IOC Report
i5NDVAFg42.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\i5NDVAFg42.exe
C:\Users\user\Desktop\i5NDVAFg42.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\ipconfig.exe
C:\Windows\SysWOW64\ipconfig.exe
malicious
C:\Windows\SysWOW64\autochk.exe
C:\Windows\SysWOW64\autochk.exe
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\i5NDVAFg42.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.laneflowlogistics.com/vr01/?K0Dl=8pkho2W8C2&F8=afsJSrVtQy935SgvDMKIlJRgvlqACV7EhITZbFrNAvlElQGaJzKQmMA6gaTM16h48AiD
76.223.105.230
malicious
http://www.gratiasempirellc.com/vr01/?F8=w7umpJ+rfj3CGTpHxtSOPW9QQGzAdMNJjdAKE5hb1nYkCdk9PPEgcDhma/h12TSv3owP&K0Dl=8pkho2W8C2
45.88.201.15
malicious
http://www.bharatcrimecontrol24news.com/vr01/?K0Dl=8pkho2W8C2&F8=3hn83+NBBYNXWUD9Y/r7Xs4IAViW+ZrQ9Q/N09yYT452ZMDcSpE7Ef8yOdRKd9g47dJA
69.57.172.11
malicious
http://www.accidentapp.online/vr01/?K0Dl=8pkho2W8C2&F8=XJpxajiERfwYWZCBMKFPnJULtBnU/CqQJGR7CZrrgovMO9KS90T7etXRllYWrqB0ffTS
3.33.130.190
malicious
http://www.kirtirefrigeration.com/vr01/?F8=0FWlSxHnm0VS79clrGeEzlQTpbLPYM717ItFtF8k1xbK31xxaWzDAorSZVSnHMmj/6/I&K0Dl=8pkho2W8C2
34.149.87.45
malicious
http://www.familyofficesheet.com/vr01/?F8=kCWTp1EUleadtFJdIzCu6Df5MNzEbmwToUUw4IkBm959jVVvzkoQYbPRGEEyl/3/RaO8&K0Dl=8pkho2W8C2
104.16.36.105
malicious
www.yoursweets.online/vr01/
malicious
http://www.flavorfog.online/vr01/?F8=Qr63XqLLwL8kZKZ1R+KG3ClgUrm6jRe21pOgDYnjKSMcuwj3QpCJccHr2dssKI7zl3t9&K0Dl=8pkho2W8C2
35.214.118.179
malicious
http://www.topdeals.biz/vr01/?K0Dl=8pkho2W8C2&F8=nF7lN0R+GAMQz/Akw9zAFS8sK1vaMqXOBBmwCvkEKDYNrGKPEkcEeMds11lXmHU70D3D
72.14.185.43
malicious
http://www.flavorfog.online
unknown
http://www.makeyousurprise.com/vr01/www.helyibudapest.com
unknown
https://word.office.comon
unknown
http://www.yesxoit.xyz
unknown
http://www.bharatcrimecontrol24news.com/vr01/
unknown
http://www.michellecaldwelldesign.com
unknown
http://www.hsyxkj.com/vr01/www.makeyousurprise.com
unknown
http://www.yoursweets.online/vr01/www.nicholsonflooringservices.com
unknown
http://www.hsyxkj.com
unknown
http://www.yoursweets.online
unknown
https://powerpoint.office.comcember
unknown
http://www.hsyxkj.comReferer:
unknown
http://www.accidentapp.online/vr01/www.yoursweets.online
unknown
http://www.laneflowlogistics.comReferer:
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
http://www.familyofficesheet.com/vr01/
unknown
http://www.nicholsonflooringservices.comReferer:
unknown
http://www.gratiasempirellc.comReferer:
unknown
http://www.yoursweets.online/vr01/
unknown
http://www.flavorfog.online/vr01/
unknown
http://www.yesxoit.xyz/vr01/www.gratiasempirellc.com
unknown
http://www.accidentapp.onlineReferer:
unknown
http://www.mayorii.com
unknown
http://www.familyofficesheet.com
unknown
http://www.helyibudapest.comReferer:
unknown
http://www.michellecaldwelldesign.com/vr01/
unknown
http://www.michellecaldwelldesign.comReferer:
unknown
http://www.flavorfog.online/vr01/www.bharatcrimecontrol24news.com
unknown
http://www.topdeals.biz/vr01/
unknown
https://www.gratiasempirellc.com/comments/feed
unknown
http://www.topdeals.biz
unknown
http://www.accidentapp.online
unknown
http://www.laneflowlogistics.com/vr01/www.familyofficesheet.com
unknown
http://www.kirtirefrigeration.com/vr01/
unknown
http://www.laneflowlogistics.com/vr01/
unknown
http://www.familyofficesheet.com/vr01/www.mayorii.com
unknown
http://www.gratiasempirellc.com/vr01/
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://www.gratiasempirellc.com/xmlrpc.php?rsd
unknown
http://www.makeyousurprise.comReferer:
unknown
http://www.michellecaldwelldesign.com/vr01/www.accidentapp.online
unknown
https://wns.windows.com/)s
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.nicholsonflooringservices.com
unknown
http://www.helyibudapest.com
unknown
http://www.makeyousurprise.com
unknown
http://www.yesxoit.xyz/vr01/
unknown
http://www.topdeals.bizReferer:
unknown
https://api.w.org/
unknown
http://www.yoursweets.onlineReferer:
unknown
http://www.bharatcrimecontrol24news.comReferer:
unknown
http://www.yesxoit.xyzReferer:
unknown
https://www.gratiasempirellc.com/wp-json/
unknown
http://www.flavorfog.onlineReferer:
unknown
https://outlook.com
unknown
http://www.gratiasempirellc.com/wp-content/themes/business-identity-mvp/style.css?ver=6.4.3
unknown
http://www.laneflowlogistics.com
unknown
http://www.mayorii.com/vr01/www.flavorfog.online
unknown
http://www.bharatcrimecontrol24news.com
unknown
http://www.gratiasempirellc.com/vr01/www.laneflowlogistics.com
unknown
http://www.nicholsonflooringservices.com/vr01/www.hsyxkj.com
unknown
http://www.mayorii.comReferer:
unknown
http://www.kirtirefrigeration.com
unknown
http://www.topdeals.biz/vr01/www.michellecaldwelldesign.com
unknown
https://android.notify.windows.com/iOS
unknown
http://www.accidentapp.online/vr01/
unknown
http://www.gratiasempirellc.com
unknown
http://www.mayorii.com/vr01/
unknown
http://www.familyofficesheet.comReferer:
unknown
http://www.kirtirefrigeration.comReferer:
unknown
http://www.helyibudapest.com/vr01/
unknown
https://www.gratiasempirellc.com/feed
unknown
http://www.bharatcrimecontrol24news.com/vr01/www.kirtirefrigeration.com
unknown
http://www.hsyxkj.com/vr01/
unknown
https://api.msn.com/
unknown
http://www.makeyousurprise.com/vr01/
unknown
http://www.kirtirefrigeration.com/vr01/www.topdeals.biz
unknown
http://crl.v
unknown
http://www.nicholsonflooringservices.com/vr01/
unknown
There are 79 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.topdeals.biz
72.14.185.43
malicious
accidentapp.online
3.33.130.190
malicious
gratiasempirellc.com
45.88.201.15
malicious
www.flavorfog.online
35.214.118.179
malicious
www.familyofficesheet.com
104.16.36.105
malicious
td-ccm-neg-87-45.wixdns.net
34.149.87.45
malicious
bharatcrimecontrol24news.com
69.57.172.11
malicious
laneflowlogistics.com
76.223.105.230
malicious
www.accidentapp.online
unknown
malicious
www.laneflowlogistics.com
unknown
malicious
www.michellecaldwelldesign.com
unknown
malicious
www.bharatcrimecontrol24news.com
unknown
malicious
www.gratiasempirellc.com
unknown
malicious
www.kirtirefrigeration.com
unknown
malicious
www.mayorii.com
unknown
malicious
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
35.214.118.179
www.flavorfog.online
United States
malicious
76.223.105.230
laneflowlogistics.com
United States
malicious
45.88.201.15
gratiasempirellc.com
Switzerland
malicious
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
malicious
104.16.36.105
www.familyofficesheet.com
United States
malicious
3.33.130.190
accidentapp.online
United States
malicious
69.57.172.11
bharatcrimecontrol24news.com
United States
malicious
72.14.185.43
www.topdeals.biz
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{0BF754AA-C967-445C-AB3D-D8FDA9BAE7EF} {000214E4-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\display.dll,-4
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\system32\themecpl.dll,-10
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-123
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-174
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-131
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-101
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 201 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3152000
heap
page read and write
malicious
CE1000
unkown
page execute read
malicious
35D0000
trusted library allocation
page read and write
malicious
CE1000
unkown
page execute read
malicious
1AA0000
unclassified section
page execute and read and write
malicious
1098F000
system
page read and write
malicious
30F0000
system
page execute and read and write
malicious
3E7F000
unclassified section
page read and write
malicious
3570000
unclassified section
page execute and read and write
malicious
16F0000
unclassified section
page execute and read and write
malicious
3740000
trusted library allocation
page read and write
9ADB000
unkown
page read and write
9AC3000
unkown
page read and write
99B0000
unkown
page read and write
3250000
heap
page read and write
9D67000
unkown
page read and write
3ACE000
direct allocation
page execute and read and write
7FF5D7485000
unkown
page readonly
3314000
heap
page read and write
3280000
unkown
page read and write
A40E000
unkown
page read and write
9A96000
unkown
page read and write
11F4000
heap
page read and write
C9F6000
unkown
page read and write
1200000
unkown
page read and write
35D1000
unkown
page read and write
3314000
heap
page read and write
7FF5D748A000
unkown
page readonly
AA17000
unkown
page read and write
C24E000
stack
page read and write
7FF5D71F9000
unkown
page readonly
5479000
unkown
page read and write
7FF5D7641000
unkown
page readonly
B950000
unkown
page readonly
F3AA000
heap
page read and write
7FF5D748C000
unkown
page readonly
A3B9000
unkown
page read and write
A3AC000
unkown
page read and write
982B000
unkown
page read and write
F256000
unkown
page read and write
4AB0000
unkown
page read and write
9ADB000
unkown
page read and write
F24E000
unkown
page read and write
EB6000
stack
page read and write
3532000
unkown
page read and write
7FF5D770F000
unkown
page readonly
1170000
trusted library allocation
page read and write
4A90000
unkown
page read and write
12D0000
unkown
page readonly
4AC0000
unkown
page read and write
8C39000
stack
page read and write
123F000
heap
page read and write
7E60000
unkown
page read and write
10404000
unkown
page read and write
7FF5D7280000
unkown
page readonly
7FF5D751F000
unkown
page readonly
C5FD000
unkown
page read and write
A286000
unkown
page read and write
F26F000
unkown
page read and write
7B20000
unkown
page read and write
7FF5D783B000
unkown
page readonly
F24D000
unkown
page read and write
3260000
trusted library allocation
page read and write
7D3E000
stack
page read and write
7FF5D744C000
unkown
page readonly
7FF5D76D5000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
9A76000
unkown
page read and write
9A94000
unkown
page read and write
1390000
heap
page read and write
A384000
unkown
page read and write
7FF5D6BDB000
unkown
page readonly
3471000
heap
page read and write
AA92000
unkown
page read and write
7FF5CE33D000
unkown
page readonly
7CB0000
unkown
page readonly
7FF5D7591000
unkown
page readonly
35B5000
unkown
page read and write
4A44000
unkown
page read and write
3260000
trusted library allocation
page read and write
A9E9000
unkown
page read and write
3930000
direct allocation
page execute and read and write
8A70000
unkown
page read and write
C605000
unkown
page read and write
99B0000
unkown
page read and write
11F4000
heap
page read and write
7FF5D77E0000
unkown
page readonly
3314000
heap
page read and write
C617000
unkown
page read and write
C5FA000
unkown
page read and write
3149000
heap
page read and write
843F000
stack
page read and write
A39C000
unkown
page read and write
F3A0000
heap
page read and write
7FF5D75CB000
unkown
page readonly
3314000
heap
page read and write
35D5000
unkown
page read and write
11F4000
heap
page read and write
7FF5D7764000
unkown
page readonly
7FF5D732D000
unkown
page readonly
C5F0000
unkown
page read and write
30FB000
stack
page read and write
A2B5000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
B559000
stack
page read and write
7FF5D7643000
unkown
page readonly
C61B000
unkown
page read and write
7FF5D71AF000
unkown
page readonly
9E2D000
stack
page read and write
7FF5D7429000
unkown
page readonly
8C39000
stack
page read and write
B330000
unkown
page read and write
C4DC000
unkown
page read and write
3260000
trusted library allocation
page read and write
A3AC000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
C65E000
unkown
page read and write
C908000
unkown
page read and write
7FF5D7523000
unkown
page readonly
7AA0000
unkown
page read and write
F241000
unkown
page read and write
314C000
heap
page read and write
7FF5D7639000
unkown
page readonly
3530000
unkown
page read and write
7FF5D76AF000
unkown
page readonly
35C3000
unkown
page read and write
8E4E000
stack
page read and write
7C70000
unkown
page readonly
7FF5D752F000
unkown
page readonly
DFC000
stack
page read and write
7FF5D75F2000
unkown
page readonly
7FF5D77C7000
unkown
page readonly
7FF5D7694000
unkown
page readonly
7FF5D77A4000
unkown
page readonly
F3A2000
heap
page read and write
9A8C000
unkown
page read and write
3314000
heap
page read and write
7FF5D7452000
unkown
page readonly
C615000
unkown
page read and write
7FF5D7236000
unkown
page readonly
8CB8000
stack
page read and write
35B0000
unkown
page read and write
C450000
unkown
page read and write
7FF5D72D7000
unkown
page readonly
35B3000
unkown
page read and write
AFBE000
stack
page read and write
1360000
unkown
page readonly
3260000
trusted library allocation
page read and write
7FF5D77DD000
unkown
page readonly
F256000
unkown
page read and write
F25A000
unkown
page read and write
9D67000
unkown
page read and write
362D000
unkown
page read and write
B03B000
stack
page read and write
32DF000
stack
page read and write
F245000
unkown
page read and write
7FF5D7458000
unkown
page readonly
F230000
unkown
page read and write
13A0000
unkown
page readonly
E450000
system
page execute and read and write
7B60000
unkown
page readonly
1AD7000
unclassified section
page execute and read and write
A2A2000
unkown
page read and write
7FF5D728E000
unkown
page readonly
3314000
heap
page read and write
C908000
unkown
page read and write
E10000
unkown
page readonly
3314000
heap
page read and write
35B0000
unkown
page read and write
3554000
unkown
page read and write
EB5000
stack
page read and write
3260000
trusted library allocation
page read and write
C472000
unkown
page read and write
A408000
unkown
page read and write
C4C6000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
A273000
unkown
page read and write
7FF5D7244000
unkown
page readonly
362A000
unkown
page read and write
7FF5D760B000
unkown
page readonly
53E1000
unkown
page read and write
7AC0000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
35BD000
unkown
page read and write
7FF5D72BF000
unkown
page readonly
86D0000
unkown
page readonly
7FF5D76F5000
unkown
page readonly
7FF5D74C3000
unkown
page readonly
7FF5D7700000
unkown
page readonly
7FF5D71EA000
unkown
page readonly
7FF5D7309000
unkown
page readonly
35D5000
unkown
page read and write
7FF5D720F000
unkown
page readonly
9A92000
unkown
page read and write
7CB0000
unkown
page readonly
7FF5D7202000
unkown
page readonly
7B00000
unkown
page readonly
C5F0000
unkown
page read and write
C460000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
7FF5D7309000
unkown
page readonly
11F4000
heap
page read and write
7FF5D7752000
unkown
page readonly
7FF5D781A000
unkown
page readonly
7FF5D71AF000
unkown
page readonly
C860000
unkown
page read and write
7FF5D7534000
unkown
page readonly
C609000
unkown
page read and write
362A000
unkown
page read and write
3155000
heap
page read and write
3314000
heap
page read and write
94F4000
unkown
page read and write
35B5000
unkown
page read and write
35D1000
unkown
page read and write
123F000
heap
page read and write
7FF5D75F2000
unkown
page readonly
3314000
heap
page read and write
A391000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
C62D000
unkown
page read and write
C92D000
unkown
page read and write
3C86000
unclassified section
page read and write
7FF5D7792000
unkown
page readonly
9A98000
unkown
page read and write
7FF5D7682000
unkown
page readonly
123F000
heap
page read and write
7FF5D7799000
unkown
page readonly
9AC3000
unkown
page read and write
B0E0000
unkown
page readonly
7AB0000
unkown
page read and write
10483000
unkown
page read and write
329E000
stack
page read and write
1000000
heap
page read and write
FF0000
unkown
page readonly
33B0000
unkown
page readonly
BB0D000
stack
page read and write
C615000
unkown
page read and write
C89C000
unkown
page read and write
7FF5D7797000
unkown
page readonly
760F000
unkown
page read and write
3314000
heap
page read and write
37C0000
heap
page read and write
10444000
unkown
page read and write
1150000
heap
page read and write
9B8C000
unkown
page read and write
7FF5D778A000
unkown
page readonly
B980000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
7C90000
unkown
page read and write
33F0000
unkown
page read and write
7FF5D77CD000
unkown
page readonly
35E4000
unkown
page read and write
A33F000
unkown
page read and write
7E58000
stack
page read and write
C663000
unkown
page read and write
7609000
unkown
page read and write
7FF5D7820000
unkown
page readonly
7FF5D71BF000
unkown
page readonly
1234000
heap
page read and write
FF0000
unkown
page readonly
7FF5D7745000
unkown
page readonly
B7DC000
stack
page read and write
99C0000
unkown
page read and write
C7CB000
unkown
page read and write
7611000
unkown
page read and write
3470000
heap
page read and write
C806000
unkown
page read and write
C669000
unkown
page read and write
3260000
trusted library allocation
page read and write
7E60000
unkown
page read and write
1160000
unkown
page read and write
7B10000
unkown
page read and write
997C000
stack
page read and write
94AE000
stack
page read and write
4AC0000
unkown
page read and write
75FD000
unkown
page read and write
A28D000
unkown
page read and write
3314000
heap
page read and write
C5FD000
unkown
page read and write
7FF5D7703000
unkown
page readonly
7686000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
3314000
heap
page read and write
3160000
unkown
page read and write
C615000
unkown
page read and write
13F0000
heap
page read and write
BEA0000
unkown
page readonly
1250000
unkown
page read and write
1340000
unkown
page read and write
C8C7000
unkown
page read and write
C50F000
unkown
page read and write
7FF5D7398000
unkown
page readonly
C5F4000
unkown
page read and write
35C3000
unkown
page read and write
7FF5D723F000
unkown
page readonly
7FF5D75AF000
unkown
page readonly
7FF5D7488000
unkown
page readonly
3540000
unkown
page read and write
C617000
unkown
page read and write
115E000
stack
page read and write
7FF5D7280000
unkown
page readonly
3540000
unkown
page read and write
7FF5D7075000
unkown
page readonly
104C6000
unkown
page read and write
E4EB000
system
page execute and read and write
7FF5D75F6000
unkown
page readonly
7FF5D77A4000
unkown
page readonly
B4D0000
unkown
page readonly
C5F8000
unkown
page read and write
7FF5D7507000
unkown
page readonly
7FF5D6BEF000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
9A92000
unkown
page read and write
436F000
unclassified section
page read and write
37FE000
stack
page read and write
3C72000
direct allocation
page execute and read and write
77A2000
unkown
page read and write
7DD0000
heap
page read and write
C97F000
unkown
page read and write
7FF5D77EB000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
11F4000
heap
page read and write
11F4000
heap
page read and write
9D42000
unkown
page read and write
11F4000
heap
page read and write
A2B5000
unkown
page read and write
7FF5D766E000
unkown
page readonly
C5F4000
unkown
page read and write
3626000
unkown
page read and write
AAA6000
unkown
page read and write
3155000
heap
page read and write
9679000
stack
page read and write
7FF5D7591000
unkown
page readonly
3314000
heap
page read and write
3320000
unkown
page read and write
35B0000
unkown
page read and write
BB9C000
stack
page read and write
7FF5D7257000
unkown
page readonly
75E0000
unkown
page read and write
7605000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
7FF5D75B3000
unkown
page readonly
3314000
heap
page read and write
F210000
unkown
page read and write
7FF5D760D000
unkown
page readonly
7FF5D76CD000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
A237000
unkown
page read and write
7B80000
unkown
page readonly
8870000
unkown
page readonly
4A44000
unkown
page read and write
7FF5D71A6000
unkown
page readonly
B4BF000
stack
page read and write
49BB000
unkown
page read and write
7FF5D7425000
unkown
page readonly
10E7F000
system
page read and write
C5FA000
unkown
page read and write
1281000
unkown
page readonly
35C1000
unkown
page read and write
C653000
unkown
page read and write
315B000
heap
page read and write
2F7E000
stack
page read and write
7FF5D6BE4000
unkown
page readonly
35B3000
unkown
page read and write
7FF5D764F000
unkown
page readonly
35FA000
unkown
page read and write
7FF5D69BB000
unkown
page readonly
7B10000
unkown
page read and write
10502000
unkown
page read and write
768E000
unkown
page read and write
1250000
unkown
page read and write
10580000
unkown
page execute and read and write
7FF5D7230000
unkown
page readonly
7FF5D72C8000
unkown
page readonly
B330000
unkown
page read and write
F272000
unkown
page read and write
7FF5D770F000
unkown
page readonly
7FF5D723F000
unkown
page readonly
3471000
heap
page read and write
C97D000
unkown
page read and write
7FF5D7722000
unkown
page readonly
35D5000
unkown
page read and write
760B000
unkown
page read and write
35B3000
unkown
page read and write
4AB0000
unkown
page read and write
8D39000
stack
page read and write
A3AA000
unkown
page read and write
7FF5D7593000
unkown
page readonly
7FF5D7604000
unkown
page readonly
16D4000
heap
page read and write
7FF5D76F5000
unkown
page readonly
35C1000
unkown
page read and write
B559000
stack
page read and write
35DC000
unkown
page read and write
7FF5D762F000
unkown
page readonly
9A6A000
unkown
page read and write
3314000
heap
page read and write
35F4000
unkown
page read and write
11F4000
heap
page read and write
7FF5D75EE000
unkown
page readonly
7FF5D6BEF000
unkown
page readonly
AA17000
unkown
page read and write
C9A7000
unkown
page read and write
7FF5D7215000
unkown
page readonly
768C000
unkown
page read and write
75FD000
unkown
page read and write
A9E9000
unkown
page read and write
C44F000
stack
page read and write
A12F000
stack
page read and write
7FF5D7523000
unkown
page readonly
A39F000
unkown
page read and write
1350000
unkown
page readonly
9A94000
unkown
page read and write
3314000
heap
page read and write
7FF5D7206000
unkown
page readonly
7FF5D7558000
unkown
page readonly
7FF5D75F9000
unkown
page readonly
7618000
unkown
page read and write
A237000
unkown
page read and write
3260000
trusted library allocation
page read and write
AA01000
unkown
page read and write
AA01000
unkown
page read and write
3260000
trusted library allocation
page read and write
3471000
heap
page read and write
C97D000
unkown
page read and write
3314000
heap
page read and write
123F000
heap
page read and write
7FF5D77F7000
unkown
page readonly
7FF5D7385000
unkown
page readonly
4980000
unkown
page read and write
187D000
direct allocation
page execute and read and write
35E4000
unkown
page read and write
123E000
heap
page read and write
12B0000
unkown
page read and write
1B40000
unclassified section
page execute and read and write
E00000
unkown
page readonly
75F8000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
BEA0000
unkown
page readonly
F0C000
heap
page read and write
A9FD000
unkown
page read and write
F27E000
unkown
page read and write
7FF5D7784000
unkown
page readonly
7FF5D7244000
unkown
page readonly
3170000
unkown
page read and write
36FC000
heap
page read and write
9679000
stack
page read and write
15EF000
stack
page read and write
7FF5D74FA000
unkown
page readonly
9B79000
unkown
page read and write
7FF5D7257000
unkown
page readonly
8CB8000
stack
page read and write
3310000
heap
page read and write
7810000
unkown
page read and write
77DB000
unkown
page read and write
4A12000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
7FF5D7065000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
11F4000
heap
page read and write
9AAA000
unkown
page read and write
35D3000
unkown
page read and write
1270000
unkown
page read and write
35BD000
unkown
page read and write
97FB000
stack
page read and write
7FF5D75B3000
unkown
page readonly
12D0000
unkown
page readonly
13F1000
heap
page read and write
2FF9000
stack
page read and write
7FF5D770A000
unkown
page readonly
C61D000
unkown
page read and write
B85A000
stack
page read and write
7FF5D7700000
unkown
page readonly
9D67000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
7FF5D7336000
unkown
page readonly
7AF1000
unkown
page read and write
1395000
heap
page read and write
C8EB000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
9AF9000
unkown
page read and write
98FD000
stack
page read and write
C625000
unkown
page read and write
F3AA000
heap
page read and write
8A00000
unkown
page read and write
3BFD000
direct allocation
page execute and read and write
7FF5D77E3000
unkown
page readonly
7FF5D729E000
unkown
page readonly
C8D1000
unkown
page read and write
7FF5D7376000
unkown
page readonly
A9DF000
unkown
page read and write
7693000
unkown
page read and write
C47F000
unkown
page read and write
7DC0000
unkown
page readonly
768E000
unkown
page read and write
E00000
unkown
page readonly
F242000
unkown
page read and write
AAAA000
unkown
page read and write
9BAA000
unkown
page read and write
11F4000
heap
page read and write
7FF5D77DD000
unkown
page readonly
3489000
stack
page read and write
7FF5D768B000
unkown
page readonly
35D3000
unkown
page read and write
BE90000
unkown
page read and write
123F000
heap
page read and write
C62D000
unkown
page read and write
10519000
unkown
page read and write
123A000
heap
page read and write
7FF5D77F7000
unkown
page readonly
1395000
heap
page read and write
49FD000
unkown
page read and write
A251000
unkown
page read and write
7AF1000
unkown
page read and write
C61B000
unkown
page read and write
7FF5D7292000
unkown
page readonly
C642000
unkown
page read and write
AA9B000
unkown
page read and write
4A0E000
unkown
page read and write
7FF5D769E000
unkown
page readonly
75F8000
unkown
page read and write
B980000
unkown
page readonly
7DF4F2461000
unkown
page execute read
7FF5D7407000
unkown
page readonly
9B72000
unkown
page read and write
4A40000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
C5F8000
unkown
page read and write
7FF5D7669000
unkown
page readonly
36A0000
trusted library allocation
page execute and read and write
9A80000
unkown
page read and write
7989000
stack
page read and write
7FF5D732D000
unkown
page readonly
C61D000
unkown
page read and write
35C1000
unkown
page read and write
3314000
heap
page read and write
C035000
stack
page read and write
3314000
heap
page read and write
3520000
unkown
page readonly
13F1000
heap
page read and write
C642000
unkown
page read and write
35D3000
unkown
page read and write
C472000
unkown
page read and write
3314000
heap
page read and write
35D1000
unkown
page read and write
3A59000
direct allocation
page execute and read and write
2EA1000
unkown
page read and write
7FF5D765F000
unkown
page readonly
C800000
unkown
page read and write
4A40000
unkown
page read and write
7FF5D7452000
unkown
page readonly
F256000
unkown
page read and write
C615000
unkown
page read and write
C97F000
unkown
page read and write
A3AA000
unkown
page read and write
9D67000
unkown
page read and write
9A76000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
7FF5D66E8000
unkown
page readonly
C97D000
unkown
page read and write
C483000
unkown
page read and write
34B0000
heap
page read and write
C9DE000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
7DF4F2471000
unkown
page execute read
A97000
system
page execute and read and write
7C70000
unkown
page readonly
7FF5D7272000
unkown
page readonly
7691000
unkown
page read and write
1A1D000
direct allocation
page execute and read and write
11EE000
stack
page read and write
C65E000
unkown
page read and write
1245000
heap
page read and write
7FF5D7691000
unkown
page readonly
C62D000
unkown
page read and write
C621000
unkown
page read and write
E10000
unkown
page readonly
9EAE000
stack
page read and write
C8AD000
unkown
page read and write
8A70000
unkown
page read and write
C97D000
unkown
page read and write
B220000
unkown
page read and write
7FF5D766E000
unkown
page readonly
3314000
heap
page read and write
49FA000
unkown
page read and write
7FF5D758D000
unkown
page readonly
7FF5D7837000
unkown
page readonly
9D67000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
1AA0000
trusted library allocation
page read and write
C669000
unkown
page read and write
3100000
unkown
page read and write
3600000
trusted library allocation
page execute and read and write
C035000
stack
page read and write
7FF5D7722000
unkown
page readonly
7FF5D72C8000
unkown
page readonly
9B2C000
unkown
page read and write
10502000
unkown
page read and write
A3C3000
unkown
page read and write
C496000
unkown
page read and write
35C9000
unkown
page read and write
9A84000
unkown
page read and write
A39C000
unkown
page read and write
8890000
unkown
page readonly
7FF5D6A4B000
unkown
page readonly
85BE000
stack
page read and write
1160000
unkown
page read and write
7FF5D71A6000
unkown
page readonly
AA04000
unkown
page read and write
36AF000
stack
page read and write
16D0000
heap
page read and write
7FF5D7438000
unkown
page readonly
7FF5D7404000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
3554000
unkown
page read and write
AE1D000
stack
page read and write
7FF5D71DA000
unkown
page readonly
B4D0000
unkown
page readonly
7FF5D77C2000
unkown
page readonly
7FF5D72BF000
unkown
page readonly
C9A7000
unkown
page read and write
F244000
unkown
page read and write
7FF5D765F000
unkown
page readonly
7FF5D717C000
unkown
page readonly
3260000
trusted library allocation
page read and write
AA04000
unkown
page read and write
75E0000
unkown
page read and write
7FF5D7077000
unkown
page readonly
2D80000
heap
page read and write
7FF5D771A000
unkown
page readonly
E4DB000
system
page execute and read and write
1383000
heap
page read and write
3314000
heap
page read and write
11F4000
heap
page read and write
3260000
trusted library allocation
page read and write
7AE0000
unkown
page read and write
7611000
unkown
page read and write
1720000
trusted library allocation
page execute and read and write
C89C000
unkown
page read and write
C625000
unkown
page read and write
53E1000
unkown
page read and write
10444000
unkown
page read and write
362D000
unkown
page read and write
7FF5D7534000
unkown
page readonly
C621000
unkown
page read and write
7FF5D719C000
unkown
page readonly
C899000
unkown
page read and write
C617000
unkown
page read and write
A233000
unkown
page read and write
9AAC000
unkown
page read and write
C653000
unkown
page read and write
C7BE000
unkown
page read and write
35CF000
unkown
page read and write
7DD0000
heap
page read and write
7FF5D7546000
unkown
page readonly
94F4000
unkown
page read and write
7FF5D776D000
unkown
page readonly
7FF5D77B9000
unkown
page readonly
7FF5D77F0000
unkown
page readonly
7FF5D743F000
unkown
page readonly
C7BE000
unkown
page read and write
7FF5D7394000
unkown
page readonly
7DF4F2481000
unkown
page execute read
7FF5D7639000
unkown
page readonly
9578000
stack
page read and write
7FF5D747F000
unkown
page readonly
12B0000
unkown
page read and write
7C31000
unkown
page read and write
35F4000
unkown
page read and write
35CD000
unkown
page read and write
314A000
heap
page read and write
AA9B000
unkown
page read and write
7FF5D7837000
unkown
page readonly
7DF4F2491000
unkown
page execute read
3500000
stack
page read and write
122A000
heap
page read and write
BDC0000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
84BB000
stack
page read and write
9B79000
unkown
page read and write
11F0000
heap
page read and write
35C9000
unkown
page read and write
1340000
unkown
page read and write
EF0000
heap
page read and write
9AAA000
unkown
page read and write
1350000
unkown
page readonly
7FF5D76C8000
unkown
page readonly
11F4000
heap
page read and write
7FF5D758D000
unkown
page readonly
A220000
unkown
page read and write
3120000
unkown
page read and write
32C0000
heap
page read and write
7FF5D7230000
unkown
page readonly
3314000
heap
page read and write
7FF5D729E000
unkown
page readonly
4986000
unkown
page read and write
7FF5D75F9000
unkown
page readonly
7DF4F2491000
unkown
page execute read
853B000
stack
page read and write
3314000
heap
page read and write
F3A0000
heap
page read and write
7FF5D7458000
unkown
page readonly
C5F4000
unkown
page read and write
3740000
trusted library allocation
page read and write
A0A9000
stack
page read and write
3140000
unkown
page read and write
F13000
heap
page read and write
7FF5D7820000
unkown
page readonly
3314000
heap
page read and write
B8DB000
stack
page read and write
7FF5D7065000
unkown
page readonly
7FF5D7808000
unkown
page readonly
760B000
unkown
page read and write
7FF5D745B000
unkown
page readonly
7FF5D7705000
unkown
page readonly
C9CD000
unkown
page read and write
7FF5D7593000
unkown
page readonly
10796000
system
page read and write
7FF5D7784000
unkown
page readonly
7FF5D76E8000
unkown
page readonly
35DC000
unkown
page read and write
C90D000
unkown
page read and write
A1AF000
stack
page read and write
7FF5D71D7000
unkown
page readonly
11F4000
heap
page read and write
7FF5D7442000
unkown
page readonly
3260000
trusted library allocation
page read and write
77DB000
unkown
page read and write
C8D2000
unkown
page read and write
7FF5D7764000
unkown
page readonly
1A92000
direct allocation
page execute and read and write
7FF5D77E9000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
1200000
trusted library allocation
page execute and read and write
3260000
trusted library allocation
page read and write
C81C000
unkown
page read and write
7FF5D7485000
unkown
page readonly
1220000
heap
page read and write
7FF5D7438000
unkown
page readonly
C510000
unkown
page read and write
7AE0000
unkown
page read and write
1270000
unkown
page read and write
C9CD000
unkown
page read and write
4B00000
unkown
page read and write
7FF5D748C000
unkown
page readonly
C5FA000
unkown
page read and write
A90000
system
page execute and read and write
C46F000
unkown
page read and write
C625000
unkown
page read and write
3260000
trusted library allocation
page read and write
35D9000
heap
page read and write
C7CB000
unkown
page read and write
7FF5D775C000
unkown
page readonly
9EB0000
unkown
page readonly
7C80000
unkown
page read and write
49A8000
unkown
page read and write
CFF000
unkown
page execute and read and write
3260000
trusted library allocation
page read and write
10483000
unkown
page read and write
3314000
heap
page read and write
F210000
unkown
page read and write
9B85000
unkown
page read and write
7FF5D7740000
unkown
page readonly
C609000
unkown
page read and write
38F0000
trusted library allocation
page read and write
761E000
unkown
page read and write
9ABD000
unkown
page read and write
843F000
stack
page read and write
3535000
unkown
page read and write
7AC0000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
7FF5D75FF000
unkown
page readonly
7FF5D720A000
unkown
page readonly
7FF5D76D5000
unkown
page readonly
7AA0000
unkown
page read and write
98FD000
stack
page read and write
9578000
stack
page read and write
7631000
unkown
page read and write
C7C6000
unkown
page read and write
7440000
unkown
page read and write
3626000
unkown
page read and write
8870000
unkown
page readonly
7618000
unkown
page read and write
A9DF000
unkown
page read and write
1AD0000
unclassified section
page execute and read and write
1380000
heap
page read and write
1B30000
heap
page read and write
7FF5D72D3000
unkown
page readonly
3260000
trusted library allocation
page read and write
7FF5CE343000
unkown
page readonly
1A21000
direct allocation
page execute and read and write
35C9000
unkown
page read and write
C97F000
unkown
page read and write
A3B9000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
7631000
unkown
page read and write
4A90000
unkown
page read and write
9AA8000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7FF5D6A4B000
unkown
page readonly
7FF5D77EB000
unkown
page readonly
4A16000
unkown
page read and write
123F000
heap
page read and write
7FF5D774A000
unkown
page readonly
B0BD000
stack
page read and write
B0BD000
stack
page read and write
9C22000
unkown
page read and write
B4BF000
stack
page read and write
AA40000
unkown
page read and write
A264000
unkown
page read and write
7FF5D7284000
unkown
page readonly
3314000
heap
page read and write
7686000
unkown
page read and write
982B000
unkown
page read and write
7FF5D7799000
unkown
page readonly
7FF5D747F000
unkown
page readonly
A313000
unkown
page read and write
A02E000
stack
page read and write
38F0000
trusted library allocation
page read and write
49A8000
unkown
page read and write
B950000
unkown
page readonly
4B00000
unkown
page read and write
C5FD000
unkown
page read and write
3314000
heap
page read and write
C5FD000
unkown
page read and write
9A90000
unkown
page read and write
7DF4F2470000
unkown
page readonly
7FF5D7267000
unkown
page readonly
3314000
heap
page read and write
C97D000
unkown
page read and write
123A000
heap
page read and write
353D000
unkown
page read and write
35C0000
heap
page read and write
C483000
unkown
page read and write
11F4000
heap
page read and write
3630000
unkown
page readonly
C85F000
unkown
page read and write
9E2E000
stack
page read and write
C617000
unkown
page read and write
769A000
unkown
page read and write
761E000
unkown
page read and write
7FF5D7075000
unkown
page readonly
3740000
trusted library allocation
page read and write
7FF5D770A000
unkown
page readonly
F38B000
unkown
page read and write
F26F000
unkown
page read and write
3626000
unkown
page read and write
13F1000
heap
page read and write
9AA0000
unkown
page read and write
3530000
unkown
page read and write
104CB000
unkown
page read and write
7FF5D7262000
unkown
page readonly
8880000
unkown
page readonly
2EC0000
unkown
page readonly
7AB0000
unkown
page read and write
C97F000
unkown
page read and write
7654000
unkown
page read and write
C24E000
stack
page read and write
3170000
unkown
page read and write
A40E000
unkown
page read and write
AA0B000
unkown
page read and write
F25A000
unkown
page read and write
7FF5D706E000
unkown
page readonly
49C2000
unkown
page read and write
3110000
unkown
page readonly
C0BA000
stack
page read and write
3120000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
997C000
stack
page read and write
C7C6000
unkown
page read and write
9D67000
unkown
page read and write
33C0000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
353D000
unkown
page read and write
3320000
unkown
page read and write
BE70000
unkown
page readonly
91F0000
unkown
page readonly
C5F0000
unkown
page read and write
1234000
heap
page read and write
7FF5D7292000
unkown
page readonly
3260000
trusted library allocation
page read and write
7810000
unkown
page read and write
7D3E000
stack
page read and write
7FF5D66E8000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
7DF4F2461000
unkown
page execute read
AA8D000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
7FF5D779E000
unkown
page readonly
84BB000
stack
page read and write
C609000
unkown
page read and write
AA0C000
unkown
page read and write
7FF5D73F5000
unkown
page readonly
9A6A000
unkown
page read and write
C62D000
unkown
page read and write
7460000
unkown
page read and write
362A000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
C9DE000
unkown
page read and write
7FF5D7488000
unkown
page readonly
F21C000
unkown
page read and write
3314000
heap
page read and write
7DF4F2460000
unkown
page readonly
F3A2000
heap
page read and write
BF3E000
stack
page read and write
1516000
heap
page read and write
7FF5D7376000
unkown
page readonly
3780000
heap
page read and write
7FF5D748A000
unkown
page readonly
7FF5D7669000
unkown
page readonly
1745000
heap
page read and write
4AA0000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
3314000
heap
page read and write
9AF9000
unkown
page read and write
7E58000
stack
page read and write
9A98000
unkown
page read and write
122E000
heap
page read and write
9D42000
unkown
page read and write
2D1D000
stack
page read and write
7FF5D77D2000
unkown
page readonly
4A0E000
unkown
page read and write
10519000
unkown
page read and write
C4C6000
unkown
page read and write
7FF5D762F000
unkown
page readonly
7FF5D75B8000
unkown
page readonly
7FF5D6AB6000
unkown
page readonly
3542000
unkown
page read and write
C73E000
unkown
page read and write
7FF5D749B000
unkown
page readonly
7C90000
unkown
page read and write
7FF5D723C000
unkown
page readonly
13F3000
heap
page read and write
7FF5D7752000
unkown
page readonly
391E000
heap
page read and write
4A71000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
3260000
trusted library allocation
page read and write
7FF5D7682000
unkown
page readonly
33B0000
unkown
page readonly
7FF5D7589000
unkown
page readonly
9B8E000
unkown
page read and write
C602000
unkown
page read and write
9ABD000
unkown
page read and write
8360000
unkown
page read and write
4986000
unkown
page read and write
123F000
heap
page read and write
7FF5D752F000
unkown
page readonly
C602000
unkown
page read and write
7FF5D776F000
unkown
page readonly
7FF5D7391000
unkown
page readonly
C47F000
unkown
page read and write
7609000
unkown
page read and write
3260000
trusted library allocation
page read and write
7DF4F2470000
unkown
page readonly
BFB8000
stack
page read and write
9C92000
unkown
page read and write
A02E000
stack
page read and write
3314000
heap
page read and write
769A000
unkown
page read and write
2DD0000
heap
page read and write
1390000
heap
page read and write
EF0000
heap
page read and write
7637000
unkown
page read and write
3260000
trusted library allocation
page read and write
3314000
heap
page read and write
7FF5D7360000
unkown
page readonly
7693000
unkown
page read and write
7FF5D778A000
unkown
page readonly
49D6000
unkown
page read and write
7FF5D728E000
unkown
page readonly
C50F000
unkown
page read and write
7FF5D716B000
unkown
page readonly
9B2C000
unkown
page read and write
1BF1000
unclassified section
page execute and read and write
3314000
heap
page read and write
3155000
heap
page read and write
9A8E000
unkown
page read and write
C48B000
unkown
page read and write
7FF5D783B000
unkown
page readonly
AFBE000
stack
page read and write
7FF5D7797000
unkown
page readonly
3740000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
7FF5D75DF000
unkown
page readonly
A286000
unkown
page read and write
32E0000
heap
page read and write
C908000
unkown
page read and write
8A46000
unkown
page read and write
104CB000
unkown
page read and write
2DCE000
unkown
page read and write
C0BA000
stack
page read and write
AA96000
unkown
page read and write
3151000
heap
page read and write
A28D000
unkown
page read and write
927B000
stack
page read and write
3260000
trusted library allocation
page read and write
7FF5D72D3000
unkown
page readonly
AA09000
unkown
page read and write
942D000
stack
page read and write
9AB4000
unkown
page read and write
C61B000
unkown
page read and write
8880000
unkown
page readonly
7FF5D7691000
unkown
page readonly
7FF5D7442000
unkown
page readonly
C44F000
stack
page read and write
F38B000
unkown
page read and write
8360000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
9A8C000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
C5F8000
unkown
page read and write
A2D7000
unkown
page read and write
C8B0000
unkown
page read and write
7FF5D7391000
unkown
page readonly
7FF5D7398000
unkown
page readonly
76F8000
unkown
page read and write
7FF5D764F000
unkown
page readonly
7FF5D7648000
unkown
page readonly
7FF5D77A8000
unkown
page readonly
3260000
trusted library allocation
page read and write
A3B6000
unkown
page read and write
C3CE000
stack
page read and write
96FE000
stack
page read and write
7FF5D72E9000
unkown
page readonly
3314000
heap
page read and write
C8D2000
unkown
page read and write
AA40000
unkown
page read and write
C1CC000
stack
page read and write
AA8D000
unkown
page read and write
11F4000
heap
page read and write
7FF5D738E000
unkown
page readonly
3260000
trusted library allocation
page read and write
96FE000
stack
page read and write
7B00000
unkown
page readonly
1750000
direct allocation
page execute and read and write
3C01000
direct allocation
page execute and read and write
F241000
unkown
page read and write
9AA8000
unkown
page read and write
1245000
heap
page read and write
8A46000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
C81C000
unkown
page read and write
11F4000
heap
page read and write
C73E000
unkown
page read and write
86E0000
unkown
page readonly
7FF5D738E000
unkown
page readonly
38F0000
trusted library allocation
page read and write
7FF5D7482000
unkown
page readonly
30BB000
stack
page read and write
8F49000
stack
page read and write
3314000
heap
page read and write
7FF5D7792000
unkown
page readonly
7FF5D7643000
unkown
page readonly
C899000
unkown
page read and write
AA0D000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
7DF4F2480000
unkown
page readonly
9A72000
unkown
page read and write
C4BD000
unkown
page read and write
B8DB000
stack
page read and write
3260000
trusted library allocation
page read and write
A416000
unkown
page read and write
7460000
unkown
page read and write
10544000
unkown
page read and write
BE90000
unkown
page read and write
4A16000
unkown
page read and write
F245000
unkown
page read and write
15A7000
heap
page read and write
3260000
trusted library allocation
page read and write
3471000
heap
page read and write
320E000
stack
page read and write
881E000
stack
page read and write
A9A0000
unkown
page read and write
95FB000
stack
page read and write
7FF5D7396000
unkown
page readonly
9B85000
unkown
page read and write
AA9B000
unkown
page read and write
7FF5D6BE4000
unkown
page readonly
35B5000
unkown
page read and write
A2A2000
unkown
page read and write
9B0B000
unkown
page read and write
7FF5D744C000
unkown
page readonly
F272000
unkown
page read and write
35FA000
unkown
page read and write
7FF5D7760000
unkown
page readonly
7FF5D7482000
unkown
page readonly
C8F8000
unkown
page read and write
123A000
heap
page read and write
7FF5D7455000
unkown
page readonly
1050B000
unkown
page read and write
11F4000
heap
page read and write
3160000
unkown
page read and write
760F000
unkown
page read and write
A251000
unkown
page read and write
3314000
heap
page read and write
C602000
unkown
page read and write
BB10000
heap
page read and write
A264000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
A313000
unkown
page read and write
3570000
trusted library allocation
page read and write
9C96000
unkown
page read and write
9A90000
unkown
page read and write
C5F0000
unkown
page read and write
49BB000
unkown
page read and write
C5FA000
unkown
page read and write
9A84000
unkown
page read and write
BE49000
stack
page read and write
7FF5D723C000
unkown
page readonly
7FF5D75CB000
unkown
page readonly
103C4000
unkown
page read and write
35E4000
unkown
page read and write
A23A000
unkown
page read and write
A9A0000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
4A71000
unkown
page read and write
10404000
unkown
page read and write
3534000
unkown
page read and write
7FF5D743F000
unkown
page readonly
4A12000
unkown
page read and write
91F0000
unkown
page readonly
F25A000
unkown
page read and write
7FF5D7360000
unkown
page readonly
37BE000
stack
page read and write
99C0000
unkown
page read and write
3260000
trusted library allocation
page read and write
7FF5D7450000
unkown
page readonly
9B8A000
unkown
page read and write
C97F000
unkown
page read and write
8DCB000
stack
page read and write
7FF5D75EE000
unkown
page readonly
7FF5D7073000
unkown
page readonly
7435000
stack
page read and write
16EF000
stack
page read and write
8A00000
unkown
page read and write
104C6000
unkown
page read and write
7FF5D72D7000
unkown
page readonly
AA40000
unkown
page read and write
B85A000
stack
page read and write
7FF5D75D9000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
A391000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
7FF5D7589000
unkown
page readonly
D00000
unkown
page execute read
85BE000
stack
page read and write
35DC000
unkown
page read and write
7C80000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
C61D000
unkown
page read and write
7440000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
7FF5D77E0000
unkown
page readonly
C92A000
unkown
page read and write
3531000
unkown
page read and write
7B60000
unkown
page readonly
C61B000
unkown
page read and write
10631000
unkown
page execute and read and write
1000000
heap
page read and write
7FF5D76C8000
unkown
page readonly
7FF5D77B9000
unkown
page readonly
E450000
unkown
page read and write
7605000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
7FF5D77CD000
unkown
page readonly
3260000
trusted library allocation
page read and write
8ECC000
stack
page read and write
103C4000
unkown
page read and write
7FF5D7507000
unkown
page readonly
AAAA000
unkown
page read and write
33C0000
unkown
page read and write
3260000
trusted library allocation
page read and write
3A5D000
direct allocation
page execute and read and write
A384000
unkown
page read and write
9AB4000
unkown
page read and write
7FF5D7267000
unkown
page readonly
7FF5CE343000
unkown
page readonly
768C000
unkown
page read and write
7FF5D710B000
unkown
page readonly
7FF5D7808000
unkown
page readonly
C496000
unkown
page read and write
33CF000
unkown
page read and write
97FF000
stack
page read and write
3314000
heap
page read and write
7FF5D720F000
unkown
page readonly
7FF5D74B8000
unkown
page readonly
3630000
unkown
page readonly
9B41000
unkown
page read and write
38AD000
heap
page read and write
AAA7000
unkown
page read and write
7DF4F2460000
unkown
page readonly
7FF5D745B000
unkown
page readonly
7FF5D779E000
unkown
page readonly
38F0000
trusted library allocation
page read and write
7FF5D7394000
unkown
page readonly
A273000
unkown
page read and write
3500000
stack
page read and write
38F0000
trusted library allocation
page read and write
7FF5D720A000
unkown
page readonly
7FF5D77FD000
unkown
page readonly
3400000
unkown
page read and write
C800000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
3156000
heap
page read and write
7FF5D7073000
unkown
page readonly
1380000
heap
page read and write
C625000
unkown
page read and write
A9FD000
unkown
page read and write
927C000
stack
page read and write
9FAF000
stack
page read and write
7FF5D7272000
unkown
page readonly
7FF5D717C000
unkown
page readonly
38F0000
trusted library allocation
page read and write
10FB000
stack
page read and write
7B20000
unkown
page read and write
AA96000
unkown
page read and write
1245000
heap
page read and write
5463000
unkown
page read and write
1879000
direct allocation
page execute and read and write
34BC000
heap
page read and write
A39F000
unkown
page read and write
3100000
unkown
page read and write
C78A000
unkown
page read and write
8FD9000
stack
page read and write
7FF5D774A000
unkown
page readonly
307C000
stack
page read and write
7FF5D72CE000
unkown
page readonly
3400000
unkown
page read and write
F27E000
unkown
page read and write
7FF5D7396000
unkown
page readonly
9FAF000
stack
page read and write
A12F000
stack
page read and write
7435000
stack
page read and write
5330000
unkown
page write copy
4AA0000
unkown
page read and write
7DF4F2481000
unkown
page execute read
7FF5D74B8000
unkown
page readonly
7FF5D7425000
unkown
page readonly
7C31000
unkown
page read and write
49C2000
unkown
page read and write
1281000
unkown
page readonly
7FF5D71EF000
unkown
page readonly
3314000
heap
page read and write
7FF5D710B000
unkown
page readonly
5463000
unkown
page read and write
9AB2000
unkown
page read and write
3542000
unkown
page read and write
3314000
heap
page read and write
7FF5D7705000
unkown
page readonly
F13000
heap
page read and write
7FF5D7760000
unkown
page readonly
11BF000
unkown
page read and write
B0E0000
unkown
page readonly
7FF5D7641000
unkown
page readonly
A33F000
unkown
page read and write
7FF5D7604000
unkown
page readonly
7FF5D75FF000
unkown
page readonly
7FF5D7404000
unkown
page readonly
33F0000
unkown
page read and write
362D000
unkown
page read and write
7FF5D7262000
unkown
page readonly
7FF5D774C000
unkown
page readonly
7FF5D771A000
unkown
page readonly
7FF5D7202000
unkown
page readonly
C97F000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
9A9E000
unkown
page read and write
BB10000
heap
page read and write
3260000
trusted library allocation
page read and write
2F7E000
stack
page read and write
A408000
unkown
page read and write
C61D000
unkown
page read and write
7FF5D776F000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
7FF5D77C2000
unkown
page readonly
C97D000
unkown
page read and write
7637000
unkown
page read and write
9A9E000
unkown
page read and write
CE0000
unkown
page readonly
1160000
heap
page read and write
35CF000
unkown
page read and write
7FF5D7385000
unkown
page readonly
9AAC000
unkown
page read and write
76F8000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
7654000
unkown
page read and write
BDC0000
unkown
page read and write
9B0B000
unkown
page read and write
7FF5D705D000
unkown
page readonly
C92A000
unkown
page read and write
C1CC000
stack
page read and write
C8C7000
unkown
page read and write
A3B6000
unkown
page read and write
7FF5D7745000
unkown
page readonly
3520000
unkown
page readonly
3260000
trusted library allocation
page read and write
7FF5D7546000
unkown
page readonly
7FF5D7558000
unkown
page readonly
9A8E000
unkown
page read and write
7FF5D774C000
unkown
page readonly
1731000
unkown
page readonly
A23A000
unkown
page read and write
18EE000
direct allocation
page execute and read and write
86E0000
unkown
page readonly
5479000
unkown
page read and write
C9F6000
unkown
page read and write
10544000
unkown
page read and write
7FF5D719C000
unkown
page readonly
A220000
unkown
page read and write
3314000
heap
page read and write
7FF5D772C000
unkown
page readonly
35C3000
unkown
page read and write
9B41000
unkown
page read and write
7FF5D706F000
unkown
page readonly
11AE000
stack
page read and write
7FF5D75F6000
unkown
page readonly
C48B000
unkown
page read and write
C4DC000
unkown
page read and write
C8F7000
unkown
page read and write
3260000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
7FF5D76AF000
unkown
page readonly
AAA7000
unkown
page read and write
C450000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
3260000
trusted library allocation
page read and write
30FD000
stack
page read and write
7B80000
unkown
page readonly
C8EC000
unkown
page read and write
C663000
unkown
page read and write
3186000
heap
page read and write
7DF4F2471000
unkown
page execute read
7FF5D7336000
unkown
page readonly
BF3E000
stack
page read and write
38A9000
heap
page read and write
B03B000
stack
page read and write
A3C3000
unkown
page read and write
A1AF000
stack
page read and write
3260000
trusted library allocation
page read and write
AE1D000
stack
page read and write
779E000
unkown
page read and write
C78A000
unkown
page read and write
9A96000
unkown
page read and write
C5F4000
unkown
page read and write
7FF5D7455000
unkown
page readonly
11F4000
heap
page read and write
7FF5D71E0000
unkown
page readonly
7FF5D705D000
unkown
page readonly
E500000
system
page execute and read and write
A416000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
7DC0000
unkown
page readonly
C46F000
unkown
page read and write
3549000
unkown
page read and write
35CF000
unkown
page read and write
314A000
heap
page read and write
F24D000
unkown
page read and write
7FF5D7077000
unkown
page readonly
9A80000
unkown
page read and write
3140000
unkown
page read and write
F0C000
heap
page read and write
3260000
trusted library allocation
page read and write
7FF5D776D000
unkown
page readonly
4980000
unkown
page read and write
B220000
unkown
page read and write
C621000
unkown
page read and write
8890000
unkown
page readonly
7FF5D7703000
unkown
page readonly
3140000
heap
page read and write
7FF5D71D7000
unkown
page readonly
86D0000
unkown
page readonly
C621000
unkown
page read and write
3110000
unkown
page readonly
C609000
unkown
page read and write
7FF5D777A000
unkown
page readonly
7FF5D7648000
unkown
page readonly
C8B0000
unkown
page read and write
315B000
heap
page read and write
7FF5D7284000
unkown
page readonly
1731000
unkown
page readonly
9AA0000
unkown
page read and write
7FF5D749B000
unkown
page readonly
7FF5D769E000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
3545000
unkown
page read and write
AA91000
unkown
page read and write
9EB0000
unkown
page readonly
5330000
unkown
page write copy
7FF5D72D0000
unkown
page readonly
A233000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
7DBC000
stack
page read and write
7FF5D71E0000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
7FF5D777A000
unkown
page readonly
BFB8000
stack
page read and write
9B72000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
7FF5D751F000
unkown
page readonly
11F4000
heap
page read and write
7FF5D75BF000
unkown
page readonly
7FF5D772C000
unkown
page readonly
3260000
trusted library allocation
page read and write
9AB2000
unkown
page read and write
BE49000
stack
page read and write
C460000
unkown
page read and write
7FF5D781A000
unkown
page readonly
A2D7000
unkown
page read and write
11BF000
unkown
page read and write
1383000
heap
page read and write
7FF5D716B000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
C806000
unkown
page read and write
13A0000
unkown
page readonly
760D000
unkown
page read and write
11F4000
heap
page read and write
7FF5D7694000
unkown
page readonly
7FF5D77E9000
unkown
page readonly
1050B000
unkown
page read and write
7FF5D7236000
unkown
page readonly
49D6000
unkown
page read and write
7FF5D7407000
unkown
page readonly
9C21000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
7FF5D76E8000
unkown
page readonly
760D000
unkown
page read and write
7FF5D7215000
unkown
page readonly
9A72000
unkown
page read and write
AA91000
unkown
page read and write
C5F8000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
35CD000
unkown
page read and write
7FF5D7740000
unkown
page readonly
977E000
stack
page read and write
7FF5D775C000
unkown
page readonly
A0A8000
stack
page read and write
3545000
unkown
page read and write
7FF5D768B000
unkown
page readonly
35CD000
unkown
page read and write
2EC0000
unkown
page readonly
49FA000
unkown
page read and write
3260000
trusted library allocation
page read and write
7FF5D74F2000
unkown
page readonly
7DF4F2480000
unkown
page readonly
C4BD000
unkown
page read and write
3314000
heap
page read and write
779E000
unkown
page read and write
35F4000
unkown
page read and write
7FF5D71F9000
unkown
page readonly
49FD000
unkown
page read and write
CE0000
unkown
page readonly
35BD000
unkown
page read and write
7DBC000
stack
page read and write
35FA000
unkown
page read and write
1360000
unkown
page readonly
There are 1453 hidden memdumps, click here to show them.