IOC Report
SC.028UCCP.exe

loading gif

Files

File Path
Type
Category
Malicious
SC.028UCCP.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Unepitomizeds\Indlaansrenter\Patter.Lam
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Unepitomizeds\Indlaansrenter\cavil\Ablativers91\ArtDeco_green_7.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, components 3
dropped
C:\Users\user\AppData\Local\Temp\Unepitomizeds\Indlaansrenter\cavil\Ablativers91\Patronymens.Hov230
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Local\Temp\nsc7F31.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SC.028UCCP.exe
C:\Users\user\Desktop\SC.028UCCP.exe
malicious
C:\Users\user\Desktop\SC.028UCCP.exe
C:\Users\user\Desktop\SC.028UCCP.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\mstsc.exe
C:\Windows\SysWOW64\mstsc.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\SC.028UCCP.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.friendsofquarepianos.co.uk/ms12/?hT=rKVQxN6JSordSXvKLLfEBVUre63ztGesQlGfCtix5zz1Yo/EERiTRw3ZQxg6mz/OTP1R&a6A8=p0GhgVm0MHDdp8m
81.17.29.147
malicious
http://www.hospitalityhsia.com/ms12/?a6A8=p0GhgVm0MHDdp8m&hT=i6mctz/lYNz9iKxESYWey4cK6TMKWjJsbrWHZTfqTQLBeE+tWIBGneMXWwL4vjyr8Zpy
206.233.207.174
malicious
http://www.findyellowfreightjobs.com/ms12/?hT=G6LllRn2UhCgoj9/NoDttLpXGK4pGwfwFGBz2EgLi6yWMZIZhDysno0vSCCcnKmdw4QQ&UlWl0=MBZlMJlh34CHQ
169.60.232.139
malicious
http://www.economjchq.space/ms12/?a6A8=p0GhgVm0MHDdp8m&hT=GEgy5f1eXaBWyRpWMBxBbWcEY1MHcvciQ8raEzEPejcDf7w8zE5rQdkYfLeQVLgbPBXb
188.114.97.3
malicious
http://www.amyjohnsonrealtor.com/ms12/?a6A8=p0GhgVm0MHDdp8m&hT=KsItnxjux7GTZO7TUTKtm8QLzBBO9NcCFMwewp8NtohxkT6a6dLohlItrjGlglAawoap
13.248.157.32
malicious
http://www.triknblog.net/ms12/?hT=lfzlfRYQFuadehd27GXthwlbqohm3e93HBX/EbDE1KV1AljB6VPD+GnlvvGiXqJ/lo6n&UlWl0=MBZlMJlh34CHQ
183.181.96.18
malicious
http://195.133.40.46/CsPlxqjFa224.bin
195.133.40.46
malicious
http://www.drugtestingservices.co.uk/ms12/?a6A8=p0GhgVm0MHDdp8m&hT=dB2SKHnvFm/evHV5UtSyv0UoYXCrydohCzjDkTmDf/VJc0uDcAnYtxnT/Jo2TNbLuMGT
165.160.15.20
malicious
www.eliteequinewellness.com/ms12/
malicious
http://www.paparazirestaurant.co.uk/ms12/?a6A8=p0GhgVm0MHDdp8m&hT=qQKx9PCKTcR0X3fJLav3D/FI6bogqcX+QhlqDFXKzmg3lH7RMn/qXLrYouNPLK8mW2//
192.187.111.221
malicious
http://www.lists-cellphones.life/ms12/?hT=XQDAKTxCfPAtZ1kZf5EiiDFWaFS1BQmSMuwLBzPPFACL8OgktJOl440I6bHrpdhUiEnu&a6A8=p0GhgVm0MHDdp8m
104.21.39.114
malicious
http://www.garageautosaintthomas.com/ms12/?hT=rnwHnBjC2B91WSvUx5IF3sWIhMPrpsyX3rQSnskEXaZlLwDtCWtuXGHAHocTRNCypERK&a6A8=p0GhgVm0MHDdp8m
198.185.159.144
malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://195.133.40.46/CsPlxqjFa224.bin3
unknown
http://195.133.40.46/CsPlxqjFa224.bin0
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
https://www.laposadaapts.com/ms12/?hT=vo99NxIlv9atltQAf5
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://schemas.micro
unknown
http://www.gopher.ftp://ftp.
unknown
https://outlook.com
unknown
https://excel.office.coma
unknown
http://www.conscienciaretroprogresiva.com/ms12/?hT=YOOWDLIFFjmzpH1SAG7YZM+LVKYOCEYmA0eV1woM6pvlajKzKUVwFam52RyaFl1jbOMY&UlWl0=MBZlMJlh34CHQ
34.102.136.180
http://195.133.40.46/G
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://api.msn.com/j
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://195.133.40.46/
unknown
http://195.133.40.46/CsPlxqjFa224.binU
unknown
http://www.arialttnr.com/ms12/?hT=aVqkBEdIHBWaW/lsOPNfNUdw5ZC180ox2ANf6BVSo52uRq15en0/dTfjz5sq7L16GRwO&a6A8=p0GhgVm0MHDdp8m
142.250.186.51
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://195.133.40.46/CsPlxqjFa224.bin~
unknown
https://api.msn.com/
unknown
http://www.eliteequinewellness.com/ms12/?hT=3vbl2R1UVlik5qBB6wrenITxXeLVrWa6N7N62KRalH+vVSA16yD/agKPQdEyB3rsS7Yj&a6A8=p0GhgVm0MHDdp8m
142.250.185.211
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.lists-cellphones.life
104.21.39.114
malicious
www.friendsofquarepianos.co.uk
81.17.29.147
malicious
www.economjchq.space
188.114.97.3
malicious
amyjohnsonrealtor.com
13.248.157.32
malicious
www.hospitalityhsia.com
206.233.207.174
malicious
www.triknblog.net
183.181.96.18
malicious
www.paparazirestaurant.co.uk
192.187.111.221
malicious
www.findyellowfreightjobs.com
169.60.232.139
malicious
www.drugtestingservices.co.uk
165.160.15.20
malicious
www.abimpianti.ch
217.26.48.101
malicious
www.goverifyvin.com
unknown
malicious
97.97.242.52.in-addr.arpa
unknown
malicious
www.top-promotion.net
unknown
malicious
www.amyjohnsonrealtor.com
unknown
malicious
www.conscienciaretroprogresiva.com
unknown
malicious
www.eliteequinewellness.com
unknown
malicious
www.arialttnr.com
unknown
malicious
www.garageautosaintthomas.com
unknown
malicious
www.laposadaapts.com
unknown
malicious
www.eeccu.info
unknown
malicious
www.thinkdev.africa
unknown
malicious
conscienciaretroprogresiva.com
34.102.136.180
ext-sq.squarespace.com
198.185.159.144
ghs.googlehosted.com
142.250.185.211
There are 14 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
165.160.15.20
www.drugtestingservices.co.uk
United States
malicious
195.133.40.46
unknown
Russian Federation
malicious
206.233.207.174
www.hospitalityhsia.com
United States
malicious
183.181.96.18
www.triknblog.net
Japan
malicious
192.187.111.221
www.paparazirestaurant.co.uk
United States
malicious
13.248.157.32
amyjohnsonrealtor.com
United States
malicious
217.26.48.101
www.abimpianti.ch
Switzerland
malicious
188.114.97.3
www.economjchq.space
European Union
malicious
81.17.29.147
www.friendsofquarepianos.co.uk
Switzerland
malicious
169.60.232.139
www.findyellowfreightjobs.com
United States
malicious
104.21.39.114
www.lists-cellphones.life
United States
malicious
142.250.185.211
ghs.googlehosted.com
United States
192.168.11.1
unknown
unknown
198.185.159.144
ext-sq.squarespace.com
United States
34.102.136.180
conscienciaretroprogresiva.com
United States
142.250.186.51
unknown
United States
There are 6 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Planlgningers\Reanesthetized\Skvendes\Anisopleural
Interning
HKEY_CURRENT_USER\SOFTWARE\Alkanet\Mystifically
Otterer
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\QuietHours
QuietHoursServiceState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\QuietHours
QuietHoursServiceState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
BackupReminderToastCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
LastInstallTimeLowStorageNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
LastTimeBackupReminderNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
There are 136 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1660000
remote allocation
page execute and read and write
malicious
4940000
trusted library allocation
page read and write
malicious
411D000
direct allocation
page execute and read and write
malicious
4910000
unclassified section
page execute and read and write
malicious
2C10000
direct allocation
page execute and read and write
malicious
A0000
unclassified section
page execute and read and write
malicious
34AC0000
unclassified section
page execute and read and write
malicious
2C00000
system
page execute and read and write
malicious
662000
heap
page read and write
4C3D000
unkown
page read and write
67D000
heap
page read and write
1330000
heap
page read and write
24BA7509000
heap
page read and write
CD59000
unkown
page read and write
38D0000
unkown
page read and write
7FF538087000
unkown
page readonly
7FF53814A000
unkown
page readonly
E1E2000
unkown
page read and write
D940000
unkown
page read and write
4C60000
unkown
page read and write
67D000
heap
page read and write
5F0000
unkown
page execute read
4D40000
unkown
page read and write
67D000
heap
page read and write
132016AA000
heap
page read and write
7FF537B18000
unkown
page readonly
67D000
heap
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
7FF538084000
unkown
page readonly
A8E0000
heap
page read and write
D90C000
unkown
page read and write
CE03000
unkown
page read and write
270DB8BF000
heap
page read and write
132015D9000
heap
page read and write
CD49000
unkown
page read and write
1D0000
unclassified section
page readonly
2E90000
trusted library allocation
page read and write
CD94000
unkown
page read and write
662000
heap
page read and write
662000
heap
page read and write
132017A5000
heap
page read and write
D8ED000
unkown
page read and write
10CBE000
unkown
page read and write
132016A5000
heap
page read and write
D9C4000
unkown
page read and write
CE03000
unkown
page read and write
7DF444F00000
unkown
page readonly
69B000
heap
page read and write
10CF4000
unkown
page read and write
9F30000
unkown
page readonly
D8C8000
unkown
page read and write
7FF5383B5000
unkown
page readonly
E8D0000
unkown
page read and write
BE9E000
stack
page read and write
662000
heap
page read and write
1416F000
system
page read and write
7DF444EE0000
unkown
page readonly
7FF53844C000
unkown
page readonly
D8FD000
unkown
page read and write
10F60000
unkown
page read and write
270DB862000
heap
page read and write
DB3E000
unkown
page read and write
DAF9000
unkown
page read and write
7FF537BDC000
unkown
page readonly
3101000
heap
page read and write
10D8E000
unkown
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
7FF538152000
unkown
page readonly
69B000
heap
page read and write
69B000
heap
page read and write
270DBA00000
heap
page read and write
69B000
heap
page read and write
DAF9000
unkown
page read and write
69B000
heap
page read and write
662000
heap
page read and write
10DC6000
unkown
page read and write
56F5000
unkown
page read and write
7FF538325000
unkown
page readonly
F069000
stack
page read and write
2D10000
trusted library allocation
page read and write
CD4F000
unkown
page read and write
E1F3000
unkown
page read and write
69B000
heap
page read and write
7FF5383AC000
unkown
page readonly
137C4000
unkown
page read and write
DAC2000
unkown
page read and write
7FF53857E000
unkown
page readonly
ACA0000
system
page execute and read and write
7FF537BB1000
unkown
page readonly
D9D9000
unkown
page read and write
35B2000
unkown
page read and write
A2CE000
stack
page read and write
D8F9000
unkown
page read and write
9930000
unkown
page read and write
F100000
heap
page read and write
D7B8000
unkown
page read and write
10C67000
unkown
page read and write
67D000
heap
page read and write
A1CD000
stack
page read and write
7FF537ED6000
unkown
page readonly
683000
heap
page read and write
B080000
unkown
page readonly
2FE56DA0000
heap
page read and write
7FF538540000
unkown
page readonly
34C75000
heap
page read and write
662000
heap
page read and write
D697000
unkown
page read and write
10F0000
unkown
page read and write
24BA6AE2000
heap
page read and write
67D000
heap
page read and write
DCC5000
unkown
page read and write
69B000
heap
page read and write
6AA3AFF000
stack
page read and write
7FF5377B2000
unkown
page readonly
7FF537D8E000
unkown
page readonly
13201DA0000
heap
page read and write
2CD3000
heap
page read and write
E1D0000
unkown
page read and write
CDDF000
unkown
page read and write
10E5A000
unkown
page read and write
4C83000
heap
page read and write
4B80000
direct allocation
page execute and read and write
270DB8BF000
heap
page read and write
10C8F000
unkown
page read and write
DAF9000
unkown
page read and write
132016EF000
heap
page read and write
10DF9000
unkown
page read and write
C530000
unkown
page readonly
662000
heap
page read and write
D901000
unkown
page read and write
67D000
heap
page read and write
E900000
unkown
page readonly
17F4561B000
heap
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
7FF537B4F000
unkown
page readonly
3299000
stack
page read and write
662000
heap
page read and write
9CE1000
unkown
page read and write
10DB4000
unkown
page read and write
13201DD3000
heap
page read and write
7FF5379AE000
unkown
page readonly
1320175C000
heap
page read and write
662000
heap
page read and write
67D000
heap
page read and write
24BA6B02000
heap
page read and write
7FF537E79000
unkown
page readonly
D9BD000
unkown
page read and write
D9C4000
unkown
page read and write
DA04000
unkown
page read and write
662000
heap
page read and write
17F45632000
heap
page read and write
2E90000
trusted library allocation
page read and write
69B000
heap
page read and write
662000
heap
page read and write
4D20000
unkown
page read and write
662000
heap
page read and write
10C97000
unkown
page read and write
13201DCB000
heap
page read and write
662000
heap
page read and write
7FF53854C000
unkown
page readonly
67D000
heap
page read and write
D903000
unkown
page read and write
270DB83F000
heap
page read and write
9CBF000
unkown
page read and write
DE01000
unkown
page read and write
24BA7547000
heap
page read and write
2D10000
trusted library allocation
page read and write
D4AA000
stack
page read and write
2F4A000
heap
page read and write
2BDE000
stack
page read and write
1A1ACFF000
stack
page read and write
662000
heap
page read and write
DD34000
unkown
page read and write
69B000
heap
page read and write
C5D2000
unkown
page read and write
270DB8B5000
heap
page read and write
2FE56BF2000
heap
page read and write
132016CC000
heap
page read and write
270DB8BF000
heap
page read and write
67D000
heap
page read and write
7FF53859B000
unkown
page readonly
F0B0000
unkown
page readonly
7FF5379E8000
unkown
page readonly
99AC000
unkown
page read and write
30B0000
heap
page read and write
270DB8A9000
heap
page read and write
138FD000
stack
page read and write
2D10000
trusted library allocation
page read and write
7FF538268000
unkown
page readonly
67D000
heap
page read and write
2C6E000
unkown
page read and write
132015F4000
heap
page read and write
13201E24000
heap
page read and write
69B000
heap
page read and write
7FF538371000
unkown
page readonly
9DA0000
unkown
page readonly
DA3B000
unkown
page read and write
996D000
unkown
page read and write
270DB902000
heap
page read and write
17F4566F000
heap
page read and write
7FF537BCF000
unkown
page readonly
662000
heap
page read and write
E1EE000
unkown
page read and write
9B18000
unkown
page read and write
1320154E000
heap
page read and write
13201E3B000
heap
page read and write
3101000
heap
page read and write
98D000
system
page execute and read and write
7FF538266000
unkown
page readonly
7FF5384D2000
unkown
page readonly
17F45600000
heap
page read and write
B77B000
stack
page read and write
2DC4000
heap
page read and write
24BA7588000
heap
page read and write
10BEA000
unkown
page read and write
69B000
heap
page read and write
13201516000
heap
page read and write
13201573000
heap
page read and write
7FF5382FC000
unkown
page readonly
DE01000
unkown
page read and write
7FF5383CB000
unkown
page readonly
69B000
heap
page read and write
7FF5385E2000
unkown
page readonly
662000
heap
page read and write
7DF444EE1000
unkown
page execute read
7FF5385F6000
unkown
page readonly
7FF53824D000
unkown
page readonly
69B000
heap
page read and write
7DF444F01000
unkown
page execute read
C600000
unkown
page read and write
2CD3000
heap
page read and write
69B000
heap
page read and write
17F4565D000
heap
page read and write
3240000
heap
page read and write
DAF6000
unkown
page read and write
7FF538320000
unkown
page readonly
67D000
heap
page read and write
D778000
unkown
page read and write
D8ED000
unkown
page read and write
69B000
heap
page read and write
662000
heap
page read and write
CE03000
unkown
page read and write
2E90000
trusted library allocation
page read and write
5578000
unkown
page read and write
69B000
heap
page read and write
2240000
heap
page read and write
1946C870000
trusted library allocation
page read and write
10D7F000
unkown
page read and write
270DB8A1000
heap
page read and write
7FF537A27000
unkown
page readonly
E1AD000
stack
page read and write
662000
heap
page read and write
10E6C000
unkown
page read and write
F150000
unkown
page read and write
D8C8000
unkown
page read and write
CD13000
unkown
page read and write
69B000
heap
page read and write
DABC000
unkown
page read and write
D3A0000
unkown
page readonly
BD35000
unkown
page read and write
7FF53859F000
unkown
page readonly
7FF5381EC000
unkown
page readonly
7FF538299000
unkown
page readonly
69B000
heap
page read and write
7FF53824D000
unkown
page readonly
13201549000
heap
page read and write
13201DF8000
heap
page read and write
270DB872000
heap
page read and write
4AB0000
trusted library allocation
page read and write
97A0000
unkown
page read and write
17F45EE0000
trusted library allocation
page read and write
A0C7000
stack
page read and write
10F3C000
unkown
page read and write
13201D61000
heap
page read and write
4C91000
heap
page read and write
270DB8B7000
heap
page read and write
3246000
heap
page read and write
7FF537D02000
unkown
page readonly
13201DF4000
heap
page read and write
A66D000
stack
page read and write
7FF5381B7000
unkown
page readonly
67D000
heap
page read and write
4CA1000
heap
page read and write
F0E0000
unkown
page readonly
2DC4000
heap
page read and write
C6D1000
unkown
page read and write
662000
heap
page read and write
24BA7502000
heap
page read and write
2BFA000
heap
page read and write
67D000
heap
page read and write
CDEC000
unkown
page read and write
4B6F000
stack
page read and write
13202311000
heap
page read and write
13202310000
heap
page read and write
662000
heap
page read and write
6406AFF000
stack
page read and write
80000
trusted library allocation
page execute and read and write
D87E000
unkown
page read and write
132017AE000
heap
page read and write
69B000
heap
page read and write
7FF537C38000
unkown
page readonly
662000
heap
page read and write
DD05000
unkown
page read and write
D87E000
unkown
page read and write
C6B8000
unkown
page read and write
5AE000
stack
page read and write
10DB7000
unkown
page read and write
67D000
heap
page read and write
7FF5380B9000
unkown
page readonly
67D000
heap
page read and write
870000
system
page execute and read and write
24BA7597000
heap
page read and write
69B000
heap
page read and write
10ED9000
unkown
page read and write
D89D000
unkown
page read and write
69B000
heap
page read and write
9B4D000
unkown
page read and write
67D000
heap
page read and write
7FF538618000
unkown
page readonly
35D4000
unkown
page read and write
4B7F000
unkown
page read and write
7FF537D83000
unkown
page readonly
132014A0000
heap
page read and write
662000
heap
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
CD8C000
unkown
page read and write
2F8E000
stack
page read and write
13201D81000
heap
page read and write
2FE56B20000
heap
page read and write
350EC000
direct allocation
page execute and read and write
7FF53860D000
unkown
page readonly
13201DF0000
heap
page read and write
7FF537C2D000
unkown
page readonly
F0D0000
unkown
page read and write
17F45624000
heap
page read and write
10D8E000
unkown
page read and write
5594000
unkown
page read and write
1BA5ABE9000
heap
page read and write
7FF537C49000
unkown
page readonly
7FF5381EC000
unkown
page readonly
7FF538544000
unkown
page readonly
7FF538430000
unkown
page readonly
D90C000
unkown
page read and write
1946B916000
heap
page read and write
56EF000
unkown
page read and write
6549000
trusted library allocation
page read and write
662000
heap
page read and write
D9BD000
unkown
page read and write
7FF537DD8000
unkown
page readonly
10DAA000
unkown
page read and write
7FF538556000
unkown
page readonly
24BA6A8B000
heap
page read and write
D9E5000
unkown
page read and write
7FF537BA0000
unkown
page readonly
DBE4000
unkown
page read and write
1A1AF7F000
stack
page read and write
DB8A000
unkown
page read and write
D8FD000
unkown
page read and write
348F000
stack
page read and write
67D000
heap
page read and write
3482F000
stack
page read and write
CD32000
unkown
page read and write
4B9C000
unkown
page read and write
69B000
heap
page read and write
CD59000
unkown
page read and write
10CF3000
unkown
page read and write
60000
trusted library allocation
page execute and read and write
69B000
heap
page read and write
13201D79000
heap
page read and write
69B000
heap
page read and write
F0B0000
unkown
page readonly
13201727000
heap
page read and write
D9D1000
unkown
page read and write
D903000
unkown
page read and write
C519000
stack
page read and write
67D000
heap
page read and write
662000
heap
page read and write
D530000
unkown
page read and write
7FF5379CB000
unkown
page readonly
35D4000
unkown
page read and write
17F45654000
heap
page read and write
270DB8AC000
heap
page read and write
A34B000
stack
page read and write
24BA7599000
heap
page read and write
69B000
heap
page read and write
7FF537C38000
unkown
page readonly
7FF538418000
unkown
page readonly
13201610000
trusted library allocation
page read and write
10D8E000
unkown
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
7FF538024000
unkown
page readonly
10B9E000
unkown
page read and write
4AE4000
heap
page read and write
D9F6000
unkown
page read and write
EEC000
heap
page read and write
35FD000
unkown
page read and write
57AA000
unkown
page read and write
662000
heap
page read and write
3462E000
stack
page read and write
B7B1F79000
stack
page read and write
4AB0000
trusted library allocation
page read and write
34F4D000
direct allocation
page execute and read and write
4D00000
unkown
page read and write
662000
heap
page read and write
7FF537BB1000
unkown
page readonly
CD2B000
unkown
page read and write
69B000
heap
page read and write
4C3D000
unkown
page read and write
7FF538377000
unkown
page readonly
662000
heap
page read and write
17F45649000
heap
page read and write
7FF53862E000
unkown
page readonly
AE58000
stack
page read and write
10E70000
unkown
page read and write
D711000
unkown
page read and write
270DB8AC000
heap
page read and write
7FF53860D000
unkown
page readonly
1A1AC7F000
stack
page read and write
2B20000
heap
page read and write
1320154B000
heap
page read and write
347EE000
stack
page read and write
9C58000
unkown
page read and write
662000
heap
page read and write
D8FD000
unkown
page read and write
69B000
heap
page read and write
407000
unkown
page readonly
662000
heap
page read and write
9950000
unkown
page read and write
C590000
unkown
page read and write
24BA7587000
heap
page read and write
7FF537E33000
unkown
page readonly
1946B850000
heap
page read and write
7FF538515000
unkown
page readonly
13201DC2000
heap
page read and write
D877000
unkown
page read and write
662000
heap
page read and write
3246000
heap
page read and write
662000
heap
page read and write
7FF537BD7000
unkown
page readonly
10DAA000
unkown
page read and write
7FF537B98000
unkown
page readonly
662000
heap
page read and write
4C03000
unkown
page read and write
13201D79000
heap
page read and write
D7B8000
unkown
page read and write
270DB900000
heap
page read and write
BD35000
unkown
page read and write
67D000
heap
page read and write
10C95000
unkown
page read and write
34E20000
direct allocation
page execute and read and write
E207000
unkown
page read and write
270DB8BF000
heap
page read and write
67D000
heap
page read and write
C5DE000
unkown
page read and write
DCDF000
unkown
page read and write
400000
unkown
page readonly
C6F7000
unkown
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
7FF537B4F000
unkown
page readonly
62A000
heap
page read and write
CD4F000
unkown
page read and write
E1BC000
unkown
page read and write
10E68000
unkown
page read and write
7FF5384B3000
unkown
page readonly
DD05000
unkown
page read and write
7FF538482000
unkown
page readonly
69B000
heap
page read and write
270DB8A7000
heap
page read and write
640697E000
stack
page read and write
D8C8000
unkown
page read and write
7FF537FC1000
unkown
page readonly
10F77000
unkown
page read and write
DAF9000
unkown
page read and write
10CF4000
unkown
page read and write
5574000
unkown
page read and write
7FF5377DD000
unkown
page readonly
24BA7589000
heap
page read and write
7FF537A2B000
unkown
page readonly
10DC2000
unkown
page read and write
7FF538424000
unkown
page readonly
7FF538591000
unkown
page readonly
1946C820000
trusted library allocation
page read and write
5EC000
unkown
page execute read
34101000
heap
page read and write
2D10000
trusted library allocation
page read and write
13782000
unkown
page read and write
DB8A000
unkown
page read and write
9B01000
unkown
page read and write
7FF538487000
unkown
page readonly
2F4A000
heap
page read and write
1946BA90000
trusted library allocation
page read and write
4C90000
unkown
page readonly
69B000
heap
page read and write
69B000
heap
page read and write
7FF5385CF000
unkown
page readonly
CD94000
unkown
page read and write
D919000
unkown
page read and write
E6AD000
stack
page read and write
662000
heap
page read and write
17F4567D000
heap
page read and write
DCDF000
unkown
page read and write
69B000
heap
page read and write
11F0000
unkown
page read and write
7FF53857E000
unkown
page readonly
7FF53830F000
unkown
page readonly
BF1E000
stack
page read and write
7FF537AF9000
unkown
page readonly
4B50000
unkown
page read and write
9D01000
unkown
page read and write
9B18000
unkown
page read and write
E1E7000
unkown
page read and write
67D000
heap
page read and write
D630000
unkown
page read and write
13201D74000
heap
page read and write
9B3C000
unkown
page read and write
7FF537D88000
unkown
page readonly
7FF538377000
unkown
page readonly
1946B8EA000
heap
page read and write
662000
heap
page read and write
7FF537EA8000
unkown
page readonly
67D000
heap
page read and write
D8D8000
unkown
page read and write
69B000
heap
page read and write
493A000
heap
page read and write
444000
unkown
page readonly
24BA75A5000
heap
page read and write
10C67000
unkown
page read and write
7FF538593000
unkown
page readonly
270DB8A3000
heap
page read and write
F0D0000
unkown
page read and write
7FF538196000
unkown
page readonly
17F4565B000
heap
page read and write
9B3C000
unkown
page read and write
B7F0000
unkown
page read and write
662000
heap
page read and write
2D10000
trusted library allocation
page read and write
E1EE000
unkown
page read and write
5EA000
unkown
page execute read
E920000
unkown
page readonly
69B000
heap
page read and write
69B000
heap
page read and write
12F0000
unkown
page read and write
C78A000
unkown
page read and write
67D000
heap
page read and write
270DC202000
trusted library allocation
page read and write
DAC2000
unkown
page read and write
E1E2000
unkown
page read and write
7FF537FBE000
unkown
page readonly
7FF537B7B000
unkown
page readonly
7FF537E95000
unkown
page readonly
9C58000
unkown
page read and write
10D2E000
unkown
page read and write
7FF53833B000
unkown
page readonly
132017A0000
heap
page read and write
C6C5000
unkown
page read and write
132015F6000
heap
page read and write
CDAD000
unkown
page read and write
1100000
unkown
page read and write
C41E000
stack
page read and write
10E68000
unkown
page read and write
D8E2000
unkown
page read and write
1320171D000
heap
page read and write
67D000
heap
page read and write
D9B9000
unkown
page read and write
7FF5385FA000
unkown
page readonly
67D000
heap
page read and write
D8FF000
unkown
page read and write
2BF0000
heap
page read and write
270DB8BF000
heap
page read and write
7FF53780B000
unkown
page readonly
7FF5383C2000
unkown
page readonly
2DC4000
heap
page read and write
67D000
heap
page read and write
10C67000
unkown
page read and write
10C0C000
unkown
page read and write
DD60000
unkown
page read and write
7FF5384FB000
unkown
page readonly
2D10000
trusted library allocation
page read and write
E9DC000
stack
page read and write
7FF538584000
unkown
page readonly
7FF53806B000
unkown
page readonly
7FF5384F2000
unkown
page readonly
2F3F000
heap
page read and write
DBC1000
unkown
page read and write
3610000
unkown
page write copy
69B000
heap
page read and write
3860000
unkown
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
DCDF000
unkown
page read and write
4D50000
unkown
page read and write
132016C6000
heap
page read and write
7FF538127000
unkown
page readonly
9F93000
unkown
page read and write
67D000
heap
page read and write
28DD000
stack
page read and write
662000
heap
page read and write
2D10000
trusted library allocation
page read and write
2DC4000
heap
page read and write
7FF538127000
unkown
page readonly
DBE4000
unkown
page read and write
D903000
unkown
page read and write
2C30000
unkown
page read and write
270DB8C3000
heap
page read and write
67D000
heap
page read and write
371D000
direct allocation
page execute and read and write
9F90000
unkown
page read and write
CDEC000
unkown
page read and write
4C35000
unkown
page read and write
662000
heap
page read and write
E1F3000
unkown
page read and write
9BB5000
unkown
page read and write
DBF1000
unkown
page read and write
7FF5379FB000
unkown
page readonly
7FF5379E2000
unkown
page readonly
7FF53847C000
unkown
page readonly
270DB8BF000
heap
page read and write
E12D000
stack
page read and write
C6DE000
unkown
page read and write
270DB8B5000
heap
page read and write
13201DD1000
heap
page read and write
7FF538371000
unkown
page readonly
67D000
heap
page read and write
34ACC000
heap
page read and write
10D8E000
unkown
page read and write
E1EE000
unkown
page read and write
9CD6000
unkown
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
C593000
unkown
page read and write
7FF538087000
unkown
page readonly
13201D96000
heap
page read and write
C6F7000
unkown
page read and write
4C80000
unkown
page read and write
7FF5378C5000
unkown
page readonly
CD59000
unkown
page read and write
67D000
heap
page read and write
10D20000
unkown
page read and write
10F44000
unkown
page read and write
270DB8BF000
heap
page read and write
19A000
stack
page read and write
C61D000
unkown
page read and write
13201DAF000
heap
page read and write
34AF0000
trusted library allocation
page read and write
2C70000
unkown
page readonly
A8A8000
unkown
page read and write
662000
heap
page read and write
7FF538505000
unkown
page readonly
D948000
unkown
page read and write
308F000
stack
page read and write
7FF537D88000
unkown
page readonly
CDFF000
unkown
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
DB3E000
unkown
page read and write
7FF537D8B000
unkown
page readonly
D9CE000
unkown
page read and write
10D8E000
unkown
page read and write
7FF53826C000
unkown
page readonly
E1B0000
unkown
page read and write
34270000
direct allocation
page read and write
69B000
heap
page read and write
270DB8BF000
heap
page read and write
34230000
direct allocation
page read and write
2AF0000
unkown
page readonly
CDFF000
unkown
page read and write
2E90000
trusted library allocation
page read and write
7FF5384CA000
unkown
page readonly
176D000
remote allocation
page execute and read and write
67D000
heap
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
6AA39FE000
stack
page read and write
10BD5000
unkown
page read and write
662000
heap
page read and write
132016A4000
heap
page read and write
7FF538527000
unkown
page readonly
2F4A000
heap
page read and write
6AA3BFA000
stack
page read and write
1946B88B000
heap
page read and write
69B000
heap
page read and write
7FF538243000
unkown
page readonly
1946B936000
heap
page read and write
11F0000
unkown
page read and write
D8E4000
unkown
page read and write
CD8C000
unkown
page read and write
662000
heap
page read and write
C61D000
unkown
page read and write
C6B8000
unkown
page read and write
7FF53858F000
unkown
page readonly
4C9B000
heap
page read and write
7FF538611000
unkown
page readonly
662000
heap
page read and write
2450000
heap
page read and write
1A1AEF9000
stack
page read and write
CD3B000
unkown
page read and write
7FF538605000
unkown
page readonly
10D2E000
unkown
page read and write
4C33000
unkown
page read and write
13201D6D000
heap
page read and write
10BD4000
unkown
page read and write
E02E000
stack
page read and write
3760000
unkown
page readonly
7FF5384B3000
unkown
page readonly
BF20000
unkown
page read and write
2D10000
trusted library allocation
page read and write
4CAA000
unkown
page read and write
2D10000
trusted library allocation
page read and write
9A34000
unkown
page read and write
2F43000
heap
page read and write
7FF538574000
unkown
page readonly
42B000
unkown
page read and write
7FF53848C000
unkown
page readonly
10F60000
unkown
page read and write
CE03000
unkown
page read and write
7FF537C80000
unkown
page readonly
24BA7589000
heap
page read and write
9CBB000
unkown
page read and write
270DB670000
heap
page read and write
7FF537C87000
unkown
page readonly
662000
heap
page read and write
10B9C000
unkown
page read and write
34AC0000
trusted library allocation
page read and write
7FF538293000
unkown
page readonly
69B000
heap
page read and write
69B000
heap
page read and write
B7F0000
unkown
page read and write
7FF5383C5000
unkown
page readonly
5A81000
unkown
page read and write
557A000
unkown
page read and write
67D000
heap
page read and write
4981000
trusted library allocation
page execute and read and write
9BB2000
unkown
page read and write
DC5D000
unkown
page read and write
E729000
stack
page read and write
7FF5384DF000
unkown
page readonly
69B000
heap
page read and write
662000
heap
page read and write
270DB8BF000
heap
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
132016CE000
heap
page read and write
CD93000
unkown
page read and write
D8D6000
unkown
page read and write
35A3000
unkown
page read and write
D89D000
unkown
page read and write
D9BD000
unkown
page read and write
CD93000
unkown
page read and write
7FF538398000
unkown
page readonly
DAF6000
unkown
page read and write
2FE56E95000
heap
page read and write
69B000
heap
page read and write
2FE56BFF000
heap
page read and write
270DB853000
heap
page read and write
270DB8BF000
heap
page read and write
92302FB000
stack
page read and write
7FF537AA2000
unkown
page readonly
7FF53859F000
unkown
page readonly
7FF521AD4000
unkown
page readonly
69B000
heap
page read and write
5594000
unkown
page read and write
7FF538320000
unkown
page readonly
13201D73000
heap
page read and write
10C1A000
unkown
page read and write
662000
heap
page read and write
E5AE000
stack
page read and write
10C8F000
unkown
page read and write
132016C1000
heap
page read and write
7FF538464000
unkown
page readonly
D7B8000
unkown
page read and write
7FF538213000
unkown
page readonly
DE40000
unkown
page read and write
C6E1000
unkown
page read and write
DD7A000
unkown
page read and write
CDE5000
unkown
page read and write
10BCD000
unkown
page read and write
4CAD000
direct allocation
page execute and read and write
13201D60000
heap
page read and write
9DA0000
unkown
page readonly
69B000
heap
page read and write
2E90000
trusted library allocation
page read and write
10C2C000
unkown
page read and write
9CCE000
unkown
page read and write
69B000
heap
page read and write
CD94000
unkown
page read and write
69B000
heap
page read and write
13201DD1000
heap
page read and write
D940000
unkown
page read and write
3246000
heap
page read and write
4B92000
unkown
page read and write
7FF537DD0000
unkown
page readonly
1BA5ADC0000
heap
page read and write
7FF537E69000
unkown
page readonly
7FF537EAC000
unkown
page readonly
7FF537DF4000
unkown
page readonly
132016CC000
heap
page read and write
17F45570000
heap
page read and write
C6ED000
unkown
page read and write
CD8C000
unkown
page read and write
A14E000
stack
page read and write
17F458F0000
heap
page read and write
13201E24000
heap
page read and write
7FF53815D000
unkown
page readonly
2FE56BD0000
heap
page read and write
3529C000
heap
page read and write
C580000
unkown
page readonly
13201DF8000
heap
page read and write
2B28000
heap
page read and write
10D8E000
unkown
page read and write
67D000
heap
page read and write
10C2C000
unkown
page read and write
D948000
unkown
page read and write
CDC7000
unkown
page read and write
AE59000
stack
page read and write
662000
heap
page read and write
69B000
heap
page read and write
10D75000
unkown
page read and write
4A3E000
stack
page read and write
13201DE3000
heap
page read and write
7FF537B81000
unkown
page readonly
350F0000
direct allocation
page execute and read and write
270DB872000
heap
page read and write
F0F0000
unkown
page read and write
C5D2000
unkown
page read and write
D670000
unkown
page read and write
4D30000
unkown
page read and write
10C8E000
unkown
page read and write
EA25000
unkown
page read and write
34840000
heap
page read and write
10BDF000
unkown
page read and write
2AF0000
unkown
page readonly
270DB8BF000
heap
page read and write
132016F6000
heap
page read and write
5591000
unkown
page read and write
13201D8F000
heap
page read and write
10020000
trusted library allocation
page read and write
2DC4000
heap
page read and write
4B1D000
direct allocation
page execute and read and write
67D000
heap
page read and write
7FF5385ED000
unkown
page readonly
592F000
unkown
page read and write
9ABE000
unkown
page read and write
67D000
heap
page read and write
3200000
unkown
page read and write
2F46000
heap
page read and write
69B000
heap
page read and write
B95000
stack
page read and write
17F45659000
heap
page read and write
69B000
heap
page read and write
7FF53836D000
unkown
page readonly
7DF444F21000
unkown
page execute read
E42E000
stack
page read and write
DBC1000
unkown
page read and write
DABC000
unkown
page read and write
4811000
heap
page read and write
13201DCC000
heap
page read and write
10F26000
unkown
page read and write
E1E6000
unkown
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
13201DA7000
heap
page read and write
69B000
heap
page read and write
2CD0000
heap
page read and write
7FF537C40000
unkown
page readonly
132017AE000
heap
page read and write
1946C7F0000
trusted library allocation
page read and write
270DB8BF000
heap
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
DAF6000
unkown
page read and write
4D10000
unkown
page read and write
662000
heap
page read and write
C5C8000
unkown
page read and write
4CBA000
unkown
page read and write
E8F0000
unkown
page readonly
D9E7000
unkown
page read and write
4BAD000
unkown
page read and write
3568000
unkown
page read and write
69B000
heap
page read and write
7FF53825A000
unkown
page readonly
F150000
unkown
page read and write
DA88000
unkown
page read and write
13201712000
heap
page read and write
C6D1000
unkown
page read and write
13201680000
heap
page read and write
7FF538436000
unkown
page readonly
7FF53824B000
unkown
page readonly
67D000
heap
page read and write
67D000
heap
page read and write
D9D9000
unkown
page read and write
7FF538457000
unkown
page readonly
13201DAC000
heap
page read and write
662000
heap
page read and write
13703000
unkown
page read and write
67D000
heap
page read and write
132015ED000
heap
page read and write
D8ED000
unkown
page read and write
7FF5385E2000
unkown
page readonly
13201DD1000
heap
page read and write
D922000
unkown
page read and write
10D8E000
unkown
page read and write
DABC000
unkown
page read and write
7FF5383F2000
unkown
page readonly
69B000
heap
page read and write
2D10000
trusted library allocation
page read and write
EF4000
heap
page read and write
2B40000
unkown
page readonly
D940000
unkown
page read and write
2D10000
trusted library allocation
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
2DC4000
heap
page read and write
2B40000
unkown
page readonly
5768000
unkown
page read and write
BF1000
unkown
page readonly
DD7A000
unkown
page read and write
4C9B000
heap
page read and write
2F4A000
heap
page read and write
10E63000
unkown
page read and write
7FF5383CB000
unkown
page readonly
4D10000
unkown
page read and write
10F26000
unkown
page read and write
7FF53837A000
unkown
page readonly
695000
heap
page read and write
4B50000
unkown
page read and write
CD93000
unkown
page read and write
132015D9000
heap
page read and write
DBF1000
unkown
page read and write
10D6D000
unkown
page read and write
67D000
heap
page read and write
98F4000
unkown
page read and write
7FF5384B8000
unkown
page readonly
67D000
heap
page read and write
10F44000
unkown
page read and write
10BEB000
unkown
page read and write
10DBC000
unkown
page read and write
9ABE000
unkown
page read and write
2D10000
trusted library allocation
page read and write
E30000
heap
page read and write
DCE6000
unkown
page read and write
270DB872000
heap
page read and write
69B000
heap
page read and write
7FF537D12000
unkown
page readonly
BB00000
unkown
page read and write
C613000
unkown
page read and write
4C50000
unkown
page read and write
7FF537F0C000
unkown
page readonly
132012E0000
heap
page read and write
17F45621000
heap
page read and write
7FF537BA0000
unkown
page readonly
662000
heap
page read and write
1088000
stack
page read and write
E32D000
stack
page read and write
5EE000
unkown
page execute read
38D0000
unkown
page read and write
4C50000
unkown
page read and write
D8F1000
unkown
page read and write
557A000
unkown
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
7FF5379BC000
unkown
page readonly
69B000
heap
page read and write
D42D000
stack
page read and write
495000
heap
page read and write
270DB829000
heap
page read and write
9CEA000
unkown
page read and write
10B80000
unkown
page read and write
10C67000
unkown
page read and write
E1EC000
unkown
page read and write
F070000
unkown
page read and write
D8CA000
unkown
page read and write
7FF537AF9000
unkown
page readonly
10F4E000
unkown
page read and write
5646000
unkown
page read and write
10C95000
unkown
page read and write
67D000
heap
page read and write
10BDB000
unkown
page read and write
1BA5AB20000
heap
page read and write
4B5D000
unkown
page read and write
24BA7554000
heap
page read and write
7FF537BAD000
unkown
page readonly
13201D68000
heap
page read and write
10D75000
unkown
page read and write
7DF444F51000
unkown
page execute read
7FF521ADE000
unkown
page readonly
5646000
unkown
page read and write
7FF538299000
unkown
page readonly
DCC5000
unkown
page read and write
662000
heap
page read and write
7FF53840F000
unkown
page readonly
7FF5385A1000
unkown
page readonly
7FF537D92000
unkown
page readonly
662000
heap
page read and write
7FF53831B000
unkown
page readonly
DA88000
unkown
page read and write
69B000
heap
page read and write
BF30000
unkown
page read and write
5FB0000
direct allocation
page read and write
4C64000
heap
page read and write
9CDC000
unkown
page read and write
2F3F000
heap
page read and write
4B9A000
unkown
page read and write
30000
heap
page read and write
10F44000
unkown
page read and write
67D000
heap
page read and write
7FF537EFD000
unkown
page readonly
CDA3000
unkown
page read and write
2BF0000
heap
page read and write
35FD000
unkown
page read and write
10BAD000
unkown
page read and write
69B000
heap
page read and write
7FF5377D2000
unkown
page readonly
11017000
unkown
page read and write
270DB880000
heap
page read and write
7FF5385C4000
unkown
page readonly
662000
heap
page read and write
67D000
heap
page read and write
2DC0000
heap
page read and write
7FF538200000
unkown
page readonly
662000
heap
page read and write
270DB8BF000
heap
page read and write
4ABE000
stack
page read and write
67D000
heap
page read and write
360C000
unkown
page read and write
71000
trusted library allocation
page execute and read and write
4C33000
unkown
page read and write
69B000
heap
page read and write
AC99000
stack
page read and write
69B000
heap
page read and write
1946B8B4000
heap
page read and write
7FF5384D2000
unkown
page readonly
10DB7000
unkown
page read and write
7FF537F0C000
unkown
page readonly
97A0000
unkown
page read and write
10D6D000
unkown
page read and write
CD10000
unkown
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
7FF53828F000
unkown
page readonly
2D10000
trusted library allocation
page read and write
7FF537E94000
unkown
page readonly
1340000
unkown
page readonly
17F45702000
heap
page read and write
7FF537A30000
unkown
page readonly
D9EF000
unkown
page read and write
4EE0000
heap
page read and write
34101000
heap
page read and write
7FF521ADE000
unkown
page readonly
10C95000
unkown
page read and write
270DB8BF000
heap
page read and write
10D8B000
unkown
page read and write
7FF5383FD000
unkown
page readonly
7FF537D12000
unkown
page readonly
270DB8AD000
heap
page read and write
69B000
heap
page read and write
10C8B000
unkown
page read and write
D9F6000
unkown
page read and write
7FF5383AF000
unkown
page readonly
2C11000
unkown
page read and write
662000
heap
page read and write
13201E16000
heap
page read and write
13201DEF000
heap
page read and write
10F2E000
unkown
page read and write
270DB7F0000
unclassified section
page readonly
13746000
unkown
page read and write
69B000
heap
page read and write
C600000
unkown
page read and write
7FF5379C4000
unkown
page readonly
9920000
unkown
page read and write
10D7D000
unkown
page read and write
7FF537D7E000
unkown
page readonly
D8DE000
unkown
page read and write
D9D9000
unkown
page read and write
662000
heap
page read and write
7FF538472000
unkown
page readonly
1320000
unkown
page read and write
D6EC000
unkown
page read and write
67D000
heap
page read and write
DBC9000
unkown
page read and write
69B000
heap
page read and write
CD1E000
unkown
page read and write
D948000
unkown
page read and write
D697000
unkown
page read and write
D940000
unkown
page read and write
7FF537D8E000
unkown
page readonly
9F90000
unkown
page read and write
69B000
heap
page read and write
E56000
heap
page read and write
7FF538398000
unkown
page readonly
662000
heap
page read and write
6405EBB000
stack
page read and write
67D000
heap
page read and write
7FF5383A0000
unkown
page readonly
4C89000
heap
page read and write
9CCE000
unkown
page read and write
29E0000
heap
page read and write
E625000
stack
page read and write
17F4564F000
heap
page read and write
2C40000
unkown
page read and write
10D53000
unkown
page read and write
2B50000
unkown
page readonly
67D000
heap
page read and write
D8C5000
unkown
page read and write
2A20000
heap
page read and write
D9CE000
unkown
page read and write
13201DFA000
heap
page read and write
270DB8AF000
heap
page read and write
7FF537B81000
unkown
page readonly
132016CB000
heap
page read and write
13201D99000
heap
page read and write
3F6D000
remote allocation
page execute and read and write
10C8A000
unkown
page read and write
1320171E000
heap
page read and write
13201709000
heap
page read and write
67D000
heap
page read and write
D9B9000
unkown
page read and write
99AC000
unkown
page read and write
24BA6A40000
heap
page read and write
C781000
unkown
page read and write
662000
heap
page read and write
4C1B000
unkown
page read and write
1946C800000
heap
page readonly
2E90000
trusted library allocation
page read and write
D877000
unkown
page read and write
4B96000
unkown
page read and write
132015F6000
heap
page read and write
67D000
heap
page read and write
10F60000
unkown
page read and write
CDA3000
unkown
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
4CA9000
direct allocation
page execute and read and write
13201D62000
heap
page read and write
7FF537B69000
unkown
page readonly
67D000
heap
page read and write
24BA6A13000
heap
page read and write
13201D9D000
heap
page read and write
2E90000
trusted library allocation
page read and write
10E83000
unkown
page read and write
C06F000
stack
page read and write
2FE56E10000
heap
page read and write
7FF5383FD000
unkown
page readonly
67D000
heap
page read and write
69B000
heap
page read and write
D919000
unkown
page read and write
7FF53828F000
unkown
page readonly
7FF537E69000
unkown
page readonly
2C70000
unkown
page readonly
7FF5385ED000
unkown
page readonly
7DF444F31000
unkown
page execute read
10E5A000
unkown
page read and write
7DF444F00000
unkown
page readonly
4C91000
heap
page read and write
CD8C000
unkown
page read and write
12F0000
unkown
page read and write
2FE56BD8000
heap
page read and write
4CF0000
unkown
page read and write
7FF538352000
unkown
page readonly
7FF537C8B000
unkown
page readonly
7FF537F24000
unkown
page readonly
E5AE000
stack
page read and write
13201510000
heap
page read and write
10C0C000
unkown
page read and write
557F000
unkown
page read and write
4A21000
trusted library allocation
page execute and read and write
DBC9000
unkown
page read and write
98B0000
unkown
page read and write
7FF5380BB000
unkown
page readonly
D534000
unkown
page read and write
10F77000
unkown
page read and write
3504000
stack
page read and write
2D10000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
67D000
heap
page read and write
10C65000
unkown
page read and write
10C2C000
unkown
page read and write
DAF6000
unkown
page read and write
2FE56BFB000
heap
page read and write
67D000
heap
page read and write
10EA4000
unkown
page read and write
A8E0000
heap
page read and write
E82F000
stack
page read and write
2FE56E90000
heap
page read and write
1946B89C000
heap
page read and write
69B000
heap
page read and write
BF30000
unkown
page read and write
D9E3000
unkown
page read and write
D8D6000
unkown
page read and write
7FF5383AC000
unkown
page readonly
D8F9000
unkown
page read and write
7FF537BCF000
unkown
page readonly
2C90000
unkown
page readonly
17F45613000
heap
page read and write
69B000
heap
page read and write
7FF537D0D000
unkown
page readonly
67D000
heap
page read and write
D8DE000
unkown
page read and write
13201698000
heap
page read and write
7FF53843D000
unkown
page readonly
50CF000
unclassified section
page read and write
13201573000
heap
page read and write
10F77000
unkown
page read and write
7FF538605000
unkown
page readonly
7FF5384A9000
unkown
page readonly
67D000
heap
page read and write
E1BD000
unkown
page read and write
34DCD000
unclassified section
page execute and read and write
67D000
heap
page read and write
F358000
stack
page read and write
7DF444F41000
unkown
page execute read
10E47000
unkown
page read and write
10F1B000
unkown
page read and write
7DF444F21000
unkown
page execute read
662000
heap
page read and write
2E90000
trusted library allocation
page read and write
132015D9000
heap
page read and write
270DB8BF000
heap
page read and write
7FF537826000
unkown
page readonly
13201DFC000
heap
page read and write
69B000
heap
page read and write
7FF538413000
unkown
page readonly
69B000
heap
page read and write
D630000
unkown
page read and write
10DBC000
unkown
page read and write
C61A000
unkown
page read and write
570A000
unkown
page read and write
D9D1000
unkown
page read and write
7DF444F40000
unkown
page readonly
D9F3000
unkown
page read and write
67D000
heap
page read and write
CD92000
unkown
page read and write
13201DB2000
heap
page read and write
1946B92F000
heap
page read and write
662000
heap
page read and write
7FF5377B6000
unkown
page readonly
D905000
unkown
page read and write
7FF538556000
unkown
page readonly
DBBF000
unkown
page read and write
7FF537DE8000
unkown
page readonly
13201DA7000
heap
page read and write
F0E0000
unkown
page readonly
91000
trusted library allocation
page execute and read and write
7FF5383F9000
unkown
page readonly
4CAA000
unkown
page read and write
69B000
heap
page read and write
7FF537A2B000
unkown
page readonly
7FF537B4A000
unkown
page readonly
7FF53839C000
unkown
page readonly
10BAD000
unkown
page read and write
7FF5385F6000
unkown
page readonly
69B000
heap
page read and write
5938000
unkown
page read and write
13201696000
heap
page read and write
69B000
heap
page read and write
7FF538439000
unkown
page readonly
10E93000
unkown
page read and write
DCDF000
unkown
page read and write
4C7B000
heap
page read and write
1A1AD7E000
stack
page read and write
340A000
stack
page read and write
1378B000
unkown
page read and write
7FF537826000
unkown
page readonly
2E90000
trusted library allocation
page read and write
69B000
heap
page read and write
36D8000
stack
page read and write
C519000
stack
page read and write
9F10000
unkown
page readonly
2D10000
trusted library allocation
page read and write
10C97000
unkown
page read and write
490000
heap
page read and write
13201DAA000
heap
page read and write
13746000
unkown
page read and write
10E6C000
unkown
page read and write
24BA7592000
heap
page read and write
69B000
heap
page read and write
5EE000
stack
page read and write
10CBE000
unkown
page read and write
4817000
heap
page read and write
7FF537C8B000
unkown
page readonly
4AB0000
trusted library allocation
page read and write
10CD0000
unkown
page read and write
69B000
heap
page read and write
1946B8B1000
heap
page read and write
3472E000
stack
page read and write
3568000
unkown
page read and write
2E90000
trusted library allocation
page read and write
67D000
heap
page read and write
10DBC000
unkown
page read and write
662000
heap
page read and write
67D000
heap
page read and write
7FF537BAD000
unkown
page readonly
24BA6AE6000
heap
page read and write
7FF538505000
unkown
page readonly
DA04000
unkown
page read and write
D922000
unkown
page read and write
D8D8000
unkown
page read and write
A030000
unkown
page read and write
13201D8D000
heap
page read and write
34DD2000
unclassified section
page execute and read and write
67D000
heap
page read and write
CD65000
unkown
page read and write
923047F000
stack
page read and write
9FA0000
unkown
page read and write
67D000
heap
page read and write
7FF53843C000
unkown
page readonly
23CE000
stack
page read and write
D903000
unkown
page read and write
7FF5382FF000
unkown
page readonly
7FF53836D000
unkown
page readonly
69B000
heap
page read and write
7FF538251000
unkown
page readonly
662000
heap
page read and write
E910000
unkown
page readonly
270DB8BF000
heap
page read and write
7FF5385A8000
unkown
page readonly
3299000
stack
page read and write
10C67000
unkown
page read and write
7FF538603000
unkown
page readonly
EDEE000
stack
page read and write
662000
heap
page read and write
D948000
unkown
page read and write
69B000
heap
page read and write
7FF538498000
unkown
page readonly
D9F3000
unkown
page read and write
10DC2000
unkown
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
E920000
unkown
page readonly
A3B3000
unkown
page read and write
E1EB000
unkown
page read and write
24BA7402000
heap
page read and write
10C1D000
unkown
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
7FF537B23000
unkown
page readonly
13703000
unkown
page read and write
2DC4000
heap
page read and write
132015F3000
heap
page read and write
67D000
heap
page read and write
7FF5385E7000
unkown
page readonly
662000
heap
page read and write
D8CA000
unkown
page read and write
9D4A000
unkown
page read and write
2F28000
heap
page read and write
13201D86000
heap
page read and write
662000
heap
page read and write
CD4F000
unkown
page read and write
67D000
heap
page read and write
10E3B000
unkown
page read and write
7FF537CA4000
unkown
page readonly
7FF538482000
unkown
page readonly
9D50000
unkown
page readonly
7FF53855C000
unkown
page readonly
7FF538249000
unkown
page readonly
10C8A000
unkown
page read and write
D778000
unkown
page read and write
D9DD000
unkown
page read and write
1946B950000
heap
page read and write
10BD5000
unkown
page read and write
31A0000
unkown
page readonly
132016FC000
heap
page read and write
7FF538196000
unkown
page readonly
7FF53850A000
unkown
page readonly
10CF4000
unkown
page read and write
662000
heap
page read and write
10F56000
unkown
page read and write
270DB8A1000
heap
page read and write
D87E000
unkown
page read and write
662000
heap
page read and write
2454000
heap
page read and write
92301FB000
stack
page read and write
662000
heap
page read and write
662000
heap
page read and write
10C1D000
unkown
page read and write
ECEC000
stack
page read and write
1946C480000
trusted library allocation
page read and write
10DB4000
unkown
page read and write
270DB8BD000
heap
page read and write
662000
heap
page read and write
13201410000
heap
page read and write
5768000
unkown
page read and write
13201600000
heap
page read and write
4810000
heap
page read and write
34100000
heap
page read and write
270DB883000
heap
page read and write
69B000
heap
page read and write
13201699000
heap
page read and write
1378B000
unkown
page read and write
1BA5ADC5000
heap
page read and write
D905000
unkown
page read and write
400000
unkown
page readonly
67D000
heap
page read and write
13201D75000
heap
page read and write
D4AA000
stack
page read and write
10CF4000
unkown
page read and write
662000
heap
page read and write
270DB8A9000
heap
page read and write
13201698000
heap
page read and write
9930000
unkown
page read and write
662000
heap
page read and write
24BA6A00000
heap
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
3130000
unkown
page readonly
67D000
heap
page read and write
C590000
unkown
page read and write
10BEE000
unkown
page read and write
1320173F000
heap
page read and write
10E6A000
unkown
page read and write
96000
stack
page read and write
80C91FA000
stack
page read and write
B7B1C7C000
stack
page read and write
1340000
unkown
page readonly
7FF538540000
unkown
page readonly
7FF5382FF000
unkown
page readonly
9CBB000
unkown
page read and write
662000
heap
page read and write
662000
heap
page read and write
29DD000
stack
page read and write
4BAE000
stack
page read and write
98A0000
unkown
page read and write
69B000
heap
page read and write
D8F9000
unkown
page read and write
13201E17000
heap
page read and write
10E41000
unkown
page read and write
D534000
unkown
page read and write
13201D67000
heap
page read and write
7DF444F30000
unkown
page readonly
7FF537C87000
unkown
page readonly
401000
unkown
page execute read
662000
heap
page read and write
69B000
heap
page read and write
6AA367B000
stack
page read and write
662000
heap
page read and write
2DC4000
heap
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
4D30000
unkown
page read and write
7FF538266000
unkown
page readonly
2FE56C00000
heap
page read and write
A5E000
stack
page read and write
4E50000
direct allocation
page execute and read and write
FF301BE000
stack
page read and write
10D2A000
unkown
page read and write
D901000
unkown
page read and write
D8C5000
unkown
page read and write
10DB4000
unkown
page read and write
223E000
stack
page read and write
D8ED000
unkown
page read and write
1946B800000
trusted library allocation
page read and write
409000
unkown
page write copy
EEC000
heap
page read and write
7FF53858D000
unkown
page readonly
4C5B000
heap
page read and write
69B000
heap
page read and write
10E6A000
unkown
page read and write
DBC9000
unkown
page read and write
2D10000
trusted library allocation
page read and write
E1DE000
unkown
page read and write
10F0E000
unkown
page read and write
13201573000
heap
page read and write
1A1AFFB000
stack
page read and write
7FF5385A1000
unkown
page readonly
7FF538402000
unkown
page readonly
922FDCB000
stack
page read and write
69B000
heap
page read and write
7FF5384DF000
unkown
page readonly
13201563000
heap
page read and write
67D000
heap
page read and write
24BA758D000
heap
page read and write
7FF537E01000
unkown
page readonly
4B9C000
unkown
page read and write
10E5C000
unkown
page read and write
7FF5383C2000
unkown
page readonly
D8FD000
unkown
page read and write
7FF5383A0000
unkown
page readonly
662000
heap
page read and write
10E47000
unkown
page read and write
2FE56C0C000
heap
page read and write
1946BAA0000
heap
page read and write
DE40000
unkown
page read and write
2F4A000
heap
page read and write
270DB8B7000
heap
page read and write
1100000
unkown
page read and write
662000
heap
page read and write
67D000
heap
page read and write
DAC2000
unkown
page read and write
69B000
heap
page read and write
E228000
unkown
page read and write
7FF5385BB000
unkown
page readonly
662000
heap
page read and write
662000
heap
page read and write
13201DC4000
heap
page read and write
D8D8000
unkown
page read and write
7FF538264000
unkown
page readonly
7FF5381F5000
unkown
page readonly
10CF4000
unkown
page read and write
7FF538450000
unkown
page readonly
10E3D000
unkown
page read and write
69B000
heap
page read and write
D8F1000
unkown
page read and write
67D000
heap
page read and write
10E03000
unkown
page read and write
7DF444F00000
unkown
page readonly
E02E000
stack
page read and write
F069000
stack
page read and write
4BD9000
unkown
page read and write
2F45000
heap
page read and write
CDA7000
unkown
page read and write
69B000
heap
page read and write
7FF538593000
unkown
page readonly
10C65000
unkown
page read and write
E20000
unkown
page read and write
CD1E000
unkown
page read and write
F070000
unkown
page read and write
DB3E000
unkown
page read and write
7FF537D0D000
unkown
page readonly
1374B000
unkown
page read and write
13201606000
heap
page read and write
10C0C000
unkown
page read and write
C0EF000
stack
page read and write
AE0000
heap
page read and write
10E4F000
unkown
page read and write
D8CA000
unkown
page read and write
67D000
heap
page read and write
10DC2000
unkown
page read and write
7FF538430000
unkown
page readonly
CDE5000
unkown
page read and write
D9F3000
unkown
page read and write
67D000
heap
page read and write
2B50000
unkown
page readonly
7FF53828C000
unkown
page readonly
24BA7589000
heap
page read and write
2C20000
unkown
page read and write
662000
heap
page read and write
67D000
heap
page read and write
2D10000
trusted library allocation
page read and write
A248000
stack
page read and write
9CDA000
unkown
page read and write
349BC000
stack
page read and write
662000
heap
page read and write
13201561000
heap
page read and write
7FF537D02000
unkown
page readonly
13201D8D000
heap
page read and write
A34B000
stack
page read and write
67D000
heap
page read and write
D8FF000
unkown
page read and write
69B000
heap
page read and write
7FF537BD2000
unkown
page readonly
1946B8B4000
heap
page read and write
2DC4000
heap
page read and write
E56000
heap
page read and write
D6AA000
unkown
page read and write
A248000
stack
page read and write
D8D6000
unkown
page read and write
136C4000
unkown
page read and write
7FF538280000
unkown
page readonly
11CAB000
unkown
page execute and read and write
D9D1000
unkown
page read and write
7FF537EAF000
unkown
page readonly
24BA7595000
heap
page read and write
3504000
stack
page read and write
10F0000
unkown
page read and write
1BA5ABB8000
heap
page read and write
270DB8AC000
heap
page read and write
4C66000
heap
page read and write
1946B92A000
heap
page read and write
DB8A000
unkown
page read and write
CDE5000
unkown
page read and write
E211000
unkown
page read and write
4811000
heap
page read and write
D6B9000
unkown
page read and write
C5D0000
unkown
page read and write
5A7C000
unkown
page read and write
E910000
unkown
page readonly
7FF538527000
unkown
page readonly
DD60000
unkown
page read and write
10C65000
unkown
page read and write
4C18000
heap
page read and write
2D10000
trusted library allocation
page read and write
C5B5000
unkown
page read and write
1946B935000
heap
page read and write
9CBF000
unkown
page read and write
DC5D000
unkown
page read and write
CD33000
unkown
page read and write
C6EB000
unkown
page read and write
1A1A8DC000
stack
page read and write
7FF537C36000
unkown
page readonly
C0EF000
stack
page read and write
662000
heap
page read and write
7FF537B5A000
unkown
page readonly
D9F6000
unkown
page read and write
7FF5379CD000
unkown
page readonly
7FF537BA7000
unkown
page readonly
DCC5000
unkown
page read and write
10005000
unkown
page readonly
662000
heap
page read and write
348F000
stack
page read and write
7FF53824B000
unkown
page readonly
662000
heap
page read and write
4AB0000
trusted library allocation
page read and write
7FF53825A000
unkown
page readonly
2D10000
trusted library allocation
page read and write
662000
heap
page read and write
D8CA000
unkown
page read and write
1946B8AA000
heap
page read and write
7FF538317000
unkown
page readonly
7FF537EED000
unkown
page readonly
662000
heap
page read and write
2F50000
heap
page read and write
D90C000
unkown
page read and write
132016C1000
heap
page read and write
D6B9000
unkown
page read and write
24BA6A7B000
heap
page read and write
2F4A000
heap
page read and write
13201720000
heap
page read and write
7FF53831B000
unkown
page readonly
7FF521ADA000
unkown
page readonly
662000
heap
page read and write
7E0000
heap
page read and write
30000
heap
page read and write
2F8B000
heap
page read and write
3130000
unkown
page readonly
24BA7270000
trusted library allocation
page read and write
D9F3000
unkown
page read and write
1946BA30000
trusted library allocation
page read and write
D8E2000
unkown
page read and write
59E0000
unkown
page read and write
7FF5385AB000
unkown
page readonly
7FF5379FB000
unkown
page readonly
2E90000
trusted library allocation
page read and write
7FF5377E6000
unkown
page readonly
136C4000
unkown
page read and write
7FF538256000
unkown
page readonly
67D000
heap
page read and write
E3AE000
stack
page read and write
10E66000
unkown
page read and write
4B2E000
stack
page read and write
10C25000
unkown
page read and write
67D000
heap
page read and write
34BEF000
heap
page read and write
360C000
unkown
page read and write
9BD9000
unkown
page read and write
69B000
heap
page read and write
662000
heap
page read and write
17F45656000
heap
page read and write
3510000
unkown
page read and write
DA88000
unkown
page read and write
9ABE000
unkown
page read and write
1946B8AA000
heap
page read and write
662000
heap
page read and write
67D000
heap
page read and write
10003000
unkown
page readonly
662000
heap
page read and write
7FF537E01000
unkown
page readonly
F090000
unkown
page read and write
2FE56BFA000
heap
page read and write
69B000
heap
page read and write
1946B8A8000
heap
page read and write
444000
unkown
page readonly
9B31000
unkown
page read and write
7FF537D8B000
unkown
page readonly
7FF538501000
unkown
page readonly
10D6D000
unkown
page read and write
D8FF000
unkown
page read and write
13201D92000
heap
page read and write
13201DF1000
heap
page read and write
E1F3000
unkown
page read and write
444000
unkown
page readonly
443000
unkown
page read and write
13201681000
heap
page read and write
DCE0000
unkown
page read and write
4970000
trusted library allocation
page execute and read and write
34DA2000
heap
page read and write
2470000
heap
page read and write
10CC3000
unkown
page read and write
13201682000
heap
page read and write
D8F1000
unkown
page read and write
CD3B000
unkown
page read and write
7FF538418000
unkown
page readonly
10E63000
unkown
page read and write
2D10000
trusted library allocation
page read and write
E216000
unkown
page read and write
D8C8000
unkown
page read and write
BF1000
unkown
page readonly
13201D7B000
heap
page read and write
1454D000
stack
page read and write
7FF5377AF000
unkown
page readonly
270DB6E0000
heap
page read and write
24BA6B13000
heap
page read and write
DD60000
unkown
page read and write
CD25000
unkown
page read and write
24BA757C000
heap
page read and write
662000
heap
page read and write
A0C7000
stack
page read and write
9B01000
unkown
page read and write
E1B0000
unkown
page read and write
7FF5382FC000
unkown
page readonly
CDEC000
unkown
page read and write
1320000
unkown
page read and write
270DB8AE000
heap
page read and write
13201E1A000
heap
page read and write
3860000
unkown
page read and write
7FF538450000
unkown
page readonly
CD13000
unkown
page read and write
7FF538413000
unkown
page readonly
4B5D000
unkown
page read and write
C78A000
unkown
page read and write
270DB8A7000
heap
page read and write
4B7F000
unkown
page read and write
E8F0000
unkown
page readonly
34101000
heap
page read and write
A66D000
stack
page read and write
CDCE000
unkown
page read and write
D905000
unkown
page read and write
CDA3000
unkown
page read and write
7FF538461000
unkown
page readonly
4C80000
unkown
page read and write
69B000
heap
page read and write
A2CE000
stack
page read and write
4C2F000
unkown
page read and write
7FF5383AF000
unkown
page readonly
10E89000
unkown
page read and write
2C80000
heap
page read and write
270DB8BF000
heap
page read and write
7FF537BCA000
unkown
page readonly
4AFC000
heap
page read and write
D9B9000
unkown
page read and write
7FF537CAA000
unkown
page readonly
7FF53851C000
unkown
page readonly
7FF537EED000
unkown
page readonly
7FF53848C000
unkown
page readonly
DD34000
unkown
page read and write
CD35000
unkown
page read and write
7FF5384FB000
unkown
page readonly
69B000
heap
page read and write
69B000
heap
page read and write
1946B884000
heap
page read and write
2F50000
heap
page read and write
13201D9C000
heap
page read and write
DA3B000
unkown
page read and write
DC69000
unkown
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
D9D9000
unkown
page read and write
7FF537EAF000
unkown
page readonly
67D000
heap
page read and write
5570000
unkown
page read and write
1BA5AC16000
heap
page read and write
662000
heap
page read and write
7FF538618000
unkown
page readonly
7FF537E33000
unkown
page readonly
D6F7000
unkown
page read and write
13201DFA000
heap
page read and write
7FF537FC1000
unkown
page readonly
9BB2000
unkown
page read and write
662000
heap
page read and write
13201DB5000
heap
page read and write
13201E24000
heap
page read and write
1330000
heap
page read and write
69B000
heap
page read and write
7FF538352000
unkown
page readonly
10D8E000
unkown
page read and write
67D000
heap
page read and write
67D000
heap
page read and write
7FF537EAC000
unkown
page readonly
7FF53826C000
unkown
page readonly
13201E23000
heap
page read and write
E625000
stack
page read and write
D877000
unkown
page read and write
DCC5000
unkown
page read and write
662000
heap
page read and write
4E4C000
direct allocation
page execute and read and write
7FF537B7A000
unkown
page readonly
17F45640000
heap
page read and write
662000
heap
page read and write
13201D9D000
heap
page read and write
7FF538603000
unkown
page readonly
132015D6000
heap
page read and write
10F58000
unkown
page read and write
7FF5385CF000
unkown
page readonly
4C2F000
unkown
page read and write
1946BAB0000
trusted library allocation
page read and write
7FF53828C000
unkown
page readonly
7FF5384B8000
unkown
page readonly
C39D000
stack
page read and write
2E90000
trusted library allocation
page read and write
9BB5000
unkown
page read and write
450000
heap
page read and write
7FF53837A000
unkown
page readonly
10C99000
unkown
page read and write
10D98000
unkown
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
DC5D000
unkown
page read and write
7FF53858F000
unkown
page readonly
7FF53847C000
unkown
page readonly
DD34000
unkown
page read and write
67D000
heap
page read and write
7FF538544000
unkown
page readonly
1320175C000
heap
page read and write
5F2000
unkown
page execute read
662000
heap
page read and write
9CE1000
unkown
page read and write
10CC3000
unkown
page read and write
9920000
unkown
page read and write
69B000
heap
page read and write
DA3B000
unkown
page read and write
84C000
stack
page read and write
7FF53858D000
unkown
page readonly
D922000
unkown
page read and write
DCFC000
unkown
page read and write
2D10000
trusted library allocation
page read and write
7FF538637000
unkown
page readonly
69B000
heap
page read and write
AD16000
system
page execute and read and write
7FF537820000
unkown
page readonly
7FF538492000
unkown
page readonly
2BFA000
heap
page read and write
BFEB000
stack
page read and write
67D000
heap
page read and write
662000
heap
page read and write
7FF537C36000
unkown
page readonly
10D9C000
unkown
page read and write
7FF53853C000
unkown
page readonly
7FF537B98000
unkown
page readonly
7FF53855A000
unkown
page readonly
31F0000
unkown
page read and write
270DB8BF000
heap
page read and write
7FF5377AF000
unkown
page readonly
D90C000
unkown
page read and write
7FF5377E6000
unkown
page readonly
7DF444F41000
unkown
page execute read
AA40000
unkown
page readonly
10DC6000
unkown
page read and write
270DB872000
heap
page read and write
7FF537B71000
unkown
page readonly
10C1D000
unkown
page read and write
D8E2000
unkown
page read and write
7FF538471000
unkown
page readonly
10D75000
unkown
page read and write
132015BE000
heap
page read and write
13201D95000
heap
page read and write
132016FF000
heap
page read and write
A3B3000
unkown
page read and write
69B000
heap
page read and write
662000
heap
page read and write
9CDC000
unkown
page read and write
4C1B000
unkown
page read and write
AA40000
unkown
page readonly
D6AA000
unkown
page read and write
10D0D000
unkown
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
10E9E000
unkown
page read and write
4C35000
unkown
page read and write
13A86000
system
page read and write
7FF537C3E000
unkown
page readonly
67D000
heap
page read and write
662000
heap
page read and write
7FF53851C000
unkown
page readonly
10C0C000
unkown
page read and write
7FF537A27000
unkown
page readonly
10DC5000
unkown
page read and write
4B9A000
unkown
page read and write
2DC4000
heap
page read and write
13C7F000
system
page read and write
69B000
heap
page read and write
7FF538515000
unkown
page readonly
1A1ADFE000
stack
page read and write
80C9179000
stack
page read and write
1946B859000
heap
page read and write
7FF53806D000
unkown
page readonly
34101000
heap
page read and write
662000
heap
page read and write
D9DD000
unkown
page read and write
7FF538157000
unkown
page readonly
270DB8B3000
heap
page read and write
69B000
heap
page read and write
9D50000
unkown
page readonly
10C67000
unkown
page read and write
67D000
heap
page read and write
CD4F000
unkown
page read and write
7FF538600000
unkown
page readonly
132015BE000
heap
page read and write
1946B8B4000
heap
page read and write
7FF538457000
unkown
page readonly
4C90000
unkown
page readonly
662000
heap
page read and write
67D000
heap
page read and write
10C8F000
unkown
page read and write
69B000
heap
page read and write
14DBD000
stack
page read and write
7FF53844C000
unkown
page readonly
1946B6A0000
heap
page read and write
13782000
unkown
page read and write
FF3013A000
stack
page read and write
7FF537C49000
unkown
page readonly
662000
heap
page read and write
CD35000
unkown
page read and write
67D000
heap
page read and write
132016CF000
heap
page read and write
24BA7594000
heap
page read and write
1320173E000
heap
page read and write
2BF2000
heap
page read and write
216D000
remote allocation
page execute and read and write
17F45621000
heap
page read and write
34ABD000
stack
page read and write
2D10000
trusted library allocation
page read and write
10CA6000
unkown
page read and write
C6ED000
unkown
page read and write
BF1E000
stack
page read and write
7FF5385C4000
unkown
page readonly
69B000
heap
page read and write
98A0000
unkown
page read and write
CDA3000
unkown
page read and write
7FF538600000
unkown
page readonly
7DF547345000
unkown
page readonly
270DB874000
heap
page read and write
10C97000
unkown
page read and write
E7AA000
stack
page read and write
9B7B000
unkown
page read and write
13201D61000
heap
page read and write
6405FBF000
stack
page read and write
551D000
direct allocation
page execute and read and write
67D000
heap
page read and write
2C43000
unkown
page read and write
17F45602000
heap
page read and write
69B000
heap
page read and write
80C927F000
stack
page read and write
7FF5383D4000
unkown
page readonly
1946B8C0000
heap
page read and write
10E41000
unkown
page read and write
9B7B000
unkown
page read and write
22C0000
heap
page read and write
DBF1000
unkown
page read and write
662000
heap
page read and write
7FF538249000
unkown
page readonly
D922000
unkown
page read and write
2DC4000
heap
page read and write
7FF53840F000
unkown
page readonly
CD38000
unkown
page read and write
7FF538464000
unkown
page readonly
697000
heap
page read and write
270DB8BF000
heap
page read and write
13201E14000
heap
page read and write
7FF537820000
unkown
page readonly
69B000
heap
page read and write
C49E000
stack
page read and write
356D000
remote allocation
page execute and read and write
69B000
heap
page read and write
69B000
heap
page read and write
CD10000
unkown
page read and write
649000
unkown
page execute read
1946B8B1000
heap
page read and write
17F45664000
heap
page read and write
1323000
unkown
page read and write
662000
heap
page read and write
DD1C000
unkown
page read and write
662000
heap
page read and write
4AE0000
heap
page read and write
67D000
heap
page read and write
400000
unkown
page readonly
1946B9C0000
heap
page read and write
C580000
unkown
page readonly
67D000
heap
page read and write
10DC6000
unkown
page read and write
7DF547345000
unkown
page readonly
7FF537D7B000
unkown
page readonly
67D000
heap
page read and write
662000
heap
page read and write
E211000
unkown
page read and write
69B000
heap
page read and write
4A7E000
stack
page read and write
CDDF000
unkown
page read and write
4B96000
unkown
page read and write
662000
heap
page read and write
7FF53839C000
unkown
page readonly
10E03000
unkown
page read and write
10001000
unkown
page execute read
E38000
heap
page read and write
662000
heap
page read and write
2D10000
trusted library allocation
page read and write
7FF537BA9000
unkown
page readonly
695000
heap
page read and write
5E8000
unkown
page execute read
7DF444F40000
unkown
page readonly
B95000
stack
page read and write
1270000
unkown
page readonly
4ED6000
unclassified section
page read and write
662000
heap
page read and write
270DB8BF000
heap
page read and write
7FF537EC4000
unkown
page readonly
80C8C8B000
stack
page read and write
F100000
heap
page read and write
132015D5000
heap
page read and write
407000
unkown
page readonly
67D000
heap
page read and write
67D000
heap
page read and write
2B6D000
remote allocation
page execute and read and write
9A34000
unkown
page read and write
401000
unkown
page execute read
DB8A000
unkown
page read and write
662000
heap
page read and write
DA88000
unkown
page read and write
7FF537BDC000
unkown
page readonly
9B01000
unkown
page read and write
D773000
unkown
page read and write
10DB7000
unkown
page read and write
10D2E000
unkown
page read and write
A6EC000
stack
page read and write
7FF538317000
unkown
page readonly
7FF5385BB000
unkown
page readonly
D9F6000
unkown
page read and write
7FF537B5F000
unkown
page readonly
EA25000
unkown
page read and write
1946B8AA000
heap
page read and write
DBE4000
unkown
page read and write
C5D0000
unkown
page read and write
7FF537D7E000
unkown
page readonly
D6EC000
unkown
page read and write
9CD6000
unkown
page read and write
67D000
heap
page read and write
D8F9000
unkown
page read and write
662000
heap
page read and write
CDFF000
unkown
page read and write
7FF53845C000
unkown
page readonly
2E90000
trusted library allocation
page read and write
67D000
heap
page read and write
4BD9000
unkown
page read and write
69B000
heap
page read and write
270DB8BF000
heap
page read and write
2D10000
trusted library allocation
page read and write
24BA7543000
heap
page read and write
BE0000
unkown
page readonly
7FF5384CA000
unkown
page readonly
662000
heap
page read and write
7FF538574000
unkown
page readonly
662000
heap
page read and write
13201D85000
heap
page read and write
7FF53855C000
unkown
page readonly
9B18000
unkown
page read and write
DDB3000
unkown
page read and write
7FF5381DE000
unkown
page readonly
7FF5377FB000
unkown
page readonly
1374B000
unkown
page read and write
9CDA000
unkown
page read and write
DC5D000
unkown
page read and write
67D000
heap
page read and write
9B01000
unkown
page read and write
C5CC000
unkown
page read and write
69B000
heap
page read and write
DBBF000
unkown
page read and write
7FF5385C9000
unkown
page readonly
E0AB000
stack
page read and write
2E90000
trusted library allocation
page read and write
D89D000
unkown
page read and write
10C8F000
unkown
page read and write
69B000
heap
page read and write
7FF53859B000
unkown
page readonly
DAC2000
unkown
page read and write
662000
heap
page read and write
24BA758F000
heap
page read and write
662000
heap
page read and write
7FF5381E6000
unkown
page readonly
1946B8B1000
heap
page read and write
7FF5385A8000
unkown
page readonly
4A10000
trusted library allocation
page execute and read and write
662000
heap
page read and write
67D000
heap
page read and write
7FF537C80000
unkown
page readonly
7FF538027000
unkown
page readonly
7FF538567000
unkown
page readonly
13201D70000
heap
page read and write
1320154B000
heap
page read and write
1320169D000
heap
page read and write
D9CE000
unkown
page read and write
7FF538402000
unkown
page readonly
5570000
unkown
page read and write
DBC1000
unkown
page read and write
80C90FE000
stack
page read and write
10000000
unkown
page readonly
17F458E0000
unclassified section
page readonly
3476E000
stack
page read and write
270DB851000
heap
page read and write
67D000
heap
page read and write
10C7D000
unkown
page read and write
67D000
heap
page read and write
7FF5383D4000
unkown
page readonly
CDFF000
unkown
page read and write
2D10000
trusted library allocation
page read and write
C218000
stack
page read and write
24BA759A000
heap
page read and write
13201D88000
heap
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
4C7E000
heap
page read and write
10C97000
unkown
page read and write
67D000
heap
page read and write
7FF537AC1000
unkown
page readonly
346EB000
stack
page read and write
662000
heap
page read and write
7FF5379B0000
unkown
page readonly
69B000
heap
page read and write
A44E000
stack
page read and write
401000
unkown
page execute read
7FF53854C000
unkown
page readonly
AD28000
system
page execute and read and write
D8DE000
unkown
page read and write
69B000
heap
page read and write
CDDF000
unkown
page read and write
E1D1000
unkown
page read and write
10E83000
unkown
page read and write
7FF5383F2000
unkown
page readonly
D8E4000
unkown
page read and write
13201DD2000
heap
page read and write
7FF5385FA000
unkown
page readonly
2C30000
unkown
page read and write
2FE56BED000
heap
page read and write
10F77000
unkown
page read and write
D28C000
stack
page read and write
10F4E000
unkown
page read and write
7FF537D10000
unkown
page readonly
35297000
heap
page read and write
E1E2000
unkown
page read and write
13201D74000
heap
page read and write
CDA3000
unkown
page read and write
67D000
heap
page read and write
13201D73000
heap
page read and write
2E90000
trusted library allocation
page read and write
24BA6A76000
heap
page read and write
69B000
heap
page read and write
17F4563C000
heap
page read and write
2D1D000
direct allocation
page execute and read and write
10B80000
unkown
page read and write
69B000
heap
page read and write
270DB8C3000
heap
page read and write
67D000
heap
page read and write
24BA7587000
heap
page read and write
1946BAA5000
heap
page read and write
7FF53850A000
unkown
page readonly
BE0000
unkown
page readonly
662000
heap
page read and write
BE9E000
stack
page read and write
67D000
heap
page read and write
13201DC5000
heap
page read and write
662000
heap
page read and write
240E000
stack
page read and write
CD65000
unkown
page read and write
2D10000
trusted library allocation
page read and write
662000
heap
page read and write
7FF5379C4000
unkown
page readonly
69B000
heap
page read and write
DA04000
unkown
page read and write
BFEB000
stack
page read and write
2C8B000
heap
page read and write
7FF5383BE000
unkown
page readonly
13201D6B000
heap
page read and write
7FF538608000
unkown
page readonly
D773000
unkown
page read and write
98F4000
unkown
page read and write
7FF537EA8000
unkown
page readonly
13201690000
heap
page read and write
D670000
unkown
page read and write
DBC1000
unkown
page read and write
662000
heap
page read and write
67D000
heap
page read and write
13201556000
heap
page read and write
4C70000
unkown
page read and write
7FF538487000
unkown
page readonly
7FF537EDB000
unkown
page readonly
10F58000
unkown
page read and write
E38000
heap
page read and write
3510000
unkown
page read and write
DD1C000
unkown
page read and write
1320169D000
heap
page read and write
7FF5383F9000
unkown
page readonly
CD59000
unkown
page read and write
3466F000
stack
page read and write
9B18000
unkown
page read and write
CDA5000
unkown
page read and write
67D000
heap
page read and write
10D4C000
unkown
page read and write
2BDE000
stack
page read and write
C41E000
stack
page read and write
ED6F000
stack
page read and write
CDEC000
unkown
page read and write
2E50000
heap
page read and write
4C03000
unkown
page read and write
67D000
heap
page read and write
D9CE000
unkown
page read and write
7FF5381DE000
unkown
page readonly
DC69000
unkown
page read and write
C6D4000
unkown
page read and write
2D10000
trusted library allocation
page read and write
67D000
heap
page read and write
132015DE000
heap
page read and write
67D000
heap
page read and write
CD92000
unkown
page read and write
69B000
heap
page read and write
DB3E000
unkown
page read and write
132017A9000
heap
page read and write
CD94000
unkown
page read and write
13201D8D000
heap
page read and write
10D6D000
unkown
page read and write
17F4566F000
heap
page read and write
7FF537DFE000
unkown
page readonly
CD4B000
unkown
page read and write
270DB8BF000
heap
page read and write
31A0000
unkown
page readonly
13201DFA000
heap
page read and write
69B000
heap
page read and write
7FF537EDB000
unkown
page readonly
67D000
heap
page read and write
D877000
unkown
page read and write
566B000
unkown
page read and write
662000
heap
page read and write
2F45000
heap
page read and write
270DB8BF000
heap
page read and write
13201D89000
heap
page read and write
C6EB000
unkown
page read and write
4C10000
heap
page read and write
CD9D000
unkown
page read and write
4BEF000
stack
page read and write
7FF537B8E000
unkown
page readonly
7FF53780A000
unkown
page readonly
7FF5385C9000
unkown
page readonly
DD05000
unkown
page read and write
662000
heap
page read and write
AD18000
system
page execute and read and write
662000
heap
page read and write
67D000
heap
page read and write
7FF537B5A000
unkown
page readonly
7FF538084000
unkown
page readonly
17F45646000
heap
page read and write
69B000
heap
page read and write
10EDE000
unkown
page read and write
1104C000
unkown
page read and write
AE0000
heap
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
DC69000
unkown
page read and write
7FF5377F8000
unkown
page readonly
662000
heap
page read and write
409000
unkown
page write copy
1D0000
unclassified section
page readonly
7FF537EBA000
unkown
page readonly
662000
heap
page read and write
69B000
heap
page read and write
7FF538373000
unkown
page readonly
434000
unkown
page read and write
10D7D000
unkown
page read and write
DBE4000
unkown
page read and write
D901000
unkown
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
7FF538243000
unkown
page readonly
1BA5AAB0000
heap
page read and write
7DF444F51000
unkown
page execute read
2E90000
trusted library allocation
page read and write
D8C5000
unkown
page read and write
7FF537B88000
unkown
page readonly
10F3C000
unkown
page read and write
7FF5379E8000
unkown
page readonly
1946B916000
heap
page read and write
13201E1A000
heap
page read and write
7FF5384EE000
unkown
page readonly
4BAD000
unkown
page read and write
59D3000
unkown
page read and write
139FA000
stack
page read and write
DC69000
unkown
page read and write
69B000
heap
page read and write
D6F7000
unkown
page read and write
DD34000
unkown
page read and write
662000
heap
page read and write
2F41000
heap
page read and write
122E2000
unkown
page read and write
13201DA7000
heap
page read and write
D9B9000
unkown
page read and write
13201561000
heap
page read and write
7DF444F20000
unkown
page readonly
C613000
unkown
page read and write
662000
heap
page read and write
2CD0000
heap
page read and write
95E000
stack
page read and write
10D9C000
unkown
page read and write
D7B8000
unkown
page read and write
67D000
heap
page read and write
7FF538251000
unkown
page readonly
13201D8F000
heap
page read and write
24BA6A93000
heap
page read and write
9B3C000
unkown
page read and write
69B000
heap
page read and write
662000
heap
page read and write
7FF538213000
unkown
page readonly
DBBF000
unkown
page read and write
1BA5ABB0000
heap
page read and write
E1EB000
unkown
page read and write
1397C000
stack
page read and write
270DB8B8000
heap
page read and write
7FF5377DD000
unkown
page readonly
DA3B000
unkown
page read and write
4D20000
unkown
page read and write
4C60000
unkown
page read and write
67D000
heap
page read and write
4C9B000
heap
page read and write
7FF537DD0000
unkown
page readonly
662000
heap
page read and write
31F3000
unkown
page read and write
10D6F000
unkown
page read and write
E729000
stack
page read and write
3850000
unkown
page readonly
4C47000
heap
page read and write
662000
heap
page read and write
139FA000
stack
page read and write
7FF521AD4000
unkown
page readonly
CDA3000
unkown
page read and write
13202331000
heap
page read and write
D30C000
stack
page read and write
13201D8E000
heap
page read and write
24BA7588000
heap
page read and write
662000
heap
page read and write
9910000
unkown
page read and write
69B000
heap
page read and write
7FF537F24000
unkown
page readonly
7FF538436000
unkown
page readonly
2C10000
unclassified section
page readonly
A44E000
stack
page read and write
9D01000
unkown
page read and write
67D000
heap
page read and write
17F45660000
heap
page read and write
4BE1000
unkown
page read and write
662000
heap
page read and write
4CBA000
unkown
page read and write
67D000
heap
page read and write
270DB8BF000
heap
page read and write
10C65000
unkown
page read and write
7FF537B88000
unkown
page readonly
67D000
heap
page read and write
67D000
heap
page read and write
7FF537E87000
unkown
page readonly
69B000
heap
page read and write
DABC000
unkown
page read and write
C6D4000
unkown
page read and write
7FF538200000
unkown
page readonly
64064FF000
stack
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
7FF5379DB000
unkown
page readonly
CDBC000
unkown
page read and write
7FF5385E7000
unkown
page readonly
DA04000
unkown
page read and write
67D000
heap
page read and write
D905000
unkown
page read and write
662000
heap
page read and write
10DB7000
unkown
page read and write
4CA1000
heap
page read and write
10B9C000
unkown
page read and write
D9DD000
unkown
page read and write
662000
heap
page read and write
270DB8BF000
heap
page read and write
270DB8AC000
heap
page read and write
10E5E000
unkown
page read and write
98C0000
unkown
page read and write
10F3C000
unkown
page read and write
7FF53853C000
unkown
page readonly
55BF000
unclassified section
page read and write
CDB3000
unkown
page read and write
10C65000
unkown
page read and write
67D000
heap
page read and write
7FF537D10000
unkown
page readonly
67D000
heap
page read and write
CD46000
unkown
page read and write
5578000
unkown
page read and write
662000
heap
page read and write
7FF53862E000
unkown
page readonly
13799000
unkown
page read and write
10D98000
unkown
page read and write
7FF538264000
unkown
page readonly
662000
heap
page read and write
7FF538424000
unkown
page readonly
C593000
unkown
page read and write
13201DA3000
heap
page read and write
4C1E000
unkown
page read and write
270DB8C1000
heap
page read and write
EF4000
heap
page read and write
7FF537C3E000
unkown
page readonly
C61A000
unkown
page read and write
7FF5383BA000
unkown
page readonly
662000
heap
page read and write
69B000
heap
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
CD46000
unkown
page read and write
662000
heap
page read and write
C39D000
stack
page read and write
1946B883000
heap
page read and write
69B000
heap
page read and write
570A000
unkown
page read and write
C5B5000
unkown
page read and write
DD1C000
unkown
page read and write
C5C8000
unkown
page read and write
1946B914000
heap
page read and write
4C70000
unkown
page read and write
346AE000
stack
page read and write
10C65000
unkown
page read and write
662000
heap
page read and write
13201D65000
heap
page read and write
7FF537C40000
unkown
page readonly
67D000
heap
page read and write
1335000
heap
page read and write
7DF444F01000
unkown
page execute read
CD65000
unkown
page read and write
137C4000
unkown
page read and write
662000
heap
page read and write
69B000
heap
page read and write
585A000
unkown
page read and write
13201DC7000
heap
page read and write
CD59000
unkown
page read and write
69B000
heap
page read and write
7FF538268000
unkown
page readonly
B080000
unkown
page readonly
132017AB000
heap
page read and write
CD65000
unkown
page read and write
7FF5384F2000
unkown
page readonly
CDEC000
unkown
page read and write
7FF538409000
unkown
page readonly
67D000
heap
page read and write
69B000
heap
page read and write
81F000
stack
page read and write
D778000
unkown
page read and write
7FF5380C5000
unkown
page readonly
7FF537D4A000
unkown
page readonly
7FF537B71000
unkown
page readonly
67D000
heap
page read and write
10D8E000
unkown
page read and write
348FE000
stack
page read and write
7FF537B8E000
unkown
page readonly
662000
heap
page read and write
C6C5000
unkown
page read and write
7FF537D92000
unkown
page readonly
13201DF8000
heap
page read and write
2C30000
unclassified section
page readonly
270DB8AF000
heap
page read and write
7FF538501000
unkown
page readonly
67D000
heap
page read and write
9FD0000
unkown
page readonly
10DBC000
unkown
page read and write
270DB913000
heap
page read and write
9FD0000
unkown
page readonly
13201D66000
heap
page read and write
13201DB6000
heap
page read and write
6500000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
35B2000
unkown
page read and write
DCE6000
unkown
page read and write
67D000
heap
page read and write
2B10000
heap
page read and write
7FF5383BE000
unkown
page readonly
7FF53819E000
unkown
page readonly
24BA6AA2000
heap
page read and write
91F000
stack
page read and write
662000
heap
page read and write
662000
heap
page read and write
E1E0000
unkown
page read and write
A1CD000
stack
page read and write
662000
heap
page read and write
24BA6980000
unclassified section
page readonly
10CF4000
unkown
page read and write
9D4A000
unkown
page read and write
D919000
unkown
page read and write
4B2F000
stack
page read and write
7FF537C2D000
unkown
page readonly
2F4F000
unkown
page read and write
3610000
unkown
page write copy
132016D3000
heap
page read and write
17F45662000
heap
page read and write
2C20000
heap
page read and write
D8F1000
unkown
page read and write
132015F6000
heap
page read and write
3060000
heap
page read and write
662000
heap
page read and write
4CCA000
unkown
page read and write
C49E000
stack
page read and write
996D000
unkown
page read and write
662000
heap
page read and write
D9E9000
unkown
page read and write
626000
unkown
page execute read
409000
unkown
page read and write
C06F000
stack
page read and write
10C1A000
unkown
page read and write
24BA758A000
heap
page read and write
7FF5384A9000
unkown
page readonly
7FF537D83000
unkown
page readonly
10C8F000
unkown
page read and write
69B000
heap
page read and write
7FF5380C5000
unkown
page readonly
22C5000
heap
page read and write
7FF5378CD000
unkown
page readonly
9FB0000
unkown
page read and write
9ABE000
unkown
page read and write
270DB8BF000
heap
page read and write
132015F5000
heap
page read and write
13201D74000
heap
page read and write
270DB893000
heap
page read and write
1335000
heap
page read and write
69B000
heap
page read and write
D919000
unkown
page read and write
67D000
heap
page read and write
662000
heap
page read and write
D760000
unkown
page read and write
2870000
heap
page read and write
407000
unkown
page readonly
67D000
heap
page read and write
29EC000
stack
page read and write
DD7A000
unkown
page read and write
2C90000
unkown
page readonly
10E70000
unkown
page read and write
13201D95000
heap
page read and write
A14E000
stack
page read and write
10E96000
unkown
page read and write
2D10000
trusted library allocation
page read and write
CD38000
unkown
page read and write
13201DF9000
heap
page read and write
77C0000
unkown
page read and write | page write combine
4811000
heap
page read and write
270DB88B000
heap
page read and write
34F49000
direct allocation
page execute and read and write
69B000
heap
page read and write
E30000
heap
page read and write
13201E14000
heap
page read and write
98B0000
unkown
page read and write
9BD9000
unkown
page read and write
7FF537B4A000
unkown
page readonly
1104C000
unkown
page read and write
67D000
heap
page read and write
13201D95000
heap
page read and write
7FF5380BB000
unkown
page readonly
4B30000
heap
page read and write
3493F000
stack
page read and write
CDB8000
unkown
page read and write
662000
heap
page read and write
7FF538293000
unkown
page readonly
E6AD000
stack
page read and write
DD05000
unkown
page read and write
17F455D0000
heap
page read and write
62E000
heap
page read and write
10BCD000
unkown
page read and write
7FF537ED6000
unkown
page readonly
4D50000
unkown
page read and write
9F30000
unkown
page readonly
F0F0000
unkown
page read and write
7FF5379BC000
unkown
page readonly
401000
unkown
page execute read
7FF538492000
unkown
page readonly
7FF5383BA000
unkown
page readonly
10D03000
unkown
page read and write
D28C000
stack
page read and write
13201683000
heap
page read and write
D9D1000
unkown
page read and write
77C0000
unkown
page read and write | page write combine
D8C5000
unkown
page read and write
640637C000
stack
page read and write
7FF537AA2000
unkown
page readonly
662000
heap
page read and write
662000
heap
page read and write
13201DDA000
heap
page read and write
69B000
heap
page read and write
7FF538256000
unkown
page readonly
5574000
unkown
page read and write
65D000
heap
page read and write
7FF538498000
unkown
page readonly
10E5C000
unkown
page read and write
D530000
unkown
page read and write
69B000
heap
page read and write
10D94000
unkown
page read and write
662000
heap
page read and write
DBBF000
unkown
page read and write
13201DC2000
heap
page read and write
DE01000
unkown
page read and write
2E90000
trusted library allocation
page read and write
A030000
unkown
page read and write
7FF538637000
unkown
page readonly
662000
heap
page read and write
67D000
heap
page read and write
9F10000
unkown
page readonly
10C97000
unkown
page read and write
13201D68000
heap
page read and write
4C1E000
unkown
page read and write
7FF538611000
unkown
page readonly
17F45614000
heap
page read and write
E7AA000
stack
page read and write
2F20000
heap
page read and write
7FF5379DB000
unkown
page readonly
E20000
unkown
page read and write
1946B89A000
heap
page read and write
16D0000
unkown
page readonly
CDB6000
unkown
page read and write
10BAD000
unkown
page read and write
10CD4000
unkown
page read and write
69B000
heap
page read and write
1320000
unkown
page read and write
1946C810000
trusted library allocation
page read and write
E228000
unkown
page read and write
270DB8C3000
heap
page read and write
DBF1000
unkown
page read and write
662000
heap
page read and write
67D000
heap
page read and write
D778000
unkown
page read and write
34C0B000
unclassified section
page execute and read and write
C6DE000
unkown
page read and write
662000
heap
page read and write
662000
heap
page read and write
10BDE000
unkown
page read and write
36D8000
stack
page read and write
E529000
stack
page read and write
7FF537DE8000
unkown
page readonly
ED6F000
stack
page read and write
67D000
heap
page read and write
D9BD000
unkown
page read and write
C6E1000
unkown
page read and write
CDA3000
unkown
page read and write
7DF444F11000
unkown
page execute read
69B000
heap
page read and write
24BA7588000
heap
page read and write
10DCB000
unkown
page read and write
AC98000
stack
page read and write
662000
heap
page read and write
7FF5385B6000
unkown
page readonly
67D000
heap
page read and write
CD31000
unkown
page read and write
132015D6000
heap
page read and write
CD4F000
unkown
page read and write
69B000
heap
page read and write
11CEA000
unkown
page execute and read and write
34B30000
unclassified section
page execute and read and write
DBC9000
unkown
page read and write
DD1C000
unkown
page read and write
67D000
heap
page read and write
5F70000
direct allocation
page read and write
1946B8FF000
heap
page read and write
4D40000
unkown
page read and write
56F5000
unkown
page read and write
4BE1000
unkown
page read and write
662000
heap
page read and write
7FF537D4A000
unkown
page readonly
2D10000
trusted library allocation
page read and write
7FF5377B6000
unkown
page readonly
10BDA000
unkown
page read and write
5591000
unkown
page read and write
7FF5385B6000
unkown
page readonly
270DB87B000
heap
page read and write
7DF444F30000
unkown
page readonly
7FF5384EE000
unkown
page readonly
7FF537EC4000
unkown
page readonly
7DF444F31000
unkown
page execute read
662000
heap
page read and write
1270000
unkown
page readonly
49CF000
heap
page read and write
D42D000
stack
page read and write
D901000
unkown
page read and write
DE01000
unkown
page read and write
D9DD000
unkown
page read and write
7FF538409000
unkown
page readonly
992000
system
page execute and read and write
10CA6000
unkown
page read and write
923007F000
stack
page read and write
67D000
heap
page read and write
69B000
heap
page read and write
7FF5377B2000
unkown
page readonly
4BF7000
unkown
page read and write
10F0E000
unkown
page read and write
E82F000
stack
page read and write
24BA6A27000
heap
page read and write
10D2A000
unkown
page read and write
11017000
unkown
page read and write
662000
heap
page read and write
69B000
heap
page read and write
662000
heap
page read and write
7FF521ADA000
unkown
page readonly
4CF0000
unkown
page read and write
620000
heap
page read and write
662000
heap
page read and write
24BA6AF3000
heap
page read and write
CD8C000
unkown
page read and write
D640000
unkown
page readonly
7DF444F11000
unkown
page execute read
7FF538342000
unkown
page readonly
7FF5383C5000
unkown
page readonly
69B000
heap
page read and write
24BA68D0000
heap
page read and write
EDEE000
stack
page read and write
67D000
heap
page read and write
10C99000
unkown
page read and write
24BA7580000
heap
page read and write
7FF537AC1000
unkown
page readonly
4BF7000
unkown
page read and write
D8E4000
unkown
page read and write
7FF537BD7000
unkown
page readonly
CDA3000
unkown
page read and write
10C1A000
unkown
page read and write
7FF538325000
unkown
page readonly
557F000
unkown
page read and write
7FF538027000
unkown
page readonly
662000
heap
page read and write
34CB0000
unclassified section
page execute and read and write
67D000
heap
page read and write
13201DD0000
heap
page read and write
7FF538584000
unkown
page readonly
2BF2000
heap
page read and write
1320160B000
heap
page read and write
10DC2000
unkown
page read and write
28BF000
stack
page read and write
132015E1000
heap
page read and write
1946B8D5000
heap
page read and write
D8D6000
unkown
page read and write
2C11000
unkown
page read and write
4C6D000
heap
page read and write
CDFF000
unkown
page read and write
10BD4000
unkown
page read and write
CD3E000
unkown
page read and write
67D000
heap
page read and write
7FF53806B000
unkown
page readonly
7FF538280000
unkown
page readonly
2D10000
trusted library allocation
page read and write
67D000
heap
page read and write
10EB6000
unkown
page read and write
13201600000
heap
page read and write
67D000
heap
page read and write
DD7A000
unkown
page read and write
270DBFF0000
trusted library allocation
page read and write
1946B88F000
heap
page read and write
7FF538024000
unkown
page readonly
2DC4000
heap
page read and write
F090000
unkown
page read and write
7FF53833B000
unkown
page readonly
662000
heap
page read and write
132016ED000
heap
page read and write
D87E000
unkown
page read and write
10C2F000
unkown
page read and write
270DB8B8000
heap
page read and write
7FF5383B5000
unkown
page readonly
67D000
heap
page read and write
BB00000
unkown
page read and write
3517A000
heap
page read and write
7FF537B5F000
unkown
page readonly
C530000
unkown
page readonly
3760000
unkown
page readonly
7FF5385AB000
unkown
page readonly
7FF537B23000
unkown
page readonly
662000
heap
page read and write
D8D8000
unkown
page read and write
69B000
heap
page read and write
270DB8BF000
heap
page read and write
67D000
heap
page read and write
17F46002000
trusted library allocation
page read and write
67D000
heap
page read and write
662000
heap
page read and write
7FF5379CB000
unkown
page readonly
7DF444F20000
unkown
page readonly
CDCB000
unkown
page read and write
FF3047F000
stack
page read and write
3850000
unkown
page readonly
7FF537BCA000
unkown
page readonly
4D00000
unkown
page read and write
C5DE000
unkown
page read and write
24BA75A0000
heap
page read and write
67D000
heap
page read and write
98C0000
unkown
page read and write
7FF538608000
unkown
page readonly
10E66000
unkown
page read and write
D640000
unkown
page readonly
67D000
heap
page read and write
566B000
unkown
page read and write
34C4A000
unclassified section
page execute and read and write
2D10000
trusted library allocation
page read and write
10C97000
unkown
page read and write
DCF6000
unkown
page read and write
2D10000
trusted library allocation
page read and write
1320175B000
heap
page read and write
C781000
unkown
page read and write
7FF538373000
unkown
page readonly
10059000
trusted library allocation
page read and write
13799000
unkown
page read and write
67E000
heap
page read and write
7FF5379E2000
unkown
page readonly
24BA752A000
heap
page read and write
662000
heap
page read and write
11BD0000
unkown
page execute and read and write
662000
heap
page read and write
E529000
stack
page read and write
24BA7573000
heap
page read and write
CD65000
unkown
page read and write
7FF537B18000
unkown
page readonly
D8FF000
unkown
page read and write
662000
heap
page read and write
E1BD000
unkown
page read and write
7FF537EFD000
unkown
page readonly
24BA6940000
heap
page read and write
D9C4000
unkown
page read and write
7DF444F01000
unkown
page execute read
D3A0000
unkown
page readonly
69B000
heap
page read and write
7FF537E88000
unkown
page readonly
69B000
heap
page read and write
67D000
heap
page read and write
662000
heap
page read and write
2E90000
trusted library allocation
page read and write
69B000
heap
page read and write
5927000
unkown
page read and write
7FF53830F000
unkown
page readonly
D38D000
stack
page read and write
69B000
heap
page read and write
67D000
heap
page read and write
132015BE000
heap
page read and write
D89D000
unkown
page read and write
9950000
unkown
page read and write
7FF53806D000
unkown
page readonly
7DF444EF1000
unkown
page execute read
2C50000
unkown
page read and write
9910000
unkown
page read and write
CE03000
unkown
page read and write
C219000
stack
page read and write
24BA7500000
heap
page read and write
67D000
heap
page read and write
7FF537DD8000
unkown
page readonly
270DB813000
heap
page read and write
7FF538591000
unkown
page readonly
69B000
heap
page read and write
270DB8BF000
heap
page read and write
4CCA000
unkown
page read and write
13201DD3000
heap
page read and write
69B000
heap
page read and write
7FF537BD2000
unkown
page readonly
7FF537B69000
unkown
page readonly
67D000
heap
page read and write
D8DE000
unkown
page read and write
697000
heap
page read and write
CDA3000
unkown
page read and write
7FF5380B9000
unkown
page readonly
2D10000
trusted library allocation
page read and write
7FF537CA4000
unkown
page readonly
3250000
heap
page read and write
D8E2000
unkown
page read and write
10C1D000
unkown
page read and write
132017AA000
heap
page read and write
4B92000
unkown
page read and write
10DB4000
unkown
page read and write
270DB800000
heap
page read and write
69B000
heap
page read and write
D9C4000
unkown
page read and write
10F13000
unkown
page read and write
132016CC000
heap
page read and write
13201D84000
heap
page read and write
7DF444F11000
unkown
page execute read
270DB8AC000
heap
page read and write
2E90000
trusted library allocation
page read and write
7FF538342000
unkown
page readonly
1BA5ADD0000
heap
page read and write
7FF537D7B000
unkown
page readonly
662000
heap
page read and write
16D0000
unkown
page readonly
7FF538461000
unkown
page readonly
9CEA000
unkown
page read and write
1946C260000
trusted library allocation
page read and write
BF20000
unkown
page read and write
A8A8000
unkown
page read and write
10C2C000
unkown
page read and write
D8E4000
unkown
page read and write
662000
heap
page read and write
5902000
unkown
page read and write
9A5B000
unkown
page read and write
7FF537EBA000
unkown
page readonly
34CBF000
heap
page read and write
DD60000
unkown
page read and write
69B000
heap
page read and write
56EF000
unkown
page read and write
4AF8000
heap
page read and write
24BA7587000
heap
page read and write
C5CC000
unkown
page read and write
662000
heap
page read and write
7FF53855A000
unkown
page readonly
7FF538567000
unkown
page readonly
10F56000
unkown
page read and write
662000
heap
page read and write
34D9E000
heap
page read and write
CD2B000
unkown
page read and write
7FF5381F5000
unkown
page readonly
7FF5381E6000
unkown
page readonly
662000
heap
page read and write
AD3D000
system
page execute and read and write
13201DC5000
heap
page read and write
9A62000
unkown
page read and write
7FF53845C000
unkown
page readonly
69B000
heap
page read and write
10C1A000
unkown
page read and write
24BA6990000
heap
page read and write
There are 2896 hidden memdumps, click here to show them.