IOC Report
02107799.exe

loading gif

Files

File Path
Type
Category
Malicious
02107799.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\build3[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\110C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\223E.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4445.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5B59.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\6A3D.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\740E.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7439.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\78BB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\794C.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8DD2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\946D.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AD22.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\AFA6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BDC0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\C45B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D789.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\DC0A.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EB26.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ECED.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\F0C7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\NewPlayer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\XandETC.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\aafg31.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\cuwsgii
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\cuwsgii:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\vwwsgii
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EIVQSAOTAQ.docx
data
dropped
malicious
C:\Users\user\Desktop\KLIZUSIQEN.pdf
data
dropped
malicious
C:\Users\user\Desktop\NWCXBPIUYI.jpg
data
dropped
malicious
C:\Users\user\_readme.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\_readme.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_AD22.exe_bc3690d31fe876d95d6ec65d5dc56974b7b47db_5f8597d0_0d70ed7f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER192B.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BEB.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2429.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2861.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER338D.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3747.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6AE2.tmp.dmp
Mini DuMP crash report, 14 streams, Sun May 28 17:44:38 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C3A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CA9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6CB6.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6E3E.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6B2.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA9B.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4D6.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9E8.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB41.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFE6E.tmp.txt
data
dropped
C:\SystemID\PersonalID.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old.vapo (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\4DDQNYCN\www.msn[1].xml
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\4DDQNYCN\www.msn[1].xml.vapo (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\223E.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\get[1].htm
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\image[1].jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1080x1440, components 3
dropped
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\bowsakkdestx.txt
JSON data
dropped
C:\Users\user\AppData\Roaming\07c6bc37dc5087\clip64.dll
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\EIVQSAOTAQ.docx.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ.pdf
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ.pdf.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\EIVQSAOTAQ.docx
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\EIVQSAOTAQ.docx.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\HMPPSXQPQV.mp3
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\HMPPSXQPQV.mp3.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\KLIZUSIQEN.xlsx
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\KLIZUSIQEN.xlsx.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\NWCXBPIUYI.jpg
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\NWCXBPIUYI.jpg.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\QCOILOQIKC.pdf
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\QCOILOQIKC.pdf.vapo (copy)
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\UNKRLCVOHV.png
data
dropped
C:\Users\user\Desktop\EIVQSAOTAQ\UNKRLCVOHV.png.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS.docx
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS.docx.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\EIVQSAOTAQ.pdf
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\EIVQSAOTAQ.pdf.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\EOWRVPQCCS.docx
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\EOWRVPQCCS.docx.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\EWZCVGNOWT.jpg
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\EWZCVGNOWT.jpg.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\GIGIYTFFYT.png
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\GIGIYTFFYT.png.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\KLIZUSIQEN.mp3
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\KLIZUSIQEN.mp3.vapo (copy)
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\ZGGKNSUKOP.xlsx
data
dropped
C:\Users\user\Desktop\EOWRVPQCCS\ZGGKNSUKOP.xlsx.vapo (copy)
data
dropped
C:\Users\user\Desktop\EWZCVGNOWT.jpg
data
dropped
C:\Users\user\Desktop\EWZCVGNOWT.jpg.vapo (copy)
data
dropped
C:\Users\user\Desktop\EWZCVGNOWT.xlsx
data
dropped
C:\Users\user\Desktop\EWZCVGNOWT.xlsx.vapo (copy)
data
dropped
C:\Users\user\Desktop\GIGIYTFFYT.png
data
dropped
C:\Users\user\Desktop\GIGIYTFFYT.png.vapo (copy)
data
dropped
C:\Users\user\Desktop\HMPPSXQPQV.mp3
data
dropped
C:\Users\user\Desktop\HMPPSXQPQV.mp3.vapo (copy)
data
dropped
C:\Users\user\Desktop\JDDHMPCDUJ.jpg
data
dropped
C:\Users\user\Desktop\JDDHMPCDUJ.jpg.vapo (copy)
data
dropped
C:\Users\user\Desktop\KLIZUSIQEN.mp3
data
dropped
C:\Users\user\Desktop\KLIZUSIQEN.mp3.vapo (copy)
data
dropped
C:\Users\user\Desktop\KLIZUSIQEN.pdf.vapo (copy)
data
dropped
C:\Users\user\Desktop\KLIZUSIQEN.xlsx
data
dropped
C:\Users\user\Desktop\KLIZUSIQEN.xlsx.vapo (copy)
data
dropped
C:\Users\user\Desktop\NWCXBPIUYI.jpg.vapo (copy)
data
dropped
C:\Users\user\Desktop\NWCXBPIUYI.mp3
data
dropped
C:\Users\user\Desktop\NWCXBPIUYI.mp3.vapo (copy)
data
dropped
C:\Users\user\Desktop\NYMMPCEIMA.png
data
modified
C:\Users\user\Desktop\NYMMPCEIMA.png.vapo (copy)
data
dropped
C:\Users\user\Desktop\QCOILOQIKC.pdf
data
dropped
C:\Users\user\Desktop\QCOILOQIKC.pdf.vapo (copy)
data
dropped
C:\Users\user\Desktop\UNKRLCVOHV.png
data
dropped
C:\Users\user\Desktop\UNKRLCVOHV.png.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP.docx
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP.docx.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP.xlsx
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP.xlsx.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\EWZCVGNOWT.xlsx
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\EWZCVGNOWT.xlsx.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\JDDHMPCDUJ.jpg
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\JDDHMPCDUJ.jpg.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\KLIZUSIQEN.pdf
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\KLIZUSIQEN.pdf.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\NWCXBPIUYI.mp3
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\NWCXBPIUYI.mp3.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\NYMMPCEIMA.png
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\NYMMPCEIMA.png.vapo (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\ZGGKNSUKOP.docx
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\ZGGKNSUKOP.docx.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ.docx
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ.docx.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ.pdf
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ.pdf.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\EIVQSAOTAQ.docx
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\EIVQSAOTAQ.docx.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\HMPPSXQPQV.mp3
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\HMPPSXQPQV.mp3.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\KLIZUSIQEN.xlsx
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\KLIZUSIQEN.xlsx.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\NWCXBPIUYI.jpg
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\NWCXBPIUYI.jpg.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\QCOILOQIKC.pdf
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\QCOILOQIKC.pdf.vapo (copy)
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\UNKRLCVOHV.png
data
dropped
C:\Users\user\Documents\EIVQSAOTAQ\UNKRLCVOHV.png.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS.docx
data
dropped
C:\Users\user\Documents\EOWRVPQCCS.docx.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\EIVQSAOTAQ.pdf
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\EIVQSAOTAQ.pdf.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\EOWRVPQCCS.docx
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\EOWRVPQCCS.docx.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\EWZCVGNOWT.jpg
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\EWZCVGNOWT.jpg.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\GIGIYTFFYT.png
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\GIGIYTFFYT.png.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\KLIZUSIQEN.mp3
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\KLIZUSIQEN.mp3.vapo (copy)
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\ZGGKNSUKOP.xlsx
data
dropped
C:\Users\user\Documents\EOWRVPQCCS\ZGGKNSUKOP.xlsx.vapo (copy)
data
dropped
C:\Users\user\Documents\EWZCVGNOWT.jpg
data
dropped
C:\Users\user\Documents\EWZCVGNOWT.jpg.vapo (copy)
data
dropped
C:\Users\user\Documents\EWZCVGNOWT.xlsx
data
dropped
C:\Users\user\Documents\EWZCVGNOWT.xlsx.vapo (copy)
data
dropped
C:\Users\user\Documents\GIGIYTFFYT.png
data
dropped
C:\Users\user\Documents\GIGIYTFFYT.png.vapo (copy)
data
dropped
C:\Users\user\Documents\HMPPSXQPQV.mp3
data
dropped
C:\Users\user\Documents\HMPPSXQPQV.mp3.vapo (copy)
data
dropped
C:\Users\user\Documents\JDDHMPCDUJ.jpg
data
dropped
C:\Users\user\Documents\JDDHMPCDUJ.jpg.vapo (copy)
data
dropped
C:\Users\user\Documents\KLIZUSIQEN.mp3
data
dropped
C:\Users\user\Documents\KLIZUSIQEN.mp3.vapo (copy)
data
dropped
C:\Users\user\Documents\KLIZUSIQEN.pdf
data
dropped
C:\Users\user\Documents\KLIZUSIQEN.pdf.vapo (copy)
data
dropped
C:\Users\user\Documents\KLIZUSIQEN.xlsx
data
dropped
C:\Users\user\Documents\KLIZUSIQEN.xlsx.vapo (copy)
data
dropped
C:\Users\user\Documents\NWCXBPIUYI.jpg
data
dropped
C:\Users\user\Documents\NWCXBPIUYI.jpg.vapo (copy)
data
dropped
C:\Users\user\Documents\NWCXBPIUYI.mp3
data
dropped
C:\Users\user\Documents\NWCXBPIUYI.mp3.vapo (copy)
data
dropped
C:\Users\user\Documents\NYMMPCEIMA.png
data
dropped
C:\Users\user\Documents\NYMMPCEIMA.png.vapo (copy)
data
dropped
C:\Users\user\Documents\Outlook Files\Outlook.pst
Microsoft Outlook email folder
dropped
C:\Users\user\Documents\Outlook Files\Outlook.pst.vapo (copy)
Microsoft Outlook email folder
dropped
C:\Users\user\Documents\QCOILOQIKC.pdf
data
dropped
C:\Users\user\Documents\QCOILOQIKC.pdf.vapo (copy)
data
dropped
C:\Users\user\Documents\UNKRLCVOHV.png
data
dropped
C:\Users\user\Documents\UNKRLCVOHV.png.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP.docx
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP.docx.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP.xlsx
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP.xlsx.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\EWZCVGNOWT.xlsx
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\EWZCVGNOWT.xlsx.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\JDDHMPCDUJ.jpg
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\JDDHMPCDUJ.jpg.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\KLIZUSIQEN.pdf
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\KLIZUSIQEN.pdf.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\NWCXBPIUYI.mp3
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\NWCXBPIUYI.mp3.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\NYMMPCEIMA.png
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\NYMMPCEIMA.png.vapo (copy)
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\ZGGKNSUKOP.docx
data
dropped
C:\Users\user\Documents\ZGGKNSUKOP\ZGGKNSUKOP.docx.vapo (copy)
data
dropped
C:\Users\user\Downloads\EIVQSAOTAQ.docx
data
dropped
C:\Users\user\Downloads\EIVQSAOTAQ.docx.vapo (copy)
data
dropped
C:\Users\user\Downloads\EIVQSAOTAQ.pdf
data
dropped
C:\Users\user\Downloads\EIVQSAOTAQ.pdf.vapo (copy)
data
dropped
C:\Users\user\Downloads\EOWRVPQCCS.docx
data
dropped
C:\Users\user\Downloads\EOWRVPQCCS.docx.vapo (copy)
data
dropped
C:\Users\user\Downloads\EWZCVGNOWT.jpg
data
dropped
C:\Users\user\Downloads\EWZCVGNOWT.jpg.vapo (copy)
data
dropped
C:\Users\user\Downloads\EWZCVGNOWT.xlsx
data
dropped
C:\Users\user\Downloads\EWZCVGNOWT.xlsx.vapo (copy)
data
dropped
C:\Users\user\Downloads\GIGIYTFFYT.png
data
dropped
C:\Users\user\Downloads\GIGIYTFFYT.png.vapo (copy)
data
dropped
C:\Users\user\Downloads\HMPPSXQPQV.mp3
data
dropped
C:\Users\user\Downloads\HMPPSXQPQV.mp3.vapo (copy)
data
dropped
C:\Users\user\Downloads\JDDHMPCDUJ.jpg
data
dropped
C:\Users\user\Downloads\JDDHMPCDUJ.jpg.vapo (copy)
data
dropped
C:\Users\user\Downloads\KLIZUSIQEN.mp3
data
dropped
C:\Users\user\Downloads\KLIZUSIQEN.mp3.vapo (copy)
data
dropped
C:\Users\user\Downloads\KLIZUSIQEN.pdf
data
dropped
C:\Users\user\Downloads\KLIZUSIQEN.pdf.vapo (copy)
data
dropped
C:\Users\user\Downloads\KLIZUSIQEN.xlsx
data
dropped
C:\Users\user\Downloads\KLIZUSIQEN.xlsx.vapo (copy)
data
dropped
C:\Users\user\Downloads\NWCXBPIUYI.jpg
data
dropped
C:\Users\user\Downloads\NWCXBPIUYI.jpg.vapo (copy)
data
dropped
C:\Users\user\Downloads\NWCXBPIUYI.mp3
data
dropped
C:\Users\user\Downloads\NWCXBPIUYI.mp3.vapo (copy)
data
dropped
C:\Users\user\Downloads\NYMMPCEIMA.png
data
dropped
C:\Users\user\Downloads\NYMMPCEIMA.png.vapo (copy)
data
dropped
C:\Users\user\Downloads\QCOILOQIKC.pdf
data
dropped
C:\Users\user\Downloads\QCOILOQIKC.pdf.vapo (copy)
data
dropped
C:\Users\user\Downloads\UNKRLCVOHV.png
data
dropped
C:\Users\user\Downloads\UNKRLCVOHV.png.vapo (copy)
data
dropped
C:\Users\user\Downloads\ZGGKNSUKOP.docx
data
dropped
C:\Users\user\Downloads\ZGGKNSUKOP.docx.vapo (copy)
data
dropped
C:\Users\user\Downloads\ZGGKNSUKOP.xlsx
data
dropped
C:\Users\user\Downloads\ZGGKNSUKOP.xlsx.vapo (copy)
data
dropped
C:\Users\user\Favorites\Amazon.url
data
dropped
C:\Users\user\Favorites\Amazon.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Bing.url
data
dropped
C:\Users\user\Favorites\Bing.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Facebook.url
data
dropped
C:\Users\user\Favorites\Facebook.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Google.url
data
dropped
C:\Users\user\Favorites\Google.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Live.url
data
dropped
C:\Users\user\Favorites\Live.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\NYTimes.url
data
dropped
C:\Users\user\Favorites\NYTimes.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Reddit.url
data
dropped
C:\Users\user\Favorites\Reddit.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Twitter.url
data
dropped
C:\Users\user\Favorites\Twitter.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Wikipedia.url
data
dropped
C:\Users\user\Favorites\Wikipedia.url.vapo (copy)
data
dropped
C:\Users\user\Favorites\Youtube.url
data
dropped
C:\Users\user\Favorites\Youtube.url.vapo (copy)
data
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped
There are 259 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\02107799.exe
C:\Users\user\Desktop\02107799.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\cuwsgii
C:\Users\user\AppData\Roaming\cuwsgii
malicious
C:\Users\user\AppData\Local\Temp\BDC0.exe
C:\Users\user\AppData\Local\Temp\BDC0.exe
malicious
C:\Users\user\AppData\Local\Temp\BDC0.exe
C:\Users\user\AppData\Local\Temp\BDC0.exe
malicious
C:\Users\user\AppData\Local\Temp\AD22.exe
C:\Users\user\AppData\Local\Temp\AD22.exe
malicious
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
malicious
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe --Task
malicious
C:\Users\user\AppData\Local\Temp\BDC0.exe
"C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\Temp\BDC0.exe
"C:\Users\user\AppData\Local\Temp\BDC0.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\Temp\223E.exe
C:\Users\user\AppData\Local\Temp\223E.exe
malicious
C:\Users\user\AppData\Local\Temp\aafg31.exe
"C:\Users\user\AppData\Local\Temp\aafg31.exe"
malicious
C:\Users\user\AppData\Local\Temp\NewPlayer.exe
"C:\Users\user\AppData\Local\Temp\NewPlayer.exe"
malicious
C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
"C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
malicious
C:\Users\user\AppData\Local\Temp\XandETC.exe
"C:\Users\user\AppData\Local\Temp\XandETC.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
malicious
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
"C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\Temp\946D.exe
C:\Users\user\AppData\Local\Temp\946D.exe
malicious
C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe
"C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8\BDC0.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\Temp\946D.exe
C:\Users\user\AppData\Local\Temp\946D.exe
malicious
C:\Users\user\AppData\Local\Temp\8DD2.exe
C:\Users\user\AppData\Local\Temp\8DD2.exe
malicious
C:\Users\user\AppData\Local\Temp\794C.exe
C:\Users\user\AppData\Local\Temp\794C.exe
malicious
C:\Users\user\AppData\Local\Temp\8DD2.exe
C:\Users\user\AppData\Local\Temp\8DD2.exe
malicious
C:\Users\user\AppData\Local\Temp\794C.exe
C:\Users\user\AppData\Local\Temp\794C.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
malicious
C:\Users\user\AppData\Local\Temp\DC0A.exe
C:\Users\user\AppData\Local\Temp\DC0A.exe
malicious
C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe
"C:\Users\user\AppData\Local\205aa591-8aa8-4e2c-a5b1-c9b7aaf860cf\build2.exe"
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
malicious
C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
C:\Users\user\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
malicious
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\user\AppData\Local\9af1d69e-1bc5-4008-ad08-a746f07a48e8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4724 -ip 4724
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 520
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "user:N"&&CACLS "mnolyk.exe" /P "user:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "user:N"&&CACLS "..\6d73a97b0c" /P "user:R" /E&&Exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "mnolyk.exe" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "mnolyk.exe" /P "user:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
There are 31 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://45.9.74.80/0bjds.apjeoighw.com/
unknown
malicious
http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C544.
unknown
malicious
http://zexeq.com/raud/get.phpL
unknown
malicious
http://colisumy.com/dl/build2.exe$run
unknown
malicious
http://wuc11.com/tmp/
malicious
http://zexeq.com/files/1/build3.exe$run
unknown
malicious
http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=truey
unknown
malicious
http://colisumy.com/dl/build2.exerun417
unknown
malicious
http://colisumy.com/dl/build2.exe/p
unknown
malicious
http://zexeq.com/raud/get.php
malicious
45.9.74.80/0bjdn2Z/index.php
malicious
https://we.tl/t-tnzomMj6
unknown
malicious
http://zexeq.com/files/1/build3.exe$runyinstall020921_delay721_sec.exe0
unknown
malicious
http://kingpirate.ru/tmp/
malicious
http://colisumy.com/dl/build2.exe
unknown
malicious
http://zexeq.com/files/1/build3.exe$rung
unknown
malicious
http://45.9.74.80/0bjds.apjeoighw.com/check/?sid=436838&key=0f2526fc923d8a6ab4c43d0a56a5696e
unknown
malicious
http://zexeq.com/files/1/build3.exe$runP
unknown
malicious
http://zexeq.com/raud/get.phpep
unknown
malicious
http://toobussy.com/tmp/
malicious
http://ladogatur.ru/tmp/
malicious
https://we.tl/t-tnzomMj6HU
unknown
malicious
http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54&first=trueb
unknown
malicious
http://zexeq.com/files/1/build3.exe
unknown
malicious
http://zexeq.com/raud/get.php?pid=903E7F261711F85395E5CEFBF4173C54
unknown
malicious
https://static.xx.fbcdn.net/rsrc.php/v3/yn/r/A-4As8UDAZ8.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://t.me/looking_glassbot
http://ss.apjeoighw.com/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/y-/l/0
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/y4/r/ZZnKfYusN8Z.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yt/r/v75M7CPu9-P.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://ss.apjeoighw.com:80/check/?sid=437284&key=c4d583a983211d53f326aa000dca4127MjIzMSIsICJ1bl9wd2Q
unknown
https://messenger.com/
unknown
http://components.groove.net/Groove/Components/SystemComponents/SystemComponents.osd?Package=net.gro
unknown
http://jp.imgjeoighw.com/sts/image.jpg
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yL/r/camCPYrr6r7.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://ss.apjeoighw.com/
unknown
http://ss.apjeoighw.com/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c33f
unknown
http://www.amazon.com/
unknown
http://ss.apjeoighw.com/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6f
unknown
http://www.twitter.com/
unknown
http://www.openssl.org/support/faq.html
unknown
http://ss.apjeoighw.com/check/?sid=437232&key=35a897019d4d6b7304232007313f15f2
unknown
http://ss.apjeoighw.com/check/safeS
unknown
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yT/r/Kp9IMjEGN_T.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://api.2ip.ua/geo.jsonFA
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yE/r/yWg6mkUCjYR.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://api.2ip.ua/geo.jsonz
unknown
https://api.2ip.ua/geo.jsonr
unknown
https://steamcommunity.com/profiles/76561199508624021
https://static.xx.fbcdn.net
unknown
http://zexeq.com/files/1/build3.exerun
unknown
http://ss.apjeoighw.com/check/safe13f15f2
unknown
http://www.reddit.com/
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yq/l/0
unknown
http://colisumy.com/dlget.php?pid=903E7F261711F85395E5CEFBF4173C54
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.nytimes.com/
unknown
https://api.2ip.ua/geo.jsonX
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yE/l/0
unknown
https://api.2ip.ua/
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/y2/l/0
unknown
http://ss.apjeoighw.com/check/?sid=437712&key=e0936dbb5215a1cc85afbf7dbb62727d
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yP/l/0
unknown
http://ss.apjeoighw.com:80/check/?sid=436898&key=31b04f4e86a5030e55172a3ce21438a6
unknown
http://components.groove.net/Groove/Components/Root.osd?Package=net.groove.Groove.Tools.System.Groov
unknown
http://ss.apjeoighw.com/check/safe
unknown
http://ss.apjeoighw.com:80/check/safe
unknown
https://api.2ip.ua/geo.json;?
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yO/r/_tJ17sGyxOX.js?_nc_x=Ij3Wp8lg5Kz
unknown
https://api.2ip.ua/geo.json
unknown
http://ss.apjeoighw.com:80/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bc
unknown
http://ss.apjeoighw.com:80/check/?sid=437114&key=556b8e8f2c0037a585c40888436f6c335
unknown
http://ss.apjeoighw.com/check/safe1B
unknown
https://api.2ip.ua/geo.json#?
unknown
http://ss.apjeoighw.com:80/check/safeD
unknown
http://www.youtube.com/
unknown
https://api.2ip.ua/H
unknown
https://we.tl/t-tnzomMj6$
unknown
http://ss.apjeoighw.com/check/?sid=437058&key=7c45c7b8ba54fad24dbc26b647ebd1bcf
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/ye/r/sczXDyPA0UL.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://www.wikipedia.com/
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yB/l/0
unknown
https://static.xx.fbcdn.net/rsrc.php/v3i7M54/yx/l/en_US/LsRZeEzcd6B.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://www.live.com/
unknown
https://api.2ip.ua/:m
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yI/r/Ib90vcVxYzI.js?_nc_x=Ij3Wp8lg5Kz
unknown
http://www.google.com/
unknown
https://static.xx.fbcdn.net/rsrc.php/v3/yK/l/0
unknown
There are 80 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
217.174.148.28
unknown
Bulgaria
malicious
175.119.10.231
unknown
Korea Republic of
malicious
211.40.39.251
unknown
Korea Republic of
malicious
211.171.233.129
unknown
Korea Republic of
malicious
211.119.84.112
unknown
Korea Republic of
malicious
194.180.48.90
unknown
Germany
malicious
123.140.161.243
unknown
Korea Republic of
malicious
80.66.203.53
unknown
United Kingdom
malicious
45.9.74.80
unknown
Russian Federation
malicious
188.114.97.7
unknown
European Union
malicious
188.114.96.7
unknown
European Union
malicious
183.100.39.157
unknown
Korea Republic of
malicious
80.210.25.252
unknown
Iran (ISLAMIC Republic Of)
malicious
222.236.49.123
unknown
Korea Republic of
malicious
222.236.49.124
unknown
Korea Republic of
malicious
192.168.2.1
unknown
unknown
157.240.9.35
unknown
United States
103.100.211.218
unknown
Hong Kong
154.221.31.191
unknown
Seychelles
157.240.17.35
unknown
United States
8.8.8.8
unknown
United States
157.240.17.17
unknown
United States
162.0.217.254
unknown
Canada
211.59.14.90
unknown
Korea Republic of
20.189.173.21
unknown
United States
There are 15 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
SysHelper
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C00FA
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} {0000013A-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ybpny\9ns1q69r-1op5-4008-nq08-n746s07n48r8\OQP0.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050320
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files (x86)\Common Files\Microsoft Shared\Office16\oregres.dll,-305
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C00FA
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000050320
VirtualDesktop
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\nysbaf\NccQngn\Ybpny\9ns1q69r-1op5-4008-nq08-n746s07n48r8\OQP0.rkr
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.101
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.100
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Security and Maintenance
MessageTime
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.contact\OpenWithProgids
contact_wab_auto_file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MK3D\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
SysHelper
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\4724
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\4724
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\4724
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\760
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\760
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\760
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\5456
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\5456
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\5456
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\1440
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\1440
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\1440
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6000
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6000
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6000
CreationTime
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184008C5A0EBAC
There are 162 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
877000
heap
page read and write
malicious
2410000
direct allocation
page execute and read and write
malicious
830000
direct allocation
page read and write
malicious
22E1000
unclassified section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2510000
direct allocation
page execute and read and write
malicious
40C5000
trusted library allocation
page read and write
malicious
2520000
direct allocation
page execute and read and write
malicious
871000
unclassified section
page read and write
malicious
7F0000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2321000
unclassified section
page read and write
malicious
24B0000
direct allocation
page execute and read and write
malicious
61000
unkown
page execute read
malicious
2460000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2480000
direct allocation
page execute and read and write
malicious
61000
unkown
page execute read
malicious
FF1000
unkown
page execute read
malicious
400000
remote allocation
page execute and read and write
malicious
61000
unkown
page execute read
malicious
400000
remote allocation
page execute and read and write
malicious
2470000
direct allocation
page execute and read and write
malicious
22F0000
direct allocation
page execute and read and write
malicious
850000
direct allocation
page read and write
malicious
FF1000
unkown
page execute read
malicious
2FDE000
stack
page read and write
2950000
unkown
page read and write
30B0000
remote allocation
page read and write
20901600000
heap
page read and write
20901713000
heap
page read and write
780000
heap
page read and write
2950000
unkown
page read and write
3170000
heap
page read and write
6EC000
unkown
page readonly
38D0000
heap
page read and write
20955D9A000
heap
page read and write
A9F000
stack
page read and write
20955D1D000
heap
page read and write
20955D77000
heap
page read and write
3F81000
heap
page read and write
20955D00000
heap
page read and write
20953C59000
heap
page read and write
20953C1A000
heap
page read and write
20955D46000
heap
page read and write
7FF585D63000
unkown
page readonly
20955D04000
heap
page read and write
20955C04000
heap
page read and write
20955D7A000
heap
page read and write
4A6000
unkown
page write copy
20953C60000
heap
page read and write
20953BEF000
heap
page read and write
2960000
unkown
page read and write
DD7C000
unkown
page read and write
87C6000
unkown
page read and write
954000
heap
page read and write
7FF585D66000
unkown
page readonly
72B9000
unkown
page readonly
9AA000
heap
page read and write
278E000
stack
page read and write
20955D43000
heap
page read and write
A0000
unkown
page readonly
5B4000
heap
page read and write
20955D04000
heap
page read and write
20955D19000
heap
page read and write
20955DFF000
heap
page read and write
133AE000
stack
page read and write
20955E44000
heap
page read and write
2728000
heap
page read and write
20955D92000
heap
page read and write
4083000
heap
page read and write
FF0000
unkown
page readonly
8631000
unkown
page read and write
20953C66000
heap
page read and write
20955D9A000
heap
page read and write
400000
unkown
page readonly
137AC000
stack
page read and write
20955D9B000
heap
page read and write
28EE000
stack
page read and write
EEA0000
unkown
page read and write
20955CDA000
heap
page read and write
4850000
unkown
page readonly
1373C000
unkown
page read and write
20955E44000
heap
page read and write
7FF585AD9000
unkown
page readonly
750000
heap
page read and write
2950000
unkown
page read and write
3F81000
heap
page read and write
7FF585937000
unkown
page readonly
9890000
direct allocation
page read and write
4088000
heap
page read and write
20955D43000
heap
page read and write
7FF6607D1000
unkown
page execute read
2AC1000
unkown
page read and write
20953C63000
heap
page read and write
2E30000
unkown
page readonly
20955D5B000
heap
page read and write
9890000
direct allocation
page read and write
20955CDA000
heap
page read and write
20953C0C000
heap
page read and write
26CF000
stack
page read and write
87B000
heap
page read and write
7FF585A34000
unkown
page readonly
66A000
heap
page read and write
401000
unkown
page execute read
2700000
unkown
page readonly
61C0000
unkown
page read and write
20953C5B000
unkown
page read and write
20953C5A000
heap
page read and write
7FF56077E000
unkown
page readonly
400000
unkown
page readonly
20955D95000
heap
page read and write
1040000
heap
page read and write
2990000
unkown
page read and write
7FFA13227000
unkown
page readonly
10357000
unkown
page read and write
7FF58598B000
unkown
page readonly
2DE0000
trusted library allocation
page read and write
7FF5859E0000
unkown
page readonly
6B9000
heap
page read and write
20953C50000
heap
page read and write
20953C59000
heap
page read and write
20955D58000
heap
page read and write
3070000
heap
page read and write
7FF56085C000
unkown
page readonly
20955D2E000
heap
page read and write
52B000
remote allocation
page execute and read and write
30B0000
remote allocation
page read and write
20955D43000
heap
page read and write
2AAD000
unkown
page read and write
20955D2B000
heap
page read and write
20953C64000
heap
page read and write
20955DEF000
heap
page read and write
20953C5A000
heap
page read and write
9890000
direct allocation
page read and write
C1F000
stack
page read and write
8B3000
heap
page read and write
2950000
unkown
page read and write
2350000
heap
page read and write
B20A000
stack
page read and write
20955E02000
heap
page read and write
20953C59000
heap
page read and write
2C8F000
stack
page read and write
88A1979000
stack
page read and write
2990000
unkown
page read and write
680000
heap
page read and write
2CE0000
remote allocation
page read and write
7FF585D69000
unkown
page readonly
A5F000
stack
page read and write
390F000
stack
page read and write
20953DA5000
heap
page read and write
850000
direct allocation
page read and write
20955D36000
heap
page read and write
9C000
stack
page read and write
20953C18000
heap
page read and write
2493D102000
unkown
page read and write
2B4C000
stack
page read and write
20953C61000
heap
page read and write
953000
heap
page read and write
20953C62000
heap
page read and write
7FF6607D0000
unkown
page readonly
15AE000
stack
page read and write
2E27000
stack
page read and write
429000
unkown
page write copy
6EC000
unkown
page readonly
20955D9B000
heap
page read and write
5BE000
stack
page read and write
20955D96000
heap
page read and write
13731000
stack
page read and write
20953C65000
heap
page read and write
9890000
direct allocation
page read and write
400000
unkown
page execute and read and write
620000
heap
page read and write
25C0000
heap
page read and write
5830000
unkown
page read and write
20955DEF000
heap
page read and write
2910000
unkown
page read and write
CCBB000
unkown
page read and write
7C0000
heap
page read and write
6DA000
heap
page read and write
20955D9A000
heap
page read and write
20953C59000
heap
page read and write
20955CDA000
heap
page read and write
29E0000
heap
page read and write
20955DD3000
heap
page read and write
30000
heap
page read and write
30B1000
heap
page read and write
316A000
stack
page read and write
7FF660837000
unkown
page write copy
7DA000
heap
page read and write
4A6000
unkown
page write copy
EE2D000
unkown
page read and write
20955D19000
heap
page read and write
6EC000
unkown
page readonly
6F85000
unkown
page readonly
20955CFE000
heap
page read and write
95C000
heap
page read and write
2493D046000
unkown
page read and write
20953C0C000
heap
page read and write
2950000
unkown
page read and write
7FF585940000
unkown
page readonly
400000
unkown
page execute and read and write
20955D9A000
heap
page read and write
20955D4B000
heap
page read and write
20955D66000
heap
page read and write
9890000
direct allocation
page read and write
4A6000
unkown
page read and write
B0F000
stack
page read and write
20953C59000
heap
page read and write
2980000
unkown
page read and write
7FF5859B4000
unkown
page readonly
7FF58571D000
unkown
page readonly
79E000
stack
page read and write
20955BF6000
heap
page read and write
6F7E000
unkown
page readonly
20955D07000
heap
page read and write
5830000
unkown
page read and write
300A000
heap
page read and write
38A0000
heap
page read and write
20953C59000
heap
page read and write
2950000
unkown
page read and write
20955D46000
heap
page read and write
D70C000
stack
page read and write
20955E02000
heap
page read and write
20955E40000
heap
page read and write
9890000
direct allocation
page read and write
77E000
stack
page read and write
20953C1A000
heap
page read and write
20955D44000
heap
page read and write
2990000
unkown
page read and write
20953C59000
heap
page read and write
29EE000
unkown
page read and write
2D40000
unkown
page read and write
1392C000
stack
page read and write
7FF585ACA000
unkown
page readonly
820000
heap
page read and write
20953B70000
unkown
page read and write
6EC000
unkown
page readonly
19E000
stack
page read and write
6CE000
stack
page read and write
20901702000
heap
page read and write
20955D43000
heap
page read and write
20955D92000
heap
page read and write
2950000
unkown
page read and write
288F000
stack
page read and write
AE88000
stack
page read and write
30000
heap
page read and write
7FF5856C4000
unkown
page readonly
F0F1000
unkown
page read and write
401000
unkown
page execute read
20953C62000
heap
page read and write
20955CFF000
heap
page read and write
2C80000
heap
page read and write
20955CFF000
heap
page read and write
408A000
heap
page read and write
7FF5859E5000
unkown
page readonly
97F000
stack
page read and write
6EC000
unkown
page readonly
800000
heap
page read and write
20955D95000
heap
page read and write
194DF1F0000
heap
page read and write
3F81000
heap
page read and write
20955D9B000
heap
page read and write
2960000
unkown
page read and write
4A6000
unkown
page write copy
7FF6E46FC000
unkown
page readonly
3870000
heap
page read and write
EC67000
unkown
page read and write
20955E02000
heap
page read and write
29EF000
stack
page read and write
B753000
unkown
page read and write
20955D09000
heap
page read and write
20953C62000
heap
page read and write
20955E44000
heap
page read and write
2EFB000
stack
page read and write
3071000
heap
page read and write
7FF560836000
unkown
page readonly
20955D05000
heap
page read and write
20955D76000
heap
page read and write
5830000
unkown
page read and write
20955D12000
heap
page read and write
20955DEF000
heap
page read and write
7FF585908000
unkown
page readonly
20953C63000
heap
page read and write
20955CDA000
heap
page read and write
AF0000
heap
page read and write
20955E99000
heap
page read and write
67A000
heap
page read and write
910000
heap
page read and write
4CE0000
unkown
page read and write
20955E40000
heap
page read and write
7FF585C8E000
unkown
page readonly
20955E44000
heap
page read and write
20953C50000
heap
page read and write
6F0000
heap
page read and write
400000
unkown
page readonly
EEBD000
unkown
page read and write
85C8000
unkown
page read and write
7FF56077E000
unkown
page readonly
20953C0C000
heap
page read and write
26C0000
heap
page read and write
20953C62000
heap
page read and write
20953C0C000
heap
page read and write
2F49000
heap
page read and write
3900000
heap
page read and write
20953C59000
heap
page read and write
BA0000
heap
page read and write
20953C55000
heap
page read and write
642000
heap
page read and write
20953C01000
heap
page read and write
20953C5C000
unkown
page read and write
20901713000
heap
page read and write
31B0000
remote allocation
page read and write
20953BEF000
heap
page read and write
20955D46000
heap
page read and write
258F000
stack
page read and write
2950000
unkown
page read and write
20953C50000
heap
page read and write
8AE000
stack
page read and write
20953C0C000
heap
page read and write
262F000
stack
page read and write
20955DED000
heap
page read and write
7FF5608E3000
unkown
page readonly
7FF56085C000
unkown
page readonly
20955D19000
heap
page read and write
9890000
direct allocation
page read and write
2950000
unkown
page read and write
278F000
stack
page read and write
196000
stack
page read and write
2950000
unkown
page read and write
20955C00000
heap
page read and write
20953C18000
heap
page read and write
9890000
direct allocation
page read and write
20953C63000
heap
page read and write
7FF585B6C000
unkown
page readonly
20953BD3000
direct allocation
page read and write
67A000
heap
page read and write
20953BEF000
heap
page read and write
B609000
stack
page read and write
5830000
unkown
page read and write
38AA000
heap
page read and write
2F1A000
heap
page read and write
67A000
heap
page read and write
20955D63000
heap
page read and write
20955D5B000
heap
page read and write
20955E44000
heap
page read and write
31DB000
heap
page read and write
8D0000
heap
page read and write
12CB1000
unkown
page read and write
7FF58575D000
unkown
page readonly
6A7000
heap
page read and write
20955CDA000
heap
page read and write
20955D92000
heap
page read and write
20955E1E000
heap
page read and write
2950000
unkown
page read and write
126FB000
unkown
page read and write
80D000
heap
page read and write
20953C01000
unkown
page read and write
20901702000
heap
page read and write
72EEE7B000
stack
page read and write
20953C01000
heap
page read and write
2090143C000
heap
page read and write
9890000
direct allocation
page read and write
20955D95000
heap
page read and write
7D0000
direct allocation
page read and write
6EC000
unkown
page readonly
20955CDA000
heap
page read and write
79E000
stack
page read and write
20953C50000
heap
page read and write
4860000
unkown
page read and write
20953C57000
heap
page read and write
20955CF1000
heap
page read and write
20955D0E000
heap
page read and write
6298000
unkown
page read and write
20953C59000
heap
page read and write
2493D000000
unkown
page read and write
820000
heap
page read and write
20955E44000
heap
page read and write
32EA000
heap
page read and write
20955D44000
heap
page read and write
861000
heap
page read and write
6ABB000
unkown
page readonly
7CE000
heap
page read and write
20901702000
heap
page read and write
20953C66000
heap
page read and write
9B000
unkown
page write copy
AC0000
unkown
page readonly
4B3B000
stack
page read and write
305F000
stack
page read and write
20955D04000
heap
page read and write
5830000
unkown
page read and write
409000
unkown
page execute read
20953C62000
heap
page read and write
9890000
direct allocation
page read and write
408F000
heap
page read and write
AB0000
unkown
page read and write
401000
unkown
page execute read
5830000
unkown
page read and write
2950000
unkown
page read and write
7FF6E4340000
unkown
page readonly
6B7000
heap
page read and write
20955D96000
heap
page read and write
20955E44000
heap
page read and write
7FF585974000
unkown
page readonly
2493CF90000
heap
page read and write
20955D06000
heap
page read and write
477E000
unkown
page read and write
7FF5859BD000
unkown
page readonly
20955D43000
heap
page read and write
2950000
unkown
page read and write
20953C04000
heap
page read and write
98C0000
trusted library allocation
page read and write
429000
unkown
page write copy
28CF000
stack
page read and write
20953C59000
heap
page read and write
26DF000
stack
page read and write
20955C10000
heap
page read and write
7FF58573B000
unkown
page readonly
31B0000
heap
page read and write
D1F000
stack
page read and write
2A0F000
stack
page read and write
20955D46000
heap
page read and write
6F97000
unkown
page readonly
20953BEA000
heap
page read and write
20955D0A000
heap
page read and write
DD7F000
unkown
page read and write
20953C0C000
heap
page read and write
E7D000
stack
page read and write
4210000
unkown
page read and write
31E7000
heap
page read and write
20955D0E000
heap
page read and write
20901702000
heap
page read and write
2E30000
remote allocation
page read and write
27CE000
stack
page read and write
830000
direct allocation
page read and write
AC10000
unkown
page read and write
DED000
stack
page read and write
20955D19000
heap
page read and write
2950000
unkown
page read and write
1342E000
stack
page read and write
3060000
trusted library allocation
page read and write
20953C18000
heap
page read and write
5E0000
heap
page read and write
20901400000
unkown
page read and write
897C000
unkown
page read and write
20955D95000
heap
page read and write
4350000
unkown
page read and write
20955CDA000
heap
page read and write
2DC0000
trusted library allocation
page read and write
87B7000
unkown
page read and write
5830000
unkown
page read and write
8B9000
heap
page read and write
12CB1000
unkown
page read and write
2950000
unkown
page read and write
7FF5858FA000
unkown
page readonly
20955D0D000
heap
page read and write
9890000
direct allocation
page read and write
CE69000
unkown
page read and write
7D0000
heap
page read and write
20953C50000
heap
page read and write
20953C0C000
heap
page read and write
6E0000
direct allocation
page execute and read and write
6150000
unkown
page read and write
85E000
stack
page read and write
670000
heap
page read and write
B70B000
stack
page read and write
20953C50000
heap
page read and write
7FF6E46D1000
unkown
page write copy
7FF560836000
unkown
page readonly
20953C14000
heap
page read and write
7FF585D6E000
unkown
page readonly
401000
unkown
page execute read
4088000
heap
page read and write
20955E1D000
heap
page read and write
85DD000
unkown
page read and write
20955DEF000
heap
page read and write
9890000
direct allocation
page read and write
9C000
stack
page read and write
2F70000
heap
page read and write
20955D9A000
heap
page read and write
102E000
stack
page read and write
13331000
stack
page read and write
2551000
heap
page read and write
63A0000
unkown
page read and write
66F000
unkown
page readonly
20955C49000
heap
page read and write
A9F000
stack
page read and write
20953C50000
heap
page read and write
20955CFE000
heap
page read and write
22DC000
stack
page read and write
20955D43000
heap
page read and write
90D000
heap
page read and write
20953BEA000
heap
page read and write
20955CDA000
heap
page read and write
9890000
direct allocation
page read and write
840000
unkown
page readonly
20953C65000
heap
page read and write
2950000
remote allocation
page read and write
20955D95000
heap
page read and write
ADE000
stack
page read and write
20955CF1000
heap
page read and write
20953BD2000
heap
page read and write
87D9000
unkown
page read and write
20953C64000
heap
page read and write
20955D46000
heap
page read and write
20953C62000
heap
page read and write
20953C1A000
heap
page read and write
20955D07000
heap
page read and write
327C000
stack
page read and write
305E000
stack
page read and write
20955D07000
heap
page read and write
29A0000
unkown
page read and write
2950000
unkown
page read and write
9890000
direct allocation
page read and write
20953C0C000
heap
page read and write
52B000
remote allocation
page execute and read and write
20955DFF000
heap
page read and write
20953C50000
heap
page read and write
20955D75000
heap
page read and write
20955E99000
heap
page read and write
194DF1D0000
heap
page read and write
6EC000
unkown
page readonly
20955D06000
heap
page read and write
23A0000
heap
page read and write
2C90000
heap
page read and write
23BE000
stack
page read and write
20953BE1000
unkown
page read and write
19C000
stack
page read and write
409000
unkown
page execute read
790000
direct allocation
page read and write
20955D66000
heap
page read and write
B9F000
stack
page read and write
5E2E000
stack
page read and write
7FFA131BA000
unkown
page read and write
20955D49000
heap
page read and write
FF0000
unkown
page readonly
20953BEA000
heap
page read and write
818000
heap
page execute and read and write
7FF585E26000
unkown
page readonly
2493DA02000
unkown
page read and write
20955CFA000
heap
page read and write
627F000
unkown
page read and write
2D94000
trusted library allocation
page read and write
20955D43000
heap
page read and write
53C0000
unkown
page readonly
4350000
unkown
page read and write
20955C05000
heap
page read and write
20955DFF000
heap
page read and write
193000
stack
page read and write
20955E1D000
heap
page read and write
9890000
direct allocation
page read and write
68A000
heap
page read and write
5F6E000
stack
page read and write
20953C5C000
unkown
page read and write
20953C18000
heap
page read and write
7FF585DC2000
unkown
page readonly
2950000
unkown
page read and write
2F31000
heap
page read and write
5830000
unkown
page read and write
20955BF1000
heap
page read and write
20955C10000
heap
page read and write
81E000
stack
page read and write
2950000
stack
page read and write
20955D58000
heap
page read and write
19C000
stack
page read and write
7FF560855000
unkown
page readonly
6CC000
unkown
page readonly
20953C18000
heap
page read and write
20953C64000
heap
page read and write
20955D04000
heap
page read and write
20901613000
heap
page read and write
20955CDA000
heap
page read and write
9890000
direct allocation
page read and write
6CE000
stack
page read and write
41C3000
unkown
page read and write
20953C63000
heap
page read and write
2950000
unkown
page read and write
7FF56084C000
unkown
page readonly
19E000
stack
page read and write
20955E44000
heap
page read and write
9FF000
stack
page read and write
2950000
unkown
page read and write
19C000
stack
page read and write
19C000
stack
page read and write
7FF58577B000
unkown
page readonly
AF8000
heap
page read and write
20955D5B000
heap
page read and write
20955D43000
heap
page read and write
2904000
unkown
page read and write
20955CFA000
heap
page read and write
33E0000
heap
page read and write
7FF5856BC000
unkown
page readonly
3900000
heap
page read and write
7FF585DE2000
unkown
page readonly
2F70000
remote allocation
page read and write
7FF585DCA000
unkown
page readonly
560000
heap
page read and write
20955CFF000
heap
page read and write
20953C04000
heap
page read and write
20901429000
heap
page read and write
4A6000
unkown
page write copy
26E0000
heap
page read and write
7245000
unkown
page readonly
400000
unkown
page readonly
193000
stack
page read and write
3070000
heap
page read and write
20901800000
heap
page read and write
1070000
heap
page read and write
7FF660832000
unkown
page write copy
9890000
direct allocation
page read and write
7FF585A69000
unkown
page readonly
20953C16000
heap
page read and write
E376000
heap
page read and write
2950000
unkown
page read and write
23FE000
stack
page read and write
346E000
stack
page read and write
20953C59000
heap
page read and write
1038A000
unkown
page read and write
2950000
unkown
page read and write
7FF5859CE000
unkown
page readonly
20901500000
trusted library allocation
page read and write
9890000
direct allocation
page read and write
20955D07000
heap
page read and write
20953C63000
heap
page read and write
9890000
direct allocation
page read and write
640000
heap
page read and write
68CA000
stack
page read and write
3F81000
heap
page read and write
87C8000
unkown
page read and write
8A1000
heap
page read and write
7FF5607FA000
unkown
page readonly
2950000
unkown
page read and write
401000
unkown
page execute read
AC0B000
stack
page read and write
23B0000
heap
page read and write
60AC000
stack
page read and write
246F000
stack
page read and write
87E7000
unkown
page read and write
9890000
direct allocation
page read and write
9890000
direct allocation
page read and write
20955E44000
heap
page read and write
EB3F7F000
stack
page read and write
882F000
unkown
page read and write
9890000
direct allocation
page read and write
2090143C000
heap
page read and write
20955CFA000
heap
page read and write
20955D19000
heap
page read and write
400000
unkown
page execute and read and write
2950000
unkown
page read and write
20955E44000
heap
page read and write
9890000
direct allocation
page read and write
4080000
heap
page read and write
20955D10000
heap
page read and write
2950000
unkown
page read and write
EF3E000
unkown
page read and write
20955D9A000
heap
page read and write
4190000
unkown
page read and write
4350000
unkown
page read and write
126F6000
unkown
page read and write
20955D6C000
heap
page read and write
830000
heap
page read and write
2970000
unkown
page read and write
881D000
unkown
page read and write
160F000
stack
page read and write
20955D0E000
heap
page read and write
20955D9B000
heap
page read and write
20955D96000
heap
page read and write
702000
unkown
page readonly
20953BE1000
heap
page read and write
5BEE000
stack
page read and write
20955D9B000
heap
page read and write
13A0000
heap
page read and write
2510000
heap
page read and write
20953C59000
heap
page read and write
400000
unkown
page readonly
8804000
unkown
page read and write
20953C01000
heap
page read and write
20955D2B000
heap
page read and write
7E0000
direct allocation
page execute and read and write
2DDF000
stack
page read and write
20955DEF000
heap
page read and write
20955E1D000
heap
page read and write
371F000
heap
page read and write
20953C66000
heap
page read and write
20955DF0000
heap
page read and write
31C9000
heap
page read and write
20955D48000
heap
page read and write
20953C18000
heap
page read and write
196000
stack
page read and write
20955D9B000
heap
page read and write
7FF585D28000
unkown
page readonly
20955D06000
heap
page read and write
9890000
direct allocation
page read and write
2493D048000
unkown
page read and write
20953C59000
heap
page read and write
20955D19000
heap
page read and write
20955D0E000
heap
page read and write
20953BEA000
heap
page read and write
7FF56084F000
unkown
page readonly
20955E44000
heap
page read and write
730000
heap
page read and write
5910000
unkown
page read and write
29A0000
unkown
page read and write
2640000
heap
page read and write
20955D95000
heap
page read and write
30B0000
heap
page read and write
6517000
unkown
page read and write
20953C65000
heap
page read and write
20955CF1000
heap
page read and write
20953C01000
heap
page read and write
72EEA7B000
stack
page read and write
10290000
unkown
page read and write
20955D95000
heap
page read and write
20955E44000
heap
page read and write
ADE000
stack
page read and write
400000
unkown
page readonly
13463000
stack
page read and write
7D7000
heap
page read and write
A9E000
stack
page read and write
109A000
heap
page read and write
20955D83000
heap
page read and write
20955E28000
heap
page read and write
20955D43000
heap
page read and write
74E000
stack
page read and write
7FF5608E3000
unkown
page readonly
7FF585D4D000
unkown
page readonly
B008000
stack
page read and write
7FF5859A5000
unkown
page readonly
20955D96000
heap
page read and write
3F81000
heap
page read and write
83E000
stack
page read and write
12E55000
unkown
page read and write
2980000
unkown
page read and write
20955DFF000
heap
page read and write
20955D19000
heap
page read and write
20955D96000
heap
page read and write
20955D42000
heap
page read and write
7FF585CFD000
unkown
page readonly
7FF585CD1000
unkown
page readonly
138AC000
stack
page read and write
F78000
stack
page read and write
9890000
direct allocation
page read and write
125F4000
unkown
page read and write
2CBE000
stack
page read and write
20901702000
heap
page read and write
9890000
direct allocation
page read and write
7FF585BB8000
unkown
page readonly
3F81000
heap
page read and write
85C4000
unkown
page read and write
5CEE000
stack
page read and write
7FF58596C000
unkown
page readonly
35EF000
stack
page read and write
20955DF0000
heap
page read and write
7A70000
unkown
page read and write
20955DEF000
heap
page read and write
2900000
unkown
page read and write
20953C60000
heap
page read and write
2950000
unkown
page read and write
26B6000
heap
page read and write
4084000
heap
page read and write
20953C5B000
heap
page read and write
20955DEF000
heap
page read and write
20953C50000
heap
page read and write
8407000
stack
page read and write
5EA000
heap
page read and write
67A000
heap
page read and write
20953C59000
heap
page read and write
81D0000
unkown
page readonly
1F0000
heap
page read and write
20953C59000
heap
page read and write
20955D0D000
heap
page read and write
20955D07000
heap
page read and write
20953C0C000
heap
page read and write
20955BF1000
heap
page read and write
26E0000
unkown
page readonly
20953C50000
heap
page read and write
273F000
stack
page read and write
1642000
heap
page read and write
28CE000
stack
page read and write
194E0BF0000
trusted library allocation
page read and write
20955E44000
heap
page read and write
9C000
stack
page read and write
20955D9B000
heap
page read and write
A3F000
stack
page read and write
2950000
unkown
page read and write
7FF585A9F000
unkown
page readonly
2960000
unkown
page read and write
7FF6E46CA000
unkown
page readonly
20955D83000
heap
page read and write
ECFA000
unkown
page read and write
5830000
unkown
page read and write
2960000
unkown
page read and write
8CA000
heap
page read and write
20955C10000
heap
page read and write
20953C5F000
heap
page read and write
20955E02000
heap
page read and write
71A000
heap
page read and write
5830000
unkown
page read and write
20953C5F000
heap
page read and write
253F000
stack
page read and write
32E0000
heap
page read and write
9890000
direct allocation
page read and write
401000
unkown
page execute read
306C000
stack
page read and write
6FAF000
unkown
page readonly
904000
heap
page read and write
20955DEF000
heap
page read and write
408B000
heap
page read and write
263F000
stack
page read and write
1030000
unkown
page readonly
20955D9B000
heap
page read and write
43B0000
unkown
page read and write
20955CDA000
heap
page read and write
9890000
direct allocation
page read and write
87DC000
unkown
page read and write
20953C18000
heap
page read and write
20955D9A000
heap
page read and write
7FF5859B7000
unkown
page readonly
20953C5E000
heap
page read and write
390A000
heap
page read and write
2950000
remote allocation
page read and write
627000
heap
page read and write
7FF585D05000
unkown
page readonly
9890000
direct allocation
page read and write
2090143C000
heap
page read and write
2950000
unkown
page read and write
EB3D7C000
stack
page read and write
B00A000
stack
page read and write
EB90000
unkown
page read and write
20953BD4000
heap
page read and write
8949000
unkown
page read and write
20953C63000
heap
page read and write
7FF560831000
unkown
page readonly
2970000
unkown
page read and write
7FF5859F3000
unkown
page readonly
20955CF1000
heap
page read and write
20953C50000
heap
page read and write
20955D9A000
heap
page read and write
23F0000
direct allocation
page read and write
30000
heap
page read and write
20955D92000
heap
page read and write
31C0000
heap
page read and write
20955E40000
heap
page read and write
20953C66000
heap
page read and write
2970000
unkown
page read and write
20955D14000
heap
page read and write
7FF560855000
unkown
page readonly
2950000
unkown
page read and write
20955D76000
heap
page read and write
6C0000
heap
page read and write
20955E1E000
heap
page read and write
7FF58592C000
unkown
page readonly
4370000
unkown
page read and write
394E000
stack
page read and write
20955C10000
heap
page read and write
2FC0000
heap
page read and write
20953C0C000
heap
page read and write
620000
heap
page read and write
2493D024000
unkown
page read and write
20955C63000
heap
page read and write
4330000
unkown
page read and write
2F70000
heap
page read and write
20953BD2000
heap
page read and write
20955CF1000
heap
page read and write
63A0000
unkown
page read and write
721C000
unkown
page readonly
2990000
unkown
page read and write
20955E0C000
heap
page read and write
400000
unkown
page readonly
52B000
remote allocation
page execute and read and write
31EB000
heap
page read and write
20955E44000
heap
page read and write
2DBB000
stack
page read and write
683000
heap
page read and write
20955D92000
heap
page read and write
20955DFF000
heap
page read and write
20953C59000
heap
page read and write
20955D19000
heap
page read and write
B7F000
stack
page read and write
20953C65000
heap
page read and write
368E000
stack
page read and write
6C5000
heap
page read and write
1F0000
heap
page read and write
20955D5B000
heap
page read and write
20953C01000
heap
page read and write
7DE000
stack
page read and write
20955E44000
heap
page read and write
8B6000
heap
page read and write
71F3000
unkown
page readonly
401000
unkown
page execute read
20955CFF000
heap
page read and write
12635000
unkown
page read and write
2950000
unkown
page read and write
7232000
unkown
page readonly
3F81000
heap
page read and write
7299000
unkown
page readonly
341F000
stack
page read and write
4180000
unkown
page read and write
B1F000
stack
page read and write
2990000
unkown
page read and write
2C7F000
stack
page read and write
20955CDA000
heap
page read and write
305A000
trusted library allocation
page read and write
20955E44000
heap
page read and write
2950000
unkown
page read and write
2D40000
unkown
page read and write
20953C18000
heap
page read and write
9890000
direct allocation
page read and write
20955CFA000
heap
page read and write
26D0000
unkown
page readonly
5830000
unkown
page read and write
2950000
unkown
page read and write
45C0000
unkown
page write copy
20955E1D000
heap
page read and write
20955D07000
heap
page read and write
30000
heap
page read and write
28CF000
stack
page read and write
409000
unkown
page execute read
20953C5F000
heap
page read and write
8783000
unkown
page read and write
29A0000
unkown
page read and write
20953C04000
heap
page read and write
20955DED000
heap
page read and write
20953C50000
heap
page read and write
2B0F000
stack
page read and write
20953C50000
heap
page read and write
20955D96000
heap
page read and write
20955E97000
heap
page read and write
7BE000
stack
page read and write
20953C66000
heap
page read and write
20955D0A000
heap
page read and write
20953C50000
heap
page read and write
20953C5C000
heap
page read and write
87BA000
unkown
page read and write
20953BD3000
heap
page read and write
20955CFE000
heap
page read and write
818E000
stack
page read and write
20955D96000
heap
page read and write
830000
unkown
page read and write
20955D9A000
heap
page read and write
7FF560817000
unkown
page readonly
20955D92000
heap
page read and write
20955D44000
heap
page read and write
8590000
unkown
page read and write
20955D49000
heap
page read and write
2990000
unkown
page read and write
103A7000
unkown
page read and write
20953BE1000
heap
page read and write
91000
unkown
page readonly
32E0000
heap
page read and write
3450000
heap
page read and write
7FF5607DA000
unkown
page readonly
400000
unkown
page readonly
20955D04000
heap
page read and write
20955D44000
heap
page read and write
20953C64000
heap
page read and write
7FFA131BC000
unkown
page read and write
2950000
unkown
page read and write
7FF56088A000
unkown
page readonly
883000
heap
page read and write
9890000
direct allocation
page read and write
6AE000
stack
page read and write
20955CDA000
heap
page read and write
2950000
unkown
page read and write
20955D04000
heap
page read and write
20955DEF000
heap
page read and write
20955DED000
heap
page read and write
5620000
heap
page execute and read and write
7EF000
heap
page read and write
300A000
heap
page read and write
90C000
heap
page read and write
2DCE000
stack
page read and write
302E000
stack
page read and write
4860000
unkown
page read and write
20953C62000
heap
page read and write
20901515000
trusted library allocation
page read and write
2950000
unkown
page read and write
9890000
direct allocation
page read and write
7FF585E21000
unkown
page readonly
4A6000
unkown
page read and write
1F0000
heap
page read and write
2550000
heap
page read and write
2910000
unkown
page read and write
20955D92000
heap
page read and write
72EED7E000
stack
page read and write
EBE4000
unkown
page read and write
2493D013000
unkown
page read and write
6651000
unkown
page read and write
9890000
direct allocation
page read and write
20953C18000
heap
page read and write
20901523000
heap
page read and write
23CD000
heap
page execute and read and write
20955D0D000
heap
page read and write
20953C55000
heap
page read and write
BB0000
heap
page read and write
87E1000
unkown
page read and write
234D000
heap
page execute and read and write
43A0000
unkown
page readonly
881B000
unkown
page read and write
B50E000
stack
page read and write
8DA000
heap
page read and write
20955E02000
heap
page read and write
400000
unkown
page readonly
70FC000
unkown
page readonly
1039B000
unkown
page read and write
7FF585AA6000
unkown
page readonly
89E000
stack
page read and write
7FF585C6A000
unkown
page readonly
830000
heap
page read and write
51A000
remote allocation
page execute and read and write
72A000
heap
page read and write
2A4D000
stack
page read and write
20953C04000
heap
page read and write
20901479000
heap
page read and write
20953C60000
heap
page read and write
20955D0A000
heap
page read and write
7FF585B49000
unkown
page readonly
7FF560838000
unkown
page readonly
20955D0D000
heap
page read and write
2950000
unkown
page read and write
7FF585D9D000
unkown
page readonly
20953C50000
heap
page read and write
20953DA0000
heap
page read and write
715000
heap
page read and write
2960000
unkown
page read and write
3F81000
heap
page read and write
7A0000
heap
page read and write
20955D9B000
heap
page read and write
2493D660000
unkown
page readonly
20953C63000
heap
page read and write
3430000
heap
page read and write
20953C5C000
unkown
page read and write
20901702000
heap
page read and write
CCA3000
unkown
page read and write
AB8E000
stack
page read and write
5580000
unkown
page readonly
29CF000
stack
page read and write
20953C66000
heap
page read and write
20953C65000
heap
page read and write
7FFA131BD000
unkown
page write copy
778C000
stack
page read and write
20955DEF000
heap
page read and write
7290000
unkown
page readonly
3F81000
heap
page read and write
20953C54000
heap
page read and write
20953BEF000
direct allocation
page read and write
613000
heap
page read and write
3310000
heap
page read and write
20953BE1000
heap
page read and write
8D5000
heap
page read and write
60000
unkown
page readonly
32E0000
heap
page read and write
2493CF20000
heap
page read and write
2950000
unkown
page read and write
60000
unkown
page readonly
20955D77000
heap
page read and write
20955DF0000
heap
page read and write
64A000
heap
page read and write
6EC000
unkown
page readonly
20955CFE000
heap
page read and write
2950000
unkown
page read and write
20955D45000
heap
page read and write
2493D024000
unkown
page read and write
2B20000
heap
page read and write
800000
heap
page read and write
20953C01000
unkown
page read and write
20953C59000
heap
page read and write
7FF585C0A000
unkown
page readonly
194E0FC0000
trusted library allocation
page read and write
20955E0C000
heap
page read and write
5830000
unkown
page read and write
20955D46000
heap
page read and write
4BC0000
unkown
page read and write
4A35000
stack
page read and write
7FF585CE4000
unkown
page readonly
3F81000
heap
page read and write
63A000
heap
page read and write
20955D44000
heap
page read and write
20955D9B000
heap
page read and write
7FF585992000
unkown
page readonly
8AD000
heap
page read and write
20955D5F000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
2540000
heap
page read and write
20953C5D000
heap
page read and write
4686000
stack
page read and write
F0A8000
unkown
page read and write
61C0000
unkown
page read and write
87DF000
unkown
page read and write
718C000
unkown
page readonly
20953C01000
unkown
page read and write
20953C50000
heap
page read and write
20955E1D000
heap
page read and write
7FF585E7A000
unkown
page readonly
9890000
direct allocation
page read and write
7FF585DD9000
unkown
page readonly
30000
heap
page read and write
20955D95000
heap
page read and write
7FF585ABC000
unkown
page readonly
840000
direct allocation
page execute and read and write
7FF5859EB000
unkown
page readonly
20953C63000
heap
page read and write
2F70000
remote allocation
page read and write
5830000
unkown
page read and write
20955D2C000
heap
page read and write
6B5000
heap
page read and write
2A6B000
unkown
page read and write
61A000
heap
page read and write
20955D45000
heap
page read and write
2900000
unkown
page read and write
28CE000
stack
page read and write
7FF5856DA000
unkown
page readonly
3330000
heap
page read and write
20953C0C000
heap
page read and write
2493D043000
unkown
page read and write
20955E44000
heap
page read and write
7FF585E45000
unkown
page readonly
2950000
unkown
page read and write
20901713000
heap
page read and write
20953C50000
heap
page read and write
20953C54000
heap
page read and write
209011C0000
heap
page read and write
419000
unkown
page write copy
2A0E000
stack
page read and write
7FF5858F0000
unkown
page readonly
2D1E000
stack
page read and write
20953C5B000
heap
page read and write
78E000
stack
page read and write
2950000
unkown
page read and write
9C000
stack
page read and write
2950000
unkown
page read and write
20955DFF000
heap
page read and write
858B000
stack
page read and write
2680000
heap
page read and write
20955DEF000
heap
page read and write
193000
stack
page read and write
7FF585793000
unkown
page readonly
134AB000
stack
page read and write
B68A000
stack
page read and write
20955D42000
heap
page read and write
5830000
unkown
page read and write
530000
heap
page read and write
2990000
unkown
page read and write
2349000
heap
page execute and read and write
2F70000
remote allocation
page read and write
2F40000
heap
page read and write
EBFA000
unkown
page read and write
940000
heap
page read and write
7FF585C99000
unkown
page readonly
9890000
direct allocation
page read and write
401000
unkown
page execute read
20953C59000
heap
page read and write
20901479000
heap
page read and write
20955D2F000
heap
page read and write
85DF000
unkown
page read and write
400000
unkown
page readonly
7FFA131B3000
unkown
page read and write
7FF585A2E000
unkown
page readonly
9F0000
heap
page read and write
20901472000
heap
page read and write
4810000
unkown
page read and write
20955DF0000
heap
page read and write
6277000
unkown
page read and write
20953C66000
heap
page read and write
7FF585CC0000
unkown
page readonly
20955CDA000
heap
page read and write
20955D47000
heap
page read and write
33BE000
stack
page read and write
20955D76000
heap
page read and write
20955D95000
heap
page read and write
20953C18000
heap
page read and write
4080000
heap
page read and write
6EC000
unkown
page readonly
F185000
unkown
page read and write
626D000
unkown
page read and write
20955D0D000
heap
page read and write
20901472000
heap
page read and write
9890000
direct allocation
page read and write
20953BD2000
heap
page read and write
20953C65000
heap
page read and write
1372C000
stack
page read and write
15D0000
heap
page read and write
7FF5607F4000
unkown
page readonly
20955E44000
heap
page read and write
400000
unkown
page readonly
18CF000
stack
page read and write
7163000
unkown
page readonly
20955DEF000
heap
page read and write
7FF585B4C000
unkown
page readonly
2D40000
unkown
page read and write
9D000
stack
page read and write
5F6000
heap
page read and write
7BC0000
heap
page read and write
20955CFF000
heap
page read and write
86B000
heap
page read and write
20953C59000
heap
page read and write
CCB2000
unkown
page read and write
3590000
heap
page read and write
20955D07000
heap
page read and write
323D000
stack
page read and write
12689000
unkown
page read and write
20953C18000
heap
page read and write
61C0000
unkown
page read and write
7FF585998000
unkown
page readonly
BAE000
stack
page read and write
22CF000
heap
page execute and read and write
7FF585E6E000
unkown
page readonly
400000
unkown
page readonly
529000
remote allocation
page execute and read and write
20955C11000
heap
page read and write
2493D04C000
unkown
page read and write
20955CFE000
heap
page read and write
CE88000
unkown
page read and write
824000
heap
page read and write
2ED0000
heap
page read and write
20955D07000
heap
page read and write
6F68000
unkown
page readonly
20953C59000
heap
page read and write
2950000
unkown
page read and write
690000
heap
page read and write
2950000
unkown
page read and write
20953C50000
heap
page read and write
BF0000
heap
page read and write
7FF585752000
unkown
page readonly
2470000
heap
page read and write
9890000
direct allocation
page read and write
263F000
stack
page read and write
28CF000
stack
page read and write
DDB0000
unkown
page read and write
7FF585D1C000
unkown
page readonly
1F0000
heap
page read and write
2F70000
remote allocation
page read and write
20953BEA000
unkown
page read and write
5FA000
heap
page read and write
4350000
unkown
page read and write
20953C50000
heap
page read and write
20955E40000
heap
page read and write
2A13000
unkown
page read and write
59AE000
stack
page read and write
20955C65000
heap
page read and write
304A000
heap
page read and write
20955E44000
heap
page read and write
20953C01000
heap
page read and write
6D5000
heap
page read and write
20955D43000
heap
page read and write
20953C56000
heap
page read and write
7FF56081E000
unkown
page readonly
5830000
unkown
page read and write
4860000
unkown
page read and write
7A0000
heap
page read and write
31BD000
heap
page read and write
20953C0C000
heap
page read and write
10370000
unkown
page read and write
2950000
unkown
page read and write
20953C5B000
heap
page read and write
138E000
stack
page read and write
727C000
unkown
page readonly
20955D47000
heap
page read and write
20955D19000
heap
page read and write
9B000
unkown
page write copy
20955DFF000
heap
page read and write
2950000
unkown
page read and write
356C000
stack
page read and write
20955E44000
heap
page read and write
7FF585E16000
unkown
page readonly
20955D95000
heap
page read and write
20955D0A000
heap
page read and write
7DE000
stack
page read and write
20955D96000
heap
page read and write
29C0000
unkown
page read and write
20955DEF000
heap
page read and write
400000
unkown
page readonly
20953C65000
heap
page read and write
2493CF30000
heap
page read and write
20955DEF000
heap
page read and write
529000
remote allocation
page execute and read and write
20953C0C000
heap
page read and write
3F81000
heap
page read and write
9890000
direct allocation
page read and write
2950000
unkown
page read and write
20953C65000
heap
page read and write
20953C59000
heap
page read and write
20955E40000
heap
page read and write
323D000
stack
page read and write
20955CDA000
heap
page read and write
20953BEF000
unkown
page read and write
20955E1D000
heap
page read and write
20953C0C000
heap
page read and write
7FFA131BE000
unkown
page read and write
31E9000
heap
page read and write
20953C65000
heap
page read and write
2960000
unkown
page read and write
20955E02000
heap
page read and write
408D000
heap
page read and write
30000
heap
page read and write
6D0000
heap
page read and write
7FFA131B5000
unkown
page read and write
20955E44000
heap
page read and write
20955D0A000
heap
page read and write
20955CFA000
heap
page read and write
20955C00000
heap
page read and write
7FF6E46D1000
unkown
page write copy
103B9000
unkown
page read and write
4860000
unkown
page read and write
7FF585CD4000
unkown
page readonly
5E5000
heap
page read and write
7FF585782000
unkown
page readonly
7FF585C1C000
unkown
page readonly
20953C5F000
heap
page read and write
9C000
stack
page read and write
7FFA13020000
unkown
page readonly
7FF5607FA000
unkown
page readonly
196000
stack
page read and write
20953C0C000
heap
page read and write
20953C62000
heap
page read and write
20953C50000
heap
page read and write
20953C04000
heap
page read and write
20955CF1000
heap
page read and write
2950000
unkown
page read and write
6279000
unkown
page read and write
20953920000
heap
page read and write
429000
unkown
page read and write
3CCC000
stack
page read and write
787000
heap
page read and write
29C8000
stack
page read and write
24C1000
heap
page read and write
20955BF1000
heap
page read and write
5830000
unkown
page read and write
29DF000
stack
page read and write
290E000
stack
page read and write
20901713000
heap
page read and write
31F0000
heap
page read and write
194E0C10000
heap
page read and write
2960000
unkown
page read and write
7FF5859B1000
unkown
page readonly
38DA000
heap
page read and write
2950000
unkown
page read and write
20955D96000
heap
page read and write
20955D96000
heap
page read and write
804000
heap
page read and write
20953BE1000
heap
page read and write
20955D46000
heap
page read and write
196000
stack
page read and write
9FA000
heap
page read and write
20955E44000
heap
page read and write
34DF000
stack
page read and write
6F41000
unkown
page readonly
2980000
unkown
page read and write
20955D76000
heap
page read and write
9C000
stack
page read and write
20955C10000
heap
page read and write
20953BE1000
direct allocation
page read and write
7FF585CC5000
unkown
page readonly
7FF5607DA000
unkown
page readonly
4808000
stack
page read and write
2950000
unkown
page read and write
29C0000
unkown
page read and write
194E0FC0000
trusted library allocation
page read and write
20953C5B000
heap
page read and write
20953BC3000
unkown
page read and write
94F000
heap
page read and write
697000
heap
page read and write
20955E44000
heap
page read and write
2950000
unkown
page read and write
56D0000
unkown
page readonly
9890000
direct allocation
page read and write
6FE000
heap
page read and write
20901702000
heap
page read and write
878000
heap
page read and write
8BE000
heap
page read and write
38EA000
heap
page read and write
3640000
direct allocation
page read and write
7FF585A4A000
unkown
page readonly
61B2000
heap
page read and write
20953C50000
heap
page read and write
13859000
unkown
page read and write
20953C04000
heap
page read and write
170F000
stack
page read and write
401000
unkown
page execute read
20955D92000
heap
page read and write
7FF585D46000
unkown
page readonly
2FB0000
heap
page read and write
3F81000
heap
page read and write
20955D9B000
heap
page read and write
7FF585ED3000
unkown
page readonly
709A000
unkown
page readonly
7FF585DD7000
unkown
page readonly
20901713000
heap
page read and write
2F70000
remote allocation
page read and write
29B0000
unkown
page read and write
3F81000
heap
page read and write
9D000
stack
page read and write
57E000
stack
page read and write
7FF585A31000
unkown
page readonly
20953BE1000
heap
page read and write
20953C18000
heap
page read and write
20953C66000
heap
page read and write
61C0000
unkown
page read and write
6150000
unkown
page read and write
20955D9A000
heap
page read and write
20953C59000
heap
page read and write
9C000
stack
page read and write
2960000
unkown
page read and write
20955D48000
heap
page read and write
20955C11000
heap
page read and write
85E5000
unkown
page read and write
20953C50000
heap
page read and write
6350000
unkown
page readonly
13859000
unkown
page read and write
20955C10000
heap
page read and write
20955CDA000
heap
page read and write
4082000
heap
page read and write
80A000
heap
page read and write
9890000
direct allocation
page read and write
3030000
heap
page read and write
20953C63000
heap
page read and write
20953C63000
heap
page read and write
20955CDA000
heap
page read and write
7FF5855F4000
unkown
page readonly
7FF5856E7000
unkown
page readonly
20953C18000
heap
page read and write
5830000
unkown
page read and write
103C2000
unkown
page read and write
57E000
stack
page read and write
20955CFE000
heap
page read and write
4A6000
unkown
page read and write
20955C52000
heap
page read and write
20955CDA000
heap
page read and write
12775000
unkown
page read and write
2970000
unkown
page read and write
7FF585E53000
unkown
page readonly
20955E1D000
heap
page read and write
7FF585853000
unkown
page readonly
20955DAB000
heap
page read and write
2CBD000
stack
page read and write
20955E1D000
heap
page read and write
7FF585DB6000
unkown
page readonly
20955D2F000
heap
page read and write
20955E1E000
heap
page read and write
6EC000
unkown
page readonly
31AC000
stack
page read and write
2493CFA0000
unkown
page readonly
9890000
direct allocation
page read and write
20955C00000
heap
page read and write
20955BF1000
heap
page read and write
861000
heap
page read and write
2990000
unkown
page read and write
20955D06000
heap
page read and write
2720000
heap
page read and write
EEC2000
unkown
page read and write
29CF000
stack
page read and write
2A9C000
unkown
page read and write
4BEF000
stack
page read and write
2493D047000
unkown
page read and write
20955D9B000
heap
page read and write
68A000
heap
page read and write
30000
heap
page read and write
20955E28000
heap
page read and write
2B7E000
stack
page read and write
386A000
heap
page read and write
5FAD000
stack
page read and write
4860000
unkown
page read and write
7FF58590B000
unkown
page readonly
9C000
stack
page read and write
2A95000
unkown
page read and write
20953C66000
heap
page read and write
20953C17000
heap
page read and write
20953C67000
heap
page read and write
20955D43000
heap
page read and write
20953C5F000
heap
page read and write
6C0000
heap
page read and write
20955D95000
heap
page read and write
21BE000
stack
page read and write
408A000
heap
page read and write
5830000
unkown
page read and write
20955E97000
heap
page read and write
20953C65000
heap
page read and write
20955D9A000
heap
page read and write
447B000
unkown
page read and write
B3F000
stack
page read and write
2950000
unkown
page read and write
89A000
heap
page read and write
74E000
stack
page read and write
13845000
stack
page read and write
879D000
unkown
page read and write
7FF585CEA000
unkown
page readonly
20955CF1000
heap
page read and write
8DD000
heap
page read and write
20955D9B000
heap
page read and write
20953C04000
heap
page read and write
20955D04000
heap
page read and write
4880000
unkown
page readonly
20953C60000
heap
page read and write
140E000
stack
page read and write
20955D24000
heap
page read and write
20955CDA000
heap
page read and write
4499000
unkown
page read and write
2960000
unkown
page read and write
20955D0B000
heap
page read and write
284A000
stack
page read and write
87E000
heap
page read and write
51BE000
stack
page read and write
20955DEF000
heap
page read and write
9890000
direct allocation
page read and write
2493CF90000
heap
page read and write
33E7000
heap
page read and write
5830000
unkown
page read and write
1352B000
stack
page read and write
131AE000
stack
page read and write
20955D0E000
heap
page read and write
3F81000
heap
page read and write
2990000
unkown
page read and write
91000
unkown
page readonly
76E000
stack
page read and write
7185000
unkown
page readonly
20953C0C000
heap
page read and write
1F0000
heap
page read and write
20955E44000
heap
page read and write
20955D00000
heap
page read and write
8812000
unkown
page read and write
52C0000
unkown
page readonly
44B0000
unkown
page read and write
6D0000
heap
page read and write
2470000
heap
page read and write
6150000
unkown
page read and write
12F31000
unkown
page read and write
29C0000
unkown
page read and write
429000
unkown
page read and write
5261000
unkown
page read and write
20953C67000
unkown
page read and write
58FA87F000
stack
page read and write
20955E44000
heap
page read and write
2950000
unkown
page read and write
8B00000
unkown
page read and write
B290000
unkown
page read and write
20955D86000
heap
page read and write
6F9F000
unkown
page readonly
29CF000
stack
page read and write
12F2A000
stack
page read and write
6150000
unkown
page read and write
2EBA000
stack
page read and write
106E000
stack
page read and write
EC5F000
unkown
page read and write
29C0000
unkown
page read and write
4C62000
unkown
page read and write
2F70000
heap
page read and write
860000
unclassified section
page read and write
196000
stack
page read and write
2950000
unkown
page read and write
2950000
unkown
page read and write
20955E44000
heap
page read and write
409000
unkown
page execute read
20955D0E000
heap
page read and write
27CF000
stack
page read and write
2950000
unkown
page read and write
390A000
heap
page read and write
897000
heap
page read and write
2950000
unkown
page read and write
20955D15000
heap
page read and write
20955E0C000
heap
page read and write
2950000
unkown
page read and write
B00000
unkown
page readonly
8831000
unkown
page read and write
2493D000000
unkown
page read and write
20955D43000
heap
page read and write
20953C04000
heap
page read and write
56E0000
unkown
page readonly
7FF5607EC000
unkown
page readonly
7FF585BA6000
unkown
page readonly
5E0000
heap
page read and write
2CE0000
remote allocation
page read and write
20955D95000
heap
page read and write
20955D49000
heap
page read and write
9890000
direct allocation
page read and write
9C000
stack
page read and write
29E0000
heap
page read and write
20955C00000
heap
page read and write
2910000
unkown
page read and write
2950000
unkown
page read and write
2950000
unkown
page read and write
20953C62000
heap
page read and write
3F81000
heap
page read and write
20955D0B000
heap
page read and write
20953C01000
heap
page read and write
12672000
unkown
page read and write
20955E44000
heap
page read and write
20953C04000
heap
page read and write
66F000
unkown
page readonly
30000
heap
page read and write
20955E40000
heap
page read and write
20953C50000
heap
page read and write
87A000
heap
page read and write
4082000
heap
page read and write
2980000
unkown
page read and write
7FF58574B000
unkown
page readonly
529000
remote allocation
page execute and read and write
20955C11000
heap
page read and write
2F71000
heap
page read and write
20953C50000
heap
page read and write
740000
heap
page read and write
2493D043000
unkown
page read and write
9890000
direct allocation
page read and write
20955C10000
heap
page read and write
2D9D000
trusted library allocation
page execute and read and write
2ABF000
unkown
page read and write
2BC0000
unkown
page readonly
20955D04000
heap
page read and write
20953C01000
heap
page read and write
29F0000
heap
page read and write
750000
heap
page read and write
20955E44000
heap
page read and write
9890000
direct allocation
page read and write
2960000
unkown
page read and write
1175000
heap
page read and write
9890000
direct allocation
page read and write
7FF585E80000
unkown
page readonly
7125000
unkown
page readonly
7FF585A98000
unkown
page readonly
830000
heap
page read and write
5830000
unkown
page read and write
2DA4000
trusted library allocation
page read and write
2730000
heap
page read and write
7FF585DCC000
unkown
page readonly
813000
heap
page read and write
1362C000
stack
page read and write
2950000
unkown
page read and write
20955DF0000
heap
page read and write
20955BFC000
heap
page read and write
20953C54000
heap
page read and write
829000
heap
page read and write
20953C66000
heap
page read and write
20955D04000
heap
page read and write
6EC7000
unkown
page readonly
2A4D000
stack
page read and write
3F81000
heap
page read and write
20955C11000
heap
page read and write
7FF585A4E000
unkown
page readonly
5E6E000
stack
page read and write
20955E44000
heap
page read and write
AC1E000
unkown
page read and write
5830000
unkown
page read and write
1030000
unkown
page readonly
58FA7FD000
stack
page read and write
20955CDA000
heap
page read and write
2950000
unkown
page read and write
2950000
unkown
page read and write
5830000
unkown
page read and write
2D40000
unkown
page read and write
3340000
heap
page read and write
66F000
unkown
page readonly
B2F000
stack
page read and write
20953C0C000
heap
page read and write
20955DEF000
heap
page read and write
20953C5B000
heap
page read and write
2960000
unkown
page read and write
20955E97000
heap
page read and write
4084000
heap
page read and write
9D000
stack
page read and write
85CC000
unkown
page read and write
20955DF0000
heap
page read and write
2A40000
unkown
page read and write
2950000
unkown
page read and write
52F0000
unkown
page readonly
20955D92000
heap
page read and write
837000
heap
page read and write
20955C05000
heap
page read and write
20953C50000
heap
page read and write
7FF56084F000
unkown
page readonly
2C7E000
stack
page read and write
AE8000
heap
page read and write
27CA000
stack
page read and write
D80000
heap
page read and write
20901713000
heap
page read and write
400000
unkown
page readonly
52B000
remote allocation
page execute and read and write
2CCE000
stack
page read and write
2990000
unkown
page read and write
2901000
unkown
page read and write
4860000
unkown
page read and write
7FF560826000
unkown
page readonly
7297000
unkown
page readonly
20955DFF000
heap
page read and write
30000
heap
page read and write
7FF585B9A000
unkown
page readonly
33F0000
heap
page read and write
20955E1E000
heap
page read and write
20953C58000
heap
page read and write
20955D0B000
heap
page read and write
400000
unkown
page execute and read and write
3F81000
heap
page read and write
21C0000
unclassified section
page read and write
7FF585E36000
unkown
page readonly
20955CDA000
heap
page read and write
2990000
unkown
page read and write
20955D96000
heap
page read and write
20955D4A000
heap
page read and write
20955CDA000
heap
page read and write
20955D95000
heap
page read and write
2960000
unkown
page read and write
20953BE1000
heap
page read and write
2950000
unkown
page read and write
20955D4A000
heap
page read and write
2493D035000
unkown
page read and write
9890000
direct allocation
page read and write
4A6000
unkown
page write copy
7F0000
direct allocation
page read and write
2950000
unkown
page read and write
2F10000
unkown
page readonly
71DE000
unkown
page readonly
1267B000
unkown
page read and write
7FF58584B000
unkown
page readonly
20955E02000
heap
page read and write
3000000
heap
page read and write
20955D96000
heap
page read and write
20955D95000
heap
page read and write
20955DEF000
heap
page read and write
2900000
unkown
page read and write
20955E0C000
heap
page read and write
20955D9B000
heap
page read and write
8487000
stack
page read and write
20953C59000
heap
page read and write
20953C62000
heap
page read and write
684B000
stack
page read and write
3860000
heap
page read and write
1021000
unkown
page readonly
20953C61000
heap
page read and write
760000
heap
page read and write
20955C2A000
heap
page read and write
2C7F000
stack
page read and write
6240000
unkown
page read and write
2950000
unkown
page read and write
20953C04000
heap
page read and write
20955D06000
heap
page read and write
126B3000
unkown
page read and write
20953C5C000
unkown
page read and write
20953C50000
heap
page read and write
401000
unkown
page execute read
61C0000
unkown
page read and write
2960000
unkown
page read and write
20953C63000
heap
page read and write
3A72000
heap
page read and write
103EB000
unkown
page read and write
20955D0B000
heap
page read and write
657000
heap
page read and write
1240000
heap
page read and write
20953C56000
heap
page read and write
20953C65000
heap
page read and write
20955D0C000
heap
page read and write
2493D002000
unkown
page read and write
400000
unkown
page readonly
20955D15000
heap
page read and write
32FA000
stack
page read and write
20953C1A000
heap
page read and write
9890000
direct allocation
page read and write
20953C50000
heap
page read and write
20955D07000
heap
page read and write
20955D9B000
heap
page read and write
4087000
heap
page read and write
20955D9B000
heap
page read and write
20955CDA000
heap
page read and write
67E000
heap
page read and write
8B21000
unkown
page read and write
6150000
unkown
page read and write
3A8E000
stack
page read and write
7FF585775000
unkown
page readonly
7FF585D51000
unkown
page readonly
7FF585D7C000
unkown
page readonly
2B3A000
stack
page read and write
895A000
unkown
page read and write
2DBE000
stack
page read and write
2950000
unkown
page read and write
227E000
stack
page read and write
20955D2B000
heap
page read and write
20955CDA000
heap
page read and write
7FF585929000
unkown
page readonly
6285000
unkown
page read and write
20955D06000
heap
page read and write
4A6000
unkown
page read and write
20953C5D000
heap
page read and write
2950000
unkown
page read and write
417000
unkown
page write copy
1F0000
heap
page read and write
6E8000
heap
page execute and read and write
5830000
unkown
page read and write
7FF5858E1000
unkown
page readonly
20953C59000
heap
page read and write
20953C5F000
heap
page read and write
12E55000
unkown
page read and write
4ABE000
stack
page read and write
4082000
heap
page read and write
58FA3DF000
stack
page read and write
2B4A000
stack
page read and write
2960000
unkown
page read and write
20955D49000
heap
page read and write
20955DEF000
heap
page read and write
7FF585DDC000
unkown
page readonly
20955DEF000
heap
page read and write
892F000
unkown
page read and write
20955DEF000
heap
page read and write
20955BF1000
heap
page read and write
3F81000
heap
page read and write
7FF585E07000
unkown
page readonly
20955CDA000
heap
page read and write
860000
heap
page read and write
20953C59000
heap
page read and write
80E000
heap
page read and write
20953C59000
heap
page read and write
2970000
unkown
page read and write
3F81000
heap
page read and write
20955C11000
heap
page read and write
194DF31A000
heap
page read and write
2950000
unkown
page read and write
6B8000
heap
page execute and read and write
2900000
unkown
page read and write
7FF585C6D000
unkown
page readonly
F03A000
unkown
page read and write
7FF560831000
unkown
page readonly
2960000
unkown
page read and write
20953C50000
heap
page read and write
7FF585CF6000
unkown
page readonly
7FFA13021000
unkown
page execute read
20955C42000
heap
page read and write
335A000
stack
page read and write
CF8000
heap
page read and write
2493D044000
unkown
page read and write
6EC000
unkown
page readonly
20955CFA000
heap
page read and write
20955D9B000
heap
page read and write
20953C01000
heap
page read and write
67A000
heap
page read and write
868000
heap
page read and write
66F000
unkown
page readonly
20955CFF000
heap
page read and write
870000
heap
page read and write
20953C04000
heap
page read and write
5830000
unkown
page read and write
20953C01000
heap
page read and write
5830000
unkown
page read and write
20955D04000
heap
page read and write
4C64000
unkown
page read and write
4756000
unkown
page read and write
C0F000
stack
page read and write
20953B60000
remote allocation
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
45BA000
stack
page read and write
20953BEA000
heap
page read and write
9890000
direct allocation
page read and write
20955D43000
heap
page read and write
289F000
stack
page read and write
2DBE000
stack
page read and write
5830000
unkown
page read and write
20955E3A000
heap
page read and write
9890000
direct allocation
page read and write
5E0000
heap
page read and write
346E000
stack
page read and write
20955D9B000
heap
page read and write
E370000
heap
page read and write
88A1A7B000
stack
page read and write
2950000
unkown
page read and write
838C000
stack
page read and write
20953A80000
heap
page read and write
31B0000
remote allocation
page read and write
7FF5856B7000
unkown
page readonly
401000
unkown
page execute read
20955E44000
heap
page read and write
20955D43000
heap
page read and write
70E000
stack
page read and write
670000
heap
page read and write
20955CFF000
heap
page read and write
2950000
unkown
page read and write
2B4A000
stack
page read and write
20955C11000
heap
page read and write
26C0000
heap
page read and write
20953C5C000
heap
page read and write
22DF000
stack
page read and write
61BA000
heap
page read and write
2960000
unkown
page read and write
6EC000
unkown
page readonly
22B0000
heap
page read and write
20953C18000
heap
page read and write
46F4000
trusted library allocation
page read and write
380E000
stack
page read and write
6EC000
unkown
page readonly
6150000
unkown
page read and write
7D0000
heap
page read and write
7FF5859AB000
unkown
page readonly
8604000
unkown
page read and write
71B5000
unkown
page readonly
401000
unkown
page execute read
20953C61000
heap
page read and write
9890000
direct allocation
page read and write
20955C6E000
heap
page read and write
356C000
stack
page read and write
20953C0C000
heap
page read and write
20955E44000
heap
page read and write
20955D06000
heap
page read and write
2F7A000
heap
page read and write
41B3000
unkown
page read and write
EB3EF9000
stack
page read and write
20955D5B000
heap
page read and write
1332A000
stack
page read and write
20953C50000
heap
page read and write
19C000
stack
page read and write
20953BD2000
heap
page read and write
2B7E000
stack
page read and write
2A1E000
stack
page read and write
3F81000
heap
page read and write
20953C63000
heap
page read and write
7FF58593D000
unkown
page readonly
9890000
direct allocation
page read and write
327C000
stack
page read and write
429000
unkown
page write copy
2950000
unkown
page read and write
1F0000
heap
page read and write
2950000
unkown
page read and write
20955D43000
heap
page read and write
7FF560826000
unkown
page readonly
3F81000
heap
page read and write
613000
heap
page read and write
91F000
heap
page read and write
20955E40000
heap
page read and write
52B000
remote allocation
page execute and read and write
4A6000
unkown
page write copy
9890000
direct allocation
page read and write
5830000
unkown
page read and write
20955D10000
heap
page read and write
20953C55000
heap
page read and write
750000
heap
page read and write
20955D9B000
heap
page read and write
60C000
heap
page read and write
1390000
heap
page read and write
2CDE000
stack
page read and write
9890000
direct allocation
page read and write
647D000
unkown
page read and write
58A0000
heap
page read and write
5FB000
heap
page read and write
20955D4A000
heap
page read and write
3F81000
heap
page read and write
20901602000
heap
page read and write
20953C1A000
heap
page read and write
343C000
stack
page read and write
20955D9A000
heap
page read and write
2FFF000
stack
page read and write
2990000
unkown
page read and write
7FF585ECC000
unkown
page readonly
20955D15000
heap
page read and write
2960000
unkown
page read and write
4A6000
unkown
page read and write
5830000
unkown
page read and write
20955D0E000
heap
page read and write
20955D15000
heap
page read and write
850E000
stack
page read and write
720000
heap
page read and write
20955D83000
heap
page read and write
20955D95000
heap
page read and write
20955E1D000
heap
page read and write
429000
unkown
page write copy
20901802000
heap
page read and write
2980000
unkown
page read and write
60C000
heap
page read and write
7FF585E3E000
unkown
page readonly
20953C59000
heap
page read and write
3F81000
heap
page read and write
757000
heap
page read and write
20955D9A000
heap
page read and write
20955C11000
heap
page read and write
2DFE000
stack
page read and write
72AC000
unkown
page readonly
2F00000
unkown
page read and write
20953C5D000
heap
page read and write
20955D07000
heap
page read and write
2493CF30000
heap
page read and write
20953C59000
heap
page read and write
3060000
trusted library allocation
page read and write
13331000
stack
page read and write
3F81000
heap
page read and write
3A4F000
stack
page read and write
2740000
heap
page read and write
20953BE1000
unkown
page read and write
194E0FC0000
trusted library allocation
page read and write
102B000
unkown
page write copy
20955D92000
heap
page read and write
8A0000
heap
page read and write
31B7000
heap
page read and write
848000
heap
page read and write
20955D15000
heap
page read and write
2950000
unkown
page read and write
3F81000
heap
page read and write
7FF585C21000
unkown
page readonly
20955D42000
heap
page read and write
2950000
unkown
page read and write
22EF000
stack
page read and write
20953C0C000
heap
page read and write
6150000
unkown
page read and write
CDDB000
unkown
page read and write
DD55000
unkown
page read and write
196000
stack
page read and write
5700000
unkown
page read and write
4089000
heap
page read and write
9890000
direct allocation
page read and write
349E000
stack
page read and write
9CF000
stack
page read and write
266E000
stack
page read and write
2493D041000
unkown
page read and write
4536000
stack
page read and write
2900000
unkown
page read and write
20953C64000
heap
page read and write
20955D43000
heap
page read and write
E60B000
stack
page read and write
2950000
unkown
page read and write
920000
heap
page read and write
7FF585922000
unkown
page readonly
6460000
unkown
page read and write
9890000
direct allocation
page read and write
20955D01000
heap
page read and write
20955D44000
heap
page read and write
2680000
heap
page read and write
87E000
heap
page read and write
20953C50000
heap
page read and write
60000
unkown
page readonly
2E2E000
stack
page read and write
2980000
unkown
page read and write
1F0000
heap
page read and write
10FC000
stack
page read and write
20955D96000
heap
page read and write
632000
heap
page read and write
20955D46000
heap
page read and write
2CE0000
remote allocation
page read and write
2F70000
remote allocation
page read and write
2950000
unkown
page read and write
710000
heap
page read and write
20953C64000
heap
page read and write
20953C04000
heap
page read and write
2950000
unkown
page read and write
3740000
heap
page read and write
20953C60000
heap
page read and write
2980000
unkown
page read and write
20953C50000
heap
page read and write
5E7000
heap
page read and write
8EE000
heap
page read and write
20953C62000
heap
page read and write
A20000
heap
page read and write
20955D95000
heap
page read and write
864000
heap
page read and write
7FF5856B0000
unkown
page readonly
9894000
direct allocation
page read and write
31CD000
heap
page read and write
6AC2000
unkown
page readonly
20955D0A000
heap
page read and write
2950000
unkown
page read and write
700000
unkown
page readonly
A2F000
stack
page read and write
231E000
stack
page read and write
2950000
unkown
page read and write
1F0000
heap
page read and write
68E000
stack
page read and write
20955E13000
heap
page read and write
6A0000
heap
page read and write
660000
heap
page read and write
20953C59000
heap
page read and write
2400000
heap
page read and write
20953C65000
heap
page read and write
20955E99000
heap
page read and write
6A90000
unkown
page readonly
138E000
stack
page read and write
BBE000
stack
page read and write
20953C5D000
heap
page read and write
30000
heap
page read and write
20955D43000
heap
page read and write
2950000
unkown
page read and write
20955D95000
heap
page read and write
2493D013000
unkown
page read and write
193000
stack
page read and write
DD5E000
unkown
page read and write
7FF585B3A000
unkown
page readonly
20953C0C000
heap
page read and write
6EC000
unkown
page readonly
20953C04000
heap
page read and write
20955D12000
heap
page read and write
408C000
heap
page read and write
2821000
heap
page read and write
3630000
heap
page read and write
7FF585A2C000
unkown
page readonly
960000
heap
page read and write
2F10000
heap
page read and write
A3E000
stack
page read and write
20953C62000
heap
page read and write
24A0000
heap
page read and write
20953C5F000
heap
page read and write
20955D4A000
heap
page read and write
20955CF1000
heap
page read and write
2970000
unkown
page read and write
20955D95000
heap
page read and write
7FF585978000
unkown
page readonly
2950000
unkown
page read and write
7FF585A75000
unkown
page readonly
4A6000
unkown
page write copy
20955E99000
heap
page read and write
3050000
trusted library allocation
page read and write
20953C50000
heap
page read and write
2950000
unkown
page read and write
20955E99000
heap
page read and write
87CD000
unkown
page read and write
20955E3A000
heap
page read and write
2950000
unkown
page read and write
7FF585B50000
unkown
page readonly
20953C59000
heap
page read and write
20955D9A000
heap
page read and write
1382E000
stack
page read and write
EDB9000
unkown
page read and write
20955D19000
heap
page read and write
20955E13000
heap
page read and write
20955D4B000
heap
page read and write
95F000
stack
page read and write
2C7E000
stack
page read and write
2B1F000
stack
page read and write
20955CDA000
heap
page read and write
20955E44000
heap
page read and write
193000
stack
page read and write
9890000
direct allocation
page read and write
20955D0B000
heap
page read and write
20953C01000
heap
page read and write
5D0000
heap
page read and write
20953C50000
heap
page read and write
660000
heap
page read and write
2950000
unkown
page read and write
20953C62000
heap
page read and write
20953C5B000
heap
page read and write
20955E41000
heap
page read and write
20953BE1000
heap
page read and write
20953C5A000
heap
page read and write
20953C50000
heap
page read and write
7FF585773000
unkown
page readonly
5F0000
heap
page read and write
20953C66000
heap
page read and write
19C000
stack
page read and write
20955CDA000
heap
page read and write
6CD000
heap
page read and write
7024000
unkown
page readonly
7FB000
heap
page read and write
9890000
direct allocation
page read and write
20955D44000
heap
page read and write
20955E44000
heap
page read and write
30E0000
heap
page read and write
9890000
direct allocation
page read and write
2960000
unkown
page read and write
2950000
unkown
page read and write
2650000
heap
page read and write
20953C65000
heap
page read and write
20955E02000
heap
page read and write
2960000
unkown
page read and write
B20000
unkown
page readonly
728000
heap
page execute and read and write
31B1000
heap
page read and write
20953C50000
heap
page read and write
907000
heap
page read and write
2950000
unkown
page read and write
4082000
heap
page read and write
20955D07000
heap
page read and write
6EC000
unkown
page readonly
20901713000
heap
page read and write
2900000
unkown
page read and write
20955DEF000
heap
page read and write
20953C0C000
heap
page read and write
2E30000
remote allocation
page read and write
30CC000
trusted library allocation
page read and write
9EF000
stack
page read and write
20955C11000
heap
page read and write
CE7E000
unkown
page read and write
20955E44000
heap
page read and write
4751000
unkown
page read and write
20955D0E000
heap
page read and write
5FB000
heap
page read and write
2DBE000
stack
page read and write
20955DEF000
heap
page read and write
3550000
heap
page read and write
9890000
direct allocation
page read and write
20955D12000
heap
page read and write
568000
heap
page read and write
760000
heap
page read and write
2380000
heap
page read and write
17CE000
stack
page read and write
10AF000
heap
page read and write
20955D44000
heap
page read and write
20953C64000
heap
page read and write
2990000
unkown
page read and write
7FF58567F000
unkown
page readonly
29B0000
unkown
page read and write
2960000
unkown
page read and write
309E000
stack
page read and write
194DF301000
heap
page read and write
61E000
heap
page read and write
B887000
stack
page read and write
20955E99000
heap
page read and write
6360000
unkown
page read and write
401000
unkown
page execute read
7FF58575F000
unkown
page readonly
20953C5D000
heap
page read and write
41E0000
unkown
page read and write
2960000
unkown
page read and write
4779000
unkown
page read and write
20953C04000
heap
page read and write
20953BD3000
heap
page read and write
9DF000
stack
page read and write
882000
heap
page read and write
20955E3A000
heap
page read and write
20955D00000
heap
page read and write
20955D12000
heap
page read and write
EC9D000
unkown
page read and write
8E2000
heap
page read and write
10E3000
heap
page read and write
30000
heap
page read and write
20953C59000
heap
page read and write
7D89000
stack
page read and write
DD76000
unkown
page read and write
9D000
stack
page read and write
88A10BD000
stack
page read and write
20953C64000
heap
page read and write
20953C0C000
heap
page read and write
7FF585E0E000
unkown
page readonly
20953C0C000
heap
page read and write
2090148A000
heap
page read and write
20955D19000
heap
page read and write
20955DEF000
heap
page read and write
88A1879000
stack
page read and write
2F60000
heap
page read and write
FE0000
heap
page read and write
20955E98000
heap
page read and write
9890000
direct allocation
page read and write
3F81000
heap
page read and write
7FF585CA1000
unkown
page readonly
23C0000
heap
page read and write
20955C00000
heap
page read and write
20955D3F000
heap
page read and write
38A0000
heap
page read and write
4350000
unkown
page read and write
2950000
unkown
page read and write
20953C65000
heap
page read and write
2B20000
heap
page read and write
7FF66083A000
unkown
page readonly
20955D7C000
heap
page read and write
7DF49B311000
unkown
page execute read
2EDA000
heap
page read and write
36CE000
stack
page read and write
7FF6E4341000
unkown
page execute read
20953BEA000
heap
page read and write
20955D49000
heap
page read and write
2E1E000
stack
page read and write
2950000
unkown
page read and write
387A000
heap
page read and write
20955D6D000
heap
page read and write
20953BEF000
heap
page read and write
F12D000
unkown
page read and write
429000
unkown
page read and write
20953C01000
heap
page read and write
7FF5856F4000
unkown
page readonly
20955DEF000
heap
page read and write
3836000
heap
page read and write
58FA6FF000
stack
page read and write
400000
unkown
page readonly
20953C1A000
heap
page read and write
61B0000
heap
page read and write
670000
heap
page read and write
7FF585AF5000
unkown
page readonly
2950000
unkown
page read and write
20953C01000
heap
page read and write
20953C0C000
heap
page read and write
20953C01000
heap
page read and write
7FF585971000
unkown
page readonly
20955D24000
heap
page read and write
20953C63000
heap
page read and write
20955D15000
heap
page read and write
653000
heap
page read and write
87F4000
unkown
page read and write
450000
unkown
page read and write
FA8E000
stack
page read and write
81D000
heap
page read and write
F989000
stack
page read and write
CE4E000
unkown
page read and write
209011D0000
trusted library allocation
page read and write
20953C16000
heap
page read and write
5AAE000
stack
page read and write
20955BFD000
heap
page read and write
20955E44000
heap
page read and write
20955C05000
heap
page read and write
20955D04000
heap
page read and write
714E000
unkown
page readonly
1510000
heap
page read and write
2500000
heap
page read and write
2F71000
heap
page read and write
20955D0A000
heap
page read and write
20955CDA000
heap
page read and write
20953C18000
heap
page read and write
86B6000
unkown
page read and write
20953C59000
heap
page read and write
73E000
stack
page read and write
91000
unkown
page readonly
2E30000
remote allocation
page read and write
7FF585A50000
unkown
page readonly
19C000
stack
page read and write
20955D15000
heap
page read and write
29C0000
unkown
page read and write
680000
heap
page read and write
38E0000
heap
page read and write
20953C64000
heap
page read and write
5830000
unkown
page read and write
12E53000
unkown
page read and write
5E5000
stack
page read and write
20955D07000
heap
page read and write
7FF585D8B000
unkown
page readonly
20955D77000
heap
page read and write
20955DEF000
heap
page read and write
2900000
unkown
page read and write
806000
heap
page read and write
20953C59000
heap
page read and write
ED27000
unkown
page read and write
20955D45000
heap
page read and write
20955E29000
heap
page read and write
20953C19000
heap
page read and write
31CA000
heap
page read and write
29D0000
unkown
page read and write
20955C11000
heap
page read and write
3860000
heap
page read and write
ED22000
unkown
page read and write
20953C01000
heap
page read and write
20953C0C000
heap
page read and write
6117000
unkown
page read and write
20955D10000
heap
page read and write
20953C1A000
heap
page read and write
2960000
unkown
page read and write
32FE000
stack
page read and write
EB3E7E000
stack
page read and write
2EC0000
heap
page read and write
20955E97000
heap
page read and write
7FF585D81000
unkown
page readonly
12734000
unkown
page read and write
20955D04000
heap
page read and write
30000
heap
page read and write
2B3A000
stack
page read and write
9890000
direct allocation
page read and write
31D4000
heap
page read and write
20953C59000
heap
page read and write
20955E14000
heap
page read and write
20953C04000
heap
page read and write
401000
unkown
page execute read
408E000
heap
page read and write
8107000
stack
page read and write
20953C07000
heap
page read and write
20953C63000
heap
page read and write
E70F000
stack
page read and write
408C000
heap
page read and write
31F0000
heap
page read and write
20955E41000
heap
page read and write
1373C000
unkown
page read and write
7FF585755000
unkown
page readonly
2F70000
remote allocation
page read and write
2700000
heap
page read and write
20955C00000
heap
page read and write
20953C66000
heap
page read and write
2960000
unkown
page read and write
9890000
direct allocation
page read and write
2950000
unkown
page read and write
20955D44000
heap
page read and write
8EE000
stack
page read and write
10A1000
heap
page read and write
2980000
unkown
page read and write
6DFD000
unkown
page readonly
7FF585B61000
unkown
page readonly
9890000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
CF0000
heap
page read and write
3F81000
heap
page read and write
6EC000
unkown
page readonly
9890000
direct allocation
page read and write
939000
heap
page execute and read and write
5880000
unkown
page read and write
20955D76000
heap
page read and write
A7F000
stack
page read and write
20953C50000
heap
page read and write
20955D95000
heap
page read and write
9C000
stack
page read and write
3F81000
heap
page read and write
1F0000
heap
page read and write
7FF5859FA000
unkown
page readonly
4830000
unkown
page read and write
386A000
heap
page read and write
F00E000
unkown
page read and write
5830000
unkown
page read and write
2980000
unkown
page read and write
20955C11000
heap
page read and write
68E000
stack
page read and write
9C000
stack
page read and write
20953C65000
heap
page read and write
8DF000
heap
page read and write
4087000
heap
page read and write
64E000
stack
page read and write
DDA0000
heap
page read and write
20955D96000
heap
page read and write
540000
unkown
page read and write
7FF6E434C000
unkown
page write copy
20955DEF000
heap
page read and write
6B0000
heap
page read and write
163D000
heap
page read and write
20955D96000
heap
page read and write
41F0000
unkown
page read and write
2493D041000
unkown
page read and write
CE66000
unkown
page read and write
40C1000
trusted library allocation
page read and write
A2A000
heap
page read and write
20955D44000
heap
page read and write
470A000
stack
page read and write
4860000
unkown
page read and write
2F71000
heap
page read and write
7FF585D6B000
unkown
page readonly
A0000
unkown
page readonly
DD84000
unkown
page read and write
20953C65000
heap
page read and write
358E000
stack
page read and write
20953C0C000
heap
page read and write
5350000
heap
page read and write
2950000
unkown
page read and write
20955C11000
heap
page read and write
20955D06000
heap
page read and write
5830000
unkown
page read and write
2BDB000
unkown
page read and write
6CC000
unkown
page readonly
9890000
direct allocation
page read and write
20955E44000
heap
page read and write
4390000
unkown
page read and write
13331000
stack
page read and write
92A000
heap
page read and write
7FF5607EC000
unkown
page readonly
62B000
heap
page read and write
CCC5000
unkown
page read and write
704000
heap
page read and write
20955D95000
heap
page read and write
30C1000
trusted library allocation
page read and write
20955D1D000
heap
page read and write
51A000
remote allocation
page execute and read and write
401000
unkown
page execute read
20901713000
heap
page read and write
680000
heap
page read and write
3670000
trusted library allocation
page read and write
20955CFE000
heap
page read and write
1322A000
stack
page read and write
2950000
unkown
page read and write
1417000
heap
page read and write
2493CFC0000
unkown
page read and write
5830000
unkown
page read and write
2950000
remote allocation
page read and write
10377000
unkown
page read and write
20953C59000
heap
page read and write
2E1E000
stack
page read and write
ED0000
unkown
page readonly
4310000
unkown
page read and write
CE08000
unkown
page read and write
20955E97000
heap
page read and write
85F3000
unkown
page read and write
20953C59000
heap
page read and write
20953C50000
heap
page read and write
4081000
heap
page read and write
4089000
heap
page read and write
2950000
unkown
page read and write
7FF560842000
unkown
page readonly
9890000
direct allocation
page read and write
820000
unkown
page readonly
20955D98000
heap
page read and write
20953C59000
heap
page read and write
EF2B000
unkown
page read and write
7FF5856FF000
unkown
page readonly
20953C62000
heap
page read and write
20955C11000
heap
page read and write
20955D95000
heap
page read and write
30000
heap
page read and write
8ED000
heap
page read and write
20953C50000
heap
page read and write
5830000
unkown
page read and write
134F000
stack
page read and write
20955D06000
heap
page read and write
855000
heap
page read and write
9B000
unkown
page read and write
4A6000
unkown
page write copy
20955D15000
heap
page read and write
20955D04000
heap
page read and write
20953C62000
heap
page read and write
85C0000
unkown
page read and write
20955C11000
heap
page read and write
4BBE000
stack
page read and write
7FF585D3F000
unkown
page readonly
F04A000
unkown
page read and write
4860000
unkown
page read and write
21DE000
stack
page read and write
20955E13000
heap
page read and write
20955D87000
heap
page read and write
87E3000
unkown
page read and write
2820000
heap
page read and write
3F81000
heap
page read and write
20953C62000
heap
page read and write
2960000
unkown
page read and write
72EEB7B000
unkown
page read and write
627D000
unkown
page read and write
2F1F000
stack
page read and write
20955C11000
heap
page read and write
65CB000
stack
page read and write
196000
stack
page read and write
232B000
heap
page execute and read and write
66F000
unkown
page readonly
B6E000
stack
page read and write
2493D660000
unkown
page readonly
28AF000
stack
page read and write
20955DEF000
heap
page read and write
91A000
heap
page read and write
2960000
unkown
page read and write
20955D92000
heap
page read and write
20955D45000
heap
page read and write
590C000
stack
page read and write
30CA000
heap
page read and write
6AD3000
unkown
page readonly
20955D2C000
heap
page read and write
3F81000
heap
page read and write
20953C5B000
heap
page read and write
26B0000
heap
page read and write
7D0000
heap
page read and write
2A4F000
unkown
page read and write
20955E1D000
heap
page read and write
20955CDA000
heap
page read and write
E80A000
stack
page read and write
20955D42000
heap
page read and write
10385000
unkown
page read and write
8307000
stack
page read and write
400000
unkown
page readonly
9890000
direct allocation
page read and write
20955D07000
heap
page read and write
102B000
unkown
page read and write
20955D43000
heap
page read and write
7FF577B76000
unkown
page readonly
20953C57000
unkown
page read and write
160F000
heap
page read and write
30B0000
remote allocation
page read and write
7FF577B72000
unkown
page readonly
7FF585D2E000
unkown
page readonly
19C000
stack
page read and write
20901478000
heap
page read and write
2700000
heap
page read and write
58FA67E000
stack
page read and write
61C0000
unkown
page read and write
3830000
heap
page read and write
20955E0C000
heap
page read and write
20955C11000
heap
page read and write
768000
heap
page read and write
7FF5858F6000
unkown
page readonly
20955DEF000
heap
page read and write
20953C0C000
heap
page read and write
20955D43000
heap
page read and write
20955D43000
heap
page read and write
20955D42000
heap
page read and write
20953C66000
heap
page read and write
7FF585952000
unkown
page readonly
20955CDA000
heap
page read and write
21D0000
heap
page read and write
861000
heap
page read and write
2EFE000
stack
page read and write
20953C50000
heap
page read and write
6624000
unkown
page read and write
7F85000
stack
page read and write
20955D96000
heap
page read and write
20955E97000
heap
page read and write
56B0000
heap
page read and write
9C000
stack
page read and write
23B0000
heap
page read and write
20953BEA000
heap
page read and write
20955DEF000
heap
page read and write
31AC000
stack
page read and write
20955E44000
heap
page read and write
2493D04C000
unkown
page read and write
82B000
heap
page read and write
20953C01000
unkown
page read and write
20955D04000
heap
page read and write
401000
unkown
page execute read
65D0000
unkown
page read and write
2493CFA0000
unkown
page readonly
20953C50000
heap
page read and write
20955D96000
heap
page read and write
20953C01000
heap
page read and write
20955DD3000
heap
page read and write
5AB0000
heap
page read and write
7FFA13109000
unkown
page readonly
860000
heap
page read and write
20955D04000
heap
page read and write
401000
unkown
page execute read
20953C59000
heap
page read and write
20953C59000
heap
page read and write
7FF585E32000
unkown
page readonly
20955D04000
heap
page read and write
20953D90000
direct allocation
page execute and read and write
135AE000
stack
page read and write
20955D0B000
heap
page read and write
20955DF0000
heap
page read and write
20955D04000
heap
page read and write
41D0000
unkown
page read and write
1410000
heap
page read and write
2960000
unkown
page read and write
2900000
unkown
page read and write
2950000
unkown
page read and write
20955D04000
heap
page read and write
20955D0F000
heap
page read and write
20953C01000
heap
page read and write
9890000
direct allocation
page read and write
20955DFF000
heap
page read and write
401000
unkown
page execute read
20953C50000
heap
page read and write
695000
heap
page read and write
20953C0C000
heap
page read and write
20953C50000
heap
page read and write
20955D07000
heap
page read and write
1031C000
unkown
page read and write
ECDA000
unkown
page read and write
20955DEF000
heap
page read and write
300A000
heap
page read and write
20953BEF000
unkown
page read and write
20955E44000
heap
page read and write
20953C5C000
heap
page read and write
58FA8FE000
stack
page read and write
20953C62000
heap
page read and write
7FF585779000
unkown
page readonly
20955CB7000
heap
page read and write
20901230000
heap
page read and write
20953BEA000
unkown
page read and write
20955E44000
heap
page read and write
20955D86000
heap
page read and write
B9F000
stack
page read and write
2CAA000
stack
page read and write
20955CDA000
heap
page read and write
20953C63000
heap
page read and write
20901702000
heap
page read and write
28D0000
unkown
page readonly
20955D9B000
heap
page read and write
7FF585E74000
unkown
page readonly
276F000
stack
page read and write
20953C01000
heap
page read and write
20953C1A000
heap
page read and write
710000
heap
page read and write
20953C5C000
heap
page read and write
9890000
direct allocation
page read and write
20955BF1000
heap
page read and write
584E000
stack
page read and write
85E1000
unkown
page read and write
20955DC1000
heap
page read and write
20955A80000
direct allocation
page execute and read and write
7FF585AD7000
unkown
page readonly
7FF585661000
unkown
page readonly
3040000
heap
page read and write
7FF585BF5000
unkown
page readonly
20955CFA000
heap
page read and write
20955E44000
heap
page read and write
20953B60000
remote allocation
page read and write
72EEE7B000
stack
page read and write
4085000
heap
page read and write
20955D00000
heap
page read and write
20955C11000
heap
page read and write
7FF585846000
unkown
page readonly
20955D1E000
heap
page read and write
7FF585C5F000
unkown
page readonly
20955E99000
heap
page read and write
7FF585C06000
unkown
page readonly
20953C5B000
heap
page read and write
20953C67000
heap
page read and write
2950000
unkown
page read and write
2F20000
unkown
page read and write
157DC000
unkown
page read and write
7FF585930000
unkown
page readonly
A7E000
stack
page read and write
194DF31F000
heap
page read and write
7FF6E4341000
unkown
page execute read
ECA5000
unkown
page read and write
7FF6E46FC000
unkown
page readonly
2950000
unkown
page read and write
20953C65000
heap
page read and write
20955C01000
heap
page read and write
2950000
unkown
page read and write
20953C01000
unkown
page read and write
20901436000
heap
page read and write
2493D05D000
unkown
page read and write
20955CFA000
heap
page read and write
93E000
stack
page read and write
20955D54000
heap
page read and write
20955D15000
heap
page read and write
20953C59000
heap
page read and write
400000
unkown
page readonly
2950000
unkown
page read and write
5830000
unkown
page read and write
7FFA131DA000
unkown
page readonly
20953C5C000
heap
page read and write
21E0000
heap
page read and write
2970000
unkown
page read and write
9890000
direct allocation
page read and write
20953C50000
heap
page read and write
20953C04000
heap
page read and write
7FE000
stack
page read and write
1385D000
unkown
page read and write
20901713000
heap
page read and write
2900000
unkown
page read and write
2DBD000
stack
page read and write
20955D04000
heap
page read and write
20955CFE000
heap
page read and write
20953C01000
heap
page read and write
4A6000
unkown
page write copy
7AE000
stack
page read and write
2F30000
trusted library allocation
page execute and read and write
6210000
unkown
page readonly
400000
unkown
page readonly
93D000
heap
page read and write
2CA0000
heap
page read and write
128E000
stack
page read and write
20955C11000
heap
page read and write
5830000
unkown
page read and write
890000
heap
page read and write
2950000
unkown
page read and write
A60000
unkown
page readonly
87D1000
unkown
page read and write
ED50000
unkown
page read and write
23FF000
stack
page read and write
CCAA000
unkown
page read and write
7FF585AC1000
unkown
page readonly
19C000
stack
page read and write
20955D95000
heap
page read and write
86B000
heap
page read and write
5F1000
heap
page read and write
683000
heap
page read and write
85E3000
unkown
page read and write
9890000
direct allocation
page read and write
20955550000
direct allocation
page read and write
2EBC000
stack
page read and write
2F30000
heap
page read and write
5DA000
heap
page read and write
1647000
heap
page read and write
20953C0C000
heap
page read and write
87E5000
unkown
page read and write
64E000
stack
page read and write
2E31000
heap
page read and write
7FF585E5D000
unkown
page readonly
9890000
direct allocation
page read and write
20955E44000
heap
page read and write
20953C5F000
heap
page read and write
84B000
heap
page read and write
2960000
unkown
page read and write
20955C65000
heap
page read and write
20953C01000
heap
page read and write
8939000
unkown
page read and write
95E000
stack
page read and write
20953C01000
heap
page read and write
20953C0C000
heap
page read and write
738B000
stack
page read and write
7FFA131C3000
unkown
page readonly
20953A60000
heap
page read and write
20955D4A000
heap
page read and write
20955E13000
heap
page read and write
20955D04000
heap
page read and write
20953C50000
heap
page read and write
4350000
unkown
page read and write
5830000
unkown
page read and write
7FF585C19000
unkown
page readonly
9890000
direct allocation
page read and write
1170000
heap
page read and write
9890000
direct allocation
page read and write
20953C64000
heap
page read and write
6EC000
unkown
page readonly
20955D04000
heap
page read and write
2950000
unkown
page read and write
3000000
heap
page read and write
2A3D000
stack
page read and write
EDF5000
unkown
page read and write
20955E44000
heap
page read and write
4A6000
unkown
page read and write
3000000
heap
page read and write
20955DD3000
heap
page read and write
840000
unclassified section
page read and write
20953C01000
heap
page read and write
408F000
heap
page read and write
20953C59000
heap
page read and write
5810000
unkown
page read and write
20953B7B000
unkown
page read and write
7FF585B46000
unkown
page readonly
2230000
heap
page read and write
2990000
unkown
page read and write
2950000
unkown
page read and write
20955D04000
heap
page read and write
20955D10000
heap
page read and write
8BA3000
unkown
page read and write
6AA000
heap
page read and write
31DF000
heap
page read and write
20955D15000
heap
page read and write
B808000
stack
page read and write
20955CFE000
heap
page read and write
20955D0A000
heap
page read and write
20955DEF000
heap
page read and write
9890000
direct allocation
page read and write
2950000
unkown
page read and write
7FF585C9F000
unkown
page readonly
AE0000
heap
page read and write
9890000
direct allocation
page read and write
910000
heap
page read and write
7FF560817000
unkown
page readonly
9D000
stack
page read and write
194DF270000
heap
page read and write
20953C66000
heap
page read and write
9890000
direct allocation
page read and write
2D40000
unkown
page read and write
2493D045000
unkown
page read and write
20953C59000
heap
page read and write
20955DEF000
heap
page read and write
2950000
unkown
page read and write
20901713000
heap
page read and write
20953C5B000
heap
page read and write
5830000
unkown
page read and write
20953C5A000
heap
page read and write
7FF6E434C000
unkown
page write copy
20955D9A000
heap
page read and write
5F1000
heap
page read and write
20955D54000
heap
page read and write
20955D9B000
heap
page read and write
74E000
stack
page read and write
7FF56084C000
unkown
page readonly
2950000
unkown
page read and write
20955DEF000
heap
page read and write
20955CDA000
heap
page read and write
9890000
direct allocation
page read and write
3557000
heap
page read and write
2EFE000
stack
page read and write
277E000
stack
page read and write
14AF000
stack
page read and write
E58F000
stack
page read and write
2720000
unkown
page readonly
20953C56000
heap
page read and write
BD0000
heap
page read and write
20901702000
heap
page read and write
2E50000
heap
page read and write
72EEA7B000
stack
page read and write
29E0000
heap
page read and write
20955D15000
heap
page read and write
2950000
unkown
page read and write
55E0000
unkown
page read and write
20953C5C000
heap
page read and write
20953C56000
heap
page read and write
20953C65000
heap
page read and write
2E1F000
stack
page read and write
EB04000
stack
page read and write
20953C59000
heap
page read and write
20953C56000
heap
page read and write
7FF58596F000
unkown
page readonly
813000
heap
page read and write
88E000
heap
page read and write
2950000
unkown
page read and write
30000
heap
page read and write
20953C65000
heap
page read and write
15A0000
heap
page read and write
7FF56088A000
unkown
page readonly
20953C5F000
heap
page read and write
20955D96000
heap
page read and write
2B3A000
stack
page read and write
20955D0B000
heap
page read and write
3F81000
heap
page read and write
5EA000
heap
page read and write
20953C18000
heap
page read and write
6A5000
heap
page read and write
3420000
heap
page read and write
2900000
unkown
page read and write
2493CF20000
heap
page read and write
20953C65000
heap
page read and write
31E0000
heap
page read and write
2950000
unkown
page read and write
20955D06000
heap
page read and write
4860000
unkown
page read and write
7FF58578B000
unkown
page readonly
20901702000
heap
page read and write
7FF585ED1000
unkown
page readonly
2950000
unkown
page read and write
417000
unkown
page read and write
B3F000
stack
page read and write
2950000
unkown
page read and write
20955E13000
heap
page read and write
20955DEF000
heap
page read and write
20955E02000
heap
page read and write
20955DF0000
heap
page read and write
30000
heap
page read and write
20953C56000
heap
page read and write
86E7000
unkown
page read and write
4C66000
unkown
page read and write
10314000
unkown
page read and write
2950000
unkown
page read and write
2DA0000
unkown
page readonly
20955E14000
heap
page read and write
20953C59000
heap
page read and write
20955D46000
heap
page read and write
2950000
unkown
page read and write
92C000
heap
page read and write
2B8E000
stack
page read and write
13735000
unkown
page read and write
2CBE000
stack
page read and write
20953C63000
heap
page read and write
31E6000
heap
page read and write
7FF585DA6000
unkown
page readonly
626000
heap
page read and write
20955D04000
heap
page read and write
770E000
stack
page read and write
20955D95000
heap
page read and write
6370000
unkown
page readonly
1F0000
heap
page read and write
952000
heap
page read and write
5830000
unkown
page read and write
20955E40000
heap
page read and write
7FF585E4C000
unkown
page readonly
33DE000
stack
page read and write
9890000
direct allocation
page read and write
2950000
unkown
page read and write
20955D07000
heap
page read and write
2A3D000
stack
page read and write
8E2000
heap
page read and write
20901713000
heap
page read and write
20953C70000
direct allocation
page execute and read and write
20955CFF000
heap
page read and write
2493CFC0000
unkown
page read and write
7FF585DA2000
unkown
page readonly
20955D07000
heap
page read and write
9FF000
stack
page read and write
9890000
direct allocation
page read and write
194DF255000
heap
page read and write
1F0000
heap
page read and write
20953C5E000
heap
page read and write
7FF5607F2000
unkown
page readonly
4084000
heap
page read and write
20901716000
heap
page read and write
7FF585D5F000
unkown
page readonly
2950000
unkown
page read and write
9890000
direct allocation
page read and write
66F000
unkown
page readonly
4086000
heap
page read and write
31CB000
heap
page read and write
20953C59000
heap
page read and write
20955D04000
heap
page read and write
B409000
stack
page read and write
31C7000
heap
page read and write
20953C01000
heap
page read and write
7FF5607F2000
unkown
page readonly
20953C5C000
heap
page read and write
2E1E000
stack
page read and write
155E000
stack
page read and write
2493D102000
unkown
page read and write
29A0000
unkown
page read and write
240F000
heap
page execute and read and write
2F70000
remote allocation
page read and write
1F0000
heap
page read and write
20955D95000
heap
page read and write
7FF585ADC000
unkown
page readonly
3F81000
heap
page read and write
31F7000
heap
page read and write
B70000
heap
page read and write
38A0000
heap
page read and write
790000
heap
page read and write
4860000
unkown
page read and write
2A63000
unkown
page read and write
717000
heap
page read and write
AF0000
unkown
page readonly
3B8F000
stack
page read and write
20955D0E000
heap
page read and write
2900000
unkown
page read and write
5830000
unkown
page read and write
A8E000
stack
page read and write
20955C53000
heap
page read and write
20901502000
trusted library allocation
page read and write
20953C66000
heap
page read and write
20955C11000
heap
page read and write
20953C66000
heap
page read and write
DA10000
heap
page read and write
20953C64000
heap
page read and write
20901702000
heap
page read and write
401000
unkown
page execute read
97F000
stack
page read and write
2950000
unkown
page read and write
7FF585DF3000
unkown
page readonly
9890000
direct allocation
page read and write
279F000
stack
page read and write
20955D95000
heap
page read and write
20955E40000
heap
page read and write
7FF5607F4000
unkown
page readonly
7FF585D74000
unkown
page readonly
20955E44000
heap
page read and write
274F000
stack
page read and write
10AC000
stack
page read and write
20953C50000
heap
page read and write
229D000
stack
page read and write
194DF250000
heap
page read and write
B589000
stack
page read and write
2950000
unkown
page read and write
37CE000
stack
page read and write
82D000
heap
page read and write
20955C11000
heap
page read and write
20955E13000
heap
page read and write
85EC000
unkown
page read and write
194DF277000
heap
page read and write
6C7000
heap
page read and write
2B7E000
stack
page read and write
7FF585684000
unkown
page readonly
2ACE000
unkown
page read and write
20953C18000
heap
page read and write
31B0000
heap
page read and write
20953C50000
heap
page read and write
7FF585ACD000
unkown
page readonly
20955CF1000
heap
page read and write
7FF560884000
unkown
page readonly
61C0000
unkown
page read and write
20955CDA000
heap
page read and write
62A7000
unkown
page read and write
5600000
unkown
page read and write
20955C11000
heap
page read and write
66F000
unkown
page readonly
20901702000
heap
page read and write
2FF0000
heap
page read and write
20953C55000
heap
page read and write
20955D9B000
heap
page read and write
2F5E000
stack
page read and write
20955E28000
heap
page read and write
20955D42000
heap
page read and write
20955D5B000
heap
page read and write
20953C63000
heap
page read and write
20955DEF000
heap
page read and write
194DF27B000
heap
page read and write
3300000
heap
page read and write
A3F000
stack
page read and write
20955D5B000
heap
page read and write
20955D0A000
heap
page read and write
7FF6E46CA000
unkown
page readonly
7FF56081E000
unkown
page readonly
20955D43000
heap
page read and write
75A000
heap
page read and write
878000
heap
page read and write
2950000
unkown
page read and write
20953C59000
heap
page read and write
20953C1A000
heap
page read and write
2940000
unkown
page read and write
20955D0A000
heap
page read and write
2493D002000
unkown
page read and write
20955DEF000
heap
page read and write
2B8E000
stack
page read and write
7D7000
heap
page read and write
2960000
unkown
page read and write
7FF585669000
unkown
page readonly
6A0000
heap
page read and write
401000
unkown
page execute read
BB7000
heap
page read and write
2900000
unkown
page read and write
400000
unkown
page readonly
20955C11000
heap
page read and write
1344F000
stack
page read and write
882000
heap
page read and write
7FF6E46CE000
unkown
page write copy
401000
unkown
page execute read
31B5000
heap
page read and write
64E000
stack
page read and write
9C000
stack
page read and write
62A000
heap
page read and write
20955D0E000
heap
page read and write
20953B60000
remote allocation
page read and write
20955DEF000
heap
page read and write
7FF585CA3000
unkown
page readonly
20953C60000
heap
page read and write
2960000
unkown
page read and write
20955D00000
heap
page read and write
194DF090000
heap
page read and write
9890000
direct allocation
page read and write
6A7000
heap
page read and write
12F31000
unkown
page read and write
81E000
stack
page read and write
20953C04000
heap
page read and write
20953C01000
heap
page read and write
159E000
stack
page read and write
850000
heap
page read and write
2440000
direct allocation
page read and write
20953C5E000
heap
page read and write
2A8B000
unkown
page read and write
87C2000
unkown
page read and write
30000
heap
page read and write
400000
unkown
page readonly
2950000
unkown
page read and write
A4E000
stack
page read and write
19C000
stack
page read and write
7FF585B5A000
unkown
page readonly
20955D0B000
heap
page read and write
337F000
stack
page read and write
2960000
unkown
page read and write
C8B2000
unkown
page read and write
13CE000
stack
page read and write
80F000
heap
page read and write
7FF56087E000
unkown
page readonly
7FF6E46CE000
unkown
page write copy
1088D000
stack
page read and write
20955D96000
heap
page read and write
9890000
direct allocation
page read and write
20955D0A000
heap
page read and write
20953C65000
heap
page read and write
20953C0C000
heap
page read and write
6EC000
unkown
page readonly
2E30000
heap
page read and write
3F81000
heap
page read and write
20955DEF000
heap
page read and write
20955CFE000
heap
page read and write
55E0000
unkown
page read and write
20953C66000
heap
page read and write
7FF585C64000
unkown
page readonly
5830000
unkown
page read and write
27AE000
stack
page read and write
5F8000
heap
page read and write
CE73000
unkown
page read and write
9890000
direct allocation
page read and write
88A14F9000
stack
page read and write
22E3000
heap
page read and write
2330000
heap
page read and write
194E0FC0000
trusted library allocation
page read and write
6FE000
stack
page read and write
820000
direct allocation
page execute and read and write
193000
stack
page read and write
52B000
remote allocation
page execute and read and write
2950000
unkown
page read and write
683000
heap
page read and write
20955D43000
heap
page read and write
20953C56000
heap
page read and write
315F000
stack
page read and write
20953C59000
heap
page read and write
20955E1D000
heap
page read and write
9890000
direct allocation
page read and write
20953C50000
heap
page read and write
EF7D000
unkown
page read and write
2090148A000
heap
page read and write
2950000
unkown
page read and write
20955D04000
heap
page read and write
20953C0C000
heap
page read and write
9890000
direct allocation
page read and write
20955D6C000
heap
page read and write
20955D07000
heap
page read and write
4A6000
unkown
page write copy
20953C1A000
heap
page read and write
EBD2000
unkown
page read and write
20953C01000
heap
page read and write
20955DEF000
heap
page read and write
2950000
unkown
page read and write
136AC000
stack
page read and write
2670000
heap
page read and write
400000
unkown
page readonly
20955D19000
heap
page read and write
6EC000
unkown
page readonly
9890000
direct allocation
page read and write
7FF585770000
unkown
page readonly
2F70000
heap
page read and write
20953C65000
heap
page read and write
20953C01000
heap
page read and write
30B0000
heap
page execute and read and write
20953C54000
heap
page read and write
529000
remote allocation
page execute and read and write
20955D54000
heap
page read and write
20955CFA000
heap
page read and write
20955CDA000
heap
page read and write
7FF585CCD000
unkown
page readonly
7FF585A91000
unkown
page readonly
19C000
stack
page read and write
20955D12000
heap
page read and write
20955E44000
heap
page read and write
20955D96000
heap
page read and write
20955D76000
heap
page read and write
20955C11000
heap
page read and write
2D93000
trusted library allocation
page execute and read and write
7FF58591F000
unkown
page readonly
20955DEF000
heap
page read and write
529000
remote allocation
page execute and read and write
20953C64000
heap
page read and write
20901700000
heap
page read and write
1F0000
heap
page read and write
1F0000
heap
page read and write
4084000
heap
page read and write
626000
heap
page read and write
20955E44000
heap
page read and write
22E0000
heap
page read and write
64B0000
unkown
page readonly
1F0000
heap
page read and write
6EC000
unkown
page readonly
7FF5856BE000
unkown
page readonly
4320000
unkown
page read and write
20955D50000
heap
page read and write
2493D2D0000
unkown
page readonly
20955D03000
heap
page read and write
20953C01000
heap
page read and write
2900000
unkown
page read and write
2950000
unkown
page read and write
20955C11000
heap
page read and write
20955D04000
heap
page read and write
11F0000
heap
page read and write
20955D04000
heap
page read and write
20953C1A000
heap
page read and write
9890000
direct allocation
page read and write
20953C62000
heap
page read and write
20953C66000
heap
page read and write
20955E44000
heap
page read and write
2493DA02000
unkown
page read and write
3F81000
heap
page read and write
20953C65000
heap
page read and write
20953BEF000
heap
page read and write
20955CFE000
heap
page read and write
2950000
unkown
page read and write
20901713000
heap
page read and write
5BE000
stack
page read and write
2960000
unkown
page read and write
20955D96000
heap
page read and write
20953C5D000
heap
page read and write
2990000
unkown
page read and write
2C96000
heap
page read and write
2960000
unkown
page read and write
24D0000
heap
page read and write
20955D19000
heap
page read and write
3250000
heap
page read and write
FB09000
stack
page read and write
71C3000
unkown
page readonly
13732000
unkown
page read and write
20955DFF000
heap
page read and write
4A6000
unkown
page read and write
2660000
unkown
page readonly
20955D96000
heap
page read and write
20955D1D000
heap
page read and write
7FF560842000
unkown
page readonly
20955C10000
heap
page read and write
2900000
unkown
page read and write
20955D0A000
heap
page read and write
9D000
stack
page read and write
4081000
heap
page read and write
AF0A000
stack
page read and write
2F1F000
stack
page read and write
58FA358000
stack
page read and write
20955D76000
heap
page read and write
31B4000
heap
page read and write
2493D2D0000
unkown
page readonly
20953C65000
heap
page read and write
EB396A000
stack
page read and write
2970000
unkown
page read and write
7FF585AB9000
unkown
page readonly
4C60000
unkown
page read and write
2900000
unkown
page read and write
20955D2E000
heap
page read and write
8E2000
heap
page read and write
31B0000
remote allocation
page read and write
670000
heap
page read and write
20953BEA000
direct allocation
page read and write
20955E97000
heap
page read and write
20955D82000
heap
page read and write
20955CFA000
heap
page read and write
20955C11000
heap
page read and write
20953C59000
heap
page read and write
7283000
unkown
page readonly
20953C01000
heap
page read and write
20955D19000
heap
page read and write
20953C0C000
heap
page read and write
4C90000
heap
page read and write
20953C64000
heap
page read and write
20955CFE000
heap
page read and write
27E0000
heap
page read and write
2493D043000
unkown
page read and write
529000
remote allocation
page execute and read and write
20955E44000
heap
page read and write
20953C62000
heap
page read and write
2960000
unkown
page read and write
4086000
heap
page read and write
EE65000
unkown
page read and write
4C55000
stack
page read and write
193000
stack
page read and write
3BCE000
stack
page read and write
20955BF0000
heap
page read and write
1220000
heap
page read and write
9890000
direct allocation
page read and write
20955C11000
heap
page read and write
20955D95000
heap
page read and write
7FF58570C000
unkown
page readonly
AD8D000
stack
page read and write
2F1F000
stack
page read and write
20953C5B000
heap
page read and write
20901413000
unkown
page read and write
5B3000
heap
page read and write
20955DAC000
heap
page read and write
401000
unkown
page execute read
20953C01000
heap
page read and write
13037000
unkown
page read and write
FA0F000
stack
page read and write
20955D9B000
heap
page read and write
20955E44000
heap
page read and write
23BD000
heap
page execute and read and write
2950000
unkown
page read and write
20955D12000
heap
page read and write
62B000
heap
page read and write
20901483000
heap
page read and write
2480000
heap
page read and write
4A6000
unkown
page write copy
7FF585A0F000
unkown
page readonly
15DA000
heap
page read and write
20955CDA000
heap
page read and write
20955D0A000
heap
page read and write
20953C62000
heap
page read and write
726E000
unkown
page readonly
9890000
direct allocation
page read and write
20953C59000
heap
page read and write
70E000
stack
page read and write
30B1000
heap
page read and write
20955E97000
heap
page read and write
20955D0C000
heap
page read and write
20955D46000
heap
page read and write
20955D04000
heap
page read and write
2493D049000
unkown
page read and write
20955E0C000
heap
page read and write
400000
unkown
page readonly
2A3D000
stack
page read and write
7FF585D97000
unkown
page readonly
4A6000
unkown
page write copy
7FF585935000
unkown
page readonly
20953C50000
heap
page read and write
20955D14000
heap
page read and write
20953C59000
heap
page read and write
20955D9A000
heap
page read and write
7FF5859D2000
unkown
page readonly
30000
heap
page read and write
20955D95000
heap
page read and write
20953C65000
heap
page read and write
20953C62000
heap
page read and write
401000
unkown
page execute read
7FF5856C6000
unkown
page readonly
873000
heap
page read and write
7FF585C66000
unkown
page readonly
20953C67000
heap
page read and write
20955D2F000
heap
page read and write
8820000
unkown
page read and write
20955D44000
heap
page read and write
4084000
heap
page read and write
5830000
unkown
page read and write
2960000
unkown
page read and write
20955DEF000
heap
page read and write
20953C61000
heap
page read and write
20953BD2000
unkown
page read and write
9A0000
heap
page read and write
400000
unkown
page readonly
20955BF1000
heap
page read and write
20955D54000
heap
page read and write
2950000
unkown
page read and write
20953C65000
heap
page read and write
ACF000
stack
page read and write
B28E000
stack
page read and write
29A0000
unkown
page read and write
7FF585DB1000
unkown
page readonly
61C0000
unkown
page read and write
8F8000
heap
page read and write
5F7000
heap
page read and write
20955D95000
heap
page read and write
862C000
unkown
page read and write
7FF58594C000
unkown
page readonly
3560000
heap
page read and write
7FF6E4340000
unkown
page readonly
2DCB000
trusted library allocation
page execute and read and write
20955D96000
heap
page read and write
2950000
unkown
page read and write
20955DAB000
heap
page read and write
20953C63000
heap
page read and write
20955BF1000
heap
page read and write
EDBD000
unkown
page read and write
31DD000
heap
page read and write
7FF585767000
unkown
page readonly
644000
heap
page read and write
3180000
heap
page read and write
2950000
unkown
page read and write
F0AA000
unkown
page read and write
22F0000
heap
page read and write
20955D04000
heap
page read and write
20955D92000
heap
page read and write
4820000
unkown
page readonly
DD68000
unkown
page read and write
20955D07000
heap
page read and write
810000
heap
page read and write
20955CDA000
heap
page read and write
20955D95000
heap
page read and write
20901713000
heap
page read and write
572E000
stack
page read and write
4200000
unkown
page read and write
9890000
direct allocation
page read and write
20955D44000
heap
page read and write
80E000
heap
page read and write
20955D36000
heap
page read and write
20955D95000
heap
page read and write
20955D66000
heap
page read and write
20955E44000
heap
page read and write
20955D07000
heap
page read and write
20953BD3000
heap
page read and write
8F8000
heap
page read and write
1F0000
heap
page read and write
2950000
unkown
page read and write
9890000
direct allocation
page read and write
20955C11000
heap
page read and write
2C7A000
stack
page read and write
897E000
unkown
page read and write
9890000
direct allocation
page read and write
5830000
unkown
page read and write
9890000
direct allocation
page read and write
5D2E000
stack
page read and write
7FF585904000
unkown
page readonly
20953C50000
heap
page read and write
85D0000
unkown
page read and write
20955E1D000
heap
page read and write
B6E000
stack
page read and write
EB3CFB000
stack
page read and write
20955C11000
heap
page read and write
32EA000
heap
page read and write
4A6000
unkown
page write copy
2640000
unkown
page read and write
7FF585AE2000
unkown
page readonly
A0000
unkown
page readonly
20953C18000
heap
page read and write
233F000
stack
page read and write
588E000
stack
page read and write
2E30000
heap
page read and write
24C0000
heap
page read and write
7FF560838000
unkown
page readonly
3240000
heap
page read and write
20953C50000
heap
page read and write
2950000
unkown
page read and write
7FF585C70000
unkown
page readonly
85DA000
unkown
page read and write
5830000
unkown
page read and write
2950000
unkown
page read and write
30000
heap
page read and write
B18A000
stack
page read and write
3F81000
heap
page read and write
19C000
stack
page read and write
2F70000
remote allocation
page read and write
2900000
unkown
page read and write
20955C50000
heap
page read and write
7FF56087E000
unkown
page readonly
429000
unkown
page read and write
2950000
unkown
page read and write
BD7000
heap
page read and write
20953C64000
heap
page read and write
2A0F000
unkown
page read and write
2DA0000
trusted library allocation
page read and write
20955CB7000
heap
page read and write
2960000
unkown
page read and write
20955D6C000
heap
page read and write
20955D95000
heap
page read and write
6775000
unkown
page read and write
20955CDA000
heap
page read and write
82D000
heap
page read and write
5212000
unkown
page read and write
7FF5859EF000
unkown
page readonly
408D000
heap
page read and write
27DF000
stack
page read and write
20955DEF000
heap
page read and write
287F000
stack
page read and write
20955D46000
heap
page read and write
72EED7E000
stack
page read and write
66F000
unkown
page readonly
8DD000
heap
page read and write
2B7E000
stack
page read and write
7032000
unkown
page readonly
2D25000
stack
page read and write
629C000
unkown
page read and write
29C0000
unkown
page read and write
10434000
unkown
page read and write
2900000
unkown
page read and write
6EC000
unkown
page readonly
20955CFF000
heap
page read and write
7FF58594F000
unkown
page readonly
20955D9B000
heap
page read and write
7FF585664000
unkown
page readonly
7FF585D01000
unkown
page readonly
529000
remote allocation
page execute and read and write
7FF585CC9000
unkown
page readonly
2390000
heap
page read and write
5830000
unkown
page read and write
20955D45000
heap
page read and write
20953C50000
heap
page read and write
20955D4A000
heap
page read and write
20901702000
heap
page read and write
400000
unkown
page readonly
20955D43000
heap
page read and write
30000
heap
page read and write
20953C50000
heap
page read and write
7FF585DEA000
unkown
page readonly
20955CFF000
heap
page read and write
622000
heap
page read and write
20955D43000
heap
page read and write
20955E02000
heap
page read and write
7FF560884000
unkown
page readonly
20955D3F000
heap
page read and write
CC90000
unkown
page read and write
7FF585C85000
unkown
page readonly
5830000
unkown
page read and write
237E000
stack
page read and write
20955C05000
heap
page read and write
3F81000
heap
page read and write
7FF585BA9000
unkown
page readonly
EC75000
unkown
page read and write
AF87000
stack
page read and write
20955D04000
heap
page read and write
81D000
heap
page read and write
9890000
direct allocation
page read and write
824000
heap
page read and write
20953C65000
heap
page read and write
20955D95000
heap
page read and write
20953C18000
heap
page read and write
20955E0C000
heap
page read and write
B40000
unkown
page readonly
20953C57000
heap
page read and write
8B0000
heap
page read and write
20955D2F000
heap
page read and write
20953C5B000
unkown
page read and write
20955CFA000
heap
page read and write
20955DF0000
heap
page read and write
4873000
trusted library allocation
page read and write
8989000
unkown
page read and write
1602000
heap
page read and write
7FF585C33000
unkown
page readonly
20955D43000
heap
page read and write
58FA77C000
stack
page read and write
7FFA1321F000
unkown
page readonly
ED54000
unkown
page read and write
4860000
unkown
page read and write
20953C19000
unkown
page read and write
2950000
unkown
page read and write
A0E000
stack
page read and write
9890000
direct allocation
page read and write
3070000
heap
page read and write
20955D2E000
heap
page read and write
2950000
unkown
page read and write
5710000
unkown
page read and write
7FF585CDD000
unkown
page readonly
20955E99000
heap
page read and write
2C8E000
stack
page read and write
5830000
unkown
page read and write
20955D5B000
heap
page read and write
2B7D000
stack
page read and write
5F0000
heap
page read and write
2E31000
heap
page read and write
20955E0C000
heap
page read and write
20955E44000
heap
page read and write
72A5000
unkown
page readonly
20953C0C000
heap
page read and write
28DF000
stack
page read and write
401000
unkown
page execute read
20955D43000
heap
page read and write
2D80000
trusted library allocation
page read and write
400000
unkown
page readonly
194E0F60000
trusted library allocation
page read and write
9890000
direct allocation
page read and write
307A000
heap
page read and write
20955D43000
heap
page read and write
41A3000
unkown
page read and write
20955CFA000
heap
page read and write
2DC7000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
4A6000
unkown
page write copy
58FA97F000
stack
page read and write
1515000
heap
page read and write
20953C61000
heap
page read and write
720000
heap
page read and write
68A000
heap
page read and write
2493D041000
unkown
page read and write
38AA000
heap
page read and write
74E000
stack
page read and write
20953C59000
heap
page read and write
20955D19000
heap
page read and write
20955D43000
heap
page read and write
29A0000
unkown
page read and write
20955D9B000
heap
page read and write
20953BEF000
heap
page read and write
2F2E000
stack
page read and write
33F8000
heap
page read and write
1F0000
heap
page read and write
820000
heap
page read and write
20955D06000
heap
page read and write
20955D2E000
heap
page read and write
20953C5F000
heap
page read and write
72C2000
unkown
page readonly
9890000
direct allocation
page read and write
1021000
unkown
page readonly
11A9000
stack
page read and write
63C000
heap
page read and write
680000
heap
page read and write
20955D10000
heap
page read and write
5830000
unkown
page read and write
10311000
unkown
page read and write
AC20000
unkown
page read and write
4340000
unkown
page read and write
2960000
unkown
page read and write
38AA000
heap
page read and write
7FF585D78000
unkown
page readonly
2EF0000
unkown
page readonly
4085000
heap
page read and write
20955CDA000
heap
page read and write
9890000
direct allocation
page read and write
6ABE000
unkown
page readonly
20953C0C000
heap
page read and write
20953C5F000
heap
page read and write
30C0000
heap
page read and write
5830000
unkown
page read and write
20955CDA000
heap
page read and write
4350000
unkown
page read and write
85D8000
unkown
page read and write
7FF585DE0000
unkown
page readonly
20953C56000
heap
page read and write
333E000
stack
page read and write
2B4E000
stack
page read and write
20901702000
heap
page read and write
20953C65000
heap
page read and write
There are 3606 hidden memdumps, click here to show them.