IOC Report
OUTSTANDING_PAYMENT.exe

loading gif

Files

File Path
Type
Category
Malicious
OUTSTANDING_PAYMENT.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\qhcqh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\81EFaKSJ3
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\bpgvtpbkoxw.z
data
dropped
C:\Users\user\AppData\Local\Temp\nsmF14F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\tmjcdbgtyam.ggz
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OUTSTANDING_PAYMENT.exe
C:\Users\user\Desktop\OUTSTANDING_PAYMENT.exe
malicious
C:\Users\user\AppData\Local\Temp\qhcqh.exe
"C:\Users\user\AppData\Local\Temp\qhcqh.exe" C:\Users\user\AppData\Local\Temp\bpgvtpbkoxw.z
malicious
C:\Users\user\AppData\Local\Temp\qhcqh.exe
C:\Users\user\AppData\Local\Temp\qhcqh.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe
malicious

URLs

Name
IP
Malicious
http://www.g2fm.co.uk/0oqq/?ICHyvj5=mrlIldvmtur7mkt/rPLDu6zCaW7pq/FSfCj+/pKGfo5WkxwIgZbXON4VpSp8r5ryJHF0PKr2dhp3lAxH7D3LGu58YX7EcXy0Ow==&qt9TW=60_ljPJoqo6d2
213.171.195.105
malicious
http://www.fanversewallet.com/0oqq/?qt9TW=60_ljPJoqo6d2&ICHyvj5=Yikzj9CFq5vqEc2vNlbzxihd8s3DrMcGxuzxagcCy5X6CzTVIy/a14lT5vlHy5RQ1Z7Px0aDVF6+DD/SwGM+3qMYWad3MBh6/g==
203.245.24.47
malicious
http://www.fanversewallet.com/0oqq/qt9TW=60_ljPJoqo6d2
unknown
malicious
http://www.karlscurry.co.uk/0oqq/
217.160.0.249
malicious
http://www.karlscurry.co.uk/0oqq/?ICHyvj5=/wt4JY4W3l+DpUlEm50j75nj98dXbWC1Jam/Xyx5jEHfTH+E1ePLpr1g8eshFzfVb4/25r9KS6bvXq1NrjcG6ioEuox+na//qA==&qt9TW=60_ljPJoqo6d2
217.160.0.249
malicious
http://www.dirdikyepedia.com/0oqq/?qt9TW=60_ljPJoqo6d2&ICHyvj5=PRQC41TmcI9bvUwILfW251fDqJjDWsulERfzYnlMN4HgHjqryKViH0BFVe/NE6lVKE81tYv052d7aHxIDF6KpDCDELCE9pYayA==
5.181.216.141
malicious
http://www.mynichemarket.co.uk/0oqq/
185.151.30.181
malicious
http://www.glb-mobility.com/0oqq/?ICHyvj5=L0mSdT0ooJoC+WTAff+ZGzvWM+chwjv3Dy0WIeNakQkmi/ixITEkKFHCL0Q8UzGKK5QpSY+AVQ3IyxgaFTuxUTcmK0rro2dEnw==&qt9TW=60_ljPJoqo6d2
88.99.217.197
malicious
http://www.allison2patrick.online/0oqq/
62.4.21.190
malicious
http://www.glb-mobility.com/0oqq/
88.99.217.197
malicious
http://www.g2fm.co.uk/0oqq/
213.171.195.105
malicious
http://www.fanversewallet.com/0oqq/
203.245.24.47
malicious
http://www.landlotto.ru/0oqq/
109.70.26.37
malicious
http://www.dirdikyepedia.com/0oqq/
5.181.216.141
malicious
http://www.gorwly.top/0oqq/
192.64.116.162
malicious
http://www.mynichemarket.co.uk/0oqq/?qt9TW=60_ljPJoqo6d2&ICHyvj5=bPiAqCboB3xuuR9jBd2d5kx4kdlhaJ3zm41TCptSu6I9zHYblFc2aOuFx07ZodW9tNkBHFGkWniHGpAg445zXTdag0fAcLuZfA==
185.151.30.181
malicious
http://www.virginhairweave.co.uk/0oqq/
198.58.118.167
malicious
http://www.landlotto.ru/0oqq/?ICHyvj5=zVtcFUb2erpe1riHNV8x4uTJHdjXeMKlBrPOkTLBlxKebXbCPRW4F79HIT/4WhPpl+5XC4kkcR4ywvq/sd7+lksDMuqQ2YrnfA==&qt9TW=60_ljPJoqo6d2
109.70.26.37
malicious
http://www.hudsonandbailey.uk/0oqq/?ICHyvj5=8lDg7smsrRHQ2qUpjxtX5vXhip5hsKbS8bjyUsS5uXhQwZhytHa5U2zriYWyog0tbgqTaVuvH+VyL3+e5fQfLE/J79Vj0e1H5A==&qt9TW=60_ljPJoqo6d2
199.59.243.223
malicious
http://www.virginhairweave.co.uk/0oqq/?qt9TW=60_ljPJoqo6d2&ICHyvj5=uTgIqe0UraKbEL8bVan9urdYcpPucjhGk2sL3YY9ls8dblQwqoiZoebTO/nXMXVf1qLfWs/b3Kzx4hfR3b8+tPCCgrVHYEBTbA==
198.58.118.167
malicious
http://www.allison2patrick.online/0oqq/?qt9TW=60_ljPJoqo6d2&ICHyvj5=+kFy7HAJLaaTMVi2uF0rU22efsuYGHBQaVugoRnSwIkO/2Cyn5VxSDOnkUbRzJjMahwif1zr/P1d/M6VqUD0f3xgTygnYxnqIA==
62.4.21.190
malicious
http://www.hudsonandbailey.uk/0oqq/
199.59.243.223
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://www.nic.ru/catalog/mail/on-domain/?ipartner=6666&adv_id=click_mail&utm_source=stpg_all&utm_m
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.ty23vip.com/0oqq/
unknown
http://www.ketoibabal.cyou/0oqq/
unknown
https://www.nic.ru/catalog/ssl/
unknown
https://www.nic.ru/catalog/sites/sitebuilder/
unknown
https://www.nic.ru/catalog/domains/ru/
unknown
http://nic.ru/images/w8/win8transp.png
unknown
http://www.hudsonandbailey.uk
unknown
http://www.ty23vip.com/0oqq/qt9TW=60_ljPJoqo6d2
unknown
http://www.glb-mobility.com
unknown
https://www.google.com
unknown
http://nic.ru/
unknown
https://www.nic.ru/catalog/domains/
unknown
http://www.thelastwill.net/0oqq/
unknown
https://www.nic.ru/whois/?searchWord=LANDLOTTO.RU&ipartner=6666&adv_id=whois_info&utm_source=stpg_al
unknown
http://www.thelastwill.net/0oqq/qt9TW=60_ljPJoqo6d2
unknown
http://www.gorwly.top/0oqq/qt9TW=60_ljPJoqo6d2
unknown
https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
unknown
http://www.brennmansoluciones.com
unknown
https://www.nic.ru/catalog/mail/on-domain/
unknown
http://www.karlscurry.co.uk
unknown
https://www.nic.ru/product/mail/forward/?ipartner=6666&adv_id=click_mail_forward&utm_source=stpg_all
unknown
https://www.nic.ru/help/statusnaya-stranica_4785.html?ipartner=6666&adv_id=faq&utm_source=stpg_all&u
unknown
http://www.thelastwill.net
unknown
https://www.nic.ru/catalog/domains/rf/
unknown
http://www.thebang.sbs
unknown
https://www.nic.ru/auction/
unknown
http://www.sexopornoxx.store/0oqq/
unknown
http://www.ty23vip.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.nic.ru/catalog/hosting/dedicated/
unknown
https://www.nic.ru/catalog/sites/sitebuilder/?ipartner=6666&adv_id=click_sitebuild&utm_source=stpg_a
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.nic.ru/catalog/domains/com/
unknown
https://tiao2022.vip:12306/?u=
unknown
https://www.nic.ru/product/for-domain-use/web-forwarding/?ipartner=6666&adv_id=click_domain_forward&
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
unknown
http://www.gorwly.top
unknown
http://www.mynichemarket.co.uk
unknown
http://www.themssterofssuepnse.rest
unknown
http://www.fanversewallet.com
unknown
https://www.nic.ru/opensearch.xml
unknown
http://storage.nic.ru/ru/images/png/1.rc-logo-og.png
unknown
http://www.brennmansoluciones.com/0oqq/qt9TW=60_ljPJoqo6d2
unknown
http://www.karlscurry.co.uk/0oqq/qt9TW=60_ljPJoqo6d2
unknown
http://www.leewanyam.com/0oqq/poIb=tYchV8
unknown
http://www.allison2patrick.online
unknown
http://www.brennmansoluciones.com/0oqq/poIb=tYchV8
unknown
http://www.glb-mobility.com/0oqq/qt9TW=60_ljPJoqo6d2
unknown
http://www.brennmansoluciones.com/0oqq/
unknown
https://search.yahoo.com?fr=crmas_sfpf
unknown
https://www.fasthosts.co.uk/domain-names/search/?domain=$
unknown
http://www.themssterofssuepnse.rest/0oqq/
unknown
http://www.leewanyam.com/0oqq/
unknown
http://www.landlotto.ru/0oqq/qt9TW=60_ljPJoqo6d2
unknown
https://fasthosts.co.uk/
unknown
http://www.ketoibabal.cyou
unknown
https://www.nic.ru/catalog/hosting/shared/
unknown
http://www.mynichemarket.co.uk/0oqq/qt9TW=60_ljPJoqo6d2
unknown
https://www.fasthosts.co.uk/get-online?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_
unknown
http://www.themssterofssuepnse.rest/0oqq/poIb=tYchV8
unknown
https://www.nic.ru/cata
unknown
http://www.ketoibabal.cyou/0oqq/qt9TW=60_ljPJoqo6d2
unknown
https://www.nic.ru/catalog/hosting/shared/?ipartner=6666&adv_id=click_vh&utm_source=stpg_all&utm_med
unknown
http://www.landlotto.ru
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.nic.ru?ipartner=6666&adv_id=logo&utm_source=stpg_all&utm_medium=link&utm_campaign=logo
unknown
http://www.virginhairweave.co.uk
unknown
http://www.litespeedtech.com/error-page
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
https://www.nic.ru/catalog/hosting/cms/?ipartner=6666&adv_id=click_cmsh&utm_source=stpg_all&utm_medi
unknown
http://www.themssterofssuepnse.rest/0oqq/qt9TW=60_ljPJoqo6d2
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://search.yahoo.com?fr=crmas_sfp
unknown
https://www.nic.ru/catalog/hosting/vds-vps/
unknown
http://www.g2fm.co.uk
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dirdikyepedia.com
5.181.216.141
malicious
allison2patrick.online
62.4.21.190
malicious
www.gorwly.top
192.64.116.162
malicious
glb-mobility.com
88.99.217.197
malicious
www.hudsonandbailey.uk
199.59.243.223
malicious
www.virginhairweave.co.uk
198.58.118.167
malicious
www.g2fm.co.uk
213.171.195.105
malicious
www.landlotto.ru
109.70.26.37
malicious
www.karlscurry.co.uk
217.160.0.249
malicious
www.ty23vip.com
162.209.159.142
malicious
fanversewallet.com
203.245.24.47
malicious
www.mynichemarket.co.uk
185.151.30.181
malicious
www.themssterofssuepnse.rest
unknown
malicious
www.glb-mobility.com
unknown
malicious
www.fanversewallet.com
unknown
malicious
www.ketoibabal.cyou
unknown
malicious
www.allison2patrick.online
unknown
malicious
www.brennmansoluciones.com
unknown
malicious
www.dirdikyepedia.com
unknown
malicious
www.thelastwill.net
unknown
malicious
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
109.70.26.37
www.landlotto.ru
Russian Federation
malicious
88.99.217.197
glb-mobility.com
Germany
malicious
217.160.0.249
www.karlscurry.co.uk
Germany
malicious
162.209.159.142
www.ty23vip.com
United States
malicious
192.64.116.162
www.gorwly.top
United States
malicious
199.59.243.223
www.hudsonandbailey.uk
United States
malicious
5.181.216.141
dirdikyepedia.com
Germany
malicious
62.4.21.190
allison2patrick.online
France
malicious
185.151.30.181
www.mynichemarket.co.uk
United Kingdom
malicious
203.245.24.47
fanversewallet.com
Korea Republic of
malicious
198.58.118.167
www.virginhairweave.co.uk
United States
malicious
213.171.195.105
www.g2fm.co.uk
United Kingdom
malicious
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.106
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.104
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MK3D\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 128 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C40000
system
page execute and read and write
malicious
F30000
unclassified section
page execute and read and write
malicious
2FA0000
trusted library allocation
page read and write
malicious
E00000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
DB0000
unclassified section
page execute and read and write
malicious
7FF534BF1000
unkown
page readonly
928E000
unkown
page read and write
7A3000
heap
page read and write
11342000
unkown
page read and write
7FC000
stack
page read and write
4B2A000
unkown
page read and write
21543FB9000
heap
page read and write
510F000
unkown
page read and write
D312000
unkown
page read and write
7FF534D26000
unkown
page readonly
242C1402000
trusted library allocation
page read and write
7FF534B55000
unkown
page readonly
7770000
trusted library allocation
page read and write
55B6000
stack
page read and write
DC0000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
925F000
unkown
page read and write
33E8000
unkown
page read and write
F80E000
unkown
page read and write
F2A9000
unkown
page read and write
1754000
unclassified section
page execute and read and write
93B3000
unkown
page read and write
77B0000
unkown
page readonly
8F54000
unkown
page read and write
1AA3EFFD000
heap
page read and write
33A7000
unkown
page read and write
1340000
unkown
page read and write
7A6000
heap
page read and write
29FEE7D0000
remote allocation
page read and write
21544802000
heap
page read and write
4C00000
unkown
page readonly
12B0000
unkown
page readonly
7FF5350A2000
unkown
page readonly
1AA3F390000
trusted library allocation
page read and write
7A6000
heap
page read and write
8F31000
unkown
page read and write
7071000
unkown
page read and write
91CD000
unkown
page read and write
62D5000
unkown
page read and write
D8DE000
unkown
page read and write
1AA3EFFD000
heap
page read and write
8566000
unkown
page read and write
BEE000
stack
page read and write
F5A7000
unkown
page read and write
1AA3FE90000
trusted library allocation
page read and write
7FF534CAE000
unkown
page readonly
F4C4000
unkown
page read and write
9185000
unkown
page read and write
3B10AFF000
stack
page read and write
2E91000
heap
page read and write
5740000
unkown
page read and write
33DB000
unkown
page read and write
7FF534CD0000
unkown
page readonly
7E1C000
unkown
page readonly
33E8000
unkown
page read and write
8558000
unkown
page read and write
27D4663A000
heap
page read and write
62E5000
unkown
page read and write
842C000
stack
page read and write
B746000
system
page execute and read and write
48DD000
heap
page read and write
7FF51EC9E000
unkown
page readonly
F6B8000
unkown
page read and write
CD4000
heap
page read and write
7DF442301000
unkown
page execute read
40A000
unkown
page write copy
21543E00000
heap
page read and write
1A710000
direct allocation
page read and write
F75257E000
stack
page read and write
CD4000
heap
page read and write
7166000
unkown
page read and write
F5D6000
unkown
page read and write
7FF53505E000
unkown
page readonly
1133E000
unkown
page read and write
1AA3FC40000
trusted library allocation
page read and write
7FF534B7D000
unkown
page readonly
2E91000
heap
page read and write
19A000
stack
page read and write
6268000
unkown
page read and write
7FF534BE1000
unkown
page readonly
8545000
unkown
page read and write
620000
heap
page read and write
7F65000
unkown
page readonly
F5FD000
unkown
page read and write
21543E13000
heap
page read and write
8FD3000
unkown
page read and write
4EBF000
direct allocation
page execute and read and write
F5A7000
unkown
page read and write
91CD000
unkown
page read and write
F8F1000
unkown
page read and write
EB10000
unkown
page read and write
B9FF000
stack
page read and write
7FF534FE4000
unkown
page readonly
7FF534E7E000
unkown
page readonly
7FF534F21000
unkown
page readonly
F5E2000
unkown
page read and write
7FF534F85000
unkown
page readonly
7EA5000
unkown
page readonly
89B0000
unkown
page readonly
91D8000
unkown
page read and write
9213000
unkown
page read and write
F621000
unkown
page read and write
8D68000
stack
page read and write
7DFF000
stack
page read and write
5A10000
unkown
page read and write
21543E29000
heap
page read and write
30D9000
heap
page read and write
F5E6000
unkown
page read and write
7DBA000
unkown
page readonly
3250000
heap
page read and write
CD4000
heap
page read and write
58D0000
unkown
page readonly
928B000
unkown
page read and write
B43B000
stack
page read and write
1980000
unkown
page readonly
5296000
unkown
page read and write
4B90000
unkown
page read and write
7FF534B43000
unkown
page readonly
1AA3FBD0000
trusted library allocation
page read and write
7FF535004000
unkown
page readonly
77F3000
unkown
page readonly
7DF442300000
unkown
page readonly
305B000
heap
page read and write
E30000
heap
page read and write
780000
heap
page read and write
2E91000
heap
page read and write
4BC0000
unkown
page readonly
3257000
heap
page read and write
F5D0000
unkown
page read and write
3256000
heap
page read and write
11331000
unkown
page read and write
C71000
heap
page read and write
523C000
stack
page read and write
1A82B000
direct allocation
page read and write
BD77000
stack
page read and write
790000
heap
page read and write
7FF5348F6000
unkown
page readonly
F2C3000
unkown
page read and write
5130000
unkown
page readonly
6770000
unkown
page read and write
919F000
unkown
page read and write
7FFC1B351000
unkown
page execute read
29FEE848000
heap
page read and write
1A82F000
direct allocation
page read and write
30AF000
heap
page read and write
713B000
unkown
page read and write
89AF000
stack
page read and write
F79000
unclassified section
page execute and read and write
339E000
unkown
page read and write
30FD000
heap
page read and write
8FC1000
unkown
page read and write
F6A0000
unkown
page read and write
77E2000
unkown
page readonly
CD4000
heap
page read and write
6326000
unkown
page read and write
DC0000
trusted library allocation
page read and write
7FF534BB4000
unkown
page readonly
31CA000
stack
page read and write
F5A7000
unkown
page read and write
3441000
unkown
page read and write
907D000
unkown
page read and write
9297000
unkown
page read and write
2439D26E000
heap
page read and write
34B0000
unkown
page read and write
7FF534A99000
unkown
page readonly
925F000
unkown
page read and write
27D4667A000
heap
page read and write
CD4000
heap
page read and write
DC0000
trusted library allocation
page read and write
CD4000
heap
page read and write
9155000
unkown
page read and write
29EE5670000
heap
page read and write
C5C000
unkown
page readonly
100A8000
stack
page read and write
F6E1000
unkown
page read and write
90D6000
unkown
page read and write
43B000
unkown
page readonly
4D30000
unkown
page read and write
928E000
unkown
page read and write
F5E4000
unkown
page read and write
11353000
unkown
page read and write
7FA3000
unkown
page readonly
7FF5348D7000
unkown
page readonly
59F0000
unkown
page read and write
AFB000
stack
page read and write
9185000
unkown
page read and write
D867000
unkown
page read and write
F85C000
unkown
page read and write
5106000
unkown
page read and write
7E6E000
unkown
page readonly
29FEE859000
heap
page read and write
7F13000
unkown
page readonly
1490000
unkown
page read and write
F72B000
unkown
page read and write
F656000
unkown
page read and write
4BCD000
stack
page read and write
29FEE83D000
heap
page read and write
7A3000
heap
page read and write
F5E2000
unkown
page read and write
2439D213000
heap
page read and write
F5D6000
unkown
page read and write
7FF534B33000
unkown
page readonly
21543E6F000
heap
page read and write
8F10000
unkown
page read and write
33E8000
unkown
page read and write
91D8000
unkown
page read and write
CD5000
heap
page read and write
7FF534F6C000
unkown
page readonly
6261000
unkown
page read and write
4EBB000
direct allocation
page execute and read and write
CD0000
heap
page read and write
90B1000
unkown
page read and write
7FF534C60000
unkown
page readonly
77DE000
unkown
page readonly
6254000
unkown
page read and write
F722000
unkown
page read and write
57A0000
unkown
page read and write
8545000
unkown
page read and write
CD5000
heap
page read and write
F5D0000
unkown
page read and write
D87F000
unkown
page read and write
7CBF000
unkown
page readonly
7C9E000
unkown
page readonly
1384E000
stack
page read and write
354C000
stack
page read and write
7FF5348E4000
unkown
page readonly
7FFC1B4F3000
unkown
page readonly
CD4000
heap
page read and write
F51E000
unkown
page read and write
50A1000
unkown
page read and write
29FEE5D0000
heap
page read and write
21543F13000
heap
page read and write
1133E000
unkown
page read and write
B5F000
stack
page read and write
F6E6000
unkown
page read and write
6241000
unkown
page read and write
27D46655000
heap
page read and write
DC0000
trusted library allocation
page read and write
29EE5867000
heap
page read and write
30E4000
heap
page read and write
F367000
unkown
page read and write
623F000
unkown
page read and write
C20000
trusted library allocation
page read and write
CD4000
heap
page read and write
7FF534DC9000
unkown
page readonly
438387A000
stack
page read and write
435000
unkown
page read and write
5104000
unkown
page read and write
7FF534BF6000
unkown
page readonly
7FF534BC0000
unkown
page readonly
F582000
unkown
page read and write
7FF5349B7000
unkown
page readonly
F6C6000
unkown
page read and write
580C000
unkown
page read and write
7DF442311000
unkown
page execute read
7FF5349B9000
unkown
page readonly
12B0000
unkown
page readonly
C5F000
unkown
page read and write
7166000
unkown
page read and write
B71B000
system
page execute and read and write
23CE0F00000
heap
page read and write
4D20000
unkown
page read and write
6238000
unkown
page read and write
4B4A000
unkown
page read and write
CD4000
heap
page read and write
77E2000
unkown
page readonly
1A710000
direct allocation
page read and write
11353000
unkown
page read and write
29EE5856000
heap
page read and write
2154476E000
heap
page read and write
F607000
unkown
page read and write
33CC000
unkown
page read and write
EE5000
stack
page read and write
7FF534DB3000
unkown
page readonly
F645000
unkown
page read and write
4B93000
heap
page read and write
7FC5000
unkown
page readonly
1A82B000
direct allocation
page read and write
215447BD000
heap
page read and write
CD4000
heap
page read and write
F607000
unkown
page read and write
65975FF000
stack
page read and write
F8BC000
unkown
page read and write
4D2F000
direct allocation
page execute and read and write
7FF534F9A000
unkown
page readonly
5880000
unkown
page read and write
1573000
heap
page read and write
7FF535074000
unkown
page readonly
F6D9000
unkown
page read and write
F5D6000
unkown
page read and write
DC0000
trusted library allocation
page read and write
F4E4000
unkown
page read and write
CD4000
heap
page read and write
7FF534D1C000
unkown
page readonly
917C000
unkown
page read and write
11331000
unkown
page read and write
D8EB000
unkown
page read and write
27D4667E000
heap
page read and write
CD4000
heap
page read and write
77B0000
unkown
page readonly
29EE583C000
heap
page read and write
B57E000
stack
page read and write
3146000
stack
page read and write
7B1D000
unkown
page readonly
91D8000
unkown
page read and write
CD4000
heap
page read and write
307A000
heap
page read and write
5350000
unkown
page readonly
CD4000
heap
page read and write
62E5000
unkown
page read and write
8F33000
unkown
page read and write
D864000
unkown
page read and write
6766F7F000
stack
page read and write
23CE0D60000
heap
page read and write
708A000
unkown
page read and write
27D46702000
heap
page read and write
27D46631000
heap
page read and write
1280000
unkown
page readonly
21544830000
heap
page read and write
5933000
unkown
page read and write
9210000
unkown
page read and write
DE4000
heap
page read and write
DC0000
trusted library allocation
page read and write
1F0CC902000
heap
page read and write
6274000
unkown
page read and write
F656000
unkown
page read and write
7F9C000
unkown
page readonly
27D46460000
heap
page read and write
CD4000
heap
page read and write
F2C3000
unkown
page read and write
1590000
unkown
page readonly
F645000
unkown
page read and write
7FFC1B557000
unkown
page readonly
27D46600000
heap
page read and write
1F0CC802000
heap
page read and write
5B67000
stack
page read and write
30C1000
heap
page read and write
920B000
unkown
page read and write
1AA3F380000
heap
page read and write
11366000
unkown
page read and write
6912000
unclassified section
page read and write
D8DE000
unkown
page read and write
4B50000
unkown
page read and write
F582000
unkown
page read and write
7FF534B5C000
unkown
page readonly
4E08000
stack
page read and write
DE4000
heap
page read and write
6FF0000
unkown
page read and write
F62F000
unkown
page read and write
F5E8000
unkown
page read and write
F661000
unkown
page read and write
1AA3F1A0000
heap
page read and write
F432000
unkown
page read and write
7FF535043000
unkown
page readonly
2E91000
heap
page read and write
309F000
heap
page read and write
5010000
unkown
page read and write
29FEE640000
heap
page read and write
F7D5000
unkown
page read and write
7FF534CF0000
unkown
page readonly
8F42000
unkown
page read and write
7FF5348AC000
unkown
page readonly
23CE0DF0000
trusted library allocation
page read and write
E5FD7FD000
stack
page read and write
CD4000
heap
page read and write
27D46640000
heap
page read and write
F621000
unkown
page read and write
30FD000
heap
page read and write
13347000
stack
page read and write
7FF53509B000
unkown
page readonly
CD4000
heap
page read and write
5010000
unkown
page read and write
7FF534E4E000
unkown
page readonly
706E000
unkown
page read and write
215447C8000
heap
page read and write
7FF53500F000
unkown
page readonly
F4E4000
unkown
page read and write
4D2B000
direct allocation
page execute and read and write
8F2F000
unkown
page read and write
30D3000
heap
page read and write
71BA000
unkown
page read and write
713B000
unkown
page read and write
5106000
unkown
page read and write
33E8000
unkown
page read and write
30B4000
heap
page read and write
7ED5000
unkown
page readonly
7FF534B59000
unkown
page readonly
B8FA000
stack
page read and write
F759000
unkown
page read and write
F656000
unkown
page read and write
29FEE740000
trusted library allocation
page read and write
DE4000
heap
page read and write
27D46677000
heap
page read and write
27D4663C000
heap
page read and write
F5E8000
unkown
page read and write
F479000
unkown
page read and write
F6E1000
unkown
page read and write
8FC1000
unkown
page read and write
7FF534BEE000
unkown
page readonly
8F35000
unkown
page read and write
6353000
unkown
page read and write
33CC000
unkown
page read and write
91CD000
unkown
page read and write
1A580000
direct allocation
page read and write
5120000
unkown
page readonly
E964000
stack
page read and write
7FF5349E7000
unkown
page readonly
7FF534F7F000
unkown
page readonly
E30000
system
page execute and read and write
1445000
heap
page read and write
7FF534C2C000
unkown
page readonly
7EE3000
unkown
page readonly
D8EB000
unkown
page read and write
9197000
unkown
page read and write
631C000
unkown
page read and write
C50000
unkown
page readonly
F608000
unkown
page read and write
2439D240000
heap
page read and write
F72B000
unkown
page read and write
6246000
unkown
page read and write
27D46657000
heap
page read and write
13B4A000
stack
page read and write
F5E6000
unkown
page read and write
842C000
stack
page read and write
F4DF000
unkown
page read and write
35C9000
stack
page read and write
4BF0000
unkown
page read and write
90D8000
unkown
page read and write
F5E4000
unkown
page read and write
7FF534916000
unkown
page readonly
7FF534D9F000
unkown
page readonly
1425000
heap
page read and write
29EE5902000
heap
page read and write
33EE000
unkown
page read and write
F75247F000
stack
page read and write
27D46660000
heap
page read and write
29EE5813000
heap
page read and write
9297000
unkown
page read and write
23CE0D50000
heap
page read and write
7FF535029000
unkown
page readonly
917E000
unkown
page read and write
F621000
unkown
page read and write
920F000
unkown
page read and write
1419B000
unkown
page read and write
6326000
unkown
page read and write
11B0000
heap
page read and write
F5DA000
unkown
page read and write
BC7E000
stack
page read and write
F2A9000
unkown
page read and write
F5EA000
unkown
page read and write
DC0000
trusted library allocation
page read and write
B8FA000
stack
page read and write
F5A7000
unkown
page read and write
2E91000
heap
page read and write
29FEE859000
heap
page read and write
F49C000
unkown
page read and write
242C0E29000
heap
page read and write
4E08000
stack
page read and write
2E91000
heap
page read and write
F5EC000
unkown
page read and write
2E91000
heap
page read and write
5020000
unkown
page read and write
5360000
unkown
page read and write
4383F7F000
stack
page read and write
BD77000
stack
page read and write
7FF534DFB000
unkown
page readonly
132CC000
stack
page read and write
7E1C000
unkown
page readonly
F2C3000
unkown
page read and write
7FF534932000
unkown
page readonly
F62F000
unkown
page read and write
917C000
unkown
page read and write
6FFD000
unkown
page read and write
7FF534C5D000
unkown
page readonly
33EE000
unkown
page read and write
563E000
stack
page read and write
138D000
heap
page read and write
30E4000
heap
page read and write
7BE7000
unkown
page readonly
F621000
unkown
page read and write
F5F5000
unkown
page read and write
7FF534944000
unkown
page readonly
F6D9000
unkown
page read and write
7FF534F12000
unkown
page readonly
9201000
unkown
page read and write
EEF000
stack
page read and write
DC0000
trusted library allocation
page read and write
30DF000
heap
page read and write
1135A000
unkown
page read and write
4C10000
unkown
page read and write
F72B000
unkown
page read and write
1A580000
direct allocation
page read and write
401000
unkown
page execute read
15C0000
unkown
page readonly
1310000
unkown
page readonly
9298000
unkown
page read and write
33AD000
unkown
page read and write
1A82F000
direct allocation
page read and write
F4FD000
unkown
page read and write
D87F000
unkown
page read and write
CD5000
heap
page read and write
2E91000
heap
page read and write
C5C000
unkown
page readonly
623F000
unkown
page read and write
B4F0000
unkown
page read and write
2439D302000
heap
page read and write
C100000
unkown
page read and write
92DD000
unkown
page read and write
9CC000
stack
page read and write
F4A2000
unkown
page read and write
928E000
unkown
page read and write
2E91000
heap
page read and write
CD4000
heap
page read and write
33AC000
unkown
page read and write
7FF534BA2000
unkown
page readonly
B43B000
stack
page read and write
F5A7000
unkown
page read and write
F479000
unkown
page read and write
52F0000
unkown
page write copy
960000
heap
page read and write
F60B000
unkown
page read and write
7CA5000
unkown
page readonly
F5E2000
unkown
page read and write
2560000
heap
page read and write
706E000
unkown
page read and write
11333000
unkown
page read and write
9209000
unkown
page read and write
7FF534C14000
unkown
page readonly
7FF534B4D000
unkown
page readonly
F582000
unkown
page read and write
23CE0F02000
heap
page read and write
77F3000
unkown
page readonly
26F467F000
stack
page read and write
F458000
unkown
page read and write
F80E000
unkown
page read and write
7DBA000
unkown
page readonly
2E91000
heap
page read and write
7FF534EC4000
unkown
page readonly
2E91000
heap
page read and write
11338000
unkown
page read and write
B4F0000
unkown
page read and write
1360000
unkown
page readonly
7FF53488C000
unkown
page readonly
2FD0000
trusted library allocation
page read and write
1F0CC837000
heap
page read and write
15F0000
unkown
page readonly
4B8F000
heap
page read and write
21543E90000
heap
page read and write
3056000
heap
page read and write
88AB000
stack
page read and write
5106000
unkown
page read and write
7FF535017000
unkown
page readonly
919F000
unkown
page read and write
C62000
unkown
page readonly
DC0000
trusted library allocation
page read and write
F4C4000
unkown
page read and write
65972FB000
stack
page read and write
1423000
heap
page read and write
F5A2000
unkown
page read and write
B57E000
stack
page read and write
34A0000
unkown
page read and write
7FF534EA5000
unkown
page readonly
F4F4000
unkown
page read and write
425000
unkown
page read and write
854E000
unkown
page read and write
7FF5350AF000
unkown
page readonly
CD4000
heap
page read and write
509F000
unkown
page read and write
57D0000
unkown
page readonly
7FF534966000
unkown
page readonly
29EE6002000
trusted library allocation
page read and write
6246000
unkown
page read and write
7CA5000
unkown
page readonly
7FF534DBC000
unkown
page readonly
B7A0000
heap
page read and write
D875000
unkown
page read and write
F5D6000
unkown
page read and write
3350000
unkown
page read and write
11357000
unkown
page read and write
15E5000
heap
page read and write
33A7000
unkown
page read and write
7FF534934000
unkown
page readonly
F8B5000
unkown
page read and write
E3C000
system
page execute and read and write
43B000
unkown
page readonly
1F0CC82E000
heap
page read and write
F6A0000
unkown
page read and write
7FF53490E000
unkown
page readonly
1AA3EF50000
trusted library allocation
page read and write
21543E6C000
heap
page read and write
F6C6000
unkown
page read and write
5063000
unkown
page read and write
59E000
stack
page read and write
7FF534D3C000
unkown
page readonly
F4F1000
unkown
page read and write
9201000
unkown
page read and write
C077000
stack
page read and write
8F10000
unkown
page read and write
B71D000
system
page execute and read and write
7FF535008000
unkown
page readonly
2E91000
heap
page read and write
F5EC000
unkown
page read and write
F5F5000
unkown
page read and write
2E91000
heap
page read and write
33B6000
unkown
page read and write
510F000
unkown
page read and write
1230000
unkown
page readonly
1AA3FC50000
trusted library allocation
page read and write
75E000
stack
page read and write
F5A7000
unkown
page read and write
2E91000
heap
page read and write
F70000
unclassified section
page execute and read and write
51B9000
stack
page read and write
7FF5350FB000
unkown
page readonly
F4C4000
unkown
page read and write
1133E000
unkown
page read and write
7133000
unkown
page read and write
F582000
unkown
page read and write
921F000
unkown
page read and write
F5E4000
unkown
page read and write
6236000
unkown
page read and write
21543E58000
heap
page read and write
C5C000
unkown
page readonly
2439DB00000
heap
page read and write
B879000
stack
page read and write
F4A9000
unkown
page read and write
14254000
unkown
page read and write
1A580000
direct allocation
page read and write
1AA3F180000
heap
page read and write
7FF534E65000
unkown
page readonly
F4B3000
unkown
page read and write
1290000
unkown
page read and write
8F97000
unkown
page read and write
2439D229000
heap
page read and write
917E000
unkown
page read and write
7FF534B6A000
unkown
page readonly
30FF000
heap
page read and write
15E0000
heap
page read and write
523C000
stack
page read and write
4C10000
unkown
page read and write
21543F8E000
heap
page read and write
53FC000
stack
page read and write
7002000
unkown
page read and write
2E91000
heap
page read and write
7FF535114000
unkown
page readonly
C5F000
unkown
page write copy
5106000
unkown
page read and write
F6CB000
unkown
page read and write
6241000
unkown
page read and write
242C0E00000
heap
page read and write
4B50000
unkown
page read and write
4F08000
stack
page read and write
7133000
unkown
page read and write
F5E6000
unkown
page read and write
F5EC000
unkown
page read and write
242C0E58000
heap
page read and write
F31B000
unkown
page read and write
7044000
unkown
page read and write
8574000
unkown
page read and write
E00000
trusted library allocation
page read and write
7368000
stack
page read and write
215447B0000
heap
page read and write
F72B000
unkown
page read and write
7FD9000
unkown
page readonly
5280000
unkown
page readonly
7FFC1B4EA000
unkown
page read and write
5106000
unkown
page read and write
7FC5000
unkown
page readonly
712D000
unkown
page read and write
7FB0000
unkown
page readonly
3061000
heap
page read and write
27D46613000
heap
page read and write
4D10000
unkown
page read and write
6FEB000
stack
page read and write
F2AC000
unkown
page read and write
91D8000
unkown
page read and write
21544791000
heap
page read and write
F48D000
unkown
page read and write
1A710000
direct allocation
page read and write
7FF53503B000
unkown
page readonly
F367000
unkown
page read and write
27D4666A000
heap
page read and write
CD4000
heap
page read and write
6780000
unclassified section
page read and write
5AEA000
stack
page read and write
F5EA000
unkown
page read and write
9155000
unkown
page read and write
7CB7000
unkown
page readonly
1370000
heap
page read and write
27D4664D000
heap
page read and write
676667E000
stack
page read and write
929B000
unkown
page read and write
324E000
stack
page read and write
B67B000
stack
page read and write
D8E2000
unkown
page read and write
7D44000
unkown
page readonly
8FBC000
unkown
page read and write
34C5000
unkown
page read and write
F7D4000
unkown
page read and write
33F6000
unkown
page read and write
CD4000
heap
page read and write
F80E000
unkown
page read and write
BB78000
stack
page read and write
DE4000
heap
page read and write
1A696000
direct allocation
page read and write
CD4000
heap
page read and write
305B000
heap
page read and write
7368000
stack
page read and write
95F000
stack
page read and write
9B000
stack
page read and write
2E91000
heap
page read and write
F3C8000
unkown
page read and write
645C000
unclassified section
page read and write
7890000
trusted library allocation
page read and write
3646000
stack
page read and write
D6D000
stack
page read and write
CD4000
heap
page read and write
7FF5349C1000
unkown
page readonly
7FF534D9A000
unkown
page readonly
F306000
unkown
page read and write
F582000
unkown
page read and write
706E000
unkown
page read and write
BAE000
stack
page read and write
2439D2BE000
heap
page read and write
920B000
unkown
page read and write
8FD3000
unkown
page read and write
7FF534FBA000
unkown
page readonly
2520000
heap
page read and write
632D000
unkown
page read and write
438397F000
stack
page read and write
4D70000
unkown
page read and write
7D44000
unkown
page readonly
7C61000
unkown
page readonly
1980000
unkown
page readonly
1F0CD002000
trusted library allocation
page read and write
8F2D000
unkown
page read and write
7FF534AA6000
unkown
page readonly
4E8A000
stack
page read and write
AE0717E000
stack
page read and write
C51000
unkown
page execute read
7FF534F17000
unkown
page readonly
3371000
unkown
page read and write
7890000
trusted library allocation
page read and write
CD5000
heap
page read and write
29FF0202000
trusted library allocation
page read and write
CD4000
heap
page read and write
563A000
unclassified section
page read and write
7047000
unkown
page read and write
AE06BCE000
stack
page read and write
DC0000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
33A1000
unkown
page read and write
23CE0DC0000
heap
page read and write
57A0000
unkown
page read and write
F367000
unkown
page read and write
8F35000
unkown
page read and write
E5FDF7C000
stack
page read and write
7FFC1B4EC000
unkown
page read and write
30AF000
heap
page read and write
C51000
unkown
page execute read
C5F000
unkown
page write copy
550000
heap
page read and write
563E000
stack
page read and write
90B1000
unkown
page read and write
7890000
trusted library allocation
page read and write
856F000
unkown
page read and write
3350000
unkown
page read and write
4D80000
unkown
page read and write
676C000
stack
page read and write
38A0000
unkown
page read and write
7FF535035000
unkown
page readonly
7FF534FCF000
unkown
page readonly
2E91000
heap
page read and write
1F0CC81F000
heap
page read and write
6259000
unkown
page read and write
3850000
unkown
page read and write
631C000
unkown
page read and write
242C0BC0000
heap
page read and write
F722000
unkown
page read and write
2E91000
heap
page read and write
7FFC1B4E5000
unkown
page read and write
1A82B000
direct allocation
page read and write
4383CFA000
stack
page read and write
2439D287000
heap
page read and write
29EE56D0000
heap
page read and write
F30000
trusted library allocation
page read and write
7ED5000
unkown
page readonly
CD4000
heap
page read and write
FD6000
heap
page read and write
CD4000
heap
page read and write
F81E000
unkown
page read and write
8A3C000
stack
page read and write
1A580000
direct allocation
page read and write
7FB7000
unkown
page readonly
F5FD000
unkown
page read and write
CD4000
heap
page read and write
F4FF000
unkown
page read and write
CD4000
heap
page read and write
8558000
unkown
page read and write
F434000
unkown
page read and write
F367000
unkown
page read and write
7FB0000
unkown
page readonly
9209000
unkown
page read and write
11342000
unkown
page read and write
6238000
unkown
page read and write
F439000
unkown
page read and write
F661000
unkown
page read and write
7FF5349D2000
unkown
page readonly
632D000
unkown
page read and write
242C0F02000
heap
page read and write
90B1000
unkown
page read and write
DE0000
heap
page read and write
3820000
unkown
page readonly
4D50000
unkown
page read and write
9331000
unkown
page read and write
138F000
direct allocation
page execute and read and write
920D000
unkown
page read and write
712D000
unkown
page read and write
B979000
stack
page read and write
2E91000
heap
page read and write
2E91000
heap
page read and write
7FF535026000
unkown
page readonly
F52A000
unkown
page read and write
7FF534D2D000
unkown
page readonly
55B6000
stack
page read and write
DE4000
heap
page read and write
623C000
unkown
page read and write
33B6000
unkown
page read and write
7FF534E1F000
unkown
page readonly
7B1D000
unkown
page readonly
2E91000
heap
page read and write
BC0000
heap
page read and write
FDF000
heap
page read and write
27D46642000
heap
page read and write
1504E000
stack
page read and write
52E0000
unkown
page readonly
4BE0000
unkown
page readonly
2E91000
heap
page read and write
D88E000
unkown
page read and write
F3C7000
unkown
page read and write
F661000
unkown
page read and write
7FF534EE9000
unkown
page readonly
B9FF000
stack
page read and write
7FF534F2E000
unkown
page readonly
66A0000
unkown
page readonly
34C3000
unkown
page read and write
C71000
heap
page read and write
1344A000
stack
page read and write
F5E8000
unkown
page read and write
9BA000
heap
page read and write
666B000
unkown
page read and write
7FF534DA5000
unkown
page readonly
510F000
unkown
page read and write
DC0000
trusted library allocation
page read and write
7FF534C1D000
unkown
page readonly
7FF534B3A000
unkown
page readonly
CD4000
heap
page read and write
8725000
stack
page read and write
C62000
unkown
page readonly
27D46662000
heap
page read and write
7FF534950000
unkown
page readonly
1F0CC790000
heap
page read and write
6246000
unkown
page read and write
30AA000
heap
page read and write
F661000
unkown
page read and write
1133E000
unkown
page read and write
F51E000
unkown
page read and write
5291000
unkown
page read and write
F5E6000
unkown
page read and write
F5DA000
unkown
page read and write
7FB7000
unkown
page readonly
706D000
unkown
page read and write
8574000
unkown
page read and write
F58D000
unkown
page read and write
3050000
heap
page read and write
F4EA000
unkown
page read and write
3B109FA000
stack
page read and write
7FFC1B54F000
unkown
page readonly
B4BB000
stack
page read and write
1270000
direct allocation
page execute and read and write
29EE5829000
heap
page read and write
7FE2000
unkown
page readonly
12E0000
unkown
page read and write
5710000
unkown
page read and write
F49C000
unkown
page read and write
4A74000
heap
page read and write
F621000
unkown
page read and write
FF0000
unkown
page readonly
90B5000
unkown
page read and write
2E91000
heap
page read and write
7D52000
unkown
page readonly
712D000
unkown
page read and write
F432000
unkown
page read and write
B979000
stack
page read and write
11F6000
heap
page read and write
F6A0000
unkown
page read and write
510F000
unkown
page read and write
5DE000
stack
page read and write
57B0000
unkown
page read and write
CD4000
heap
page read and write
4BA0000
unkown
page read and write
C70000
heap
page read and write
928E000
unkown
page read and write
6254000
unkown
page read and write
6FF0000
unkown
page read and write
242C13C0000
remote allocation
page read and write
21543E72000
heap
page read and write
4B3A000
unkown
page read and write
D88C000
unkown
page read and write
7DF442331000
unkown
page execute read
1A82B000
direct allocation
page read and write
AE06F7E000
stack
page read and write
7E45000
unkown
page readonly
33AA000
unkown
page read and write
5C2A000
unkown
page read and write
15E5000
heap
page read and write
6AA4000
unclassified section
page read and write
BC7E000
stack
page read and write
1421B000
unkown
page read and write
BDF8000
stack
page read and write
1AA3FEC0000
trusted library allocation
page read and write
7F8E000
unkown
page readonly
21544823000
heap
page read and write
F49C000
unkown
page read and write
27D4667B000
heap
page read and write
7FF534F9E000
unkown
page readonly
29FEE872000
heap
page read and write
7FF534FC1000
unkown
page readonly
6241000
unkown
page read and write
9179000
unkown
page read and write
242C0BD0000
heap
page read and write
DAE000
stack
page read and write
F527000
unkown
page read and write
D867000
unkown
page read and write
4B2A000
unkown
page read and write
F645000
unkown
page read and write
4383DFE000
stack
page read and write
8D68000
stack
page read and write
F31B000
unkown
page read and write
7FF535090000
unkown
page readonly
90D6000
unkown
page read and write
7EE3000
unkown
page readonly
F5EC000
unkown
page read and write
F5EA000
unkown
page read and write
F5FD000
unkown
page read and write
7FF534E77000
unkown
page readonly
3860000
unkown
page read and write
29EE583F000
heap
page read and write
9278000
unkown
page read and write
F5E6000
unkown
page read and write
7FF534F0B000
unkown
page readonly
33DB000
unkown
page read and write
D88C000
unkown
page read and write
F801000
unkown
page read and write
F6E6000
unkown
page read and write
F5A2000
unkown
page read and write
FDC000
heap
page read and write
7FF534DCF000
unkown
page readonly
7133000
unkown
page read and write
7FF534EE2000
unkown
page readonly
856C000
unkown
page read and write
7DF442310000
unkown
page readonly
23CE0E69000
heap
page read and write
40C000
unkown
page read and write
7890000
trusted library allocation
page read and write
4B10000
unkown
page read and write
B77E000
stack
page read and write
7FF534FB7000
unkown
page readonly
7F65000
unkown
page readonly
52E0000
unkown
page readonly
F2E000
stack
page read and write
5370000
unkown
page readonly
F645000
unkown
page read and write
F749000
unkown
page read and write
354F000
stack
page read and write
91CD000
unkown
page read and write
29FEE5E0000
heap
page read and write
23CE0F13000
heap
page read and write
3054000
heap
page read and write
7D52000
unkown
page readonly
88AB000
stack
page read and write
F751E7F000
stack
page read and write
29EE5877000
heap
page read and write
11338000
unkown
page read and write
7FF534DAF000
unkown
page readonly
21544743000
heap
page read and write
F6A0000
unkown
page read and write
77DB000
unkown
page readonly
629D000
unkown
page read and write
7133000
unkown
page read and write
F580000
unkown
page read and write
928B000
unkown
page read and write
3070000
heap
page read and write
91F3000
unkown
page read and write
E30000
heap
page read and write
FDE000
heap
page read and write
3099000
heap
page read and write
5063000
unkown
page read and write
CD4000
heap
page read and write
138D000
heap
page read and write
7EAC000
unkown
page readonly
BDF8000
stack
page read and write
F5F5000
unkown
page read and write
7CCF000
unkown
page readonly
1A580000
direct allocation
page read and write
7FF534BD4000
unkown
page readonly
CD5000
heap
page read and write
632E000
unkown
page read and write
11342000
unkown
page read and write
79A000
heap
page read and write
7FF534EC7000
unkown
page readonly
7FF535121000
unkown
page readonly
1A710000
direct allocation
page read and write
5A50000
unkown
page readonly
9077000
unkown
page read and write
3448000
unkown
page read and write
7FF534F96000
unkown
page readonly
B3AF000
stack
page read and write
7FF534D9D000
unkown
page readonly
9197000
unkown
page read and write
D733000
unkown
page read and write
59F0000
unkown
page read and write
27D46665000
heap
page read and write
F74F000
unkown
page read and write
D6F0000
unkown
page read and write
C62000
unkown
page readonly
11330000
unkown
page read and write
1220000
unkown
page readonly
33F6000
unkown
page read and write
7FF534D2A000
unkown
page readonly
21544830000
heap
page read and write
F453000
unkown
page read and write
F5F5000
unkown
page read and write
AE0707E000
stack
page read and write
8F14000
unkown
page read and write
F820000
unkown
page read and write
21543E43000
heap
page read and write
3390000
unkown
page read and write
74F0000
trusted library allocation
page read and write
F5EE000
unkown
page read and write
49F3000
heap
page read and write
F608000
unkown
page read and write
33DB000
unkown
page read and write
27D464D0000
heap
page read and write
B67B000
stack
page read and write
27D4666B000
heap
page read and write
62BF000
unkown
page read and write
F305000
unkown
page read and write
F306000
unkown
page read and write
4F88000
stack
page read and write
F432000
unkown
page read and write
21544800000
heap
page read and write
F5DA000
unkown
page read and write
713B000
unkown
page read and write
1F0CC83C000
heap
page read and write
62D5000
unkown
page read and write
2E91000
heap
page read and write
7FF534B64000
unkown
page readonly
1280000
unkown
page readonly
7FF534C27000
unkown
page readonly
676C000
stack
page read and write
B4BB000
stack
page read and write
1A696000
direct allocation
page read and write
F5E8000
unkown
page read and write
F51E000
unkown
page read and write
29EE5875000
heap
page read and write
856F000
unkown
page read and write
CD4000
heap
page read and write
F0F000
heap
page read and write
7E6E000
unkown
page readonly
7C88000
unkown
page readonly
8F20000
unkown
page read and write
3B1087C000
stack
page read and write
FDA000
heap
page read and write
CD4000
heap
page read and write
2E91000
heap
page read and write
9289000
unkown
page read and write
21543FE5000
heap
page read and write
7FF534C0F000
unkown
page readonly
344B000
unkown
page read and write
DE4000
heap
page read and write
7FFC1B350000
unkown
page readonly
71BA000
unkown
page read and write
7CBF000
unkown
page readonly
631E000
unkown
page read and write
CD4000
heap
page read and write
F43F000
unkown
page read and write
F58D000
unkown
page read and write
4F42000
unclassified section
page read and write
1A696000
direct allocation
page read and write
623F000
unkown
page read and write
F5E6000
unkown
page read and write
29FEE802000
heap
page read and write
7F9C000
unkown
page readonly
7FF534BF9000
unkown
page readonly
713B000
unkown
page read and write
CD4000
heap
page read and write
F5E6000
unkown
page read and write
33B6000
unkown
page read and write
D6F0000
unkown
page read and write
DC0000
trusted library allocation
page read and write
61F0000
unkown
page read and write
62AC000
unkown
page read and write
CD4000
heap
page read and write
F6F7000
unkown
page read and write
62C6000
unkown
page read and write
7FF53493C000
unkown
page readonly
33F6000
unkown
page read and write
305B000
heap
page read and write
4C00000
unkown
page readonly
11F2000
heap
page read and write
6322000
unkown
page read and write
427000
unkown
page read and write
7FF534F4B000
unkown
page readonly
8F1C000
unkown
page read and write
7FF534F2A000
unkown
page readonly
15E0000
heap
page read and write
92DD000
unkown
page read and write
1A580000
direct allocation
page read and write
8EEB000
stack
page read and write
21543E75000
heap
page read and write
1A82F000
direct allocation
page read and write
D8E2000
unkown
page read and write
7FF534924000
unkown
page readonly
27D4665C000
heap
page read and write
E5FDB7E000
stack
page read and write
DC0000
trusted library allocation
page read and write
169F000
stack
page read and write
DC0000
trusted library allocation
page read and write
62BF000
unkown
page read and write
CD4000
heap
page read and write
73E7000
stack
page read and write
7FF534D0F000
unkown
page readonly
354C000
stack
page read and write
7FF534FBE000
unkown
page readonly
2E91000
heap
page read and write
7FF534E02000
unkown
page readonly
E5FDA7F000
stack
page read and write
341A000
unkown
page read and write
925F000
unkown
page read and write
67669FE000
stack
page read and write
1135A000
unkown
page read and write
C077000
stack
page read and write
91CD000
unkown
page read and write
DC0000
trusted library allocation
page read and write
2439D060000
heap
page read and write
5E14000
unclassified section
page read and write
7FF534BFF000
unkown
page readonly
2E91000
heap
page read and write
CD4000
heap
page read and write
7FCC000
unkown
page readonly
33CC000
unkown
page read and write
9297000
unkown
page read and write
305B000
heap
page read and write
C50000
unkown
page readonly
C30000
trusted library allocation
page execute and read and write
4D30000
unkown
page read and write
7FF534ED3000
unkown
page readonly
71BA000
unkown
page read and write
7890000
trusted library allocation
page read and write
30E9000
heap
page read and write
30D9000
heap
page read and write
1378000
heap
page read and write
7EA5000
unkown
page readonly
7FF534B3E000
unkown
page readonly
CD4000
heap
page read and write
F6A0000
unkown
page read and write
2E91000
heap
page read and write
2439D200000
heap
page read and write
27D4665A000
heap
page read and write
6261000
unkown
page read and write
10CD6000
unkown
page read and write
1AA3F385000
heap
page read and write
BCF9000
stack
page read and write
F5D6000
unkown
page read and write
628B000
unkown
page read and write
8725000
stack
page read and write
BCF9000
stack
page read and write
6766B7B000
stack
page read and write
29FEE913000
heap
page read and write
7FF534F37000
unkown
page readonly
9184000
unkown
page read and write
7FF534D17000
unkown
page readonly
91D8000
unkown
page read and write
83AD000
stack
page read and write
7133000
unkown
page read and write
344B000
unkown
page read and write
DE4000
heap
page read and write
F582000
unkown
page read and write
C51000
unkown
page execute read
1300000
unkown
page read and write
1220000
unkown
page readonly
DE4000
heap
page read and write
9157000
unkown
page read and write
7FF535086000
unkown
page readonly
9289000
unkown
page read and write
4D10000
unkown
page read and write
F6A0000
unkown
page read and write
6324000
unkown
page read and write
5820000
unkown
page read and write
F367000
unkown
page read and write
F4C4000
unkown
page read and write
27D465D0000
trusted library allocation
page read and write
CD4000
heap
page read and write
308B000
heap
page read and write
7FF535095000
unkown
page readonly
CD4000
heap
page read and write
3052000
heap
page read and write
3250000
heap
page read and write
23CE0E13000
heap
page read and write
33A1000
unkown
page read and write
27D4666D000
heap
page read and write
6274000
unkown
page read and write
F58A000
unkown
page read and write
920F000
unkown
page read and write
F645000
unkown
page read and write
7FF534E6A000
unkown
page readonly
CD4000
heap
page read and write
CD4000
heap
page read and write
57B0000
unkown
page read and write
AE06B4E000
stack
page read and write
F5FD000
unkown
page read and write
6254000
unkown
page read and write
3258000
heap
page read and write
925F000
unkown
page read and write
F6A0000
unkown
page read and write
8F2A000
unkown
page read and write
4B60000
unkown
page read and write
7FF534D23000
unkown
page readonly
510F000
unkown
page read and write
7FF534B76000
unkown
page readonly
F4A5000
unkown
page read and write
6323000
unkown
page read and write
242C13C0000
remote allocation
page read and write
7FF534F73000
unkown
page readonly
29FEE849000
heap
page read and write
6230000
unkown
page read and write
11368000
unkown
page read and write
7FF534FC5000
unkown
page readonly
DE4000
heap
page read and write
F5E4000
unkown
page read and write
61C747E000
stack
page read and write
5820000
unkown
page read and write
2439D2E1000
heap
page read and write
FD9000
heap
page read and write
F751D7B000
stack
page read and write
5A50000
unkown
page readonly
F621000
unkown
page read and write
CD4000
heap
page read and write
F607000
unkown
page read and write
F645000
unkown
page read and write
F5EC000
unkown
page read and write
708A000
unkown
page read and write
F81D000
unkown
page read and write
3057000
heap
page read and write
CD4000
heap
page read and write
1AA3EF40000
heap
page read and write
1AA3EFFD000
heap
page read and write
15C0000
unkown
page readonly
F453000
unkown
page read and write
15D0000
unkown
page read and write
2E91000
heap
page read and write
4B3A000
unkown
page read and write
F62F000
unkown
page read and write
CD4000
heap
page read and write
BB78000
stack
page read and write
6766E7D000
stack
page read and write
78C000
stack
page read and write
F72B000
unkown
page read and write
2439D2C7000
heap
page read and write
F722000
unkown
page read and write
1A696000
direct allocation
page read and write
595E000
unclassified section
page read and write
401000
unkown
page execute read
DE4000
heap
page read and write
9289000
unkown
page read and write
29FEE918000
heap
page read and write
134CF000
stack
page read and write
61C767D000
stack
page read and write
7FF534FEB000
unkown
page readonly
77A0000
heap
page read and write
5A20000
unkown
page readonly
D881000
unkown
page read and write
F5D6000
unkown
page read and write
36CA000
stack
page read and write
9209000
unkown
page read and write
52D0000
unkown
page read and write
73E7000
stack
page read and write
4D20000
unkown
page read and write
21543E92000
heap
page read and write
589D000
unkown
page read and write
BAFD000
stack
page read and write
324E000
stack
page read and write
7FFC1B4ED000
unkown
page write copy
1425000
heap
page read and write
D881000
unkown
page read and write
F41C000
unkown
page read and write
F5EA000
unkown
page read and write
29FEE813000
heap
page read and write
27D46E02000
trusted library allocation
page read and write
101AB000
stack
page read and write
F661000
unkown
page read and write
77D000
heap
page read and write
310F000
heap
page read and write
928B000
unkown
page read and write
F5EE000
unkown
page read and write
27F2000
heap
page execute and read and write
6267000
unkown
page read and write
F31B000
unkown
page read and write
21543E3C000
heap
page read and write
29FEE760000
trusted library allocation
page read and write
CD4000
heap
page read and write
90B5000
unkown
page read and write
341A000
unkown
page read and write
7FB9000
unkown
page readonly
56CE000
stack
page read and write
8EF0000
unkown
page read and write
7FFC1B4E3000
unkown
page read and write
4D40000
unkown
page read and write
1133E000
unkown
page read and write
80AD000
stack
page read and write
5A20000
unkown
page readonly
F60B000
unkown
page read and write
6235000
unkown
page read and write
CD5000
heap
page read and write
D898000
unkown
page read and write
80AD000
stack
page read and write
5296000
unkown
page read and write
5104000
unkown
page read and write
F069000
stack
page read and write
91D8000
unkown
page read and write
7C88000
unkown
page readonly
F75237F000
stack
page read and write
2439D268000
heap
page read and write
61C73FC000
stack
page read and write
7FF534F52000
unkown
page readonly
E5FD97E000
stack
page read and write
DE4000
heap
page read and write
8F2F000
unkown
page read and write
BF7B000
stack
page read and write
1AA3FBE0000
trusted library allocation
page read and write
1F0CC740000
heap
page read and write
CD4000
heap
page read and write
7FB9000
unkown
page readonly
34C0000
unkown
page read and write
F582000
unkown
page read and write
6230000
unkown
page read and write
27D4665E000
heap
page read and write
F582000
unkown
page read and write
438367B000
stack
page read and write
2E91000
heap
page read and write
3146000
stack
page read and write
5C82000
unclassified section
page read and write
2439D0D0000
heap
page read and write
CD4000
heap
page read and write
1AA3FEA0000
heap
page readonly
8F28000
unkown
page read and write
6596D9C000
stack
page read and write
151F000
direct allocation
page execute and read and write
27D46470000
heap
page read and write
F49C000
unkown
page read and write
1A82F000
direct allocation
page read and write
2E91000
heap
page read and write
760000
heap
page read and write
B6FC000
stack
page read and write
91CD000
unkown
page read and write
F580000
unkown
page read and write
90B5000
unkown
page read and write
90B1000
unkown
page read and write
4383E7E000
stack
page read and write
9B0000
heap
page read and write
F75217D000
stack
page read and write
921A000
unkown
page read and write
2E91000
heap
page read and write
907D000
unkown
page read and write
102A7000
stack
page read and write
DC0000
trusted library allocation
page read and write
1A82B000
direct allocation
page read and write
631D000
unkown
page read and write
F5DA000
unkown
page read and write
F5FD000
unkown
page read and write
7071000
unkown
page read and write
1A82F000
direct allocation
page read and write
12E0000
unkown
page read and write
4B00000
unkown
page read and write
DE4000
heap
page read and write
2E91000
heap
page read and write
FF0000
unkown
page readonly
CD4000
heap
page read and write
305B000
heap
page read and write
4B20000
heap
page read and write
7C9E000
unkown
page readonly
14192000
unkown
page read and write
8F2D000
unkown
page read and write
7EFE000
unkown
page readonly
7FF534FCB000
unkown
page readonly
344B000
unkown
page read and write
1AA3F00E000
heap
page read and write
CD4000
heap
page read and write
9054000
unkown
page read and write
9210000
unkown
page read and write
E40000
unkown
page read and write
5120000
unkown
page readonly
3390000
unkown
page read and write
305B000
heap
page read and write
5710000
unkown
page read and write
7EFE000
unkown
page readonly
9185000
unkown
page read and write
141D3000
unkown
page read and write
CD4000
heap
page read and write
138B000
direct allocation
page execute and read and write
4E8A000
stack
page read and write
7FF53502D000
unkown
page readonly
F30000
heap
page read and write
DC0000
trusted library allocation
page read and write
5880000
unkown
page read and write
8F28000
unkown
page read and write
151B000
direct allocation
page execute and read and write
CD4000
heap
page read and write
30E9000
heap
page read and write
F49F000
unkown
page read and write
4B60000
unkown
page read and write
F6E1000
unkown
page read and write
CD4000
heap
page read and write
F2C3000
unkown
page read and write
7047000
unkown
page read and write
F4C4000
unkown
page read and write
7FF534B62000
unkown
page readonly
92DD000
unkown
page read and write
29EE5800000
heap
page read and write
7FF534E4C000
unkown
page readonly
C71000
heap
page read and write
1354B000
stack
page read and write
50A1000
unkown
page read and write
5130000
unkown
page readonly
8F0C000
unkown
page read and write
29EE57D0000
trusted library allocation
page read and write
6766D7F000
stack
page read and write
CD4000
heap
page read and write
CD4000
heap
page read and write
4BB0000
unkown
page readonly
F62F000
unkown
page read and write
380B000
stack
page read and write
9202000
unkown
page read and write
29EE585B000
heap
page read and write
9185000
unkown
page read and write
5720000
unkown
page read and write
CD4000
heap
page read and write
5106000
unkown
page read and write
2E90000
heap
page read and write
1F0CC7C0000
trusted library allocation
page read and write
C5C000
unkown
page readonly
B879000
stack
page read and write
92B0000
unkown
page read and write
5740000
unkown
page read and write
141A9000
unkown
page read and write
5C2A000
unkown
page read and write
242C0E02000
heap
page read and write
9054000
unkown
page read and write
27D46629000
heap
page read and write
2E91000
heap
page read and write
4BF0000
unkown
page read and write
F751F7C000
stack
page read and write
F2C3000
unkown
page read and write
4D50000
unkown
page read and write
DC0000
trusted library allocation
page read and write
FBD0000
unkown
page read and write
61C797E000
stack
page read and write
1132B000
unkown
page read and write
7FF534F44000
unkown
page readonly
DC0000
trusted library allocation
page read and write
928E000
unkown
page read and write
F5D0000
unkown
page read and write
CD4000
heap
page read and write
7084000
unkown
page read and write
F5EA000
unkown
page read and write
8F1C000
unkown
page read and write
F367000
unkown
page read and write
7FFC1B439000
unkown
page readonly
303A000
heap
page read and write
3098000
heap
page read and write
980000
direct allocation
page read and write
7CCF000
unkown
page readonly
F55C000
unkown
page read and write
7FF534D73000
unkown
page readonly
7FF5349CF000
unkown
page readonly
61C77FD000
stack
page read and write
23CE0E64000
heap
page read and write
5AEA000
stack
page read and write
4B10000
unkown
page read and write
F5E2000
unkown
page read and write
14294000
unkown
page read and write
8F0000
heap
page read and write
21544702000
heap
page read and write
F41C000
unkown
page read and write
8FB0000
unkown
page read and write
91CD000
unkown
page read and write
CD4000
heap
page read and write
8E6E000
stack
page read and write
14D4C000
stack
page read and write
708A000
unkown
page read and write
70F000
stack
page read and write
DC0000
trusted library allocation
page read and write
FDF000
heap
page read and write
CD4000
heap
page read and write
623A000
unkown
page read and write
5360000
unkown
page read and write
F270000
unkown
page read and write
11342000
unkown
page read and write
33EE000
unkown
page read and write
D733000
unkown
page read and write
91D8000
unkown
page read and write
E9EF000
stack
page read and write
15D0000
unkown
page read and write
F656000
unkown
page read and write
FF8000
heap
page read and write
1A82F000
direct allocation
page read and write
708A000
unkown
page read and write
3030000
heap
page read and write
10D7000
heap
page read and write
F582000
unkown
page read and write
33CC000
unkown
page read and write
7166000
unkown
page read and write
C100000
unkown
page read and write
F49F000
unkown
page read and write
F5D6000
unkown
page read and write
7A6000
heap
page read and write
6257000
unkown
page read and write
7BE7000
unkown
page readonly
7FF534B41000
unkown
page readonly
137C9000
stack
page read and write
AE06ACB000
stack
page read and write
F5A7000
unkown
page read and write
7166000
unkown
page read and write
21544602000
heap
page read and write
26F4579000
stack
page read and write
CD4000
heap
page read and write
B743000
system
page execute and read and write
48D0000
trusted library allocation
page execute and read and write
1364E000
stack
page read and write
8F54000
unkown
page read and write
6770000
unkown
page read and write
27D46646000
heap
page read and write
5790000
unkown
page read and write
7FF534A71000
unkown
page readonly
CD4000
heap
page read and write
91CD000
unkown
page read and write
B737000
system
page execute and read and write
5370000
unkown
page readonly
2FD0000
trusted library allocation
page read and write
F31B000
unkown
page read and write
8F20000
unkown
page read and write
5CF0000
unkown
page read and write
7DF442321000
unkown
page execute read
23CE0E00000
heap
page read and write
CD4000
heap
page read and write
C20000
heap
page read and write
7FF534EB3000
unkown
page readonly
7FF534CA6000
unkown
page readonly
1022B000
stack
page read and write
93E000
stack
page read and write
8F2A000
unkown
page read and write
21544570000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
97E000
stack
page read and write
7FF5349D4000
unkown
page readonly
2E91000
heap
page read and write
DC0000
trusted library allocation
page read and write
6FEB000
stack
page read and write
632C000
unkown
page read and write
26F447F000
stack
page read and write
242C1390000
trusted library allocation
page read and write
F527000
unkown
page read and write
9197000
unkown
page read and write
1570000
heap
page read and write
7FF5348A7000
unkown
page readonly
7FF534C19000
unkown
page readonly
F49C000
unkown
page read and write
C0FB000
stack
page read and write
7FF534B9B000
unkown
page readonly
56CE000
stack
page read and write
F60B000
unkown
page read and write
7FF534EEE000
unkown
page readonly
2439D313000
heap
page read and write
7FF535019000
unkown
page readonly
54A8000
unclassified section
page read and write
215447C5000
heap
page read and write
23CE0E7C000
heap
page read and write
36CA000
stack
page read and write
CD4000
heap
page read and write
4383BFE000
stack
page read and write
7FF534DBF000
unkown
page readonly
F4DF000
unkown
page read and write
6241000
unkown
page read and write
91D8000
unkown
page read and write
F5DA000
unkown
page read and write
2F90000
heap
page read and write
7FF5349C6000
unkown
page readonly
7FF534BDB000
unkown
page readonly
21543E52000
heap
page read and write
F31B000
unkown
page read and write
2E91000
heap
page read and write
1230000
unkown
page readonly
4BC0000
unkown
page readonly
9155000
unkown
page read and write
23CE1602000
trusted library allocation
page read and write
1F0CC849000
heap
page read and write
F30000
trusted library allocation
page read and write
2E91000
heap
page read and write
D875000
unkown
page read and write
8566000
unkown
page read and write
5020000
unkown
page read and write
1340000
unkown
page read and write
5400000
unkown
page readonly
7FF535107000
unkown
page readonly
2E91000
heap
page read and write
D898000
unkown
page read and write
FFB000
heap
page read and write
854E000
unkown
page read and write
928E000
unkown
page read and write
29FEE82A000
heap
page read and write
7FF535051000
unkown
page readonly
5280000
unkown
page readonly
EB20000
unkown
page read and write
52BE000
unkown
page read and write
15F0000
unkown
page readonly
1A82B000
direct allocation
page read and write
5104000
unkown
page read and write
F276000
unkown
page read and write
F5E8000
unkown
page read and write
4B90000
unkown
page read and write
E964000
stack
page read and write
90D8000
unkown
page read and write
16A0000
unclassified section
page execute and read and write
F5D0000
unkown
page read and write
7E83000
unkown
page readonly
341A000
unkown
page read and write
2439DB32000
heap
page read and write
40A000
unkown
page read and write
F5EE000
unkown
page read and write
1AA3FF10000
trusted library allocation
page read and write
7DBE000
stack
page read and write
400000
unkown
page readonly
92DD000
unkown
page read and write
21543E89000
heap
page read and write
6259000
unkown
page read and write
5AF0000
unclassified section
page read and write
8C2C000
stack
page read and write
F5E8000
unkown
page read and write
21544754000
heap
page read and write
1AA3EFB0000
heap
page read and write
BAD000
stack
page read and write
7FF534D12000
unkown
page readonly
27D46667000
heap
page read and write
29FEE800000
heap
page read and write
7FF534FB2000
unkown
page readonly
7890000
trusted library allocation
page read and write
CD4000
heap
page read and write
8F33000
unkown
page read and write
DE4000
heap
page read and write
5A10000
unkown
page read and write
29FEE900000
heap
page read and write
89B0000
unkown
page readonly
928B000
unkown
page read and write
F5D0000
unkown
page read and write
7FF534FB4000
unkown
page readonly
CD4000
heap
page read and write
67666FC000
stack
page read and write
CD4000
heap
page read and write
F580000
unkown
page read and write
F45A000
unkown
page read and write
21544700000
heap
page read and write
627C000
unkown
page read and write
50FC000
unclassified section
page read and write
61C76FE000
stack
page read and write
4960000
trusted library allocation
page execute and read and write
7890000
trusted library allocation
page read and write
30B4000
heap
page read and write
F4F1000
unkown
page read and write
F5EE000
unkown
page read and write
CD4000
heap
page read and write
F5DA000
unkown
page read and write
27D4665D000
heap
page read and write
7FF534E0C000
unkown
page readonly
3371000
unkown
page read and write
7FF534DAB000
unkown
page readonly
666B000
unkown
page read and write
CD4000
heap
page read and write
2E91000
heap
page read and write
5B66000
stack
page read and write
7FF534E7C000
unkown
page readonly
7F3C000
unkown
page readonly
1AA3EFF5000
heap
page read and write
F5E2000
unkown
page read and write
1370000
heap
page read and write
8629000
stack
page read and write
1290000
unkown
page read and write
F31B000
unkown
page read and write
FB50000
unkown
page read and write
F069000
stack
page read and write
5106000
unkown
page read and write
2439DA02000
heap
page read and write
F30000
trusted library allocation
page read and write
1A696000
direct allocation
page read and write
F5EE000
unkown
page read and write
57D0000
unkown
page readonly
7FF534EC9000
unkown
page readonly
11300000
unkown
page read and write
33EE000
unkown
page read and write
7FF534ED0000
unkown
page readonly
1AA3FEB0000
trusted library allocation
page read and write
6366000
unkown
page read and write
627C000
unkown
page read and write
7FF534B48000
unkown
page readonly
2E91000
heap
page read and write
4B30000
heap
page read and write
33B6000
unkown
page read and write
7FF534963000
unkown
page readonly
8C2C000
stack
page read and write
89AF000
stack
page read and write
B727000
system
page execute and read and write
4B4A000
unkown
page read and write
9157000
unkown
page read and write
F49C000
unkown
page read and write
1F0CC854000
heap
page read and write
DC0000
trusted library allocation
page read and write
38A0000
unkown
page read and write
6766C7C000
stack
page read and write
E5FD3AB000
stack
page read and write
61F0000
unkown
page read and write
F5D0000
unkown
page read and write
79A000
heap
page read and write
8E6E000
stack
page read and write
7FF534C64000
unkown
page readonly
D312000
unkown
page read and write
62C8000
unkown
page read and write
F661000
unkown
page read and write
2E91000
heap
page read and write
91D8000
unkown
page read and write
CA0000
heap
page read and write
CD4000
heap
page read and write
408000
unkown
page readonly
30DF000
heap
page read and write
344B000
unkown
page read and write
CD4000
heap
page read and write
FD0000
heap
page read and write
7F8E000
unkown
page readonly
2E91000
heap
page read and write
242C0E13000
heap
page read and write
1133E000
unkown
page read and write
29FEE902000
heap
page read and write
CD4000
heap
page read and write
F656000
unkown
page read and write
58D0000
unkown
page readonly
242C13C0000
remote allocation
page read and write
E5FDC7C000
stack
page read and write
F5E4000
unkown
page read and write
90D6000
unkown
page read and write
F7C000
unclassified section
page execute and read and write
21544813000
heap
page read and write
21543D90000
heap
page read and write
F276000
unkown
page read and write
9077000
unkown
page read and write
F527000
unkown
page read and write
62C6000
unkown
page read and write
AE0727E000
stack
page read and write
71BA000
unkown
page read and write
1A696000
direct allocation
page read and write
1130C000
unkown
page read and write
2FD0000
trusted library allocation
page read and write
FD8000
heap
page read and write
F72B000
unkown
page read and write
7FF53502F000
unkown
page readonly
1300000
unkown
page read and write
F621000
unkown
page read and write
90B5000
unkown
page read and write
F5EA000
unkown
page read and write
C5F000
unkown
page write copy
706E000
unkown
page read and write
35C9000
stack
page read and write
C50000
unkown
page readonly
3820000
unkown
page readonly
F75227F000
stack
page read and write
7EAC000
unkown
page readonly
7FF53490A000
unkown
page readonly
7FF534C9A000
unkown
page readonly
631D000
unkown
page read and write
4BB0000
unkown
page readonly
712D000
unkown
page read and write
27D46684000
heap
page read and write
500A000
stack
page read and write
F62F000
unkown
page read and write
341A000
unkown
page read and write
2439D1D0000
trusted library allocation
page read and write
F608000
unkown
page read and write
8F14000
unkown
page read and write
1F0CC829000
heap
page read and write
7F52000
unkown
page readonly
65973FB000
stack
page read and write
62C8000
unkown
page read and write
3853000
unkown
page read and write
F5E4000
unkown
page read and write
26F3F7B000
stack
page read and write
9157000
unkown
page read and write
712D000
unkown
page read and write
9289000
unkown
page read and write
7FF535047000
unkown
page readonly
7FF535072000
unkown
page readonly
29FEE858000
heap
page read and write
F645000
unkown
page read and write
23CE0E02000
heap
page read and write
928B000
unkown
page read and write
629D000
unkown
page read and write
215447D1000
heap
page read and write
7FF534FF2000
unkown
page readonly
D88E000
unkown
page read and write
30CD000
heap
page read and write
580C000
unkown
page read and write
2E91000
heap
page read and write
F4EC000
unkown
page read and write
13A32000
heap
page read and write
623C000
unkown
page read and write
11366000
unkown
page read and write
21543E43000
heap
page read and write
DC0000
trusted library allocation
page read and write
4C0E000
stack
page read and write
F58D000
unkown
page read and write
3068000
heap
page read and write
4A2E000
stack
page read and write
3890000
unkown
page readonly
3B10B79000
stack
page read and write
23CE0E28000
heap
page read and write
F478000
unkown
page read and write
5720000
unkown
page read and write
DC0000
trusted library allocation
page read and write
90D8000
unkown
page read and write
B6FC000
stack
page read and write
90D6000
unkown
page read and write
8CEC000
stack
page read and write
CD4000
heap
page read and write
F5EC000
unkown
page read and write
2E91000
heap
page read and write
F62F000
unkown
page read and write
C50000
unkown
page readonly
510F000
unkown
page read and write
F74B000
unkown
page read and write
92B1000
unkown
page read and write
7FF5350AA000
unkown
page readonly
33AA000
unkown
page read and write
29EE5802000
heap
page read and write
768000
heap
page read and write
2439D2CF000
heap
page read and write
52F0000
unkown
page write copy
9297000
unkown
page read and write
29EE5660000
heap
page read and write
8B0000
heap
page read and write
F507000
unkown
page read and write
F5D0000
unkown
page read and write
92DD000
unkown
page read and write
21544827000
heap
page read and write
F4EA000
unkown
page read and write
623C000
unkown
page read and write
DC0000
trusted library allocation
page read and write
7FCC000
unkown
page readonly
29FEE865000
heap
page read and write
29FEE88A000
heap
page read and write
7F52000
unkown
page readonly
3061000
heap
page read and write
7FF534EE6000
unkown
page readonly
3B10A7D000
stack
page read and write
2439D070000
heap
page read and write
F4FD000
unkown
page read and write
7FF535101000
unkown
page readonly
F479000
unkown
page read and write
F72B000
unkown
page read and write
33DB000
unkown
page read and write
7FF534A9E000
unkown
page readonly
4F53000
unclassified section
page read and write
11338000
unkown
page read and write
7FF51EC9A000
unkown
page readonly
9278000
unkown
page read and write
F5E2000
unkown
page read and write
8F31000
unkown
page read and write
7FF534E86000
unkown
page readonly
7FF53496E000
unkown
page readonly
29EE5913000
heap
page read and write
4D40000
unkown
page read and write
54E000
stack
page read and write
5350000
unkown
page readonly
7FF534E57000
unkown
page readonly
5291000
unkown
page read and write
7FF534EDE000
unkown
page readonly
CD4000
heap
page read and write
1573000
heap
page read and write
4F88000
stack
page read and write
F5F5000
unkown
page read and write
7FD9000
unkown
page readonly
242C0E3D000
heap
page read and write
3646000
stack
page read and write
B700000
system
page execute and read and write
5790000
unkown
page read and write
4B00000
unkown
page read and write
CD4000
heap
page read and write
91CD000
unkown
page read and write
23CE0E5D000
heap
page read and write
8F97000
unkown
page read and write
CD4000
heap
page read and write
DC0000
trusted library allocation
page read and write
242C0E24000
heap
page read and write
F656000
unkown
page read and write
21543D80000
heap
page read and write
4B8D000
stack
page read and write
50C2000
unkown
page read and write
2E91000
heap
page read and write
EB10000
unkown
page read and write
7FF534C80000
unkown
page readonly
7084000
unkown
page read and write
9157000
unkown
page read and write
7E83000
unkown
page readonly
CD4000
heap
page read and write
E9EF000
stack
page read and write
EE5000
stack
page read and write
F608000
unkown
page read and write
928E000
unkown
page read and write
8CEC000
stack
page read and write
3890000
unkown
page readonly
11357000
unkown
page read and write
67668FC000
stack
page read and write
8EF0000
unkown
page read and write
27D46663000
heap
page read and write
C0FB000
stack
page read and write
14216000
unkown
page read and write
52B9000
unkown
page read and write
36D0000
unkown
page readonly
CD4000
heap
page read and write
4C10000
direct allocation
page execute and read and write
7890000
trusted library allocation
page read and write
F656000
unkown
page read and write
F5E8000
unkown
page read and write
27F0000
heap
page read and write
29FEE7D0000
remote allocation
page read and write
F5FD000
unkown
page read and write
DE4000
heap
page read and write
1133E000
unkown
page read and write
9185000
unkown
page read and write
1560000
unkown
page readonly
2E91000
heap
page read and write
380B000
stack
page read and write
26F437E000
stack
page read and write
F41F000
unkown
page read and write
92DD000
unkown
page read and write
DE4000
heap
page read and write
7FF534FFE000
unkown
page readonly
7E45000
unkown
page readonly
631F000
unkown
page read and write
F55C000
unkown
page read and write
8A3C000
stack
page read and write
2E91000
heap
page read and write
8F0C000
unkown
page read and write
589D000
unkown
page read and write
1A710000
direct allocation
page read and write
1490000
unkown
page read and write
2E91000
heap
page read and write
62AC000
unkown
page read and write
246F000
stack
page read and write
7FF535055000
unkown
page readonly
1AA3F01D000
heap
page read and write
7166000
unkown
page read and write
F6E6000
unkown
page read and write
7FF534DF4000
unkown
page readonly
53FC000
stack
page read and write
7FF534C78000
unkown
page readonly
9155000
unkown
page read and write
1560000
unkown
page readonly
925F000
unkown
page read and write
3256000
heap
page read and write
C40000
trusted library allocation
page execute and read and write
13A3A000
heap
page read and write
13A30000
heap
page read and write
6322000
unkown
page read and write
400000
unkown
page readonly
1F0CC730000
heap
page read and write
52BE000
unkown
page read and write
65EE000
unclassified section
page read and write
7FFC1B4EE000
unkown
page read and write
2E91000
heap
page read and write
1590000
unkown
page readonly
2E91000
heap
page read and write
1AA3EFC0000
heap
page read and write
713B000
unkown
page read and write
9289000
unkown
page read and write
BF7A000
stack
page read and write
706E000
unkown
page read and write
91D8000
unkown
page read and write
2E91000
heap
page read and write
2E91000
heap
page read and write
5BE5000
stack
page read and write
F58D000
unkown
page read and write
CD4000
heap
page read and write
50C2000
unkown
page read and write
676628C000
stack
page read and write
6766AFD000
stack
page read and write
4BA0000
unkown
page readonly
3B10BFF000
stack
page read and write
7FF534FD2000
unkown
page readonly
5FA6000
unclassified section
page read and write
F4AB000
unkown
page read and write
7FF534C67000
unkown
page readonly
77DB000
unkown
page readonly
7CFF000
stack
page read and write
CD5000
heap
page read and write
30CD000
heap
page read and write
61C6F6C000
stack
page read and write
F4B0000
unkown
page read and write
F5F5000
unkown
page read and write
7C61000
unkown
page readonly
E40000
unkown
page read and write
628B000
unkown
page read and write
CD4000
heap
page read and write
EB20000
unkown
page read and write
708A000
unkown
page read and write
2E91000
heap
page read and write
7FF535024000
unkown
page readonly
7FF534C55000
unkown
page readonly
5CF0000
unkown
page read and write
29FF01A0000
trusted library allocation
page read and write
7FF534EBF000
unkown
page readonly
11AB7000
stack
page read and write
F5EE000
unkown
page read and write
21544722000
heap
page read and write
91CD000
unkown
page read and write
27D46656000
heap
page read and write
500A000
stack
page read and write
CD4000
heap
page read and write
F5F5000
unkown
page read and write
1378000
heap
page read and write
CD4000
heap
page read and write
510F000
unkown
page read and write
1310000
unkown
page readonly
EB1E000
unkown
page read and write
21543DF0000
heap
page read and write
F5A7000
unkown
page read and write
9197000
unkown
page read and write
1570000
heap
page read and write
C62000
unkown
page readonly
66A0000
unkown
page readonly
34A0000
unkown
page read and write
7FFC1B50A000
unkown
page readonly
30AA000
heap
page read and write
DF9000
heap
page read and write
8F42000
unkown
page read and write
5400000
unkown
page readonly
65974FE000
stack
page read and write
77AA000
heap
page read and write
CD4000
heap
page read and write
F5EA000
unkown
page read and write
FCAD000
stack
page read and write
3056000
heap
page read and write
6322000
unkown
page read and write
1F0CC813000
heap
page read and write
7FF534D83000
unkown
page readonly
77A6000
heap
page read and write
7FF534C25000
unkown
page readonly
7FF534F32000
unkown
page readonly
11368000
unkown
page read and write
338C000
unkown
page read and write
14FCE000
stack
page read and write
11330000
unkown
page read and write
5933000
unkown
page read and write
71BA000
unkown
page read and write
77AD000
heap
page read and write
7FF534BA6000
unkown
page readonly
C51000
unkown
page execute read
7FE2000
unkown
page readonly
2E91000
heap
page read and write
600000
heap
page read and write
F5DA000
unkown
page read and write
30000
heap
page read and write
2E91000
heap
page read and write
51B9000
stack
page read and write
30D3000
heap
page read and write
DE4000
heap
page read and write
29FEE7D0000
remote allocation
page read and write
BAFD000
stack
page read and write
8EEB000
stack
page read and write
F5FD000
unkown
page read and write
2E91000
heap
page read and write
F3C8000
unkown
page read and write
338C000
unkown
page read and write
F4E5000
unkown
page read and write
242C0C30000
heap
page read and write
CD4000
heap
page read and write
DC0000
trusted library allocation
page read and write
4D70000
unkown
page read and write
F926000
unkown
page read and write
F4F5000
unkown
page read and write
29FEE849000
heap
page read and write
7044000
unkown
page read and write
856C000
unkown
page read and write
33F6000
unkown
page read and write
7F3C000
unkown
page readonly
7FF534892000
unkown
page readonly
F5EE000
unkown
page read and write
D864000
unkown
page read and write
7FF534C34000
unkown
page readonly
7FF534DE7000
unkown
page readonly
36D0000
unkown
page readonly
21544722000
heap
page read and write
83AD000
stack
page read and write
4383A7B000
stack
page read and write
CD5000
heap
page read and write
11338000
unkown
page read and write
CD4000
heap
page read and write
DC0000
trusted library allocation
page read and write
31CA000
stack
page read and write
C38000
stack
page read and write
F4C4000
unkown
page read and write
F661000
unkown
page read and write
1AA3EFB8000
heap
page read and write
510F000
unkown
page read and write
1AA3F00D000
heap
page read and write
A5F000
stack
page read and write
1F0CC800000
heap
page read and write
F5E2000
unkown
page read and write
CD4000
heap
page read and write
7F13000
unkown
page readonly
1360000
unkown
page readonly
2E91000
heap
page read and write
E39000
system
page execute and read and write
4BE0000
unkown
page readonly
4F08000
stack
page read and write
F5EC000
unkown
page read and write
9297000
unkown
page read and write
F75193C000
stack
page read and write
F580000
unkown
page read and write
F60B000
unkown
page read and write
1A710000
direct allocation
page read and write
1445000
heap
page read and write
77DE000
unkown
page readonly
7780000
trusted library allocation
page read and write
C20000
heap
page read and write
E5FDD7D000
stack
page read and write
DE4000
heap
page read and write
1AA3F389000
heap
page read and write
E6E000
stack
page read and write
242C0E34000
heap
page read and write
2E91000
heap
page read and write
CD5000
heap
page read and write
7FA3000
unkown
page readonly
408000
unkown
page readonly
27D46658000
heap
page read and write
F75267F000
stack
page read and write
68C000
stack
page read and write
29FEE790000
trusted library allocation
page read and write
7CB7000
unkown
page readonly
5BE5000
stack
page read and write
2E91000
heap
page read and write
EB1E000
unkown
page read and write
F4FB000
unkown
page read and write
1002B000
stack
page read and write
92D5000
unkown
page read and write
52B9000
unkown
page read and write
21543E8C000
heap
page read and write
3050000
heap
page read and write
F62F000
unkown
page read and write
FD4000
heap
page read and write
CD4000
heap
page read and write
6254000
unkown
page read and write
3105000
heap
page read and write
4A6E000
stack
page read and write
4383AF9000
stack
page read and write
F5E4000
unkown
page read and write
B3AF000
stack
page read and write
23CE0E42000
heap
page read and write
7002000
unkown
page read and write
30C1000
heap
page read and write
92B1000
unkown
page read and write
28B5000
heap
page read and write
21544550000
trusted library allocation
page read and write
There are 2175 hidden memdumps, click here to show them.