IOC Report
Purchase Order For Consumables Eltra 008363725_9645364782_1197653623_836652746_22994644.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order For Consumables Eltra 008363725_9645364782_1197653623_836652746_22994644.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut4EA4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut4F31.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\definitization
data
dropped
C:\Users\user\AppData\Local\Temp\underbalanced
ASCII text, with very long lines (29744), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order For Consumables Eltra 008363725_9645364782_1197653623_836652746_22994644.exe
"C:\Users\user\Desktop\Purchase Order For Consumables Eltra 008363725_9645364782_1197653623_836652746_22994644.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Purchase Order For Consumables Eltra 008363725_9645364782_1197653623_836652746_22994644.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\WWAHost.exe
"C:\Windows\SysWOW64\WWAHost.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.00047.vip/se63/?ehr=rYfWuT468Tc67hNM/0Jf+cRzLkrsF889ztcgHk2AEoSHsKvkCcFa8Ph0/RVXDGgWSBfyKpA9WA==&pRxXAB=mnRtohcx_FWp
3.33.130.190
malicious
www.cincinnatisoup.com/se63/
malicious
http://www.ozr3np.com/se63/?ehr=1WXnfajc616lU+shA8HjLqX5RVgzjKJupeBRQRNuwFmzNdhzMuHtIrXkSWOpVCKlS9sifk+pBg==&pRxXAB=mnRtohcx_FWp
103.250.7.87
malicious
http://www.used-cars-66201.bond/se63/?ehr=bzypT9aUofEMOiCJ/n1OwN3WvEpSepAHdr17450F/ZpFe3vEZBe16OntfEwHG1oOFvdOJvTtYg==&pRxXAB=mnRtohcx_FWp
104.247.82.92
malicious
http://www.adptgn.com/se63/?ehr=B/S030DRfbGC/Zs8m6u79oQd9S8Dl4En3dHvcSRMsHDWRaplPHiZfhINSWyXxORHgZbapwifUw==&pRxXAB=mnRtohcx_FWp
91.195.240.19
malicious
http://www.00047.vip/se63/
unknown
http://www.xztyvk.xyz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
http://www.ky5682011.cc/se63/
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.hemule.net
unknown
http://www.egysrvs.com/se63/www.ebridgereal.site
unknown
https://word.office.comM
unknown
http://www.ebridgereal.site
unknown
http://www.ky5682011.cc
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
http://www.galeriaspognardi.comReferer:
unknown
http://www.cincinnatisoup.com/se63/www.gothecleaningpros.com
unknown
http://www.galeriaspognardi.com/se63/www.hemule.net
unknown
http://www.used-cars-66201.bond/se63/
unknown
http://www.hemule.netReferer:
unknown
http://www.cincinnatisoup.com
unknown
http://www.ebridgereal.siteReferer:
unknown
http://www.xztyvk.xyz/se63/
unknown
http://www.butimarproductions.com/se63/
unknown
https://wns.windows.com/e
unknown
http://www.wg5688.comReferer:
unknown
http://www.gothecleaningpros.com/se63/
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.ozr3np.com/se63/
unknown
http://www.used-cars-66201.bond/se63/www.ozr3np.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.ebridgereal.site/se63/
unknown
http://www.egysrvs.comReferer:
unknown
http://www.wg5688.com/se63/
unknown
http://www.used-cars-66201.bondReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
http://www.ebridgereal.site/se63/www.nomades.digital
unknown
http://www.adptgn.com/se63/
unknown
http://www.galeriaspognardi.com/se63/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.adptgn.com
unknown
https://outlook.come
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.xztyvk.xyzReferer:
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
http://www.00047.vipReferer:
unknown
http://www.galeriaspognardi.com
unknown
http://www.xztyvk.xyz/se63/www.used-cars-66201.bond
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.00047.vip
unknown
http://www.ky5682011.cc/se63/www.galeriaspognardi.com
unknown
https://api.msn.com/I
unknown
http://www.gothecleaningpros.com
unknown
http://www.ozr3np.com
unknown
http://www.wg5688.com/se63/www.egysrvs.com
unknown
http://schemas.micro
unknown
http://www.ozr3np.comReferer:
unknown
http://www.nomades.digital/se63/
unknown
http://www.nomades.digitalReferer:
unknown
http://www.hemule.net/se63/
unknown
http://www.cincinnatisoup.comReferer:
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.butimarproductions.com/se63/www.mb28apparel.com
unknown
http://www.butimarproductions.comReferer:
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
http://www.ozr3np.com/se63/www.adptgn.com
unknown
http://www.nomades.digital
unknown
http://www.mb28apparel.com
unknown
http://www.gothecleaningpros.com/se63/www.ky5682011.cc
unknown
http://www.adptgn.comReferer:
unknown
http://www.00047.vip/se63/www.xztyvk.xyz
unknown
http://www.wg5688.com
unknown
http://www.mb28apparel.com/se63/
unknown
http://www.gothecleaningpros.comReferer:
unknown
http://www.hemule.net/se63/www.wg5688.com
unknown
http://www.mb28apparel.com/se63/www.cincinnatisoup.com
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
http://www.cincinnatisoup.com/se63/
unknown
http://www.butimarproductions.com
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
http://www.mb28apparel.comReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
http://www.egysrvs.com
unknown
http://www.egysrvs.com/se63/
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
https://powerpoint.office.comEMd
unknown
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
unknown
http://www.used-cars-66201.bond
unknown
http://www.adptgn.com/se63/www.butimarproductions.com
unknown
https://api.msn.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
00047.vip
3.33.130.190
malicious
nufyo4ac.cdnaaa.net
103.250.7.87
malicious
www.used-cars-66201.bond
104.247.82.92
malicious
www.adptgn.com
unknown
malicious
www.ozr3np.com
unknown
malicious
www.00047.vip
unknown
malicious
parkingpage.namecheap.com
91.195.240.19

IPs

IP
Domain
Country
Malicious
3.33.130.190
00047.vip
United States
malicious
104.247.82.92
www.used-cars-66201.bond
Canada
malicious
103.250.7.87
nufyo4ac.cdnaaa.net
Hong Kong
malicious
91.195.240.19
parkingpage.namecheap.com
Germany

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 147 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
2B60000
unclassified section
page execute and read and write
malicious
33D0000
unclassified section
page execute and read and write
malicious
2B90000
trusted library allocation
page read and write
malicious
F00000
direct allocation
page read and write
malicious
2A50000
system
page execute and read and write
malicious
3940000
unclassified section
page execute and read and write
malicious
AB0D000
stack
page read and write
7FF5DF5FC000
unkown
page readonly
7FF5DF43C000
unkown
page readonly
51DC000
stack
page read and write
2B54000
heap
page read and write
3304000
unkown
page read and write
EE88000
unkown
page read and write
C192000
unkown
page read and write
30E0000
trusted library allocation
page execute and read and write
D1B000
heap
page read and write
37B9000
direct allocation
page read and write
2C31000
heap
page read and write
2AC0000
trusted library allocation
page read and write
E70000
unkown
page readonly
3F42000
direct allocation
page execute and read and write
9F51000
unkown
page read and write
7FF5DF221000
unkown
page readonly
5A00000
heap
page read and write
2B00000
heap
page read and write
7FF5DF017000
unkown
page readonly
7FF5DF488000
unkown
page readonly
D60000
heap
page read and write
BF6D000
unkown
page read and write
7FF5DF53F000
unkown
page readonly
BFEF000
unkown
page read and write
10600000
unkown
page execute and read and write
643F000
stack
page read and write
3281000
stack
page read and write
EE8C000
unkown
page read and write
47EC000
unkown
page read and write
8661000
unkown
page read and write
2DF1000
unkown
page read and write
3390000
heap
page read and write
F70000
unkown
page readonly
7FF5DEE52000
unkown
page readonly
C4E8000
unkown
page read and write
2B54000
heap
page read and write
C159000
unkown
page read and write
9729000
unkown
page read and write
7910000
unkown
page readonly
100C4000
unkown
page read and write
7FF5DF284000
unkown
page readonly
3613000
direct allocation
page read and write
BF90000
unkown
page read and write
A760000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
33C0000
unkown
page readonly
3B2D000
heap
page read and write
2B54000
heap
page read and write
3413000
heap
page read and write
7D89000
stack
page read and write
BFC3000
unkown
page read and write
C40E000
unkown
page read and write
BFAF000
unkown
page read and write
7FF5DF54D000
unkown
page readonly
E80000
unkown
page read and write
B28000
heap
page read and write
F70000
unkown
page readonly
320B000
stack
page read and write
7FF5DF2FE000
unkown
page readonly
8A36000
unkown
page read and write
5AC0000
heap
page read and write
978C000
unkown
page read and write
189E000
stack
page read and write
283C000
stack
page read and write
1195000
heap
page read and write
7FF5DEE43000
unkown
page readonly
C53E000
unkown
page read and write
98A7000
unkown
page read and write
7FF5DF478000
unkown
page readonly
4788000
unkown
page read and write
3613000
direct allocation
page read and write
901B000
stack
page read and write
8ADB000
stack
page read and write
7FF5DF57F000
unkown
page readonly
AEF0000
unkown
page read and write
3290000
unkown
page readonly
48A0000
unkown
page read and write
C381000
unkown
page read and write
2B54000
heap
page read and write
2C31000
heap
page read and write
BFAF000
unkown
page read and write
940E000
stack
page read and write
7FF5DF5B5000
unkown
page readonly
52C3000
unkown
page read and write
2C37000
heap
page read and write
C354000
unkown
page read and write
92DD000
stack
page read and write
7D0E000
stack
page read and write
AB0D000
stack
page read and write
7FF5DF5B0000
unkown
page readonly
3613000
direct allocation
page read and write
47EC000
unkown
page read and write
11A0000
unkown
page readonly
A6EE000
unkown
page read and write
F71000
unkown
page execute read
A760000
unkown
page read and write
37B9000
direct allocation
page read and write
B10000
heap
page read and write
A82000
heap
page read and write
3362000
unkown
page read and write
7800000
unkown
page read and write
AD2B000
stack
page read and write
2AC0000
trusted library allocation
page read and write
4050000
unclassified section
page execute and read and write
1032000
unkown
page readonly
BF9F000
unkown
page read and write
2C26000
heap
page read and write
7FF5DF43C000
unkown
page readonly
3690000
direct allocation
page read and write
AD2B000
stack
page read and write
7FF5DF5BE000
unkown
page readonly
7FF5DF62C000
unkown
page readonly
BF9B000
unkown
page read and write
9F60000
unkown
page read and write
7FF5DF45A000
unkown
page readonly
FF1000
unkown
page readonly
47B6000
unkown
page read and write
E91000
unkown
page read and write
7FF5DF095000
unkown
page readonly
C030000
unkown
page read and write
EE8C000
unkown
page read and write
3A01000
heap
page read and write
7FF5DF3F1000
unkown
page readonly
A8C000
heap
page read and write
7FF5DF26F000
unkown
page readonly
2B54000
heap
page read and write
3800000
heap
page read and write
7FF5DF398000
unkown
page readonly
7FF5DF4F3000
unkown
page readonly
7FF5DF532000
unkown
page readonly
7FF5DEE56000
unkown
page readonly
E5E000
heap
page read and write
7910000
unkown
page readonly
7FF5DF50F000
unkown
page readonly
7FF5DF067000
unkown
page readonly
7FF5DF429000
unkown
page readonly
7FF5DF45A000
unkown
page readonly
ADC0000
unkown
page readonly
7FF5DF207000
unkown
page readonly
7FF5DEFC2000
unkown
page readonly
7FF5DF3F5000
unkown
page readonly
335B000
unkown
page read and write
880000
heap
page read and write
7FF5DF591000
unkown
page readonly
28D3000
heap
page read and write
7FF5DF0C1000
unkown
page readonly
7FF5DF207000
unkown
page readonly
BB1000
heap
page read and write
7FF5DEF84000
unkown
page readonly
9564000
unkown
page read and write
BF7E000
unkown
page read and write
3373000
unkown
page read and write
34C0000
unkown
page read and write
32B1000
unkown
page read and write
C2E4000
unkown
page read and write
9E9E000
stack
page read and write
2D1E000
stack
page read and write
7DF4E6791000
unkown
page execute read
9A6C000
stack
page read and write
7FF5DF3F7000
unkown
page readonly
3ACF000
unclassified section
page read and write
C19D000
unkown
page read and write
2B54000
heap
page read and write
7FF5DF584000
unkown
page readonly
BDE000
heap
page read and write
FFC4000
unkown
page read and write
C40C000
unkown
page read and write
7DF4E6760000
unkown
page readonly
10046000
unkown
page read and write
7FF5DF4F7000
unkown
page readonly
830F000
stack
page read and write
E00000
heap
page read and write
7FF5DF341000
unkown
page readonly
971A000
unkown
page read and write
3356000
unkown
page read and write
7FF5DF16B000
unkown
page readonly
3413000
heap
page read and write
3107000
stack
page read and write
BFA3000
unkown
page read and write
7FF5DF284000
unkown
page readonly
B500000
unkown
page readonly
7FF5DF52D000
unkown
page readonly
2B54000
heap
page read and write
C34E000
unkown
page read and write
7FF5DEFE8000
unkown
page readonly
7FF5DEE52000
unkown
page readonly
1A00000
heap
page read and write
BEF0000
heap
page read and write
7FF5DF567000
unkown
page readonly
1044000
unkown
page readonly
BD7F000
stack
page read and write
C74000
heap
page read and write
7FF5DF486000
unkown
page readonly
3356000
unkown
page read and write
7FF5DF21B000
unkown
page readonly
7FF5DF06F000
unkown
page readonly
7FF5DE539000
unkown
page readonly
C086000
unkown
page read and write
A0B1000
unkown
page read and write
7FF5DF4FB000
unkown
page readonly
7499000
unkown
page read and write
7FF5DF3F7000
unkown
page readonly
2B50000
heap
page read and write
EE4C000
unkown
page read and write
7FF5DF095000
unkown
page readonly
34F0000
trusted library allocation
page read and write
34F0000
direct allocation
page read and write
CD5000
heap
page read and write
C519000
unkown
page read and write
7FF5DF4BD000
unkown
page readonly
7FF5DF5CC000
unkown
page readonly
4855000
unkown
page read and write
AC0D000
stack
page read and write
3362000
unkown
page read and write
3613000
direct allocation
page read and write
2A3C000
stack
page read and write
7FF5DEFFC000
unkown
page readonly
7FF5DF3C6000
unkown
page readonly
739B000
unkown
page read and write
B3E000
heap
page read and write
3382000
unkown
page read and write
EE7D000
unkown
page read and write
8390000
unkown
page read and write
73E5000
unkown
page read and write
EE40000
unkown
page read and write
C4E9000
unkown
page read and write
7FF5DF01B000
unkown
page readonly
7810000
unkown
page read and write
3617000
heap
page read and write
7FF5DF382000
unkown
page readonly
2C31000
heap
page read and write
A098000
unkown
page read and write
106D8000
unkown
page execute and read and write
2FE1000
heap
page read and write
7FF5DF06F000
unkown
page readonly
7FF5DF01B000
unkown
page readonly
2B54000
heap
page read and write
439000
stack
page read and write
935B000
stack
page read and write
DF8000
heap
page read and write
7FF5DF089000
unkown
page readonly
1040000
unkown
page write copy
7FF5DEF57000
unkown
page readonly
74D6000
unkown
page read and write
B60A000
stack
page read and write
2EC0000
unkown
page readonly
7FF5DF343000
unkown
page readonly
48E0000
unkown
page read and write
B5D000
heap
page read and write
7FF5DF2E2000
unkown
page readonly
7840000
unkown
page read and write
2E20000
unkown
page read and write
7FF5DF361000
unkown
page readonly
3617000
heap
page read and write
7FF5DF45C000
unkown
page readonly
E80000
unkown
page read and write
BFDF000
unkown
page read and write
4766000
unkown
page read and write
ADAC000
stack
page read and write
3500000
trusted library allocation
page read and write
7FF5DEF87000
unkown
page readonly
7FF5DEFAC000
unkown
page readonly
7FF5DEFF8000
unkown
page readonly
EEA0000
unkown
page read and write
7FF5DF25B000
unkown
page readonly
BA76000
stack
page read and write
9489000
stack
page read and write
8757000
unkown
page read and write
8670000
unkown
page read and write
7FF5DF191000
unkown
page readonly
382E000
direct allocation
page read and write
EE88000
unkown
page read and write
7FF5DF4F7000
unkown
page readonly
7FF5DF5FF000
unkown
page readonly
3240000
heap
page read and write
7FF5DF3A1000
unkown
page readonly
3373000
unkown
page read and write
13A0000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
ACAF000
stack
page read and write
73C3000
unkown
page read and write
83D0000
unkown
page read and write
9F27000
unkown
page read and write
2870000
unkown
page read and write
A08D000
unkown
page read and write
C3A9000
unkown
page read and write
3D2D000
direct allocation
page execute and read and write
2FE0000
heap
page read and write
73B6000
unkown
page read and write
EE71000
unkown
page read and write
34B0000
unkown
page readonly
7FF5DF081000
unkown
page readonly
2FE1000
heap
page read and write
C23D000
unkown
page read and write
3394000
unkown
page read and write
96DF000
unkown
page read and write
2E50000
unkown
page readonly
28D0000
heap
page read and write
9F60000
unkown
page read and write
7FF5DF2BA000
unkown
page readonly
9F78000
unkown
page read and write
EFF0000
heap
page read and write
3690000
direct allocation
page read and write
7FF5DF486000
unkown
page readonly
7FF5DF5E9000
unkown
page readonly
47A2000
unkown
page read and write
7FF5DF12A000
unkown
page readonly
9E1E000
stack
page read and write
C75000
stack
page read and write
7FF5DF09B000
unkown
page readonly
2FCC000
stack
page read and write
7FF5DEFAF000
unkown
page readonly
7FF5DF3D4000
unkown
page readonly
7FF5DEFF8000
unkown
page readonly
C43C000
unkown
page read and write
9E0000
unkown
page readonly
3B29000
heap
page read and write
D60000
heap
page read and write
7940000
unkown
page readonly
33E1000
trusted library allocation
page execute and read and write
7FF5DF4FB000
unkown
page readonly
3107000
stack
page read and write
7FF5DF3D4000
unkown
page readonly
7FF5DF3FC000
unkown
page readonly
C52D000
unkown
page read and write
4824000
unkown
page read and write
9D1F000
stack
page read and write
37BD000
direct allocation
page read and write
7DF4E6761000
unkown
page execute read
970C000
unkown
page read and write
7FF5DF3C6000
unkown
page readonly
BF9B000
unkown
page read and write
2B54000
heap
page read and write
7B4B000
stack
page read and write
3362000
unkown
page read and write
371E000
direct allocation
page execute and read and write
E06000
heap
page read and write
7ACE000
stack
page read and write
73B2000
unkown
page read and write
C40F000
unkown
page read and write
3C4000
system
page execute and read and write
98A1000
unkown
page read and write
7FF5DF0A5000
unkown
page readonly
A106000
unkown
page read and write
8910000
unkown
page read and write
27D0000
unkown
page read and write
7FF5DE531000
unkown
page readonly
BFAD000
unkown
page read and write
2870000
unkown
page read and write
A50000
heap
page read and write
7FF5DF4C6000
unkown
page readonly
5110000
unkown
page write copy
2C3F000
heap
page read and write
7D90000
unkown
page read and write
4860000
unkown
page read and write
3D9E000
direct allocation
page execute and read and write
9704000
unkown
page read and write
7FF5DF2F3000
unkown
page readonly
C013000
unkown
page read and write
2E30000
unkown
page read and write
C41B000
unkown
page read and write
2BC0000
trusted library allocation
page read and write
BF98000
unkown
page read and write
BF82000
unkown
page read and write
C048000
unkown
page read and write
3500000
trusted library allocation
page read and write
2FE8000
heap
page read and write
34F0000
direct allocation
page read and write
7FF5DF582000
unkown
page readonly
7940000
unkown
page readonly
3304000
unkown
page read and write
7DF4E67A1000
unkown
page execute read
B10000
heap
page read and write
C034000
unkown
page read and write
AE0000
heap
page read and write
7FF5DF422000
unkown
page readonly
3371000
unkown
page read and write
9F2A000
unkown
page read and write
34F0000
direct allocation
page read and write
C192000
unkown
page read and write
B120000
unkown
page readonly
73BC000
unkown
page read and write
310B000
heap
page read and write
2B54000
heap
page read and write
47F3000
unkown
page read and write
7930000
unkown
page readonly
7FF5DF3EA000
unkown
page readonly
EFFA000
heap
page read and write
7C89000
stack
page read and write
7FF5DF28E000
unkown
page readonly
7FF5DF4E7000
unkown
page readonly
31C0000
heap
page read and write
BF10000
unkown
page readonly
3613000
direct allocation
page read and write
81D000
stack
page read and write
2B54000
heap
page read and write
C431000
unkown
page read and write
37BD000
direct allocation
page read and write
10099000
unkown
page read and write
3851000
direct allocation
page execute and read and write
973C000
unkown
page read and write
B589000
stack
page read and write
739B000
unkown
page read and write
B11B000
stack
page read and write
A6FE000
unkown
page read and write
7FF5DF47E000
unkown
page readonly
C23D000
unkown
page read and write
52D9000
unkown
page read and write
9F10000
unkown
page read and write
3380000
heap
page read and write
7FF5DF571000
unkown
page readonly
980000
unkown
page readonly
BA76000
stack
page read and write
4824000
unkown
page read and write
307D000
stack
page read and write
7FF5DEF90000
unkown
page readonly
C1A9000
unkown
page read and write
7FF5DF5F0000
unkown
page readonly
7FF5DF126000
unkown
page readonly
7FF5DF0CC000
unkown
page readonly
B589000
stack
page read and write
7DF4E6771000
unkown
page execute read
335B000
unkown
page read and write
C3A0000
unkown
page read and write
74F1000
unkown
page read and write
2C2C000
heap
page read and write
7FF5DEFF5000
unkown
page readonly
BFA7000
unkown
page read and write
E00000
heap
page read and write
F40000
heap
page read and write
A690000
unkown
page read and write
B0F000
heap
page read and write
7FF5DF12A000
unkown
page readonly
83E0000
unkown
page read and write
7FF5DEFE2000
unkown
page readonly
7FF5DF626000
unkown
page readonly
C319000
unkown
page read and write
3605000
heap
page read and write
C3C000
heap
page read and write
7870000
unkown
page read and write
A6D2000
unkown
page read and write
83F000
stack
page read and write
3B00000
heap
page read and write
3FBF000
unclassified section
page read and write
32FE000
unkown
page read and write
3413000
heap
page read and write
7FF5DF0C3000
unkown
page readonly
2B54000
heap
page read and write
7FF5DEFA6000
unkown
page readonly
D50000
unkown
page read and write
7FF5DF49C000
unkown
page readonly
2B54000
heap
page read and write
2AC0000
trusted library allocation
page read and write
7FF5DF5A3000
unkown
page readonly
FE0000
unkown
page read and write
2AC0000
trusted library allocation
page read and write
BFA5000
unkown
page read and write
7FF5DF3BE000
unkown
page readonly
ACAF000
stack
page read and write
874C000
stack
page read and write
A0FC000
unkown
page read and write
2EB0000
unkown
page readonly
336C000
unkown
page read and write
885E000
stack
page read and write
32B0000
unkown
page read and write
98A1000
unkown
page read and write
4760000
unkown
page read and write
7FF5DF5F0000
unkown
page readonly
7FF5DEE56000
unkown
page readonly
BFA5000
unkown
page read and write
7FF5DF2E5000
unkown
page readonly
3304000
unkown
page read and write
7FF5DF26F000
unkown
page readonly
7FF5DF36A000
unkown
page readonly
9F7C000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
97F3000
unkown
page read and write
10003000
unkown
page read and write
3690000
direct allocation
page read and write
7FF5DF0F6000
unkown
page readonly
3375000
unkown
page read and write
73AF000
unkown
page read and write
7FF5DF507000
unkown
page readonly
98AD000
unkown
page read and write
34B0000
unkown
page readonly
4828000
unkown
page read and write
C3AF000
unkown
page read and write
7399000
unkown
page read and write
9E0000
unkown
page readonly
2B54000
heap
page read and write
790A000
stack
page read and write
987C000
unkown
page read and write
38FF000
stack
page read and write
4855000
unkown
page read and write
8CE000
stack
page read and write
2BC0000
trusted library allocation
page read and write
BFEF000
unkown
page read and write
27F0000
unkown
page readonly
2B54000
heap
page read and write
7FF5DE9C3000
unkown
page readonly
B1C0000
unkown
page readonly
FFC4000
unkown
page read and write
7FF5DF248000
unkown
page readonly
B9F0000
unkown
page read and write
7FF5DE4F2000
unkown
page readonly
382E000
direct allocation
page read and write
7FF5DF195000
unkown
page readonly
7DF4E6781000
unkown
page execute read
EE0000
heap
page read and write
C086000
unkown
page read and write
C354000
unkown
page read and write
7FF5DF0C3000
unkown
page readonly
2B54000
heap
page read and write
A6FC000
unkown
page read and write
382E000
direct allocation
page read and write
962B000
unkown
page read and write
B28000
heap
page read and write
7FF5DF429000
unkown
page readonly
C410000
unkown
page read and write
9B1E000
stack
page read and write
7800000
unkown
page read and write
73A3000
unkown
page read and write
52C3000
unkown
page read and write
914B000
stack
page read and write
7FF5DF5A8000
unkown
page readonly
BCFC000
stack
page read and write
7DF5E896A000
unkown
page readonly
7FF5DF191000
unkown
page readonly
3830000
heap
page read and write
B359000
stack
page read and write
7FF5DF507000
unkown
page readonly
9380000
unkown
page readonly
BFAD000
unkown
page read and write
7FF5DF091000
unkown
page readonly
3349000
unkown
page read and write
32B4000
unkown
page read and write
38D6000
unclassified section
page read and write
2C10000
heap
page read and write
F28000
stack
page read and write
9B99000
stack
page read and write
7FF5DF3DF000
unkown
page readonly
C183000
unkown
page read and write
9D1F000
stack
page read and write
3613000
direct allocation
page read and write
7FF5DF067000
unkown
page readonly
C54D000
unkown
page read and write
7B60000
unkown
page readonly
D69000
heap
page read and write
B60A000
stack
page read and write
3356000
unkown
page read and write
4128000
unclassified section
page execute and read and write
901B000
stack
page read and write
7FF5DE535000
unkown
page readonly
7FF5DF443000
unkown
page readonly
A9B000
heap
page read and write
7FF5DEF84000
unkown
page readonly
7FF5DF08F000
unkown
page readonly
7DF4E67A1000
unkown
page execute read
7FF5DEF90000
unkown
page readonly
10100000
system
page execute and read and write
7FF5DEE5A000
unkown
page readonly
37BD000
direct allocation
page read and write
C183000
unkown
page read and write
8C28000
stack
page read and write
7FF5DF2ED000
unkown
page readonly
7FF5DEF94000
unkown
page readonly
2C26000
heap
page read and write
C192000
unkown
page read and write
EEA0000
unkown
page read and write
27D0000
unkown
page read and write
970000
unkown
page readonly
4788000
unkown
page read and write
AE1000
heap
page read and write
C01A000
unkown
page read and write
7FF5DEF4B000
unkown
page readonly
7FF5DF5E9000
unkown
page readonly
479B000
unkown
page read and write
7870000
unkown
page read and write
7FF5DF3EA000
unkown
page readonly
C1A9000
unkown
page read and write
A6EA000
unkown
page read and write
C4E4000
unkown
page read and write
7FF5DF2F3000
unkown
page readonly
C24C000
unkown
page read and write
33CE000
stack
page read and write
7FF5DF5AE000
unkown
page readonly
7DF4E6781000
unkown
page execute read
7FF5DF392000
unkown
page readonly
A74C000
unkown
page read and write
CF7000
heap
page read and write
BFB3000
unkown
page read and write
C141000
unkown
page read and write
3382000
unkown
page read and write
A072000
unkown
page read and write
A104000
unkown
page read and write
336F000
unkown
page read and write
BF84000
unkown
page read and write
73CD000
unkown
page read and write
2B54000
heap
page read and write
7FF5DF392000
unkown
page readonly
73B6000
unkown
page read and write
9F7C000
unkown
page read and write
97B4000
unkown
page read and write
88DE000
stack
page read and write
10E6F000
system
page read and write
8590000
unkown
page readonly
3364000
unkown
page read and write
B010000
unkown
page read and write
7FF5DF017000
unkown
page readonly
339D000
unkown
page read and write
C423000
unkown
page read and write
4750000
unkown
page read and write
4167000
unclassified section
page execute and read and write
2AB0000
heap
page read and write
3290000
unkown
page readonly
EE8C000
unkown
page read and write
8670000
unkown
page read and write
3371000
unkown
page read and write
7FF5DF537000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
BD3000
heap
page read and write
9B1D000
stack
page read and write
7A30000
unkown
page read and write
3364000
unkown
page read and write
BF9F000
unkown
page read and write
7830000
unkown
page read and write
7FF5DF28E000
unkown
page readonly
7FF5DF04D000
unkown
page readonly
28A0000
unkown
page readonly
B28000
heap
page read and write
C381000
unkown
page read and write
7FF5DF584000
unkown
page readonly
7FF5DEFFC000
unkown
page readonly
7399000
unkown
page read and write
9F78000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
7FF5C0B6B000
unkown
page readonly
8757000
unkown
page read and write
914B000
stack
page read and write
7FF5DF458000
unkown
page readonly
9B99000
stack
page read and write
3940000
trusted library allocation
page read and write
C34E000
unkown
page read and write
7395000
unkown
page read and write
9729000
unkown
page read and write
7FF5DF361000
unkown
page readonly
7FF5DF1D1000
unkown
page readonly
971C000
unkown
page read and write
7FF5DF58A000
unkown
page readonly
73B2000
unkown
page read and write
7DF4E6770000
unkown
page readonly
7FF5DE9CB000
unkown
page readonly
EE7D000
unkown
page read and write
989F000
unkown
page read and write
838B000
stack
page read and write
96F1000
unkown
page read and write
96F1000
unkown
page read and write
C2E4000
unkown
page read and write
7FF5DF5F6000
unkown
page readonly
9E1E000
stack
page read and write
7840000
unkown
page read and write
37B9000
direct allocation
page read and write
7FF5DEF06000
unkown
page readonly
C003000
unkown
page read and write
BF90000
unkown
page read and write
C18A000
unkown
page read and write
77F0000
unkown
page read and write
74A9000
unkown
page read and write
7FF5DEF4B000
unkown
page readonly
34F0000
direct allocation
page read and write
A0A7000
unkown
page read and write
7230000
unkown
page read and write
C19D000
unkown
page read and write
BF84000
unkown
page read and write
34EE000
stack
page read and write
7FF5DF396000
unkown
page readonly
C187000
unkown
page read and write
7FF5DF122000
unkown
page readonly
10003000
unkown
page read and write
98A1000
unkown
page read and write
A75D000
unkown
page read and write
7A40000
unkown
page readonly
7FF5DF539000
unkown
page readonly
3260000
heap
page read and write
7FF5DF3B5000
unkown
page readonly
7D89000
stack
page read and write
B9E0000
unkown
page read and write
3375000
unkown
page read and write
7FF5DF519000
unkown
page readonly
9716000
unkown
page read and write
7FF5DF081000
unkown
page readonly
C298000
unkown
page read and write
7FF5DF577000
unkown
page readonly
A756000
unkown
page read and write
382E000
direct allocation
page read and write
B359000
stack
page read and write
3340000
heap
page read and write
9718000
unkown
page read and write
A58000
heap
page read and write
7A40000
unkown
page readonly
7DF4E6780000
unkown
page readonly
848E000
stack
page read and write
C2E4000
unkown
page read and write
E00000
heap
page read and write
7FF5DF2FE000
unkown
page readonly
FE0000
unkown
page read and write
7FF5DF366000
unkown
page readonly
7FF5DF4E3000
unkown
page readonly
349E000
unkown
page read and write
AEF0000
unkown
page read and write
7FF5DF2CB000
unkown
page readonly
7FF5DF626000
unkown
page readonly
C18A000
unkown
page read and write
96F5000
unkown
page read and write
9FA0000
unkown
page read and write
3500000
trusted library allocation
page read and write
E0F000
heap
page read and write
7FF5DF08B000
unkown
page readonly
73B4000
unkown
page read and write
2BC0000
trusted library allocation
page read and write
7DF5E896A000
unkown
page readonly
7FF5DF07D000
unkown
page readonly
7FF5DF3C2000
unkown
page readonly
7FF5DF42F000
unkown
page readonly
B28000
heap
page read and write
98AD000
unkown
page read and write
7FF5DF2BA000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
7FF5DF0D2000
unkown
page readonly
9C1F000
stack
page read and write
EFF2000
heap
page read and write
BF7E000
unkown
page read and write
4860000
unkown
page read and write
7FF5DF1CD000
unkown
page readonly
9F3E000
unkown
page read and write
7FF5DF532000
unkown
page readonly
300000
system
page execute and read and write
A0B1000
unkown
page read and write
7FF5DF623000
unkown
page readonly
2C31000
heap
page read and write
8590000
unkown
page readonly
3690000
direct allocation
page read and write
BFAB000
unkown
page read and write
7FF5DF435000
unkown
page readonly
4750000
unkown
page read and write
B259000
stack
page read and write
AE6F000
stack
page read and write
7DF4E6771000
unkown
page execute read
7FF5DF48B000
unkown
page readonly
34F0000
direct allocation
page read and write
7FF5DF567000
unkown
page readonly
30F1000
trusted library allocation
page execute and read and write
C406000
unkown
page read and write
D50000
unkown
page read and write
103C000
unkown
page write copy
ADC0000
unkown
page readonly
7FF5DF3B9000
unkown
page readonly
7FF5DF39C000
unkown
page readonly
73BC000
unkown
page read and write
2B54000
heap
page read and write
4828000
unkown
page read and write
1004B000
unkown
page read and write
C034000
unkown
page read and write
A690000
unkown
page read and write
47F1000
unkown
page read and write
D99000
heap
page read and write
97B4000
unkown
page read and write
8ADB000
stack
page read and write
97F3000
unkown
page read and write
A0F7000
unkown
page read and write
C187000
unkown
page read and write
7FF5DEEEB000
unkown
page readonly
10717000
unkown
page execute and read and write
7FF5DF5D6000
unkown
page readonly
A6FA000
unkown
page read and write
7FF5DF36A000
unkown
page readonly
7FF5DF60D000
unkown
page readonly
C1C4000
unkown
page read and write
9D9F000
stack
page read and write
A02D000
unkown
page read and write
7FF5DF221000
unkown
page readonly
7FF5DEFCB000
unkown
page readonly
10082000
unkown
page read and write
838B000
stack
page read and write
7FF5DF25E000
unkown
page readonly
3520000
heap
page read and write
149E000
stack
page read and write
D44000
heap
page read and write
9F51000
unkown
page read and write
7FF5DF366000
unkown
page readonly
82F000
stack
page read and write
C51E000
unkown
page read and write
7FF5DF0A5000
unkown
page readonly
7FF5DF41B000
unkown
page readonly
C319000
unkown
page read and write
848E000
stack
page read and write
2BC0000
trusted library allocation
page read and write
317D000
stack
page read and write
95EE000
stack
page read and write
7FF5DE4F2000
unkown
page readonly
BF40000
unkown
page read and write
371F000
stack
page read and write
7FF5DF4D5000
unkown
page readonly
7FF5DF396000
unkown
page readonly
7FF5DF4AB000
unkown
page readonly
7FF5DF60D000
unkown
page readonly
333E000
stack
page read and write
C187000
unkown
page read and write
7FF5DF5F6000
unkown
page readonly
2B54000
heap
page read and write
2B54000
heap
page read and write
7FF5DF53F000
unkown
page readonly
989F000
unkown
page read and write
A6F1000
unkown
page read and write
2B54000
heap
page read and write
7FF5DF3BE000
unkown
page readonly
7FF5DF156000
unkown
page readonly
AB8E000
stack
page read and write
73BA000
unkown
page read and write
32B0000
unkown
page read and write
A0A5000
unkown
page read and write
9605000
unkown
page read and write
73A3000
unkown
page read and write
C1CC000
unkown
page read and write
987C000
unkown
page read and write
C149000
unkown
page read and write
A6F2000
unkown
page read and write
EE40000
unkown
page read and write
336C000
unkown
page read and write
D99000
heap
page read and write
8400000
heap
page read and write
830F000
stack
page read and write
7FF000
stack
page read and write
9509000
stack
page read and write
7FF5DF5A3000
unkown
page readonly
7FF5DEFC2000
unkown
page readonly
2EB0000
unkown
page readonly
2B54000
heap
page read and write
8390000
unkown
page read and write
3504000
heap
page read and write
7FF5DEE4E000
unkown
page readonly
7FF5DF23A000
unkown
page readonly
DF8000
heap
page read and write
3402000
heap
page read and write
7FF5DF4EC000
unkown
page readonly
9F63000
unkown
page read and write
BA1000
heap
page read and write
88E0000
unkown
page read and write
9F92000
unkown
page read and write
A6CF000
unkown
page read and write
10082000
unkown
page read and write
C424000
unkown
page read and write
A072000
unkown
page read and write
ABA000
heap
page read and write
BEF0000
heap
page read and write
8C28000
stack
page read and write
7FF5DF2DA000
unkown
page readonly
5CC0000
unclassified section
page execute and read and write
A6EE000
unkown
page read and write
7FF5DEF87000
unkown
page readonly
2B54000
heap
page read and write
B09F000
stack
page read and write
7FF5DF5B0000
unkown
page readonly
9605000
unkown
page read and write
9380000
unkown
page readonly
3C00000
direct allocation
page execute and read and write
7FF5DF55A000
unkown
page readonly
7FF5DF5BE000
unkown
page readonly
7FF5DF3FC000
unkown
page readonly
C24C000
unkown
page read and write
9F74000
unkown
page read and write
7FF5DF3E4000
unkown
page readonly
BFA3000
unkown
page read and write
BFA1000
unkown
page read and write
C405000
unkown
page read and write
39B1000
trusted library allocation
page execute and read and write
34F0000
direct allocation
page read and write
37B9000
direct allocation
page read and write
C75000
stack
page read and write
3690000
direct allocation
page read and write
37BD000
direct allocation
page read and write
7380000
unkown
page read and write
7FF5DF156000
unkown
page readonly
7502000
unkown
page read and write
48E0000
unkown
page read and write
9FC3000
unkown
page read and write
C034000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
1032000
unkown
page readonly
7FF5DF4A6000
unkown
page readonly
7DF5E895F000
unkown
page readonly
7FF5DF364000
unkown
page readonly
C24C000
unkown
page read and write
BF6D000
unkown
page read and write
7FF5DF577000
unkown
page readonly
3701000
heap
page read and write
336F000
unkown
page read and write
7FF5DF41B000
unkown
page readonly
47D9000
unkown
page read and write
7FF5DF0D2000
unkown
page readonly
7FF5DF606000
unkown
page readonly
7FF5DF16B000
unkown
page readonly
C16000
heap
page read and write
2B54000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
7DF4E6770000
unkown
page readonly
C19D000
unkown
page read and write
9F2A000
unkown
page read and write
3991000
trusted library allocation
page execute and read and write
BD7F000
stack
page read and write
7DF5E895F000
unkown
page readonly
7B50000
unkown
page readonly
970000
unkown
page readonly
7FF5DF398000
unkown
page readonly
7FF5DEFB7000
unkown
page readonly
2B54000
heap
page read and write
479B000
unkown
page read and write
7503000
unkown
page read and write
393E000
stack
page read and write
A0A7000
unkown
page read and write
C1C4000
unkown
page read and write
83B0000
unkown
page readonly
B830000
unkown
page readonly
7FF5DF3E4000
unkown
page readonly
96ED000
unkown
page read and write
83E0000
unkown
page read and write
A74C000
unkown
page read and write
7FF5DF54D000
unkown
page readonly
7FF5DEFE8000
unkown
page readonly
C3B2000
unkown
page read and write
382E000
direct allocation
page read and write
B830000
unkown
page readonly
2E50000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
10099000
unkown
page read and write
95F0000
unkown
page read and write
3185000
stack
page read and write
7FF5DF3B9000
unkown
page readonly
3B9E000
heap
page read and write
C3A3000
unkown
page read and write
7FF5DEF94000
unkown
page readonly
7FF5DEFF0000
unkown
page readonly
8EA9000
stack
page read and write
7FF5DF343000
unkown
page readonly
B500000
unkown
page readonly
C159000
unkown
page read and write
335B000
unkown
page read and write
7499000
unkown
page read and write
7FF5DF48B000
unkown
page readonly
900000
heap
page read and write
3580000
direct allocation
page execute and read and write
C298000
unkown
page read and write
7FF5DF0F6000
unkown
page readonly
C159000
unkown
page read and write
C1C4000
unkown
page read and write
909B000
stack
page read and write
73B8000
unkown
page read and write
99AB000
unkown
page read and write
BFA7000
unkown
page read and write
7FF5DF341000
unkown
page readonly
B010000
unkown
page read and write
7FF5C0B65000
unkown
page readonly
C3E7000
unkown
page read and write
2F10000
unkown
page read and write
7FF5DF038000
unkown
page readonly
7FF5DF443000
unkown
page readonly
73BA000
unkown
page read and write
3413000
heap
page read and write
7FF5DF20A000
unkown
page readonly
101C8000
system
page execute and read and write
7FF5DF388000
unkown
page readonly
3413000
heap
page read and write
7FF5DEE43000
unkown
page readonly
980000
unkown
page readonly
A02D000
unkown
page read and write
B45A000
stack
page read and write
96ED000
unkown
page read and write
C1A9000
unkown
page read and write
C34E000
unkown
page read and write
2890000
unkown
page readonly
7FF5DF478000
unkown
page readonly
7FF5DF382000
unkown
page readonly
C003000
unkown
page read and write
404F000
stack
page read and write
7830000
unkown
page read and write
A84000
heap
page read and write
2C1B000
heap
page read and write
7FF5DE5CC000
unkown
page readonly
C048000
unkown
page read and write
3900000
trusted library allocation
page read and write
A6FA000
unkown
page read and write
7FF5DF18E000
unkown
page readonly
101B3000
system
page execute and read and write
3500000
heap
page read and write
3290000
heap
page read and write
7FF5DF5FC000
unkown
page readonly
7FF5DF3A1000
unkown
page readonly
A75D000
unkown
page read and write
7FF5DF091000
unkown
page readonly
A760000
unkown
page read and write
9716000
unkown
page read and write
C01A000
unkown
page read and write
A8C000
heap
page read and write
7FF5DF195000
unkown
page readonly
336F000
unkown
page read and write
7FF5DF42F000
unkown
page readonly
A6FE000
unkown
page read and write
95F0000
unkown
page read and write
73AF000
unkown
page read and write
7230000
unkown
page read and write
13A1000
unkown
page readonly
7FF5DF18E000
unkown
page readonly
C420000
unkown
page read and write
7FF5DEE5A000
unkown
page readonly
79E0000
unkown
page readonly
7FF5DF549000
unkown
page readonly
7FF5DF0CC000
unkown
page readonly
7FF5DF045000
unkown
page readonly
A0A5000
unkown
page read and write
BFAB000
unkown
page read and write
489E000
stack
page read and write
790A000
stack
page read and write
9FC3000
unkown
page read and write
9704000
unkown
page read and write
2B54000
heap
page read and write
7FF5DF380000
unkown
page readonly
7FF5DF229000
unkown
page readonly
B4DB000
stack
page read and write
7FF5DF606000
unkown
page readonly
978C000
unkown
page read and write
B3DC000
stack
page read and write
31E0000
heap
page read and write
7FF5DF0F1000
unkown
page readonly
7FF5DEFF5000
unkown
page readonly
3C3000
system
page readonly
1190000
heap
page read and write
7FF5DEFDD000
unkown
page readonly
9700000
unkown
page read and write
2BFE000
stack
page read and write
7FF5DF4D5000
unkown
page readonly
1195000
heap
page read and write
7FF5DF5D6000
unkown
page readonly
33C0000
unkown
page readonly
7FF5DF045000
unkown
page readonly
73B4000
unkown
page read and write
28A0000
unkown
page readonly
BF9D000
unkown
page read and write
7860000
unkown
page read and write
7FF5DF452000
unkown
page readonly
74A9000
unkown
page read and write
36A9000
direct allocation
page execute and read and write
8D0000
heap
page read and write
3400000
heap
page read and write
96F5000
unkown
page read and write
31BD000
stack
page read and write
C458000
unkown
page read and write
7FF5DF0A2000
unkown
page readonly
B00000
heap
page read and write
BF9D000
unkown
page read and write
3370000
heap
page readonly
7FF5DF4E7000
unkown
page readonly
7FF5DEFF0000
unkown
page readonly
7FF5DF52D000
unkown
page readonly
8661000
unkown
page read and write
C354000
unkown
page read and write
2C37000
heap
page read and write
BF8C000
unkown
page read and write
101A3000
system
page execute and read and write
7FF5DF04D000
unkown
page readonly
971A000
unkown
page read and write
47F1000
unkown
page read and write
7FF5DF5AE000
unkown
page readonly
7FF5DF5B3000
unkown
page readonly
7B60000
unkown
page readonly
7D90000
unkown
page read and write
7FF5DF571000
unkown
page readonly
7FF5DF122000
unkown
page readonly
83B0000
unkown
page readonly
C319000
unkown
page read and write
7FF5DF25E000
unkown
page readonly
B120000
unkown
page readonly
EFF2000
heap
page read and write
ADAC000
stack
page read and write
7FF5DF58A000
unkown
page readonly
971C000
unkown
page read and write
7FF5DF2E2000
unkown
page readonly
C23D000
unkown
page read and write
C522000
unkown
page read and write
7FF5DF07D000
unkown
page readonly
7FF5DF424000
unkown
page readonly
4760000
unkown
page read and write
8A36000
unkown
page read and write
9714000
unkown
page read and write
BF82000
unkown
page read and write
C45C000
unkown
page read and write
EFFA000
heap
page read and write
2F10000
unkown
page read and write
3923000
heap
page read and write
B4DB000
stack
page read and write
100C000
unkown
page readonly
7FF5DF582000
unkown
page readonly
7FF5DF21C000
unkown
page readonly
7FF5DF539000
unkown
page readonly
7FF5DF4A6000
unkown
page readonly
2E30000
unkown
page read and write
74F1000
unkown
page read and write
1044000
unkown
page readonly
987C000
unkown
page read and write
7FF5DF229000
unkown
page readonly
3500000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
384D000
direct allocation
page execute and read and write
3575000
heap
page read and write
2B54000
heap
page read and write
7FF5DF4AB000
unkown
page readonly
3413000
heap
page read and write
7FF5DF24E000
unkown
page readonly
9C1F000
stack
page read and write
9564000
unkown
page read and write
1190000
heap
page read and write
3185000
stack
page read and write
7FF5DF4BD000
unkown
page readonly
39A0000
trusted library allocation
page execute and read and write
EE72000
unkown
page read and write
8910000
unkown
page read and write
909B000
stack
page read and write
9D9F000
stack
page read and write
323B000
stack
page read and write
100C000
unkown
page readonly
9718000
unkown
page read and write
2D61000
unkown
page read and write
7FF5DEFB7000
unkown
page readonly
7FF5DE9C3000
unkown
page readonly
7FF5DEFBD000
unkown
page readonly
10100000
unkown
page read and write
874C000
stack
page read and write
2B54000
heap
page read and write
7DF4E6791000
unkown
page execute read
7FF5DF310000
unkown
page readonly
B28000
heap
page read and write
3ED1000
direct allocation
page execute and read and write
80F000
stack
page read and write
B9E0000
unkown
page read and write
3980000
trusted library allocation
page execute and read and write
34C0000
unkown
page read and write
7860000
unkown
page read and write
B45A000
stack
page read and write
AEEE000
stack
page read and write
8BAC000
stack
page read and write
A106000
unkown
page read and write
FF84000
unkown
page read and write
A8B000
heap
page read and write
7FF5DF551000
unkown
page readonly
B29000
heap
page read and write
973C000
unkown
page read and write
1097F000
system
page read and write
37B9000
direct allocation
page read and write
7FF5C0B6B000
unkown
page readonly
7FF5DF45C000
unkown
page readonly
9A6C000
stack
page read and write
9FA0000
unkown
page read and write
7FF5C0B65000
unkown
page readonly
5110000
unkown
page write copy
A752000
unkown
page read and write
A763000
unkown
page read and write
3373000
unkown
page read and write
7FF5DF59E000
unkown
page readonly
7FF5DF4F3000
unkown
page readonly
7FF5DF2CB000
unkown
page readonly
EE75000
unkown
page read and write
7FF5DF24E000
unkown
page readonly
3394000
unkown
page read and write
7FF5DF1F8000
unkown
page readonly
9F10000
unkown
page read and write
7FF5DF25B000
unkown
page readonly
BFA1000
unkown
page read and write
7FF5DEFCB000
unkown
page readonly
970C000
unkown
page read and write
9F23000
unkown
page read and write
A9B000
heap
page read and write
8EA9000
stack
page read and write
AF7E000
stack
page read and write
C1CC000
unkown
page read and write
101A1000
system
page execute and read and write
48A0000
unkown
page read and write
76F0000
unkown
page read and write
73E5000
unkown
page read and write
7A30000
unkown
page read and write
EE74000
unkown
page read and write
E70000
unkown
page readonly
7FF5DEFDD000
unkown
page readonly
7FF5DEFA6000
unkown
page readonly
989F000
unkown
page read and write
C149000
unkown
page read and write
7FF5DF0F1000
unkown
page readonly
3600000
heap
page read and write
B259000
stack
page read and write
73A7000
unkown
page read and write
2B54000
heap
page read and write
3375000
unkown
page read and write
7FF5DF08F000
unkown
page readonly
C13C000
unkown
page read and write
7395000
unkown
page read and write
C3A8000
unkown
page read and write
7B4B000
stack
page read and write
98A7000
unkown
page read and write
E0F000
heap
page read and write
3605000
heap
page read and write
B11B000
stack
page read and write
EE88000
unkown
page read and write
7FF5DF537000
unkown
page readonly
8400000
heap
page read and write
7FF5DF20A000
unkown
page readonly
9700000
unkown
page read and write
2B54000
heap
page read and write
3C0000
system
page execute and read and write
7FF5DF248000
unkown
page readonly
73C3000
unkown
page read and write
73A7000
unkown
page read and write
3364000
unkown
page read and write
10786000
system
page read and write
A6F7000
unkown
page read and write
7FF5DF59E000
unkown
page readonly
2B54000
heap
page read and write
2B54000
heap
page read and write
A6FC000
unkown
page read and write
7FF5DF2ED000
unkown
page readonly
36AD000
direct allocation
page execute and read and write
B3DC000
stack
page read and write
34F0000
trusted library allocation
page read and write
B27000
heap
page read and write
74D6000
unkown
page read and write
3394000
unkown
page read and write
3690000
direct allocation
page read and write
7FF5DEF06000
unkown
page readonly
7FF5DF50F000
unkown
page readonly
9F23000
unkown
page read and write
C515000
unkown
page read and write
2D1E000
stack
page read and write
7810000
unkown
page read and write
E0F000
heap
page read and write
5C00000
unclassified section
page execute and read and write
7FF5DEFE2000
unkown
page readonly
C149000
unkown
page read and write
C40F000
unkown
page read and write
9F92000
unkown
page read and write
AE6F000
stack
page read and write
9C9D000
stack
page read and write
7FF5DF435000
unkown
page readonly
7FF5DF2DA000
unkown
page readonly
28D0000
heap
page read and write
2EC0000
unkown
page readonly
623F000
stack
page read and write
9F63000
unkown
page read and write
BF8C000
unkown
page read and write
3371000
unkown
page read and write
48B0000
unkown
page read and write
7FF5DF0C9000
unkown
page readonly
C508000
unkown
page read and write
7FF5DF5B5000
unkown
page readonly
73CD000
unkown
page read and write
A0F7000
unkown
page read and write
C4E1000
unkown
page read and write
7FF5DF029000
unkown
page readonly
A09A000
unkown
page read and write
382E000
direct allocation
page read and write
C298000
unkown
page read and write
1008B000
unkown
page read and write
7FF5DF488000
unkown
page readonly
A6CF000
unkown
page read and write
AB8E000
stack
page read and write
7FF5DF211000
unkown
page readonly
A760000
unkown
page read and write
F28000
stack
page read and write
7FF5DF09B000
unkown
page readonly
A098000
unkown
page read and write
76F0000
unkown
page read and write
7FF5DF3F1000
unkown
page readonly
7FF5DF2E5000
unkown
page readonly
95EE000
stack
page read and write
77F0000
unkown
page read and write
5241000
unkown
page read and write
7B50000
unkown
page readonly
7FF5DF5CC000
unkown
page readonly
7380000
unkown
page read and write
BF98000
unkown
page read and write
99AB000
unkown
page read and write
103C000
unkown
page read and write
2B54000
heap
page read and write
A104000
unkown
page read and write
47F3000
unkown
page read and write
7FF5DF39C000
unkown
page readonly
7FF5DF0C9000
unkown
page readonly
7FF5DE535000
unkown
page readonly
1004B000
unkown
page read and write
98AD000
unkown
page read and write
C13A000
unkown
page read and write
7991000
unkown
page read and write
7FF5DEF57000
unkown
page readonly
7FF5DF62C000
unkown
page readonly
2890000
unkown
page readonly
C18A000
unkown
page read and write
7FF5DF029000
unkown
page readonly
7FF5DEFAF000
unkown
page readonly
10046000
unkown
page read and write
3382000
unkown
page read and write
A74C000
unkown
page read and write
AFFC000
stack
page read and write
A0FC000
unkown
page read and write
A6F1000
unkown
page read and write
F71000
unkown
page execute read
88E0000
unkown
page read and write
B09F000
stack
page read and write
7FF5DE9CB000
unkown
page readonly
7FF5DF310000
unkown
page readonly
7FF5DF49C000
unkown
page readonly
7FF5DF169000
unkown
page readonly
C40C000
unkown
page read and write
7FF5DF47E000
unkown
page readonly
D09000
heap
page read and write
962B000
unkown
page read and write
7930000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
7FF5DEFBD000
unkown
page readonly
9F27000
unkown
page read and write
7FF5DE5CC000
unkown
page readonly
F44000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3281000
stack
page read and write
9714000
unkown
page read and write
9E9E000
stack
page read and write
7FF5DEEEB000
unkown
page readonly
1008B000
unkown
page read and write
48B0000
unkown
page read and write
7FF5DF57F000
unkown
page readonly
7FF5DF3B5000
unkown
page readonly
33D0000
trusted library allocation
page execute and read and write
C3F0000
unkown
page read and write
352C000
heap
page read and write
100C4000
unkown
page read and write
7DF4E6761000
unkown
page execute read
7FF5DF21F000
unkown
page readonly
B9BF000
stack
page read and write
A75D000
unkown
page read and write
7FF5DF038000
unkown
page readonly
7FF5DF1CD000
unkown
page readonly
7FF5DF169000
unkown
page readonly
7991000
unkown
page read and write
2D61000
unkown
page read and write
99AB000
unkown
page read and write
738E000
unkown
page read and write
7FF5DF3DF000
unkown
page readonly
7FF5DF0A2000
unkown
page readonly
7FF5DF4C6000
unkown
page readonly
73B8000
unkown
page read and write
2C9A000
stack
page read and write
BFDF000
unkown
page read and write
E0F000
heap
page read and write
2FE1000
heap
page read and write
C1CC000
unkown
page read and write
B9BF000
stack
page read and write
3413000
heap
page read and write
4766000
unkown
page read and write
C048000
unkown
page read and write
83D0000
unkown
page read and write
7FF5DF452000
unkown
page readonly
37B9000
direct allocation
page read and write
7FF5DF364000
unkown
page readonly
5241000
unkown
page read and write
9F0000
heap
page read and write
A09A000
unkown
page read and write
97F3000
unkown
page read and write
C071000
unkown
page read and write
2AC0000
trusted library allocation
page read and write
9489000
stack
page read and write
2B54000
heap
page read and write
FF1000
unkown
page readonly
47A2000
unkown
page read and write
3ECD000
direct allocation
page execute and read and write
7FF5DE531000
unkown
page readonly
A08D000
unkown
page read and write
2C31000
heap
page read and write
7D0E000
stack
page read and write
3612000
heap
page read and write
A6F3000
unkown
page read and write
2B54000
heap
page read and write
33D7000
heap
page read and write
7FF5DF126000
unkown
page readonly
7FF5DF08B000
unkown
page readonly
98A7000
unkown
page read and write
C013000
unkown
page read and write
96DF000
unkown
page read and write
FF84000
unkown
page read and write
3A00000
heap
page read and write
BF10000
unkown
page readonly
BFC3000
unkown
page read and write
A6D2000
unkown
page read and write
A08A000
unkown
page read and write
7FF5DF551000
unkown
page readonly
2B60000
trusted library allocation
page read and write
A6EA000
unkown
page read and write
7C85000
stack
page read and write
EF0000
direct allocation
page execute and read and write
9F0000
heap
page read and write
B28000
heap
page read and write
7FF5DF4EC000
unkown
page readonly
EE7E000
unkown
page read and write
A08A000
unkown
page read and write
28D3000
heap
page read and write
52D9000
unkown
page read and write
27F0000
unkown
page readonly
2B54000
heap
page read and write
7FF5DF089000
unkown
page readonly
9C9D000
stack
page read and write
C457000
unkown
page read and write
B9F0000
unkown
page read and write
7FF5DF349000
unkown
page readonly
37BD000
direct allocation
page read and write
47D9000
unkown
page read and write
11A0000
unkown
page readonly
A1E000
stack
page read and write
2B54000
heap
page read and write
3413000
heap
page read and write
7FF5DF3F5000
unkown
page readonly
3D29000
direct allocation
page execute and read and write
BF40000
unkown
page read and write
7FF5DF380000
unkown
page readonly
7FF5DF4E3000
unkown
page readonly
C474000
unkown
page read and write
7FF5DF1D1000
unkown
page readonly
9F74000
unkown
page read and write
7FF5DF519000
unkown
page readonly
38C2000
direct allocation
page execute and read and write
C02F000
unkown
page read and write
7DF4E6780000
unkown
page readonly
AC0D000
stack
page read and write
7FF5DF211000
unkown
page readonly
2E10000
unkown
page read and write
7FF5DEFAC000
unkown
page readonly
2C31000
heap
page read and write
7DF4E6760000
unkown
page readonly
7FF5DF458000
unkown
page readonly
E00000
heap
page read and write
7FF5DF5FF000
unkown
page readonly
7FF5DF0C1000
unkown
page readonly
7ACE000
stack
page read and write
47B6000
unkown
page read and write
7FF5DF623000
unkown
page readonly
7FF5DE539000
unkown
page readonly
E5E000
heap
page read and write
37BD000
direct allocation
page read and write
7FF5DF55A000
unkown
page readonly
7FF5DF388000
unkown
page readonly
B1C0000
unkown
page readonly
D69000
heap
page read and write
C086000
unkown
page read and write
9F3E000
unkown
page read and write
7FF5DF549000
unkown
page readonly
336C000
unkown
page read and write
EE71000
unkown
page read and write
7FF5DF591000
unkown
page readonly
C183000
unkown
page read and write
EFF0000
heap
page read and write
C474000
unkown
page read and write
7FF5DF349000
unkown
page readonly
There are 1463 hidden memdumps, click here to show them.