IOC Report
1.exe

loading gif

Files

File Path
Type
Category
Malicious
1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1.exe
C:\Users\user\Desktop\1.exe
malicious
C:\Users\user\Desktop\1.exe
C:\Users\user\Desktop\1.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\SysWOW64\colorcpl.exe
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\1.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.lbarco.com/jskg/?yV3lvHf=sl42yIbVTE2EkcOIsEKOUlHCBbE7QxdA6NZ7PagwYH4YR2l/R8Pf4e2TsXHmMhsmvqG9&8pbLu=d8z4X8O0M
34.149.87.45
malicious
http://www.lactationdrink.com/jskg/?yV3lvHf=VpJkz2P0T+/fMnrM7Dd1ATiiN68XLLnGpPbE/bn1fGrx+Ecv7ydvnShawUNCssxxEBuD&8pbLu=d8z4X8O0M
167.172.69.40
malicious
http://www.erotictoybox.com/jskg/?yV3lvHf=YCW0/yd7C01aElrhcPhS/kt9m722krufJvCDJvN/MprEBXvxMY86CRBbv2aG0eSAUYQv&8pbLu=d8z4X8O0M
23.227.38.74
malicious
http://www.saraadamchak.com/jskg/?yV3lvHf=D3ZsiJPHujYqAAcPubxypI16Ov1mNCduO0wq0OOwpknW2PP1SKlK/fdwCNTvhBS54Rsq&8pbLu=d8z4X8O0M
23.227.38.74
malicious
www.switchtoambitwithmirtha.com/jskg/
malicious
https://word.office.comon
unknown
http://www.bootyfashions.comReferer:
unknown
http://www.lactationdrink.com
unknown
http://www.lbarco.com/jskg/www.bootyfashions.com
unknown
http://www.ppc-listing.infoReferer:
unknown
http://www.dog2meeting.com
unknown
http://www.coryfireshop.com
unknown
http://www.lacroixundkress.com/jskg/www.saraadamchak.com
unknown
http://www.successwithyolandafgreen.com/jskg/www.lbarco.com
unknown
https://powerpoint.office.comcember
unknown
http://www.successwithyolandafgreen.comReferer:
unknown
http://www.lacroixundkress.comReferer:
unknown
http://www.lactationdrink.comReferer:
unknown
http://www.successwithyolandafgreen.com/jskg/
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
http://www.ppc-listing.info/jskg/www.pnorg.net
unknown
http://www.pnorg.net/jskg/
unknown
http://www.saraadamchak.com
unknown
http://www.successwithyolandafgreen.com
unknown
http://www.switchtoambitwithmirtha.com/jskg/
unknown
http://www.saraadamchak.com/jskg/
unknown
http://www.saraadamchak.com/jskg/www.kvrkl.com
unknown
http://www.erotictoybox.comReferer:
unknown
http://www.kvrkl.com/jskg/www.switchtoambitwithmirtha.com
unknown
http://www.saraadamchak.comReferer:
unknown
http://www.pnorg.netReferer:
unknown
http://www.coryfireshop.com/jskg/
unknown
http://www.ppc-listing.info/jskg/
unknown
http://www.revistabrasileiramarketing.info/jskg/
unknown
http://www.coryfireshop.com/jskg/www.lacroixundkress.com
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.ppc-listing.info
unknown
http://www.wisdomtoothguru.com/jskg/www.successwithyolandafgreen.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.wisdomtoothguru.comReferer:
unknown
http://www.kvrkl.com/jskg/
unknown
https://wns.windows.com/)s
unknown
http://www.kvrkl.com
unknown
http://www.topazkibblez.com
unknown
http://www.coryfireshop.comReferer:
unknown
http://www.dog2meeting.com/jskg/www.erotictoybox.com
unknown
http://www.revistabrasileiramarketing.info/jskg/www.lactationdrink.com
unknown
http://www.wisdomtoothguru.com/jskg/
unknown
http://www.litespeedtech.com/error-page
unknown
http://www.lbarco.comReferer:
unknown
http://www.lbarco.com
unknown
http://www.revistabrasileiramarketing.infoReferer:
unknown
http://www.topazkibblez.comReferer:
unknown
http://www.bootyfashions.com
unknown
http://www.topazkibblez.com/jskg/www.coryfireshop.com
unknown
http://www.pnorg.net
unknown
http://www.pnorg.net/jskg/www.dog2meeting.com
unknown
http://www.lactationdrink.com/jskg/www.wisdomtoothguru.com
unknown
http://www.switchtoambitwithmirtha.com/jskg/www.ppc-listing.info
unknown
https://outlook.com
unknown
http://www.erotictoybox.com/jskg/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://www.topazkibblez.com/jskg/
unknown
http://www.erotictoybox.com
unknown
http://www.dog2meeting.comReferer:
unknown
http://www.switchtoambitwithmirtha.comReferer:
unknown
https://android.notify.windows.com/iOS
unknown
http://www.kvrkl.comReferer:
unknown
http://www.dog2meeting.com/jskg/
unknown
https://api.msn.com/
unknown
http://www.bootyfashions.com/jskg/
unknown
http://www.lacroixundkress.com/jskg/
unknown
http://www.lactationdrink.com/jskg/
unknown
http://www.switchtoambitwithmirtha.com
unknown
http://crl.v
unknown
http://www.bootyfashions.com/jskg/www.topazkibblez.com
unknown
http://www.lbarco.com/jskg/
unknown
http://www.lacroixundkress.com
unknown
http://www.revistabrasileiramarketing.info
unknown
http://www.wisdomtoothguru.com
unknown
There are 71 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.lacroixundkress.com
217.160.0.167
malicious
lactationdrink.com
167.172.69.40
malicious
td-ccm-neg-87-45.wixdns.net
34.149.87.45
malicious
shops.myshopify.com
23.227.38.74
malicious
www.revistabrasileiramarketing.info
unknown
malicious
www.bootyfashions.com
unknown
malicious
www.dog2meeting.com
unknown
malicious
www.kvrkl.com
unknown
malicious
www.wisdomtoothguru.com
unknown
malicious
www.successwithyolandafgreen.com
unknown
malicious
www.topazkibblez.com
unknown
malicious
www.lactationdrink.com
unknown
malicious
www.lbarco.com
unknown
malicious
www.switchtoambitwithmirtha.com
unknown
malicious
www.coryfireshop.com
unknown
malicious
www.pnorg.net
unknown
malicious
www.saraadamchak.com
unknown
malicious
www.erotictoybox.com
unknown
malicious
There are 8 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
217.160.0.167
www.lacroixundkress.com
Germany
malicious
23.227.38.74
shops.myshopify.com
Canada
malicious
34.149.87.45
td-ccm-neg-87-45.wixdns.net
United States
malicious
167.172.69.40
lactationdrink.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 128 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E71000
trusted library allocation
page read and write
malicious
3E79000
trusted library allocation
page read and write
malicious
30B0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4B90000
trusted library allocation
page read and write
malicious
2E20000
system
page execute and read and write
malicious
C605000
unkown
page read and write
7FF5D7289000
unkown
page readonly
9A98000
unkown
page read and write
B980000
unkown
page readonly
BE49000
stack
page read and write
7FF5D772C000
unkown
page readonly
C615000
unkown
page read and write
C5F4000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
7FF5D769E000
unkown
page readonly
9AAC000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
7FF5D72D7000
unkown
page readonly
C621000
unkown
page read and write
35C9000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
BE90000
unkown
page read and write
9AC3000
unkown
page read and write
7C80000
unkown
page read and write
9EAD000
stack
page read and write
761E000
unkown
page read and write
1270000
trusted library allocation
page execute and read and write
9B0B000
unkown
page read and write
8A00000
unkown
page read and write
7FF5D7262000
unkown
page readonly
BD8000
stack
page read and write
1520000
unclassified section
page execute and read and write
53B0000
trusted library allocation
page read and write
7FF5D76E8000
unkown
page readonly
7E60000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
AA40000
unkown
page read and write
76F1000
unkown
page read and write
2EA1000
unkown
page read and write
4A16000
unkown
page read and write
35D5000
unkown
page read and write
3531000
unkown
page read and write
7FF5D7075000
unkown
page readonly
7FF5D6A4B000
unkown
page readonly
7FF5D7429000
unkown
page readonly
7440000
unkown
page read and write
1250000
unkown
page read and write
7FF5D7558000
unkown
page readonly
7FF5D7450000
unkown
page readonly
C62D000
unkown
page read and write
B330000
unkown
page read and write
A02E000
stack
page read and write
2F50000
trusted library allocation
page read and write
7FF5D7262000
unkown
page readonly
7FF5D7591000
unkown
page readonly
AA01000
unkown
page read and write
C609000
unkown
page read and write
7D3E000
stack
page read and write
7FF5D74B8000
unkown
page readonly
7FF5D7391000
unkown
page readonly
9AB2000
unkown
page read and write
7FF5D7641000
unkown
page readonly
A39F000
unkown
page read and write
AA96000
unkown
page read and write
C450000
unkown
page read and write
FF0000
unkown
page readonly
7810000
unkown
page read and write
AA9E000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
7FF5D72D0000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
C8F8000
unkown
page read and write
7FF5D7792000
unkown
page readonly
C605000
unkown
page read and write
8870000
unkown
page readonly
8964000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
BFB8000
stack
page read and write
C472000
unkown
page read and write
1149000
unclassified section
page execute and read and write
7FF5D75AF000
unkown
page readonly
9A98000
unkown
page read and write
F4F3000
unkown
page read and write
2FB4000
heap
page read and write
1230000
unkown
page read and write
9B41000
unkown
page read and write
C44F000
stack
page read and write
35B3000
unkown
page read and write
A9E9000
unkown
page read and write
B0E0000
unkown
page readonly
BB0D000
stack
page read and write
9A8C000
unkown
page read and write
C806000
unkown
page read and write
7686000
unkown
page read and write
535E000
trusted library allocation
page read and write
AA92000
unkown
page read and write
2F7E000
stack
page read and write
A28D000
unkown
page read and write
9AAC000
unkown
page read and write
53A0000
trusted library allocation
page read and write
1173000
trusted library allocation
page execute and read and write
2EC0000
unkown
page readonly
C65E000
unkown
page read and write
7FF5D738E000
unkown
page readonly
46B31000
trusted library allocation
page read and write
C62D000
unkown
page read and write
927B000
stack
page read and write
188E000
direct allocation
page execute and read and write
C5FA000
unkown
page read and write
7FF5D745B000
unkown
page readonly
760B000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
C46F000
unkown
page read and write
35D1000
unkown
page read and write
7DF4F2460000
unkown
page readonly
334A000
unkown
page read and write
E50000
heap
page read and write
7FF5D72C8000
unkown
page readonly
843F000
stack
page read and write
7609000
unkown
page read and write
C61B000
unkown
page read and write
9B84000
unkown
page read and write
C81C000
unkown
page read and write
B4BF000
stack
page read and write
2FB0000
heap
page read and write
7FF5D769E000
unkown
page readonly
7FF5D7398000
unkown
page readonly
7FF5D75B3000
unkown
page readonly
86D0000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
8C39000
stack
page read and write
768E000
unkown
page read and write
3390000
heap
page read and write
35F4000
unkown
page read and write
9D67000
unkown
page read and write
F53B000
unkown
page read and write
BB9D000
stack
page read and write
E10000
unkown
page readonly
2ED0000
unclassified section
page readonly
F574000
unkown
page read and write
7FF5D7452000
unkown
page readonly
7FF5D75FF000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
7C70000
unkown
page readonly
7FF5D71EA000
unkown
page readonly
7FF5D7740000
unkown
page readonly
9A94000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
7FF5D77B9000
unkown
page readonly
1350000
unkown
page readonly
A286000
unkown
page read and write
B559000
stack
page read and write
7FF5D783B000
unkown
page readonly
4D5D000
stack
page read and write
C625000
unkown
page read and write
C930000
unkown
page read and write
7FF5D7230000
unkown
page readonly
7810000
unkown
page read and write
2C80000
trusted library allocation
page execute and read and write
1B55000
unclassified section
page execute and read and write
7DF4F2460000
unkown
page readonly
4AB0000
unkown
page read and write
70D0000
trusted library allocation
page read and write
35C3000
unkown
page read and write
7FF5D7808000
unkown
page readonly
7FF5D743F000
unkown
page readonly
9BAC000
unkown
page read and write
3554000
unkown
page read and write
7FF5D7206000
unkown
page readonly
7FF5D77A8000
unkown
page readonly
5680000
trusted library allocation
page read and write
50F1000
direct allocation
page execute and read and write
7637000
unkown
page read and write
C81C000
unkown
page read and write
7FF5D7215000
unkown
page readonly
7FF5D72CE000
unkown
page readonly
7FF5D77F7000
unkown
page readonly
B0E0000
unkown
page readonly
3120000
unkown
page read and write
7D3E000
stack
page read and write
7DD0000
heap
page read and write
7FF5D76F5000
unkown
page readonly
7FF5D7075000
unkown
page readonly
B330000
unkown
page read and write
768C000
unkown
page read and write
9AAA000
unkown
page read and write
D9B000
stack
page read and write
1160000
heap
page read and write
76F1000
unkown
page read and write
C7BE000
unkown
page read and write
7FF5D7760000
unkown
page readonly
35E4000
unkown
page read and write
C5F8000
unkown
page read and write
7FF5D705D000
unkown
page readonly
3500000
stack
page read and write
4EFC000
stack
page read and write
7FF5D717C000
unkown
page readonly
7FF5D758D000
unkown
page readonly
7FF5D7394000
unkown
page readonly
11A0000
trusted library allocation
page read and write
12D0000
unkown
page readonly
4EAE000
stack
page read and write
70D0000
trusted library allocation
page read and write
7FF5D71AF000
unkown
page readonly
4737D000
stack
page read and write
5350000
trusted library allocation
page read and write
A233000
unkown
page read and write
F574000
unkown
page read and write
1390000
heap
page read and write
C483000
unkown
page read and write
C663000
unkown
page read and write
C0BA000
stack
page read and write
9BA0000
unkown
page read and write
C621000
unkown
page read and write
2FB4000
heap
page read and write
7FF5D729E000
unkown
page readonly
7DF4F2480000
unkown
page readonly
2F50000
trusted library allocation
page read and write
13CF000
stack
page read and write
9B41000
unkown
page read and write
AA0E000
unkown
page read and write
7FF5D774C000
unkown
page readonly
1340000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
F5B4000
unkown
page read and write
4986000
unkown
page read and write
5479000
unkown
page read and write
A40E000
unkown
page read and write
46E00000
trusted library section
page read and write
7B20000
unkown
page read and write
84BB000
stack
page read and write
9AB4000
unkown
page read and write
BE49000
stack
page read and write
4D99000
heap
page read and write
AA0A000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
7FF5D747F000
unkown
page readonly
2F50000
trusted library allocation
page read and write
331C000
unkown
page read and write
11332000
system
page read and write
3010000
trusted library allocation
page read and write
7FF5D77FD000
unkown
page readonly
B55E000
stack
page read and write
C5EC000
unkown
page read and write
C7C6000
unkown
page read and write
7AB0000
unkown
page read and write
537D000
trusted library allocation
page read and write
5413000
heap
page read and write
49D6000
unkown
page read and write
7FF5D7407000
unkown
page readonly
7FF5D765F000
unkown
page readonly
C483000
unkown
page read and write
C61B000
unkown
page read and write
3532000
unkown
page read and write
BB10000
heap
page read and write
2E50000
trusted library allocation
page read and write
5162000
direct allocation
page execute and read and write
C5EC000
unkown
page read and write
86E0000
unkown
page readonly
A391000
unkown
page read and write
111E000
stack
page read and write
3010000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
7618000
unkown
page read and write
5382000
trusted library allocation
page read and write
1005000
heap
page read and write
7FF5D77E3000
unkown
page readonly
B00000
unclassified section
page readonly
7FF5D719C000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
76F8000
unkown
page read and write
5500000
trusted library allocation
page read and write
7FF5D7682000
unkown
page readonly
7FF5D783B000
unkown
page readonly
7435000
stack
page read and write
11D0000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
49A8000
unkown
page read and write
C5FA000
unkown
page read and write
1000000
heap
page read and write
2F50000
trusted library allocation
page read and write
99B0000
unkown
page read and write
4AB0000
unkown
page read and write
C62D000
unkown
page read and write
C62D000
unkown
page read and write
C908000
unkown
page read and write
3489000
stack
page read and write
7FF5D77EB000
unkown
page readonly
99C0000
unkown
page read and write
760B000
unkown
page read and write
2E70000
heap
page read and write
C866000
unkown
page read and write
C8AC000
unkown
page read and write
B0BD000
stack
page read and write
2FB4000
heap
page read and write
10FA0000
heap
page read and write
5400000
heap
page read and write
35BD000
unkown
page read and write
7FF5D729E000
unkown
page readonly
881E000
stack
page read and write
1221000
unkown
page read and write
7611000
unkown
page read and write
54F2000
unclassified section
page read and write
7FF5D7284000
unkown
page readonly
894C000
unkown
page read and write
7FF5D7764000
unkown
page readonly
A408000
unkown
page read and write
7FF5D7073000
unkown
page readonly
2FB4000
heap
page read and write
3100000
heap
page read and write
77A1000
unkown
page read and write
9A84000
unkown
page read and write
8A46000
unkown
page read and write
9B2C000
unkown
page read and write
7FF5D7385000
unkown
page readonly
7FF5D768B000
unkown
page readonly
4A44000
unkown
page read and write
C547000
unkown
page read and write
7FF5D723F000
unkown
page readonly
7FF5D76DA000
unkown
page readonly
77A1000
unkown
page read and write
7FF5D7507000
unkown
page readonly
19A1000
direct allocation
page execute and read and write
7FF5D71EA000
unkown
page readonly
7DBD000
stack
page read and write
7FF5D71A6000
unkown
page readonly
893D000
unkown
page read and write
C916000
unkown
page read and write
C9F6000
unkown
page read and write
7FF5D766E000
unkown
page readonly
33B0000
unkown
page readonly
853B000
stack
page read and write
7460000
unkown
page read and write
A286000
unkown
page read and write
7CB0000
unkown
page readonly
7FF5D7643000
unkown
page readonly
1170000
trusted library allocation
page read and write
C9BF000
unkown
page read and write
7FF5D7643000
unkown
page readonly
35B0000
unkown
page read and write
C1CC000
stack
page read and write
7FF5D768B000
unkown
page readonly
1297000
heap
page read and write
7FF5D76F5000
unkown
page readonly
8E4E000
stack
page read and write
3040000
unkown
page read and write
3400000
unkown
page read and write
7AC0000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
3010000
trusted library allocation
page read and write
7FF5D760B000
unkown
page readonly
C90F000
unkown
page read and write
4AFA000
unkown
page read and write
8934000
unkown
page read and write
C9A7000
unkown
page read and write
7FF5D7837000
unkown
page readonly
3170000
unkown
page read and write
7FF5D7077000
unkown
page readonly
C4DC000
unkown
page read and write
A9DF000
unkown
page read and write
103F8000
system
page execute and read and write
334A000
unkown
page read and write
C90C000
unkown
page read and write
C5F8000
unkown
page read and write
53E1000
unkown
page read and write
35D3000
unkown
page read and write
7989000
stack
page read and write
7FF5D7458000
unkown
page readonly
BDC0000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
49D6000
unkown
page read and write
35DC000
unkown
page read and write
A2B5000
unkown
page read and write
7B00000
unkown
page readonly
7FF5D7752000
unkown
page readonly
8964000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
BDC0000
unkown
page read and write
A12F000
stack
page read and write
7FF5D7799000
unkown
page readonly
9B7F000
unkown
page read and write
C4BD000
unkown
page read and write
7FF5D7360000
unkown
page readonly
7FF5D75EE000
unkown
page readonly
1130000
unclassified section
page execute and read and write
4D9D000
heap
page read and write
A391000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
C5FD000
unkown
page read and write
9E2D000
stack
page read and write
33C0000
unkown
page read and write
2F50000
trusted library allocation
page read and write
7FF5D77DA000
unkown
page readonly
13A0000
unkown
page readonly
BEA0000
unkown
page readonly
3010000
trusted library allocation
page read and write
7FF5D766E000
unkown
page readonly
362A000
unkown
page read and write
3010000
trusted library allocation
page read and write
5927000
heap
page read and write
C48B000
unkown
page read and write
C653000
unkown
page read and write
C5F8000
unkown
page read and write
7B10000
unkown
page read and write
8931000
unkown
page read and write
3120000
unkown
page read and write
C5FD000
unkown
page read and write
7AB0000
unkown
page read and write
B4BF000
stack
page read and write
94F4000
unkown
page read and write
1383000
heap
page read and write
7DF4F2461000
unkown
page execute read
7FF5D7404000
unkown
page readonly
7FF5D6A4B000
unkown
page readonly
A23A000
unkown
page read and write
85BE000
stack
page read and write
C663000
unkown
page read and write
4A16000
unkown
page read and write
7FF5D75F2000
unkown
page readonly
779E000
unkown
page read and write
77A1000
unkown
page read and write
84BB000
stack
page read and write
AA04000
unkown
page read and write
1000000
heap
page read and write
7FF5D77A4000
unkown
page readonly
A9FD000
unkown
page read and write
9A76000
unkown
page read and write
7AE0000
unkown
page read and write
10FAA000
heap
page read and write
98FD000
stack
page read and write
7FF5D7639000
unkown
page readonly
A313000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
997C000
stack
page read and write
4C70000
heap
page read and write
7FF5D75F9000
unkown
page readonly
4CE0000
trusted library allocation
page read and write
E4CE000
stack
page read and write
11A2000
trusted library allocation
page read and write
A2D7000
unkown
page read and write
4ADA000
unkown
page read and write
9FAF000
stack
page read and write
9A84000
unkown
page read and write
1395000
heap
page read and write
311D000
heap
page read and write
B8DB000
stack
page read and write
103D000
heap
page read and write
109C5000
unkown
page execute and read and write
7FF5D7442000
unkown
page readonly
A2B5000
unkown
page read and write
8A00000
unkown
page read and write
10423000
system
page execute and read and write
7FF5D7376000
unkown
page readonly
7FF5D752F000
unkown
page readonly
7FF5D75B3000
unkown
page readonly
35E4000
unkown
page read and write
2FB4000
heap
page read and write
7FF5D7244000
unkown
page readonly
7FF5D72FB000
unkown
page readonly
F5B4000
unkown
page read and write
7FF5D7404000
unkown
page readonly
35CD000
unkown
page read and write
7FF5D772C000
unkown
page readonly
990000
unkown
page readonly
A416000
unkown
page read and write
A408000
unkown
page read and write
312C000
heap
page read and write
7605000
unkown
page read and write
7DC0000
unkown
page readonly
7FF5D747F000
unkown
page readonly
35B3000
unkown
page read and write
1100000
heap
page read and write
9ABD000
unkown
page read and write
BE90000
unkown
page read and write
2E5F000
trusted library allocation
page read and write
7FF5D71F9000
unkown
page readonly
9A9E000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
894C000
unkown
page read and write
517A000
unclassified section
page read and write
C9E4000
unkown
page read and write
3140000
unkown
page read and write
1A38000
direct allocation
page execute and read and write
7FF5D752F000
unkown
page readonly
7FF5D7077000
unkown
page readonly
8D39000
stack
page read and write
4F49000
direct allocation
page execute and read and write
7FF5D779E000
unkown
page readonly
7AA0000
unkown
page read and write
46C60000
heap
page read and write
3140000
unkown
page read and write
7FF5D7309000
unkown
page readonly
7FF5D77D2000
unkown
page readonly
7FF5D776D000
unkown
page readonly
A220000
unkown
page read and write
7FF5D728E000
unkown
page readonly
7FF5D71CC000
unkown
page readonly
2F50000
trusted library allocation
page read and write
47380000
heap
page read and write
7B80000
unkown
page readonly
A3AC000
unkown
page read and write
3010000
trusted library allocation
page read and write
C5F4000
unkown
page read and write
7FF5D72D7000
unkown
page readonly
E00000
unkown
page readonly
7609000
unkown
page read and write
9AF9000
unkown
page read and write
7FF5D732D000
unkown
page readonly
8CB8000
stack
page read and write
3400000
unkown
page read and write
C653000
unkown
page read and write
1270000
unkown
page read and write
5377000
unclassified section
page read and write
96FE000
stack
page read and write
C615000
unkown
page read and write
2E60000
heap
page read and write
7FF5D77CD000
unkown
page readonly
E10000
unclassified section
page readonly
B8DB000
stack
page read and write
362D000
unkown
page read and write
8A46000
unkown
page read and write
C4DC000
unkown
page read and write
9B0B000
unkown
page read and write
C800000
unkown
page read and write
4AC0000
unkown
page read and write
369F000
unkown
page read and write
8932000
unkown
page read and write
7618000
unkown
page read and write
7FF5D7442000
unkown
page readonly
7FF5D777A000
unkown
page readonly
7FF5D7691000
unkown
page readonly
3128000
heap
page read and write
8C39000
stack
page read and write
779E000
unkown
page read and write
C625000
unkown
page read and write
1281000
unkown
page readonly
F7E000
stack
page read and write
50ED000
direct allocation
page execute and read and write
10FA2000
heap
page read and write
997C000
stack
page read and write
A0A8000
stack
page read and write
103B0000
system
page execute and read and write
76F8000
unkown
page read and write
992000
unkown
page readonly
4D9E000
stack
page read and write
3626000
unkown
page read and write
E03000
system
page execute and read and write
2DFE000
stack
page read and write
7FF5D765F000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
7FF5D75F9000
unkown
page readonly
7654000
unkown
page read and write
35CF000
unkown
page read and write
2F50000
trusted library allocation
page read and write
7FF5D74F2000
unkown
page readonly
7FF5D748C000
unkown
page readonly
49BB000
unkown
page read and write
9BB1000
unkown
page read and write
2FB4000
heap
page read and write
3010000
trusted library allocation
page read and write
7FF5D7700000
unkown
page readonly
9A90000
unkown
page read and write
7FF5D7398000
unkown
page readonly
3126000
heap
page read and write
FD0000
heap
page read and write
AAA6000
unkown
page read and write
C47F000
unkown
page read and write
2F50000
trusted library allocation
page read and write
C9F6000
unkown
page read and write
5376000
trusted library allocation
page read and write
A02E000
stack
page read and write
1250000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
F13000
heap
page read and write
7FF5D7534000
unkown
page readonly
7FF5D7797000
unkown
page readonly
9A76000
unkown
page read and write
C642000
unkown
page read and write
1390000
heap
page read and write
3126000
heap
page read and write
7FF5D77E9000
unkown
page readonly
7FF5D75E9000
unkown
page readonly
75FD000
unkown
page read and write
4B00000
unkown
page read and write
3201000
heap
page read and write
C61B000
unkown
page read and write
C617000
unkown
page read and write
9EB0000
unkown
page readonly
7FF5D738E000
unkown
page readonly
7989000
stack
page read and write
1160000
unkown
page read and write
1221000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
7FF5D7336000
unkown
page readonly
2FB0000
heap
page read and write
7DF4F2480000
unkown
page readonly
7FF5D77C2000
unkown
page readonly
49FD000
unkown
page read and write
A233000
unkown
page read and write
7DF4F2470000
unkown
page readonly
3520000
unkown
page readonly
E00000
system
page execute and read and write
9D67000
unkown
page read and write
9E2E000
stack
page read and write
3060000
trusted library allocation
page read and write
C450000
unkown
page read and write
46EBE000
stack
page read and write
7FF5D706F000
unkown
page readonly
2F50000
trusted library allocation
page read and write
7FF5D720A000
unkown
page readonly
3010000
trusted library allocation
page read and write
1120000
heap
page read and write
103B0000
unkown
page read and write
86E0000
unkown
page readonly
8ECC000
stack
page read and write
9A72000
unkown
page read and write
1013000
heap
page read and write
35CF000
unkown
page read and write
4C50000
trusted library allocation
page execute and read and write
8900000
unkown
page read and write
C5F4000
unkown
page read and write
769A000
unkown
page read and write
3520000
unkown
page readonly
7FF5D7267000
unkown
page readonly
A2A2000
unkown
page read and write
2F50000
trusted library allocation
page read and write
3280000
unkown
page read and write
1196000
trusted library allocation
page execute and read and write
7FF5D7546000
unkown
page readonly
16F0000
direct allocation
page execute and read and write
A39C000
unkown
page read and write
2FF9000
stack
page read and write
7FF5D75F6000
unkown
page readonly
AF0000
unclassified section
page readonly
BBC000
stack
page read and write
760F000
unkown
page read and write
C621000
unkown
page read and write
35CD000
unkown
page read and write
1270000
unkown
page read and write
AA96000
unkown
page read and write
8890000
unkown
page readonly
2CFE000
stack
page read and write
7DC0000
unkown
page readonly
1160000
trusted library allocation
page read and write
9A96000
unkown
page read and write
35D5000
unkown
page read and write
7FF5D7700000
unkown
page readonly
EF0000
heap
page read and write
7FF5D7764000
unkown
page readonly
7FF5D71E6000
unkown
page readonly
C9CF000
unkown
page read and write
7FF5D7694000
unkown
page readonly
E10000
unkown
page readonly
3310000
heap
page read and write
7FF5D781A000
unkown
page readonly
C625000
unkown
page read and write
5390000
trusted library allocation
page read and write
7AE0000
unkown
page read and write
4AEA000
unkown
page read and write
7FF5D7485000
unkown
page readonly
7C70000
unkown
page readonly
7FF5D764F000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
7DD0000
heap
page read and write
97FC000
stack
page read and write
7FF5D7073000
unkown
page readonly
19BD000
direct allocation
page execute and read and write
35B3000
unkown
page read and write
9B7F000
unkown
page read and write
4AFA000
unkown
page read and write
353D000
unkown
page read and write
7FF5D7784000
unkown
page readonly
5479000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
7FF5D762F000
unkown
page readonly
5410000
heap
page read and write
35B0000
unkown
page read and write
118D000
trusted library allocation
page execute and read and write
3160000
unkown
page read and write
7FF5D7289000
unkown
page readonly
BF3E000
stack
page read and write
A273000
unkown
page read and write
3110000
unkown
page readonly
7FF5D777A000
unkown
page readonly
C73E000
unkown
page read and write
35C9000
unkown
page read and write
C5EC000
unkown
page read and write
7FF5D7485000
unkown
page readonly
108B0000
unkown
page execute and read and write
1523000
unclassified section
page execute and read and write
35F4000
unkown
page read and write
7FF5D732D000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
35C1000
unkown
page read and write
7FF5CE343000
unkown
page readonly
AA0A000
unkown
page read and write
2F50000
trusted library allocation
page read and write
AAAA000
unkown
page read and write
148F000
stack
page read and write
4AA0000
unkown
page read and write
9A6A000
unkown
page read and write
7FF5D7703000
unkown
page readonly
75F8000
unkown
page read and write
7FF5D775C000
unkown
page readonly
12B0000
unkown
page read and write
2CA0000
trusted library allocation
page read and write
EB5000
stack
page read and write
35C3000
unkown
page read and write
114D000
unclassified section
page execute and read and write
75F8000
unkown
page read and write
C44F000
stack
page read and write
11AB000
trusted library allocation
page execute and read and write
3235000
heap
page read and write
7FF5D75EE000
unkown
page readonly
AA05000
unkown
page read and write
C5FD000
unkown
page read and write
7FF5D7589000
unkown
page readonly
7B00000
unkown
page readonly
9AB4000
unkown
page read and write
34AB000
heap
page read and write
1290000
heap
page read and write
A33F000
unkown
page read and write
7FF5D7272000
unkown
page readonly
7611000
unkown
page read and write
C8AC000
unkown
page read and write
35B5000
unkown
page read and write
7FF5D7795000
unkown
page readonly
C547000
unkown
page read and write
8944000
unkown
page read and write
7435000
stack
page read and write
35B0000
unkown
page read and write
A273000
unkown
page read and write
A220000
unkown
page read and write
70D0000
trusted library allocation
page read and write
49BB000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
111B7000
system
page read and write
7FF5D71A6000
unkown
page readonly
C24E000
stack
page read and write
7FF5D7385000
unkown
page readonly
A9A0000
unkown
page read and write
119A000
trusted library allocation
page execute and read and write
C669000
unkown
page read and write
46E50000
trusted library section
page read and write
7FF5D7394000
unkown
page readonly
C48B000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
A3B9000
unkown
page read and write
C7BE000
unkown
page read and write
9679000
stack
page read and write
7FF5D66E8000
unkown
page readonly
C61D000
unkown
page read and write
3121000
heap
page read and write
7C31000
unkown
page read and write
7FF5D7808000
unkown
page readonly
7FF5D748A000
unkown
page readonly
2FB4000
heap
page read and write
3626000
unkown
page read and write
4980000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
9AA8000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
7FF5D7797000
unkown
page readonly
9AAA000
unkown
page read and write
9ABD000
unkown
page read and write
3100000
unkown
page read and write
3500000
stack
page read and write
4E20000
direct allocation
page execute and read and write
927B000
stack
page read and write
7FF5D72FB000
unkown
page readonly
7FF5D7837000
unkown
page readonly
7FF5D7722000
unkown
page readonly
7FF5D779E000
unkown
page readonly
A39C000
unkown
page read and write
4A71000
unkown
page read and write
7654000
unkown
page read and write
3010000
trusted library allocation
page read and write
7FF5D71E6000
unkown
page readonly
7FF5D7669000
unkown
page readonly
3E71000
trusted library allocation
page read and write
C8EB000
unkown
page read and write
761E000
unkown
page read and write
7DF4F2471000
unkown
page execute read
35D3000
unkown
page read and write
779E000
unkown
page read and write
4CE0000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
4AC0000
unkown
page read and write
9D67000
unkown
page read and write
10FA0000
heap
page read and write
7FF5D710B000
unkown
page readonly
33F0000
unkown
page read and write
9BB2000
unkown
page read and write
3314000
unkown
page read and write
117D000
trusted library allocation
page execute and read and write
7FF5D705D000
unkown
page readonly
C89D000
unkown
page read and write
7FF5D7236000
unkown
page readonly
9A96000
unkown
page read and write
760D000
unkown
page read and write
7FF5D7230000
unkown
page readonly
C800000
unkown
page read and write
7FF5D7694000
unkown
page readonly
7DF4F2461000
unkown
page execute read
9B2C000
unkown
page read and write
7FF5D770A000
unkown
page readonly
9AA8000
unkown
page read and write
7DF4F2491000
unkown
page execute read
E45000
heap
page read and write
ADA000
stack
page read and write
12CE000
stack
page read and write
2F50000
trusted library allocation
page read and write
3108000
heap
page read and write
C5FD000
unkown
page read and write
B85A000
stack
page read and write
70D0000
trusted library allocation
page read and write
C7CB000
unkown
page read and write
A416000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
7FF5D77DA000
unkown
page readonly
7FF5D66E8000
unkown
page readonly
362A000
unkown
page read and write
C5F4000
unkown
page read and write
1091000
heap
page read and write
4AA0000
unkown
page read and write
11A7000
trusted library allocation
page execute and read and write
7DF4F2470000
unkown
page readonly
C9D3000
unkown
page read and write
A1AF000
stack
page read and write
7C90000
unkown
page read and write
CA11000
unkown
page read and write
7FF5D7236000
unkown
page readonly
7FF5D75B8000
unkown
page readonly
7C80000
unkown
page read and write
9D67000
unkown
page read and write
8944000
unkown
page read and write
C617000
unkown
page read and write
95FB000
stack
page read and write
7CB0000
unkown
page readonly
7FF5D77B6000
unkown
page readonly
7693000
unkown
page read and write
7FF5D7438000
unkown
page readonly
7FF5D72BF000
unkown
page readonly
3554000
unkown
page read and write
362A000
unkown
page read and write
7FF5D749B000
unkown
page readonly
9BAC000
unkown
page read and write
7FF5D706E000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
3280000
unkown
page read and write
7FF5D7604000
unkown
page readonly
FF0000
unkown
page readonly
8391000
unkown
page read and write
1380000
heap
page read and write
4ACA000
heap
page read and write
9A8C000
unkown
page read and write
19B6000
direct allocation
page execute and read and write
49A8000
unkown
page read and write
7DF4F2481000
unkown
page execute read
94F4000
unkown
page read and write
26A00000
trusted library section
page read and write
7FF5D72DF000
unkown
page readonly
BEA0000
unkown
page readonly
B85A000
stack
page read and write
AAAA000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
B0BD000
stack
page read and write
7FF5D76AF000
unkown
page readonly
7FF5D760C000
unkown
page readonly
3126000
heap
page read and write
E54C000
stack
page read and write
9A8E000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
33F0000
unkown
page read and write
7FF5D7280000
unkown
page readonly
3540000
unkown
page read and write
7FF5D720A000
unkown
page readonly
7FF5D76D5000
unkown
page readonly
8931000
unkown
page read and write
97FF000
stack
page read and write
7B60000
unkown
page readonly
91F0000
unkown
page readonly
C7C6000
unkown
page read and write
3201000
heap
page read and write
768C000
unkown
page read and write
9A8E000
unkown
page read and write
3040000
unkown
page read and write
96FE000
stack
page read and write
C863000
unkown
page read and write
7FF5D7795000
unkown
page readonly
8890000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
9B85000
unkown
page read and write
7C31000
unkown
page read and write
3010000
trusted library allocation
page read and write
C806000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
4A0E000
unkown
page read and write
A3C3000
unkown
page read and write
7FF5D7462000
unkown
page readonly
1281000
unkown
page readonly
3126000
heap
page read and write
9A72000
unkown
page read and write
7FF5D7284000
unkown
page readonly
3740000
heap
page read and write
7FF5D74C3000
unkown
page readonly
2E40000
trusted library allocation
page read and write
311B000
heap
page read and write
35C9000
unkown
page read and write
8A70000
unkown
page read and write
7B60000
unkown
page readonly
C912000
unkown
page read and write
7FF5D7745000
unkown
page readonly
7FF5D7722000
unkown
page readonly
35D1000
unkown
page read and write
1A40000
unclassified section
page execute and read and write
7FF5D7202000
unkown
page readonly
7FF5D743F000
unkown
page readonly
EF0000
heap
page read and write
8F49000
stack
page read and write
5354000
trusted library allocation
page read and write
8880000
unkown
page readonly
C605000
unkown
page read and write
9A9E000
unkown
page read and write
4A44000
unkown
page read and write
A264000
unkown
page read and write
7FF5D77E9000
unkown
page readonly
AE1D000
stack
page read and write
7FF5D723C000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
AFBE000
stack
page read and write
7AC0000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
3010000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
7FF5D76D7000
unkown
page readonly
4980000
unkown
page read and write
7FF5D720F000
unkown
page readonly
7FF5D7309000
unkown
page readonly
7FF5D74A6000
unkown
page readonly
760D000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
12D0000
unkown
page readonly
9A6A000
unkown
page read and write
9B87000
unkown
page read and write
C73E000
unkown
page read and write
C472000
unkown
page read and write
35D5000
unkown
page read and write
2C90000
trusted library allocation
page read and write
53F0000
heap
page execute and read and write
3549000
unkown
page read and write
C61D000
unkown
page read and write
9A80000
unkown
page read and write
C617000
unkown
page read and write
2F50000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
7FF5D7482000
unkown
page readonly
91F0000
unkown
page readonly
5660000
trusted library allocation
page read and write
260AC000
trusted library allocation
page read and write
A384000
unkown
page read and write
10FAA000
heap
page read and write
7FF5D74A6000
unkown
page readonly
474BE000
stack
page read and write
2F50000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
46B50000
heap
page read and write
C908000
unkown
page read and write
77DB000
unkown
page read and write
2EC0000
unclassified section
page readonly
C9E8000
unkown
page read and write
7FF5D719C000
unkown
page readonly
C609000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
7FF5D774C000
unkown
page readonly
6021000
trusted library allocation
page read and write
49FD000
unkown
page read and write
7FF5D717C000
unkown
page readonly
760F000
unkown
page read and write
7FF5D745B000
unkown
page readonly
BB10000
heap
page read and write
7FF5D7462000
unkown
page readonly
C61B000
unkown
page read and write
1395000
heap
page read and write
1087000
heap
page read and write
99C0000
unkown
page read and write
7FF5D7425000
unkown
page readonly
7FF5D77A4000
unkown
page readonly
7FF5D76AF000
unkown
page readonly
7FF5D776F000
unkown
page readonly
4AEA000
unkown
page read and write
7FF5D720F000
unkown
page readonly
C85F000
unkown
page read and write
49C2000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
1160000
unkown
page read and write
C5F0000
unkown
page read and write
7DF4F24A1000
unkown
page execute read
F53B000
unkown
page read and write
7FF5D744E000
unkown
page readonly
7AF1000
unkown
page read and write
8935000
unkown
page read and write
FDE000
heap
page read and write
7FF5D71AF000
unkown
page readonly
9679000
stack
page read and write
4727D000
stack
page read and write
893E000
unkown
page read and write
1380000
heap
page read and write
C78A000
unkown
page read and write
7FF5D7267000
unkown
page readonly
7DF4F2481000
unkown
page execute read
9A90000
unkown
page read and write
35BD000
unkown
page read and write
3630000
unkown
page readonly
A3AC000
unkown
page read and write
500C000
stack
page read and write
7FF5D75D9000
unkown
page readonly
C9BC000
unkown
page read and write
A28D000
unkown
page read and write
8900000
unkown
page read and write
C625000
unkown
page read and write
5330000
unkown
page write copy
7FF5D7745000
unkown
page readonly
35C1000
unkown
page read and write
A9A0000
unkown
page read and write
7FF5D77C2000
unkown
page readonly
3543000
unkown
page read and write
BFB8000
stack
page read and write
A3B6000
unkown
page read and write
3160000
unkown
page read and write
AA40000
unkown
page read and write
362D000
unkown
page read and write
A50000
unclassified section
page readonly
C908000
unkown
page read and write
5463000
unkown
page read and write
A9FD000
unkown
page read and write
C4C6000
unkown
page read and write
C5F0000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
4A0E000
unkown
page read and write
7FF5D776D000
unkown
page readonly
2FB4000
heap
page read and write
C8A9000
unkown
page read and write
77DB000
unkown
page read and write
8961000
unkown
page read and write
7AA0000
unkown
page read and write
7FF5D7272000
unkown
page readonly
9579000
stack
page read and write
10421000
system
page execute and read and write
7FF5D776F000
unkown
page readonly
3121000
heap
page read and write
311B000
heap
page read and write
3530000
unkown
page read and write
779E000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
AA9E000
unkown
page read and write
7FF5D770F000
unkown
page readonly
75FD000
unkown
page read and write
F536000
unkown
page read and write
7FF5D7376000
unkown
page readonly
13A0000
unkown
page readonly
2FFE000
unkown
page read and write
86D0000
unkown
page readonly
B4D0000
unkown
page readonly
35CD000
unkown
page read and write
14CE000
stack
page read and write
F13000
heap
page read and write
A39F000
unkown
page read and write
9BA0000
unkown
page read and write
7B80000
unkown
page readonly
7FF5D71DA000
unkown
page readonly
A9DF000
unkown
page read and write
C3CC000
stack
page read and write
7E58000
stack
page read and write
7FF5D749B000
unkown
page readonly
3530000
unkown
page read and write
7FF5D7534000
unkown
page readonly
7FF5D744E000
unkown
page readonly
8CB8000
stack
page read and write
1819000
direct allocation
page execute and read and write
C915000
unkown
page read and write
B950000
unkown
page readonly
8880000
unkown
page readonly
C642000
unkown
page read and write
893D000
unkown
page read and write
7FF5D7455000
unkown
page readonly
AE1D000
stack
page read and write
7FF5D71F9000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
7FF5D77CD000
unkown
page readonly
5690000
trusted library allocation
page execute and read and write
7FF5D75AF000
unkown
page readonly
7FF5D778A000
unkown
page readonly
35BD000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
7FF5D7752000
unkown
page readonly
7FF5D7407000
unkown
page readonly
A264000
unkown
page read and write
7FF5D7507000
unkown
page readonly
7FF5D7591000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
A9E9000
unkown
page read and write
A3AA000
unkown
page read and write
49FA000
unkown
page read and write
35DC000
unkown
page read and write
A23A000
unkown
page read and write
7FF5D7455000
unkown
page readonly
C9BF000
unkown
page read and write
BE70000
unkown
page readonly
C65E000
unkown
page read and write
7DBD000
stack
page read and write
B980000
unkown
page readonly
30FB000
stack
page read and write
9AA0000
unkown
page read and write
8961000
unkown
page read and write
7FF5D7244000
unkown
page readonly
7FF5D75BF000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
99B0000
unkown
page read and write
35C3000
unkown
page read and write
7FF5D69BB000
unkown
page readonly
5670000
trusted library allocation
page execute and read and write
8360000
unkown
page read and write
C5FA000
unkown
page read and write
9AF9000
unkown
page read and write
1383000
heap
page read and write
4AC9000
heap
page read and write
C615000
unkown
page read and write
F4F3000
unkown
page read and write
75E0000
unkown
page read and write
C605000
unkown
page read and write
7AF1000
unkown
page read and write
BF0000
unclassified section
page readonly
35C1000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
8DCB000
stack
page read and write
8A70000
unkown
page read and write
3626000
unkown
page read and write
9B87000
unkown
page read and write
5371000
trusted library allocation
page read and write
7FF5D7458000
unkown
page readonly
70D0000
trusted library allocation
page read and write
7FF5D7705000
unkown
page readonly
3170000
unkown
page read and write
76F8000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
76F8000
unkown
page read and write
B03B000
stack
page read and write
1289000
trusted library allocation
page execute and read and write
12B0000
unkown
page read and write
312C000
heap
page read and write
7FF5D7396000
unkown
page readonly
7FF5D716B000
unkown
page readonly
181D000
direct allocation
page execute and read and write
7605000
unkown
page read and write
C609000
unkown
page read and write
7FF5D7703000
unkown
page readonly
AA92000
unkown
page read and write
7E60000
unkown
page read and write
2F50000
trusted library allocation
page read and write
7FF5D7648000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
A12F000
stack
page read and write
9D42000
unkown
page read and write
1731000
unkown
page readonly
7FF5D76C8000
unkown
page readonly
C78A000
unkown
page read and write
4A12000
unkown
page read and write
7FF5D7257000
unkown
page readonly
7FF5D75DF000
unkown
page readonly
70D0000
trusted library allocation
page read and write
9A80000
unkown
page read and write
470FE000
stack
page read and write
7FF5D75BF000
unkown
page readonly
7FF5D7215000
unkown
page readonly
A384000
unkown
page read and write
5463000
unkown
page read and write
54D0000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
3542000
unkown
page read and write
7FF5D723C000
unkown
page readonly
C878000
unkown
page read and write
2F90000
heap
page read and write
7FF5D751F000
unkown
page readonly
7FF5D75F2000
unkown
page readonly
35FA000
unkown
page read and write
7FF5D6BDB000
unkown
page readonly
7FF5D7523000
unkown
page readonly
7FF5D716B000
unkown
page readonly
E00000
unkown
page readonly
7FF5D775C000
unkown
page readonly
2CB0000
heap
page execute and read and write
7637000
unkown
page read and write
77A1000
unkown
page read and write
3534000
unkown
page read and write
4A90000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
114E000
stack
page read and write
B4D0000
unkown
page readonly
99B4000
unkown
page read and write
49C2000
unkown
page read and write
4A40000
unkown
page read and write
14CE000
stack
page read and write
475BE000
stack
page read and write
1340000
unkown
page read and write
3630000
unkown
page readonly
E4CD000
stack
page read and write
C460000
unkown
page read and write
115E000
stack
page read and write
7FF5D7760000
unkown
page readonly
94AE000
stack
page read and write
10FBA000
system
page read and write
2FB4000
heap
page read and write
5910000
heap
page read and write
7FF5D762F000
unkown
page readonly
15B0000
heap
page read and write
7FF5D74C3000
unkown
page readonly
AFBE000
stack
page read and write
35FA000
unkown
page read and write
C1CC000
stack
page read and write
C9C000
stack
page read and write
4986000
unkown
page read and write
7FF5D7336000
unkown
page readonly
3010000
trusted library allocation
page read and write
C9F2000
unkown
page read and write
C61D000
unkown
page read and write
AA04000
unkown
page read and write
7631000
unkown
page read and write
7FF5D7705000
unkown
page readonly
C61D000
unkown
page read and write
AA0E000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
10FA2000
heap
page read and write
B7C000
stack
page read and write
1000000
heap
page read and write
5330000
unkown
page write copy
7FF5D7257000
unkown
page readonly
49FA000
unkown
page read and write
7FF5D7799000
unkown
page readonly
7FF5D7280000
unkown
page readonly
F0C000
heap
page read and write
4713E000
stack
page read and write
4A40000
unkown
page read and write
4E0E000
heap
page read and write
7FF5D72CE000
unkown
page readonly
C621000
unkown
page read and write
103FB000
system
page execute and read and write
7FF5D7589000
unkown
page readonly
9ADB000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
35DC000
unkown
page read and write
4F00000
trusted library allocation
page read and write
7B10000
unkown
page read and write
3110000
unkown
page readonly
A3AA000
unkown
page read and write
1360000
unkown
page readonly
2C70000
trusted library allocation
page read and write
7FF5D7488000
unkown
page readonly
9A94000
unkown
page read and write
977E000
stack
page read and write
32FD000
stack
page read and write
7DF4F2491000
unkown
page execute read
C5FA000
unkown
page read and write
7440000
unkown
page read and write
2FB4000
heap
page read and write
7FF5D7820000
unkown
page readonly
35D3000
unkown
page read and write
46FFE000
stack
page read and write
7FF5D771A000
unkown
page readonly
C9CC000
unkown
page read and write
7686000
unkown
page read and write
9AA0000
unkown
page read and write
4F4D000
direct allocation
page execute and read and write
334E000
stack
page read and write
7FF5D758D000
unkown
page readonly
7FF5D781A000
unkown
page readonly
9EB0000
unkown
page readonly
7FF5D710B000
unkown
page readonly
85BE000
stack
page read and write
7FF5D7558000
unkown
page readonly
7FF5D7429000
unkown
page readonly
C615000
unkown
page read and write
9AB2000
unkown
page read and write
A313000
unkown
page read and write
7FF5D748A000
unkown
page readonly
35B5000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
C5F8000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
4BC0000
trusted library allocation
page execute and read and write
7FF5D764F000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
7FF5D7648000
unkown
page readonly
46AEE000
stack
page read and write
7FF5D7438000
unkown
page readonly
7FF5D7202000
unkown
page readonly
C24E000
stack
page read and write
C5F0000
unkown
page read and write
7FF5D7593000
unkown
page readonly
7FF5D774A000
unkown
page readonly
536E000
trusted library allocation
page read and write
7FF5D7682000
unkown
page readonly
FBE000
stack
page read and write
7FF5D7820000
unkown
page readonly
BF3E000
stack
page read and write
2FB4000
heap
page read and write
33B0000
unkown
page readonly
AA40000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
7FF5D7292000
unkown
page readonly
7FF5D72BF000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
3100000
unkown
page read and write
35D1000
unkown
page read and write
7FF5D748C000
unkown
page readonly
7FF5D7065000
unkown
page readonly
7FF5D77E0000
unkown
page readonly
7FF5D728E000
unkown
page readonly
8FD9000
stack
page read and write
16BE000
stack
page read and write
7FF5D751F000
unkown
page readonly
2F4D000
stack
page read and write
4A12000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
F0C000
heap
page read and write
C931000
unkown
page read and write
AA01000
unkown
page read and write
7FF5D778A000
unkown
page readonly
1190000
trusted library allocation
page read and write
C4BD000
unkown
page read and write
8391000
unkown
page read and write
589F000
stack
page read and write
A40E000
unkown
page read and write
7FF5D7740000
unkown
page readonly
C4C6000
unkown
page read and write
3010000
trusted library allocation
page read and write
7FF5D7391000
unkown
page readonly
35F4000
unkown
page read and write
7460000
unkown
page read and write
75E0000
unkown
page read and write
C609000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
3018000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
2F7E000
stack
page read and write
2F50000
trusted library allocation
page read and write
46C5E000
stack
page read and write
3126000
heap
page read and write
1174000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
7FF5D7488000
unkown
page readonly
7FF5D770F000
unkown
page readonly
7FF5D770A000
unkown
page readonly
7FF5D7452000
unkown
page readonly
46FBE000
stack
page read and write
A237000
unkown
page read and write
46B20000
trusted library section
page read and write
4BEC000
heap
page read and write
10D0000
heap
page read and write
1350000
unkown
page readonly
77DB000
unkown
page read and write
3201000
heap
page read and write
7E58000
stack
page read and write
98FD000
stack
page read and write
35FA000
unkown
page read and write
A251000
unkown
page read and write
7FF5D771A000
unkown
page readonly
9A92000
unkown
page read and write
C8A9000
unkown
page read and write
54C4000
trusted library allocation
page read and write
9D42000
unkown
page read and write
2FB4000
heap
page read and write
F536000
unkown
page read and write
3200000
heap
page read and write
A33F000
unkown
page read and write
34A0000
heap
page read and write
9ADB000
unkown
page read and write
7FF5D7792000
unkown
page readonly
535B000
trusted library allocation
page read and write
A237000
unkown
page read and write
A3B9000
unkown
page read and write
7FF5D7546000
unkown
page readonly
C496000
unkown
page read and write
C035000
stack
page read and write
3535000
unkown
page read and write
2F50000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
53E1000
unkown
page read and write
7FF5D7425000
unkown
page readonly
1731000
unkown
page readonly
A3C3000
unkown
page read and write
33C0000
unkown
page read and write
7FD80000
trusted library allocation
page execute and read and write
C862000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
7FF5D7065000
unkown
page readonly
E40000
heap
page read and write
384F000
stack
page read and write
7FF5D7482000
unkown
page readonly
A2D7000
unkown
page read and write
7FF5D77DD000
unkown
page readonly
C5F0000
unkown
page read and write
AA0A000
unkown
page read and write
8944000
unkown
page read and write
35CF000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
1170000
heap
page read and write
B220000
unkown
page read and write
7FF5D723F000
unkown
page readonly
362D000
unkown
page read and write
56A0000
heap
page read and write
8360000
unkown
page read and write
3300000
heap
page read and write
C47F000
unkown
page read and write
C9BC000
unkown
page read and write
AAA6000
unkown
page read and write
7FF5D7360000
unkown
page readonly
FD8000
heap
page read and write
8870000
unkown
page readonly
7FF5D7604000
unkown
page readonly
4FBE000
direct allocation
page execute and read and write
1360000
unkown
page readonly
7FF5D7396000
unkown
page readonly
AA0E000
unkown
page read and write
9D42000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
B03B000
stack
page read and write
C46F000
unkown
page read and write
555E000
stack
page read and write
B220000
unkown
page read and write
A1AF000
stack
page read and write
35E4000
unkown
page read and write
2EC0000
unkown
page readonly
7FF5D7593000
unkown
page readonly
9A92000
unkown
page read and write
77DB000
unkown
page read and write
C460000
unkown
page read and write
7B20000
unkown
page read and write
C7CB000
unkown
page read and write
F30000
heap
page read and write
54C1000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
843F000
stack
page read and write
B950000
unkown
page readonly
EB5000
stack
page read and write
7FF5D774A000
unkown
page readonly
4ADA000
unkown
page read and write
7FF5D7691000
unkown
page readonly
3126000
heap
page read and write
4B00000
unkown
page read and write
7DF4F2471000
unkown
page execute read
A251000
unkown
page read and write
C54A000
unkown
page read and write
4A71000
unkown
page read and write
C496000
unkown
page read and write
7FF5D7292000
unkown
page readonly
C669000
unkown
page read and write
7FF5D71D7000
unkown
page readonly
2F80000
unclassified section
page readonly
41BC000
trusted library allocation
page read and write
7FF5D72BD000
unkown
page readonly
C877000
unkown
page read and write
AA10000
unkown
page read and write
C035000
stack
page read and write
C9A7000
unkown
page read and write
4723E000
stack
page read and write
7FF5D7669000
unkown
page readonly
769A000
unkown
page read and write
7631000
unkown
page read and write
7FF5CE343000
unkown
page readonly
4A90000
unkown
page read and write
30B0000
trusted library allocation
page read and write
A2A2000
unkown
page read and write
A3B6000
unkown
page read and write
7FF5D7639000
unkown
page readonly
7FF5D7784000
unkown
page readonly
3122000
heap
page read and write
C0BA000
stack
page read and write
7FF5D72D3000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
4CE0000
trusted library allocation
page read and write
7FF5D6BDB000
unkown
page readonly
9FAF000
stack
page read and write
894C000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
2F50000
trusted library allocation
page read and write
C617000
unkown
page read and write
7C90000
unkown
page read and write
46B39000
trusted library allocation
page read and write
35B5000
unkown
page read and write
C8F6000
unkown
page read and write
9579000
stack
page read and write
7693000
unkown
page read and write
2E3B000
stack
page read and write
B7DE000
stack
page read and write
2F50000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
7FF5D76E8000
unkown
page readonly
7FF5D7641000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
1180000
trusted library allocation
page read and write
There are 1494 hidden memdumps, click here to show them.