
page read and write
7FF5B1FA2000
unkown
page readonly
57E0000
unkown
page read and write
2069DC5A000
heap
page read and write
41A000
unkown
page write copy
140132000
unkown
page readonly
21CED350000
remote allocation
page read and write
2682F04B000
heap
page read and write
7FF534BFF000
unkown
page readonly
1344A000
stack
page read and write
50B000
heap
page read and write
7EE000
stack
page read and write
73E8000
stack
page read and write
2205A866000
heap
page read and write
58A0000
unkown
page read and write
414000
unkown
page readonly
F432000
unkown
page read and write
569A000
trusted library allocation
page read and write
344B000
unkown
page read and write
4B9000
heap
page read and write
7FF534C1D000
unkown
page readonly
341A000
unkown
page read and write
856C000
unkown
page read and write
BAFD000
stack
page read and write
400000
unkown
page readonly
19B000
stack
page read and write
593A000
unkown
page read and write
2069DC00000
heap
page read and write
91D8000
unkown
page read and write
66A0000
unkown
page readonly
2069DB00000
heap
page read and write
57F0000
unkown
page read and write
71A000
heap
page read and write
84F000
heap
page read and write
41A000
unkown
page write copy
13347000
stack
page read and write
401000
unkown
page execute read
14F0000
unkown
page read and write
8629000
stack
page read and write
503000
heap
page read and write
1490000
unkown
page read and write
532000
heap
page read and write
11200000
unkown
page read and write
5E9000
heap
page read and write
14F0000
unkown
page read and write
2682F040000
heap
page read and write
5800000
remote allocation
page read and write
2205A83C000
heap
page read and write
84F000
heap
page read and write
7FF5B1F6E000
unkown
page readonly
14F0000
unkown
page read and write
917E000
unkown
page read and write
79F000
stack
page read and write
8F54000
unkown
page read and write
885000
heap
page read and write
4F7000
heap
page read and write
5820000
unkown
page read and write
57E0000
unkown
page read and write
1402A2000
unkown
page execute read
7FC5000
unkown
page readonly
19A000
stack
page read and write
507000
heap
page read and write
6B0000
heap
page read and write
7EE3000
unkown
page readonly
57F0000
unkown
page read and write
4EA000
heap
page read and write
57F0000
unkown
page read and write
F5E8000
unkown
page read and write
14F0000
unkown
page read and write
7FF535043000
unkown
page readonly
500000
heap
page read and write
577000
heap
page read and write
5D6000
unkown
page read and write
337E000
stack
page read and write
E28E87E000
stack
page read and write
8A3000
heap
page read and write
289F000
stack
page read and write
4D5000
heap
page read and write
7FF534B59000
unkown
page readonly
550000
direct allocation
page execute and read and write
7FF535026000
unkown
page readonly
253F6032000
heap
page read and write
BF7A000
stack
page read and write
2205A829000
heap
page read and write
EAFB279000
stack
page read and write
57E0000
unkown
page read and write
2BFE000
stack
page read and write
8D1000
heap
page read and write
1402E9000
unkown
page execute read
57E0000
unkown
page read and write
22BAEE5D000
unkown
page read and write
14F0000
unkown
page read and write
2069DAF0000
heap
page read and write
192FC200000
heap
page read and write
7AF000
stack
page read and write
510F000
unkown
page read and write
21CECC00000
heap
page read and write
8F28000
unkown
page read and write
874000
heap
page read and write
2205A9B9000
heap
page read and write
19C000
stack
page read and write
55A000
unkown
page readonly
5A60000
heap
page read and write
5830000
unkown
page read and write
22858900000
heap
page read and write
7FF534CA6000
unkown
page readonly
507000
heap
page read and write
57E0000
unkown
page read and write
2205A790000
trusted library allocation
page read and write
14F0000
unkown
page read and write
11341000
unkown
page read and write
7FF534BF9000
unkown
page readonly
22858902000
heap
page read and write
4D30000
unkown
page read and write
7F0000
heap
page read and write
1379000
heap
page read and write
4CF000
heap
page read and write
21CECC29000
heap
page read and write
8A9000
heap
page read and write
7FF5B1FAB000
unkown
page readonly
401000
unkown
page execute read
251C000
stack
page read and write
22858436000
heap
page read and write
36D0000
unkown
page readonly
7FF534E0C000
unkown
page readonly
7E83000
unkown
page readonly
FB469FD000
stack
page read and write
94E000
heap
page read and write
22BAEE00000
unkown
page read and write
4AB000
unkown
page read and write
4AE000
heap
page read and write
14F0000
unkown
page read and write
4BB000
heap
page read and write
7FF534EBF000
unkown
page readonly
5350000
unkown
page readonly
10000
heap
page read and write
73C735F000
unkown
page read and write
535000
heap
page read and write
7CB7000
unkown
page readonly
6322000
unkown
page read and write
489000
heap
page read and write
70A000
heap
page read and write
522000
heap
page read and write
57E0000
unkown
page read and write
D312000
unkown
page read and write
7FF534D9A000
unkown
page readonly
2205B102000
heap
page read and write
57F0000
unkown
page read and write
192FC264000
heap
page read and write
409000
unkown
page execute read
57E0000
unkown
page read and write
5D6000
unkown
page read and write
2205A800000
heap
page read and write
710000
heap
page read and write
2682F02D000
heap
page read and write
57BA000
unkown
page read and write
58A0000
unkown
page read and write
51E000
heap
page read and write
1280000
unkown
page readonly
7FF534BE1000
unkown
page readonly
2682F039000
heap
page read and write
11541000
unkown
page read and write
14523602000
heap
page read and write
BC7E000
stack
page read and write
2682F042000
heap
page read and write
843000
heap
page read and write
4BF000
heap
page read and write
401000
unkown
page execute read
52A000
heap
page read and write
392F5FC000
stack
page read and write
7FF53490D000
unkown
page readonly
77F3000
unkown
page readonly
FB46BFF000
stack
page read and write
140128000
unkown
page read and write
7FF534CF0000
unkown
page readonly
192FC313000
heap
page read and write
2834000
heap
page read and write
885000
heap
page read and write
7FF534BEE000
unkown
page readonly
A09C7FF000
stack
page read and write
A9F000
stack
page read and write
57E0000
unkown
page read and write
22BAEE13000
unkown
page read and write
400000
unkown
page readonly
842C000
stack
page read and write
8CE9000
stack
page read and write
82F833B000
stack
page read and write
4FF000
heap
page read and write
1570000
heap
page read and write
7FF534DF4000
unkown
page readonly
2340000
heap
page read and write
E28EA7F000
stack
page read and write
503000
heap
page read and write
4EA000
heap
page read and write
8B0000
heap
page read and write
3EBC000
heap
page read and write
61F0000
unkown
page read and write
7FF534B9B000
unkown
page readonly
2898000
heap
page read and write
6241000
unkown
page read and write
14F0000
unkown
page read and write
509000
heap
page read and write
57F0000
unkown
page read and write
1F0000
heap
page read and write
534E000
stack
page read and write
885000
heap
page read and write
54E000
stack
page read and write
593A000
unkown
page read and write
829000
heap
page read and write
7FF535035000
unkown
page readonly
8A9000
heap
page read and write
78E000
stack
page read and write
22BAED00000
heap
page read and write
7FF53495D000
unkown
page readonly
700000
heap
page read and write
30000
heap
page read and write
7FFC1B439000
unkown
page readonly
212E8785000
heap
page read and write
C07B000
stack
page read and write
84C000
heap
page read and write
2D3E000
stack
page read and write
5D9000
unkown
page readonly
7FF534D26000
unkown
page readonly
7FF534B4D000
unkown
page readonly
2682F06B000
heap
page read and write
57F0000
unkown
page read and write
4EE000
heap
page read and write
62AC000
unkown
page read and write
F608000
unkown
page read and write
22BAF602000
unkown
page read and write
57F0000
unkown
page read and write
84C000
heap
page read and write
521000
heap
page read and write
8B2000
heap
page read and write
52D0000
unkown
page read and write
6F0000
heap
page read and write
51E000
heap
page read and write
2180000
heap
page read and write
418000
unkown
page execute read
F5A7000
unkown
page read and write
8F2F000
unkown
page read and write
6D0000
direct allocation
page execute and read and write
A09C57F000
stack
page read and write
253F5FA8000
heap
page read and write
8AD000
heap
page read and write
21CED350000
remote allocation
page read and write
57E0000
unkown
page read and write
F31B000
unkown
page read and write
5940000
unkown
page read and write
539000
heap
page read and write
840000
heap
page read and write
7FF534DFB000
unkown
page readonly
840000
heap
page read and write
8A3000
heap
page read and write
7FF534C78000
unkown
page readonly
57F0000
unkown
page read and write
885000
heap
page read and write
B717000
unkown
page read and write
180000
heap
page read and write
357F000
heap
page read and write
1830000
heap
page read and write
7FF534F17000
unkown
page readonly
1F0000
heap
page read and write
84C000
heap
page read and write
ECAAD7E000
stack
page read and write
6E0000
heap
page read and write
228F000
stack
page read and write
5830000
unkown
page read and write
85FF07E000
stack
page read and write
7FF6EC77C000
unkown
page write copy
69F000
stack
page read and write
3EB9000
heap
page read and write
7FF5B1F39000
unkown
page readonly
192FC213000
heap
page read and write
536000
heap
page read and write
14F0000
unkown
page read and write
14061F000
unkown
page readonly
51C000
heap
page read and write
538000
heap
page read and write
4C7000
heap
page read and write
5740000
heap
page execute and read and write
5C2A000
unkown
page read and write
874000
heap
page read and write
212E8540000
heap
page read and write
5F0000
heap
page read and write
F5FD000
unkown
page read and write
400000
unkown
page readonly
30B0000
heap
page read and write
558000
heap
page read and write
7FF534F9A000
unkown
page readonly
FB4610B000
stack
page read and write
7FF534BB4000
unkown
page readonly
7FF5B1CAD000
unkown
page readonly
F74E000
unkown
page read and write
21CED402000
trusted library allocation
page read and write
57F0000
unkown
page read and write
14C4000
trusted library allocation
page read and write
5860000
unkown
page read and write
140D5000
unkown
page read and write
8F20000
unkown
page read and write
885000
heap
page read and write
600000
heap
page read and write
5730000
unkown
page read and write
1800000
trusted library allocation
page read and write
192FC24B000
heap
page read and write
57E0000
unkown
page read and write
253F6000000
heap
page read and write
509000
heap
page read and write
4BF000
heap
page read and write
288E000
heap
page read and write
58A0000
unkown
page read and write
192FE1C0000
remote allocation
page read and write
41A000
unkown
page write copy
2893802F000
heap
page read and write
57E0000
unkown
page read and write
2205A7B0000
trusted library allocation
page read and write
846000
heap
page read and write
14F0000
unkown
page read and write
392F0FE000
stack
page read and write
2682F03D000
heap
page read and write
950000
remote allocation
page read and write
84F000
heap
page read and write
8574000
unkown
page read and write
7FF5B1F27000
unkown
page readonly
4AB000
unkown
page read and write
1590000
unkown
page readonly
57F0000
unkown
page read and write
8F35000
unkown
page read and write
8E2000
heap
page read and write
2205B122000
heap
page read and write
B6FC000
stack
page read and write
8BF000
heap
page read and write
4F5000
heap
page read and write
843000
heap
page read and write
41A000
unkown
page write copy
31BA000
stack
page read and write
41A000
unkown
page write copy
1840000
heap
page read and write
192FC202000
heap
page read and write
7FF534C2C000
unkown
page readonly
400000
unkown
page readonly
74E000
stack
page read and write
52B9000
unkown
page read and write
874000
heap
page read and write
7FF5B1CC3000
unkown
page readonly
108EF000
unkown
page read and write
B8FA000
stack
page read and write
57F0000
unkown
page read and write
2205A892000
heap
page read and write
712D000
unkown
page read and write
52C000
heap
page read and write
55A000
unkown
page readonly
2205B200000
heap
page read and write
ECAB07F000
stack
page read and write
14522CE0000
heap
page read and write
509000
heap
page read and write
8AB000
heap
page read and write
FB50000
unkown
page read and write
8AE000
heap
page read and write
8D1000
heap
page read and write
2205B1C6000
heap
page read and write
4BA000
heap
page read and write
4B23000
unkown
page read and write
21F0000
heap
page read and write
7FF5347D2000
unkown
page readonly
FBD0000
unkown
page read and write
273F000
stack
page read and write
539000
heap
page read and write
8AE000
heap
page read and write
2682F802000
trusted library allocation
page read and write
73C777F000
stack
page read and write
8C2C000
stack
page read and write
5730000
unkown
page read and write
7FF6ECAFA000
unkown
page readonly
7C6000
heap
page execute and read and write
7FF534ED0000
unkown
page readonly
7FF5B1F3F000
unkown
page readonly
7FF534C60000
unkown
page readonly
F5F5000
unkown
page read and write
418000
unkown
page execute read
507000
heap
page read and write
B9FF000
stack
page read and write
41A000
unkown
page write copy
519000
heap
page read and write
57F0000
unkown
page read and write
30000
heap
page read and write
85E1000
unkown
page read and write
14523700000
heap
page read and write
526000
heap
page read and write
14F0000
unkown
page read and write
57E0000
unkown
page read and write
4ED000
heap
page read and write
7FF534E57000
unkown
page readonly
7FF534EE2000
unkown
page readonly
57F0000
unkown
page read and write
FB46CFF000
stack
page read and write
A10000
heap
page read and write
5940000
unkown
page read and write
5EC000
heap
page read and write
713B000
unkown
page read and write
7FF5B1FA5000
unkown
page readonly
3211000
trusted library allocation
page read and write
57E0000
unkown
page read and write
885000
heap
page read and write
90D8000
unkown
page read and write
134CF000
stack
page read and write
2CBE000
stack
page read and write
13B4A000
stack
page read and write
55A000
unkown
page readonly
509000
heap
page read and write
5B6E000
stack
page read and write
2240000
heap
page read and write
D60D4FF000
stack
page read and write
73E000
stack
page read and write
418000
unkown
page execute read
7FF534924000
unkown
page readonly
4E8A000
stack
page read and write
2205B1B0000
heap
page read and write
7FF5348F6000
unkown
page readonly
7FF5B1BE0000
unkown
page readonly
82F89FF000
stack
page read and write
228583C0000
heap
page read and write
58A0000
unkown
page read and write
4C6000
heap
page read and write
400000
unkown
page execute and read and write
ECAAE7A000
stack
page read and write
22E4000
heap
page execute and read and write
7FF5349CF000
unkown
page readonly
5D6000
unkown
page read and write
58A0000
unkown
page read and write
1425000
heap
page read and write
4B00000
unkown
page read and write
7FF535072000
unkown
page readonly
2E20000
remote allocation
page read and write
33A0000
heap
page read and write
4D6000
heap
page read and write
84F000
heap
page read and write
57F0000
unkown
page read and write
750000
heap
page read and write
354F000
stack
page read and write
8A9000
heap
page read and write
38A0000
unkown
page read and write
8A3000
heap
page read and write
885000
heap
page read and write
57F0000
unkown
page read and write
F5EE000
unkown
page read and write
57E0000
unkown
page read and write
2DBE000
stack
page read and write
2310000
heap
page read and write
5D9000
unkown
page readonly
57E0000
unkown
page read and write
97F000
stack
page read and write
2205A83C000
heap
page read and write
538000
heap
page read and write
212E8735000
heap
page read and write
707D000
unkown
page read and write
82F8DFE000
stack
page read and write
90F000
stack
page read and write
2C7F000
stack
page read and write
4D6000
heap
page read and write
24A0000
heap
page read and write
B3AF000
stack
page read and write
5020000
unkown
page read and write
22BAECA0000
heap
page read and write
6B0000
heap
page read and write
593A000
unkown
page read and write
4AB000
heap
page read and write
7FF534B43000
unkown
page readonly
58A0000
unkown
page read and write
59E000
stack
page read and write
2AEE7F20000
heap
page read and write
14F0000
unkown
page read and write
5810000
unkown
page read and write
8FD3000
unkown
page read and write
28B2000
heap
page read and write
523000
heap
page read and write
939000
heap
page read and write
7FF6ECB01000
unkown
page write copy
80AD000
stack
page read and write
1807000
trusted library allocation
page execute and read and write
7FF534C21000
unkown
page readonly
867000
heap
page read and write
14F0000
unkown
page read and write
4ED000
heap
page read and write
7FF535029000
unkown
page readonly
2E20000
remote allocation
page read and write
401000
unkown
page execute read
5F0000
heap
page read and write
4BF000
heap
page read and write
557000
unkown
page read and write
85FEC7D000
stack
page read and write
5F0000
heap
page read and write
D87F000
unkown
page read and write
287E000
heap
page read and write
744000
heap
page read and write
212E87C3000
heap
page read and write
8581000
unkown
page read and write
192FC25B000
heap
page read and write
58A0000
unkown
page read and write
6770000
unkown
page read and write
496000
heap
page read and write
140128000
unkown
page read and write
50A000
heap
page read and write
8AE000
heap
page read and write
4A7000
heap
page read and write
84C000
heap
page read and write
7FF5B2024000
unkown
page readonly
2893803E000
heap
page read and write
52BE000
unkown
page read and write
7FF534BF1000
unkown
page readonly
4ED000
heap
page read and write
57F0000
unkown
page read and write
842000
heap
page read and write
2205A88F000
heap
page read and write
100BB000
unkown
page read and write
E28E77B000
stack
page read and write
7FF534BC0000
unkown
page readonly
100BD000
unkown
page read and write
4BF000
heap
page read and write
57F0000
unkown
page read and write
519000
heap
page read and write
40E000
unkown
page readonly
73C73DE000
stack
page read and write
5A3E000
stack
page read and write
5810000
unkown
page read and write
2620000
heap
page read and write
7FB0000
unkown
page readonly
192FC25A000
heap
page read and write
7FF5350FB000
unkown
page readonly
19B000
stack
page read and write
400000
unkown
page readonly
57D0000
unkown
page readonly
7FF534C5D000
unkown
page readonly
22858500000
trusted library allocation
page read and write
8AE000
heap
page read and write
4F8000
heap
page read and write
EAFB1FB000
stack
page read and write
519000
heap
page read and write
7FF5B1F57000
unkown
page readonly
84F000
heap
page read and write
5931000
unkown
page read and write
7FF534C9A000
unkown
page readonly
28938102000
heap
page read and write
57F0000
unkown
page read and write
590000
heap
page read and write
F440000
unkown
page read and write
2682F077000
heap
page read and write
401000
unkown
page execute read
885000
heap
page read and write
3172000
heap
page read and write
509000
heap
page read and write
2820000
heap
page read and write
566000
heap
page read and write
710000
heap
page read and write
2400000
heap
page read and write
4A8000
heap
page read and write
287E000
stack
page read and write
8A9000
heap
page read and write
8A3000
heap
page read and write
8B2000
heap
page read and write
141D5000
unkown
page read and write
7FF534E1F000
unkown
page readonly
535000
heap
page read and write
D8E2000
unkown
page read and write
5810000
unkown
page read and write
7FF53505E000
unkown
page readonly
5A10000
unkown
page read and write
4D5000
heap
page read and write
392F4FE000
stack
page read and write
33E8000
unkown
page read and write
519000
heap
page read and write
69E000
stack
page read and write
4D6000
heap
page read and write
4C5000
heap
page read and write
22BAF4C0000
unkown
page read and write
4D6000
heap
page read and write
22BAEE02000
unkown
page read and write
14F0000
unkown
page read and write
874000
heap
page read and write
7FF51EC9A000
unkown
page readonly
22BAEE24000
unkown
page read and write
6E7000
heap
page read and write
5D9000
unkown
page readonly
58A0000
unkown
page read and write
E30000
heap
page read and write
4AF000
heap
page read and write
1002C000
stack
page read and write
7FF534B3A000
unkown
page readonly
418000
unkown
page execute read
2205B740000
remote allocation
page execute and read and write
867000
heap
page read and write
11332000
heap
page read and write
93B517F000
stack
page read and write
FB466FC000
stack
page read and write
F4FD000
unkown
page read and write
14F0000
unkown
page read and write
4DA000
heap
page read and write
288F000
heap
page read and write
2A1C000
stack
page read and write
885000
heap
page read and write
92E000
stack
page read and write
7DF442331000
unkown
page execute read
83AD000
stack
page read and write
2BFD000
stack
page read and write
4CF000
heap
page read and write
D88C000
unkown
page read and write
9AE000
stack
page read and write
513000
heap
page read and write
30000
heap
page read and write
108E8000
unkown
page read and write
5977000
unkown
page read and write
7FF5347CD000
unkown
page readonly
7FF5B1EC2000
unkown
page readonly
2682F062000
heap
page read and write
1022B000
stack
page read and write
2F5F000
stack
page read and write
2285840D000
unkown
page read and write
14F0000
unkown
page read and write
2069DC75000
heap
page read and write
885000
heap
page read and write
2916000
heap
page read and write
41A000
unkown
page write copy
253F5FA0000
heap
page read and write
58D0000
unkown
page readonly
3390000
unkown
page read and write
F62F000
unkown
page read and write
400000
unkown
page readonly
4D6000
heap
page read and write
5730000
unkown
page read and write
73C72DA000
stack
page read and write
F526000
unkown
page read and write
7FF5B1F4B000
unkown
page readonly
BFF000
stack
page read and write
7FF5B2027000
unkown
page readonly
58A0000
unkown
page read and write
53C000
heap
page read and write
209E000
stack
page read and write
57F0000
unkown
page read and write
53A000
heap
page read and write
ECAA94B000
stack
page read and write
6EE000
stack
page read and write
7FF534C64000
unkown
page readonly
22BAEE3C000
unkown
page read and write
2205B002000
heap
page read and write
7FF534E7E000
unkown
page readonly
4F5000
heap
page read and write
7FF535055000
unkown
page readonly
844000
heap
page read and write
4AF000
heap
page read and write
2AEE8029000
heap
page read and write
14522E29000
heap
page read and write
4B50000
unkown
page read and write
21CECC02000
heap
page read and write
71A000
heap
page read and write
4D6000
heap
page read and write
58A0000
unkown
page read and write
6236000
unkown
page read and write
58A0000
unkown
page read and write
2290000
heap
page read and write
41A000
unkown
page write copy
57E0000
unkown
page read and write
57E0000
unkown
page read and write
7FF5B1FBF000
unkown
page readonly
71BA000
unkown
page read and write
417000
unkown
page execute read
5063000
unkown
page read and write
4EA000
heap
page read and write
885000
heap
page read and write
4BA000
heap
page read and write
4EF000
heap
page read and write
14522EB8000
heap
page read and write
57E0000
unkown
page read and write
626000
heap
page read and write
7FF5B1F65000
unkown
page readonly
49A000
heap
page read and write
B67B000
stack
page read and write
5EF000
heap
page read and write
8725000
stack
page read and write
28938802000
trusted library allocation
page read and write
7166000
unkown
page read and write
5730000
unkown
page read and write
A09C87F000
stack
page read and write
57E0000
unkown
page read and write
57F0000
unkown
page read and write
58A0000
unkown
page read and write
8DD000
heap
page read and write
451000
unkown
page readonly
85FEE7B000
stack
page read and write
2205B143000
heap
page read and write
93B4DAF000
stack
page read and write
7E0000
direct allocation
page read and write
409000
unkown
page execute read
2682F05E000
heap
page read and write
1360000
unkown
page readonly
41A000
unkown
page write copy
885000
heap
page read and write
14A4000
trusted library allocation
page read and write
2AEE8102000
heap
page read and write
885000
heap
page read and write
2AEE8000000
heap
page read and write
7FFC1B4E5000
unkown
page read and write
57E0000
unkown
page read and write
100B2000
unkown
page read and write
7FF534F32000
unkown
page readonly
57E0000
unkown
page read and write
539000
heap
page read and write
7CBF000
unkown
page readonly
F644000
unkown
page read and write
15C0000
unkown
page readonly
549000
heap
page read and write
515000
heap
page read and write
4F8000
heap
page read and write
297E000
stack
page read and write
400000
unkown
page readonly
53FC000
stack
page read and write
7F13000
unkown
page readonly
7FF5B1FAB000
unkown
page readonly
7133000
unkown
page read and write
418000
unkown
page execute read
885000
heap
page read and write
7FCC000
unkown
page readonly
14061F000
unkown
page readonly
7FF534FC1000
unkown
page readonly
5B0000
heap
page read and write
21AF000
stack
page read and write
4AB000
unkown
page read and write
47A000
heap
page read and write
A09C37C000
unkown
page read and write
5730000
unkown
page read and write
9155000
unkown
page read and write
5280000
unkown
page readonly
4BB000
heap
page read and write
4D4000
heap
page read and write
1230000
unkown
page readonly
57E0000
unkown
page read and write
19A000
stack
page read and write
283E000
stack
page read and write
7FF534FCB000
unkown
page readonly
843000
heap
page read and write
C0FB000
stack
page read and write
5730000
unkown
page read and write
7D52000
unkown
page readonly
843000
heap
page read and write
7CCF000
unkown
page readonly
BB78000
stack
page read and write
401000
unkown
page execute read
6E5000
heap
page read and write
4C7000
heap
page read and write
F808000
unkown
page read and write
2205B192000
heap
page read and write
7B0000
unkown
page readonly
8F1C000
unkown
page read and write
2205A813000
heap
page read and write
7FF534E4E000
unkown
page readonly
411000
unkown
page read and write
There are 2572 hidden memdumps, click here to show them.