IOC Report
2024 Lusail Fence-WITH STICKER-2-003.exe

loading gif

Files

File Path
Type
Category
Malicious
2024 Lusail Fence-WITH STICKER-2-003.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Archimago
ASCII text, with very long lines (28756), with no line terminators
modified
C:\Users\user\AppData\Local\Temp\autBE59.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autBE98.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\miaoued
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2024 Lusail Fence-WITH STICKER-2-003.exe
"C:\Users\user\Desktop\2024 Lusail Fence-WITH STICKER-2-003.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\2024 Lusail Fence-WITH STICKER-2-003.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\control.exe
"C:\Windows\SysWOW64\control.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\SysWOW64\svchost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.scarytube.world/ts59/?7n=5Kzuc08NHZ8t10osRye94ZQvODLPm8mJty646c/dpAg/zLZpW1bo0yg/pue6LIfdumZDuAZHWw==&2d8=3fe8kxnx8zVX-2L
13.248.169.48
malicious
http://www.zangbreaker.com/ts59/?7n=/870L+f5uYuMeX+RQ7xUOiQTdWqbXz9Ki2XQMm/qjwY6yFcouCApqHiIgf95TupcdCgvNrXz6Q==&2d8=3fe8kxnx8zVX-2L
3.33.130.190
malicious
http://www.gb-electric-wheelchairs-8j.bond/ts59/?7n=mB8uG6w8zpafFuNLwvQmLBNoWWmhhT+Pa5pMyx7Kkg5PpWq+xUX3NBFKVo2JmSZYGQcG7mEBYw==&2d8=3fe8kxnx8zVX-2L
185.53.179.91
malicious
http://www.asmauardotreschicshoes.com/ts59/?7n=mlngg5Tq8mAbovLDpSTQPdURm3XRXD2izxcBP0x82yVhlreLb+x9gDDmRHWXZVcg0gqB6qNybQ==&2d8=3fe8kxnx8zVX-2L
23.227.38.74
malicious
http://www.lostaino.com/ts59/?7n=CMI3XAkyIIc+lbzQFM0yBiMxIQj45W/6BGDFfPoe8SD5h+4DN1QfAHIl1f4AVZ60VX6NCS7/mA==&2d8=3fe8kxnx8zVX-2L
198.185.159.144
malicious
http://www.robottts.com/ts59/?7n=cK9IFJet6pmJE86ae8KOHfirNs8pECX6NYxzkQ3MXT6vCvPIzrd8O4FQURVhV/WvD5THDom2OA==&2d8=3fe8kxnx8zVX-2L
3.64.163.50
malicious
http://www.babyscan.xyz/ts59/?7n=Q0rerqlMM+Mzf1m4EVXcVVXnMVAfvTa9yYuOwxw9IZ3XTRGu1uzNDOvhppaUL+BqZnD0gHwuuw==&2d8=3fe8kxnx8zVX-2L
3.64.163.50
malicious
http://www.cn-brand.com/ts59/?7n=6XBHEvjpc5M3V6LIfIX8DkkGcsaew2r6P99WVPRIfudOyKrWJ/Ql+0StQIWY9mDv/yxfQ54Ieg==&2d8=3fe8kxnx8zVX-2L
52.86.6.113
malicious
www.gb-electric-wheelchairs-8j.bond/ts59/
malicious
http://www.cn-brand.com
unknown
http://www.texhio.online
unknown
http://www.qjjkxi260l.top
unknown
http://www.texhio.online/ts59/www.femininequantumflowcoach.com
unknown
https://api.msn.com:443/v1/news/Feed/Windows?t
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.zangbreaker.com
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
unknown
http://www.gb-electric-wheelchairs-8j.bondReferer:
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://www.gb-electric-wheelchairs-8j.bond/ts59/www.lostaino.com
unknown
http://www.gb-electric-wheelchairs-8j.bond/ts59/
unknown
http://www.texhio.onlineReferer:
unknown
http://www.kgstrengthandperformance.com
unknown
http://www.scarytube.world/ts59/www.robottts.com
unknown
http://www.scarytube.worldReferer:
unknown
http://www.lostaino.com/ts59/
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
unknown
http://www.scarytube.world/ts59/
unknown
http://www.ssweatstudio.com
unknown
https://wns.windows.com/
unknown
http://www.wizardatm.com
unknown
http://www.asmauardotreschicshoes.com/ts59/www.texhio.online
unknown
http://www.robottts.com/ts59/
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://word.office.com
unknown
http://www.robottts.comReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
http://www.asmauardotreschicshoes.com
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://outlook.com
unknown
http://www.modleavedepts.online/ts59/www.kgstrengthandperformance.com
unknown
http://www.modleavedepts.onlineReferer:
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://www.babyscan.xyz
unknown
http://www.asmauardotreschicshoes.com/ts59/
unknown
http://www.lostaino.com/ts59/www.modleavedepts.online
unknown
https://android.notify.windows.com/iOS
unknown
http://www.qjjkxi260l.topReferer:
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.wizardatm.com/ts59/www.zangbreaker.com
unknown
http://www.femininequantumflowcoach.com
unknown
http://www.redseadivingadventure.com/ts59/
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://www.pollensense.com/
unknown
http://www.wizardatm.comReferer:
unknown
http://www.lostaino.com
unknown
https://status.squarespace.com
unknown
http://www.femininequantumflowcoach.com/ts59/
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
http://schemas.micro
unknown
http://www.wizardatm.com/ts59/
unknown
http://www.zangbreaker.com/ts59/www.babyscan.xyz
unknown
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
unknown
http://www.babyscan.xyz/ts59/www.scarytube.world
unknown
http://www.zangbreaker.com/ts59/
unknown
https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
unknown
http://www.cn-brand.com/ts59/www.asmauardotreschicshoes.com
unknown
http://www.ssweatstudio.comReferer:
unknown
http://www.redseadivingadventure.com/ts59/www.ssweatstudio.com
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.texhio.online/ts59/
unknown
http://www.ssweatstudio.com/ts59/
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
http://www.modleavedepts.online/ts59/
unknown
http://www.qjjkxi260l.top/ts59/
unknown
http://www.cn-brand.comReferer:
unknown
http://www.robottts.com
unknown
http://www.kgstrengthandperformance.com/ts59/www.redseadivingadventure.com
unknown
http://www.ssweatstudio.com/ts59/www.qjjkxi260l.top
unknown
http://www.zangbreaker.comReferer:
unknown
https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
unknown
http://www.babyscan.xyzReferer:
unknown
http://www.redseadivingadventure.com
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://powerpoint.office.com
unknown
http://www.robottts.com/ts59/www.gb-electric-wheelchairs-8j.bond
unknown
http://www.foreca.com
unknown
http://www.lostaino.comReferer:
unknown
http://www.kgstrengthandperformance.com/ts59/
unknown
http://www.redseadivingadventure.comReferer:
unknown
http://www.kgstrengthandperformance.comReferer:
unknown
http://www.gb-electric-wheelchairs-8j.bond
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.robottts.com
3.64.163.50
malicious
hdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.com
52.86.6.113
malicious
modleavedepts.online
104.194.9.178
malicious
femininequantumflowcoach.com
192.0.78.25
malicious
zangbreaker.com
3.33.130.190
malicious
www.gb-electric-wheelchairs-8j.bond
185.53.179.91
malicious
shops.myshopify.com
23.227.38.74
malicious
www.scarytube.world
13.248.169.48
malicious
ext-sq.squarespace.com
198.185.159.144
malicious
www.babyscan.xyz
3.64.163.50
malicious
www.femininequantumflowcoach.com
unknown
malicious
www.lostaino.com
unknown
malicious
www.modleavedepts.online
unknown
malicious
time.windows.com
unknown
malicious
www.zangbreaker.com
unknown
malicious
www.cn-brand.com
unknown
malicious
www.asmauardotreschicshoes.com
unknown
malicious
www.wizardatm.com
unknown
malicious
There are 8 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
52.86.6.113
hdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.com
United States
malicious
192.0.78.25
femininequantumflowcoach.com
United States
malicious
13.248.169.48
www.scarytube.world
United States
malicious
185.53.179.91
www.gb-electric-wheelchairs-8j.bond
Germany
malicious
198.185.159.144
ext-sq.squarespace.com
United States
malicious
23.227.38.74
shops.myshopify.com
Canada
malicious
3.64.163.50
www.robottts.com
United States
malicious
3.33.130.190
zangbreaker.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 189 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
640000
unclassified section
page execute and read and write
malicious
2FA0000
unclassified section
page execute and read and write
malicious
670000
trusted library allocation
page read and write
malicious
3950000
unclassified section
page execute and read and write
malicious
18D0000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
1A0000
system
page execute and read and write
malicious
19CF000
heap
page read and write
9013000
unkown
page read and write
C04B000
unkown
page read and write
B52A000
stack
page read and write
2F00000
heap
page readonly
5310000
unclassified section
page execute and read and write
7FF5572BD000
unkown
page readonly
7FF5574A9000
unkown
page readonly
470D000
direct allocation
page execute and read and write
4746000
unkown
page read and write
7FF557009000
unkown
page readonly
7FF557589000
unkown
page readonly
C13000
heap
page read and write
42B3000
direct allocation
page read and write
524000
heap
page read and write
7FF5575FC000
unkown
page readonly
32C4000
unkown
page read and write
3005000
heap
page read and write
7FF5574BD000
unkown
page readonly
7FF55706A000
unkown
page readonly
7FF55706A000
unkown
page readonly
3460000
heap
page read and write
1B70000
heap
page read and write
7FF557293000
unkown
page readonly
9E0F000
stack
page read and write
7FF557426000
unkown
page readonly
7FF557187000
unkown
page readonly
7FF557599000
unkown
page readonly
C59000
heap
page read and write
7318000
unkown
page read and write
7DF468971000
unkown
page execute read
6A0000
trusted library allocation
page read and write
C5BE000
unkown
page read and write
73D0000
unkown
page read and write
7FF557083000
unkown
page readonly
4330000
direct allocation
page read and write
47C0000
unkown
page read and write
C20000
unkown
page read and write
C12D000
unkown
page read and write
590000
trusted library allocation
page read and write
FD91000
unkown
page read and write
7300000
unkown
page read and write
4781000
unkown
page read and write
C123000
unkown
page read and write
7FF557501000
unkown
page readonly
FD30000
unkown
page read and write
A8DD000
unkown
page read and write
7BC1000
unkown
page read and write
46F6000
unkown
page read and write
196F000
heap
page read and write
4330000
direct allocation
page read and write
40DF000
heap
page read and write
7FF557302000
unkown
page readonly
7FF55710A000
unkown
page readonly
524000
heap
page read and write
7FF557413000
unkown
page readonly
7FF557602000
unkown
page readonly
C23A000
unkown
page read and write
C374000
unkown
page read and write
BF3F000
stack
page read and write
4E0000
trusted library allocation
page read and write
7C60000
unkown
page readonly
716B000
unkown
page read and write
A8CA000
unkown
page read and write
3230000
unkown
page read and write
F7F4000
unkown
page read and write
E7BD000
stack
page read and write
7FF557579000
unkown
page readonly
7323000
unkown
page read and write
864F000
stack
page read and write
88A0000
unkown
page read and write
7FF55733F000
unkown
page readonly
32E3000
unkown
page read and write
88A0000
unkown
page read and write
7FF557535000
unkown
page readonly
7FF556E7E000
unkown
page readonly
8F4D000
unkown
page read and write
42B3000
direct allocation
page read and write
7FF557456000
unkown
page readonly
9005000
unkown
page read and write
730B000
unkown
page read and write
7FF557531000
unkown
page readonly
72C3000
unkown
page read and write
487A000
unkown
page read and write
3440000
unkown
page readonly
7FF556F2A000
unkown
page readonly
590000
trusted library allocation
page read and write
7FF5575D5000
unkown
page readonly
330A000
unkown
page read and write
C00000
heap
page read and write
590000
trusted library allocation
page read and write
8F27000
unkown
page read and write
7FF5573E6000
unkown
page readonly
16C000
stack
page read and write
9F0E000
stack
page read and write
445D000
direct allocation
page read and write
7FF5575E3000
unkown
page readonly
539E000
stack
page read and write
524000
heap
page read and write
7FF557037000
unkown
page readonly
9022000
unkown
page read and write
C44D000
unkown
page read and write
77F0000
unkown
page read and write
8F83000
unkown
page read and write
19FE000
heap
page read and write
8D70000
unkown
page read and write
9050000
unkown
page read and write
3230000
unkown
page read and write
77C0000
unkown
page read and write
E0F000
unkown
page readonly
707000
heap
page read and write
86CE000
stack
page read and write
C3F7000
unkown
page read and write
F47D000
unkown
page execute and read and write
A131000
unkown
page read and write
3017000
heap
page read and write
7FF556E85000
unkown
page readonly
8D86000
unkown
page read and write
445D000
direct allocation
page read and write
6F0000
heap
page read and write
7908000
stack
page read and write
7E10000
unkown
page read and write
7FF556FE3000
unkown
page readonly
BBC0000
unkown
page read and write
7FF557653000
unkown
page readonly
9004000
unkown
page read and write
F776000
unkown
page read and write
2F5E000
stack
page read and write
1930000
heap
page read and write
718000
heap
page read and write
9B6000
stack
page read and write
7FF5573B0000
unkown
page readonly
7FF55714A000
unkown
page readonly
7FF556E98000
unkown
page readonly
A8DD000
unkown
page read and write
8EB8000
unkown
page read and write
7FF556FFB000
unkown
page readonly
570000
heap
page read and write
C091000
unkown
page read and write
8EB8000
unkown
page read and write
4820000
unkown
page read and write
32C7000
unkown
page read and write
4202000
heap
page read and write
7FF557249000
unkown
page readonly
A0FF000
unkown
page read and write
442C000
heap
page read and write
7C00000
unkown
page readonly
7FF556E7B000
unkown
page readonly
FD6D000
unkown
page read and write
4190000
direct allocation
page read and write
712000
heap
page read and write
717A000
unkown
page read and write
7FF557416000
unkown
page readonly
C06D000
unkown
page read and write
400000
heap
page read and write
C0F3000
unkown
page read and write
717C000
unkown
page read and write
90CF000
unkown
page read and write
7FF5574F1000
unkown
page readonly
7306000
unkown
page read and write
1A96000
heap
page read and write
A8E3000
unkown
page read and write
A8DD000
unkown
page read and write
7FF55730C000
unkown
page readonly
7FF55722A000
unkown
page readonly
7FF557382000
unkown
page readonly
FD76000
unkown
page read and write
A0A5000
unkown
page read and write
C3ED000
unkown
page read and write
B050000
unkown
page read and write
8EEE000
unkown
page read and write
77F0000
unkown
page read and write
590000
trusted library allocation
page read and write
D14000
heap
page read and write
7FF5571E6000
unkown
page readonly
B040000
unkown
page readonly
712000
heap
page read and write
8D6A000
unkown
page read and write
7FF557554000
unkown
page readonly
3B50000
trusted library allocation
page execute and read and write
47C0000
unkown
page read and write
5420000
trusted library allocation
page read and write
A110000
unkown
page read and write
902B000
unkown
page read and write
7FF5575B1000
unkown
page readonly
C233000
unkown
page read and write
84DC000
stack
page read and write
6A0000
trusted library allocation
page read and write
7FF5570E7000
unkown
page readonly
252F000
stack
page read and write
7FF5573B0000
unkown
page readonly
A114000
unkown
page read and write
BFBB000
stack
page read and write
7FF557669000
unkown
page readonly
BC00000
unkown
page readonly
C10000
unkown
page read and write
4711000
direct allocation
page execute and read and write
379F000
unkown
page read and write
C59000
heap
page read and write
7D8E000
stack
page read and write
1938000
heap
page read and write
71A4000
unkown
page read and write
8EF5000
unkown
page read and write
4330000
direct allocation
page read and write
10F0F000
system
page read and write
7FF55714F000
unkown
page readonly
7FF5575B9000
unkown
page readonly
7FF5572C9000
unkown
page readonly
10A0000
heap
page read and write
72FE000
unkown
page read and write
7FF557095000
unkown
page readonly
4E0000
trusted library allocation
page read and write
F733000
unkown
page read and write
46F0000
unkown
page read and write
72FC000
unkown
page read and write
8ECE000
unkown
page read and write
7FF557106000
unkown
page readonly
4E7F000
unclassified section
page read and write
C091000
unkown
page read and write
C1E9000
unkown
page read and write
A8CA000
unkown
page read and write
5420000
trusted library allocation
page read and write
32C9000
unkown
page read and write
7FF5570F7000
unkown
page readonly
7FF55760F000
unkown
page readonly
5420000
trusted library allocation
page read and write
4190000
direct allocation
page read and write
3213000
stack
page read and write
9F0000
unkown
page readonly
326A000
unkown
page read and write
7FF557393000
unkown
page readonly
3029000
stack
page read and write
7FF557033000
unkown
page readonly
7178000
unkown
page read and write
7FF5572A4000
unkown
page readonly
D1D000
heap
page read and write
7FF55741C000
unkown
page readonly
7FF55753D000
unkown
page readonly
7FF55725B000
unkown
page readonly
7FF5572B6000
unkown
page readonly
7FF557413000
unkown
page readonly
7FF5575BB000
unkown
page readonly
4E0000
trusted library allocation
page read and write
3323000
heap
page read and write
4785000
unkown
page read and write
2C04000
stack
page read and write
47C6000
unkown
page read and write
345E000
stack
page read and write
72FC000
unkown
page read and write
788D000
stack
page read and write
7FF5573F3000
unkown
page readonly
FE42000
heap
page read and write
F7B4000
unkown
page read and write
E2A0000
heap
page read and write
7FF557235000
unkown
page readonly
E0F000
unkown
page readonly
4E0000
trusted library allocation
page read and write
7FF557411000
unkown
page readonly
C5F2000
unkown
page read and write
4840000
unkown
page read and write
9086000
unkown
page read and write
842F000
stack
page read and write
7FF557463000
unkown
page readonly
7FF5575BD000
unkown
page readonly
A0A8000
unkown
page read and write
590000
trusted library allocation
page read and write
524000
heap
page read and write
7B99000
stack
page read and write
7FF557103000
unkown
page readonly
8ECE000
unkown
page read and write
A22F000
unkown
page read and write
7FF5572B4000
unkown
page readonly
7FF5570CA000
unkown
page readonly
19FE000
heap
page read and write
7FF556FC4000
unkown
page readonly
C244000
unkown
page read and write
C13000
heap
page read and write
8EF5000
unkown
page read and write
A8E5000
unkown
page read and write
9B6000
stack
page read and write
94C000
stack
page read and write
7162000
unkown
page read and write
1B40000
heap
page read and write
C5B2000
unkown
page read and write
F733000
unkown
page read and write
C22F000
unkown
page read and write
7A50000
unkown
page readonly
7FF5570C5000
unkown
page readonly
FE4A000
heap
page read and write
7FF556FEE000
unkown
page readonly
A215000
unkown
page read and write
913F000
unkown
page read and write
C18A000
unkown
page read and write
F830000
unkown
page read and write
7FF557419000
unkown
page readonly
7FF557257000
unkown
page readonly
9580000
unkown
page readonly
7FF556E6C000
unkown
page readonly
70B000
heap
page read and write
B6AA000
stack
page read and write
1020000
heap
page read and write
8820000
unkown
page readonly
717A000
unkown
page read and write
32C7000
unkown
page read and write
7FF5570B5000
unkown
page readonly
8EEE000
unkown
page read and write
10A0000
heap
page read and write
7FF55733F000
unkown
page readonly
7FF5574F9000
unkown
page readonly
7FF55722A000
unkown
page readonly
7FF5570D4000
unkown
page readonly
9086000
unkown
page read and write
BBE0000
unkown
page readonly
A118000
unkown
page read and write
7FF557476000
unkown
page readonly
B030000
unkown
page readonly
524000
heap
page read and write
8EC5000
unkown
page read and write
E270000
unkown
page read and write
EBC0000
system
page execute and read and write
7FF556E85000
unkown
page readonly
910F000
unkown
page read and write
A129000
unkown
page read and write
7FF55730C000
unkown
page readonly
4E0000
trusted library allocation
page read and write
A0A8000
unkown
page read and write
640000
trusted library allocation
page read and write
7173000
unkown
page read and write
7DF468990000
unkown
page readonly
C5A3000
unkown
page read and write
C22F000
unkown
page read and write
7FF5571B3000
unkown
page readonly
BBD0000
unkown
page readonly
7FF55745B000
unkown
page readonly
995E000
stack
page read and write
FD7A000
unkown
page read and write
C3F7000
unkown
page read and write
C233000
unkown
page read and write
A85E000
unkown
page read and write
7FF55703F000
unkown
page readonly
4459000
direct allocation
page read and write
A114000
unkown
page read and write
9F0000
unkown
page readonly
7FF55760F000
unkown
page readonly
717C000
unkown
page read and write
FD64000
unkown
page read and write
3269000
unkown
page read and write
590000
trusted library allocation
page read and write
7DF468981000
unkown
page execute read
2D0B000
stack
page read and write
90C9000
unkown
page read and write
C3AE000
unkown
page read and write
8ED5000
unkown
page read and write
A85E000
unkown
page read and write
10B0000
unkown
page readonly
7FF55702F000
unkown
page readonly
7FF5573F3000
unkown
page readonly
32C9000
unkown
page read and write
FD0000
unkown
page readonly
590000
trusted library allocation
page read and write
900000
unkown
page readonly
E290000
unkown
page read and write
C13000
heap
page read and write
C0F9000
unkown
page read and write
8DFE000
unkown
page read and write
7FF557113000
unkown
page readonly
3942000
direct allocation
page execute and read and write
C4A2000
unkown
page read and write
A154000
unkown
page read and write
7FF5573ED000
unkown
page readonly
7FF557045000
unkown
page readonly
90AC000
unkown
page read and write
7FF557239000
unkown
page readonly
445D000
direct allocation
page read and write
79A0000
unkown
page read and write
C1DD000
unkown
page read and write
8B17000
unkown
page read and write
2C06000
stack
page read and write
E260000
unkown
page read and write
7FF556F87000
unkown
page readonly
7FF5570D6000
unkown
page readonly
84E0000
unkown
page readonly
A08D000
stack
page read and write
7FF557463000
unkown
page readonly
C24F000
unkown
page read and write
C063000
unkown
page read and write
1BE4000
heap
page read and write
7FF5575FC000
unkown
page readonly
C04F000
unkown
page read and write
7FF5573EA000
unkown
page readonly
C55A000
unkown
page read and write
98B000
stack
page read and write
7FF557280000
unkown
page readonly
7DF4689A1000
unkown
page execute read
79A0000
unkown
page read and write
B4A6000
stack
page read and write
3118000
stack
page read and write
7FF55745B000
unkown
page readonly
7FF5571A1000
unkown
page readonly
1963000
heap
page read and write
3529000
heap
page read and write
7FF55733B000
unkown
page readonly
7FF5575BD000
unkown
page readonly
7FF5575AB000
unkown
page readonly
7FF55708D000
unkown
page readonly
8EDD000
unkown
page read and write
8D7A000
unkown
page read and write
B010000
unkown
page readonly
C13000
heap
page read and write
8EF5000
unkown
page read and write
32D3000
unkown
page read and write
C3FB000
unkown
page read and write
7FF557531000
unkown
page readonly
6A0000
trusted library allocation
page read and write
E370000
unkown
page read and write
C557000
unkown
page read and write
C452000
unkown
page read and write
7FF55728F000
unkown
page readonly
B82A000
stack
page read and write
89C0000
unkown
page read and write
9E8E000
stack
page read and write
F776000
unkown
page read and write
4830000
unkown
page read and write
8DA6000
unkown
page read and write
C5B2000
unkown
page read and write
7FF55732D000
unkown
page readonly
7FF55752A000
unkown
page readonly
520000
heap
page read and write
2E86000
stack
page read and write
BF3F000
stack
page read and write
3040000
heap
page read and write
17B0000
heap
page read and write
7FF556E43000
unkown
page readonly
FB0000
unkown
page read and write
A0B9000
unkown
page read and write
7FF557607000
unkown
page readonly
7FF557429000
unkown
page readonly
341E000
unkown
page read and write
7FF557330000
unkown
page readonly
1BF4000
heap
page read and write
4785000
unkown
page read and write
44CE000
direct allocation
page read and write
44CE000
direct allocation
page read and write
7FF557210000
unkown
page readonly
4459000
direct allocation
page read and write
4E0000
trusted library allocation
page read and write
7DF4689A1000
unkown
page execute read
73F0000
unkown
page read and write
7185000
unkown
page read and write
A286000
unkown
page read and write
4E0000
trusted library allocation
page read and write
7A80000
unkown
page readonly
C40D000
unkown
page read and write
7FF557456000
unkown
page readonly
19AE000
heap
page read and write
9052000
unkown
page read and write
3253000
unkown
page read and write
FD72000
unkown
page read and write
4459000
direct allocation
page read and write
7FF55750F000
unkown
page readonly
39A0000
unclassified section
page execute and read and write
7FF546F35000
unkown
page readonly
7276000
unkown
page read and write
7FF5569FA000
unkown
page readonly
9050000
unkown
page read and write
1A83000
heap
page read and write
1ABE000
heap
page read and write
E1B9000
stack
page read and write
32DB000
unkown
page read and write
524000
heap
page read and write
7FF556A1B000
unkown
page readonly
C2D3000
unkown
page read and write
7FF55719C000
unkown
page readonly
90C9000
unkown
page read and write
961B000
stack
page read and write
904C000
unkown
page read and write
7FF5572B4000
unkown
page readonly
7FF5570A6000
unkown
page readonly
196F000
heap
page read and write
788B000
stack
page read and write
8B17000
unkown
page read and write
7FF557501000
unkown
page readonly
3450000
unkown
page read and write
E10000
heap
page read and write
FD50000
unkown
page read and write
C452000
unkown
page read and write
7FF55703C000
unkown
page readonly
42B3000
direct allocation
page read and write
32C4000
unkown
page read and write
77B0000
unkown
page read and write
4190000
direct allocation
page read and write
8D72000
unkown
page read and write
A873000
unkown
page read and write
BBE0000
unkown
page readonly
7A4B000
stack
page read and write
7FF5569E8000
unkown
page readonly
7FF5575E0000
unkown
page readonly
32B9000
unkown
page read and write
9F8F000
stack
page read and write
C10B000
unkown
page read and write
C43F000
unkown
page read and write
E23B000
stack
page read and write
7FF55704A000
unkown
page readonly
7178000
unkown
page read and write
524000
heap
page read and write
C18A000
unkown
page read and write
E1B9000
stack
page read and write
8F09000
unkown
page read and write
C101000
unkown
page read and write
7FF5570D6000
unkown
page readonly
A810000
unkown
page read and write
4E0000
trusted library allocation
page read and write
7C60000
unkown
page readonly
9013000
unkown
page read and write
7FF5572C1000
unkown
page readonly
10A5000
heap
page read and write
AE2B000
stack
page read and write
7FF55700F000
unkown
page readonly
FD30000
unkown
page read and write
8F09000
unkown
page read and write
7FF556E98000
unkown
page readonly
301B000
heap
page read and write
D80000
unkown
page readonly
913F000
unkown
page read and write
7FF5574BD000
unkown
page readonly
7FF556F87000
unkown
page readonly
7FF556FD2000
unkown
page readonly
9052000
unkown
page read and write
BEBF000
stack
page read and write
32C7000
unkown
page read and write
7FF557602000
unkown
page readonly
C0F3000
unkown
page read and write
B628000
stack
page read and write
F6BB000
unkown
page read and write
7FF557257000
unkown
page readonly
904C000
unkown
page read and write
7FF557617000
unkown
page readonly
4732000
unkown
page read and write
7FF556FEE000
unkown
page readonly
C374000
unkown
page read and write
7FF55756D000
unkown
page readonly
90DB000
unkown
page read and write
486A000
unkown
page read and write
7FF55756D000
unkown
page readonly
7FF5575EA000
unkown
page readonly
319C000
stack
page read and write
8F09000
unkown
page read and write
1962000
heap
page read and write
C1DF000
unkown
page read and write
A231000
unkown
page read and write
C3B3000
unkown
page read and write
7FF557599000
unkown
page readonly
F77B000
unkown
page read and write
7FF5575E0000
unkown
page readonly
A877000
unkown
page read and write
7FF5570A6000
unkown
page readonly
7FF557187000
unkown
page readonly
3260000
unkown
page read and write
7FF5574BA000
unkown
page readonly
4880000
unkown
page read and write
4830000
unkown
page read and write
3401000
heap
page read and write
C10B000
unkown
page read and write
C23A000
unkown
page read and write
32B9000
unkown
page read and write
7FF557607000
unkown
page readonly
E43000
unkown
page write copy
EEC000
stack
page read and write
7FF55763D000
unkown
page readonly
7FF55728F000
unkown
page readonly
7FF55714D000
unkown
page readonly
524000
heap
page read and write
900000
unkown
page readonly
7DF468971000
unkown
page execute read
C3B3000
unkown
page read and write
C244000
unkown
page read and write
B070000
unkown
page read and write
34A0000
heap
page read and write
A129000
unkown
page read and write
389F000
stack
page read and write
72FE000
unkown
page read and write
7FF557250000
unkown
page readonly
4718000
unkown
page read and write
995E000
stack
page read and write
E35000
unkown
page readonly
7FF55732D000
unkown
page readonly
7FF55733B000
unkown
page readonly
32E6000
unkown
page read and write
A22F000
unkown
page read and write
32E6000
unkown
page read and write
7DF468990000
unkown
page readonly
A286000
unkown
page read and write
B080000
unkown
page read and write
BC10000
unkown
page read and write
1967000
heap
page read and write
3400000
heap
page read and write
7FF55742B000
unkown
page readonly
C20000
unkown
page read and write
904C000
unkown
page read and write
C591000
unkown
page read and write
7FF546F35000
unkown
page readonly
F6F4000
unkown
page read and write
4800000
unkown
page read and write
9C0000
heap
page read and write
32F3000
unkown
page read and write
E370000
unkown
page read and write
8DFE000
unkown
page read and write
84E0000
unkown
page readonly
44CE000
direct allocation
page read and write
FD61000
unkown
page read and write
79B0000
unkown
page read and write
7FF557065000
unkown
page readonly
7FF55703C000
unkown
page readonly
84DC000
stack
page read and write
7FF5572C3000
unkown
page readonly
7FF556F84000
unkown
page readonly
46F0000
unkown
page read and write
46E0000
unkown
page read and write
7160000
unkown
page read and write
AE2B000
stack
page read and write
E290000
unkown
page read and write
A156000
unkown
page read and write
7FF5573B5000
unkown
page readonly
4330000
direct allocation
page read and write
901E000
unkown
page read and write
8530000
unkown
page readonly
9050000
unkown
page read and write
7FF556E8D000
unkown
page readonly
717E000
unkown
page read and write
73C5000
stack
page read and write
7FF5571DF000
unkown
page readonly
6F8000
heap
page read and write
8590000
heap
page read and write
8F09000
unkown
page read and write
32D7000
unkown
page read and write
7FF556FFF000
unkown
page readonly
3450000
unkown
page read and write
C5B2000
unkown
page read and write
7FF557243000
unkown
page readonly
7FF55761F000
unkown
page readonly
7DF468981000
unkown
page execute read
32B9000
unkown
page read and write
7FF55714A000
unkown
page readonly
51E000
stack
page read and write
7FF5570C1000
unkown
page readonly
BFD0000
unkown
page read and write
B6A5000
stack
page read and write
B050000
unkown
page read and write
FD72000
unkown
page read and write
9D8E000
stack
page read and write
7FF5574C6000
unkown
page readonly
C0F9000
unkown
page read and write
7FF5575A1000
unkown
page readonly
E35000
unkown
page readonly
3118000
stack
page read and write
BC00000
unkown
page readonly
486A000
unkown
page read and write
7FF557420000
unkown
page readonly
7FF557382000
unkown
page readonly
91D9000
stack
page read and write
47EE000
unkown
page read and write
7FF557387000
unkown
page readonly
8DFE000
unkown
page read and write
4769000
unkown
page read and write
4732000
unkown
page read and write
498F000
unclassified section
page read and write
7FF5573E2000
unkown
page readonly
5420000
trusted library allocation
page read and write
7FF55765C000
unkown
page readonly
7FF557583000
unkown
page readonly
F6B2000
unkown
page read and write
7FF55752E000
unkown
page readonly
3460000
unkown
page read and write
72D8000
unkown
page read and write
4730000
unkown
page read and write
ACB9000
stack
page read and write
32E3000
unkown
page read and write
C1DB000
unkown
page read and write
7314000
unkown
page read and write
C40E000
unkown
page read and write
C24F000
unkown
page read and write
A154000
unkown
page read and write
7FF5575BF000
unkown
page readonly
7FF557571000
unkown
page readonly
C6D000
heap
page read and write
7FF556E75000
unkown
page readonly
7FF5573FF000
unkown
page readonly
7FF557243000
unkown
page readonly
7FF556F84000
unkown
page readonly
7FF5574C6000
unkown
page readonly
7FF557062000
unkown
page readonly
51E3000
unkown
page read and write
8AE6000
unkown
page read and write
97CE000
stack
page read and write
C2D3000
unkown
page read and write
32D3000
unkown
page read and write
7FF556E66000
unkown
page readonly
73F0000
unkown
page read and write
7319000
unkown
page read and write
C9D000
system
page execute and read and write
712000
heap
page read and write
7FF5573ED000
unkown
page readonly
910E000
unkown
page read and write
7FF5572A2000
unkown
page readonly
C5F6000
unkown
page read and write
9021000
unkown
page read and write
456D000
direct allocation
page execute and read and write
864F000
stack
page read and write
717E000
unkown
page read and write
C31000
unkown
page readonly
FD0000
unkown
page readonly
EBD0000
system
page execute and read and write
910000
unkown
page readonly
7C70000
unkown
page readonly
524000
heap
page read and write
8D6A000
unkown
page read and write
BC10000
unkown
page read and write
19FF000
heap
page read and write
C530000
unkown
page read and write
77D0000
unkown
page read and write
D81000
unkown
page execute read
7FF5570D4000
unkown
page readonly
32DB000
unkown
page read and write
7FF557487000
unkown
page readonly
7169000
unkown
page read and write
7FF5575E3000
unkown
page readonly
38D1000
direct allocation
page execute and read and write
7FF546F2F000
unkown
page readonly
AFFF000
stack
page read and write
7FF55725B000
unkown
page readonly
C575000
unkown
page read and write
72FE000
unkown
page read and write
590000
trusted library allocation
page read and write
90DB000
unkown
page read and write
32D3000
unkown
page read and write
3600000
direct allocation
page execute and read and write
C3E7000
unkown
page read and write
2E0A000
stack
page read and write
3530000
heap
page read and write
7FF5575AB000
unkown
page readonly
C3F7000
unkown
page read and write
47DB000
unkown
page read and write
2F09000
stack
page read and write
1060000
unkown
page read and write
10A5000
heap
page read and write
7FF5570C1000
unkown
page readonly
3460000
unkown
page read and write
A8DD000
unkown
page read and write
7FF55720D000
unkown
page readonly
15DB000
stack
page read and write
9580000
unkown
page readonly
8F4D000
unkown
page read and write
32B9000
unkown
page read and write
C13000
heap
page read and write
7D0E000
stack
page read and write
A0BD000
unkown
page read and write
C451000
unkown
page read and write
325F000
unkown
page read and write
3950000
trusted library allocation
page read and write
7FF5570FE000
unkown
page readonly
F6C9000
unkown
page read and write
7FF55751D000
unkown
page readonly
8F27000
unkown
page read and write
E280000
unkown
page read and write
71FC000
unkown
page read and write
524000
heap
page read and write
C4A2000
unkown
page read and write
7FF557009000
unkown
page readonly
4880000
unkown
page read and write
7318000
unkown
page read and write
7FF557250000
unkown
page readonly
C1DD000
unkown
page read and write
477D000
unkown
page read and write
7DF468991000
unkown
page execute read
8590000
heap
page read and write
A218000
unkown
page read and write
C3B3000
unkown
page read and write
904C000
unkown
page read and write
C072000
unkown
page read and write
1790000
heap
page read and write
79B0000
unkown
page read and write
70D000
heap
page read and write
7FF557554000
unkown
page readonly
4E0000
trusted library allocation
page read and write
7FF5573BB000
unkown
page readonly
8DB0000
unkown
page read and write
304D000
heap
page read and write
7FF5570CA000
unkown
page readonly
47DB000
unkown
page read and write
7FF5570C5000
unkown
page readonly
E5FC000
stack
page read and write
4746000
unkown
page read and write
2E0A000
stack
page read and write
7FF5572AC000
unkown
page readonly
C13000
heap
page read and write
C1DD000
unkown
page read and write
9D8E000
stack
page read and write
3200000
heap
page read and write
7FF5573D5000
unkown
page readonly
EB30000
system
page execute and read and write
B72B000
stack
page read and write
A8DD000
unkown
page read and write
47EE000
unkown
page read and write
8ED5000
unkown
page read and write
7FF557642000
unkown
page readonly
197D000
heap
page read and write
2C8E000
stack
page read and write
E270000
unkown
page read and write
AD10000
unkown
page readonly
7FF557210000
unkown
page readonly
7803000
unkown
page read and write
A1FD000
unkown
page read and write
BFBB000
stack
page read and write
7FF5571A1000
unkown
page readonly
AF6E000
stack
page read and write
304D000
heap
page read and write
7FF557247000
unkown
page readonly
C02000
heap
page read and write
32FF000
stack
page read and write
C4A2000
unkown
page read and write
7FF557302000
unkown
page readonly
5420000
trusted library allocation
page read and write
32D7000
unkown
page read and write
C575000
unkown
page read and write
7FF55738F000
unkown
page readonly
8EDD000
unkown
page read and write
7FF557467000
unkown
page readonly
A8CA000
unkown
page read and write
89C0000
unkown
page read and write
BBD0000
unkown
page readonly
4781000
unkown
page read and write
7FF5574B3000
unkown
page readonly
A8E2000
unkown
page read and write
7FF5574F4000
unkown
page readonly
7FF556FD2000
unkown
page readonly
C04F000
unkown
page read and write
7FF55761F000
unkown
page readonly
428E000
heap
page read and write
1020000
heap
page read and write
32D7000
unkown
page read and write
C31000
unkown
page readonly
590000
trusted library allocation
page read and write
7FF557416000
unkown
page readonly
8F27000
unkown
page read and write
FE40000
heap
page read and write
C547000
unkown
page read and write
7D0E000
stack
page read and write
7FF557328000
unkown
page readonly
90DB000
unkown
page read and write
8EC5000
unkown
page read and write
524000
heap
page read and write
51E3000
unkown
page read and write
7FF557148000
unkown
page readonly
18A0000
heap
page read and write
19B0000
heap
page read and write
32D7000
unkown
page read and write
9050000
unkown
page read and write
7FF557661000
unkown
page readonly
E2A0000
heap
page read and write
C1DF000
unkown
page read and write
53DE000
stack
page read and write
3729000
direct allocation
page execute and read and write
E48000
unkown
page readonly
3440000
unkown
page readonly
A858000
unkown
page read and write
8EF5000
unkown
page read and write
7803000
unkown
page read and write
8C59000
stack
page read and write
D80000
unkown
page readonly
7FF55726C000
unkown
page readonly
1060000
unkown
page read and write
A0FC000
unkown
page read and write
B81000
heap
page read and write
2F80000
unkown
page readonly
7FF55710F000
unkown
page readonly
FD76000
unkown
page read and write
7FF5572B6000
unkown
page readonly
32D3000
unkown
page read and write
7FF5575C5000
unkown
page readonly
7FF556E3B000
unkown
page readonly
715C000
unkown
page read and write
E260000
unkown
page read and write
E48000
unkown
page readonly
71A4000
unkown
page read and write
FD76000
unkown
page read and write
AFFF000
stack
page read and write
9CDC000
stack
page read and write
7FF557583000
unkown
page readonly
A218000
unkown
page read and write
1023000
heap
page read and write
C480000
unkown
page read and write
3017000
heap
page read and write
7FF557026000
unkown
page readonly
7FF5575B1000
unkown
page readonly
E60000
unkown
page readonly
7FF557661000
unkown
page readonly
7FF557549000
unkown
page readonly
A0BF000
unkown
page read and write
56F000
stack
page read and write
902C000
unkown
page read and write
BBBB000
stack
page read and write
798E000
stack
page read and write
ADAF000
stack
page read and write
6A0000
trusted library allocation
page read and write
C3A8000
unkown
page read and write
7FF557099000
unkown
page readonly
7FF557393000
unkown
page readonly
C5F6000
unkown
page read and write
7FF557653000
unkown
page readonly
7FF5572AC000
unkown
page readonly
7FF556F2A000
unkown
page readonly
72D7000
unkown
page read and write
7FF55704A000
unkown
page readonly
15FC000
stack
page read and write
5420000
trusted library allocation
page read and write
7FF557426000
unkown
page readonly
A110000
unkown
page read and write
359E000
heap
page read and write
B1A0000
unkown
page read and write
45DE000
direct allocation
page execute and read and write
8EC5000
unkown
page read and write
9F8F000
stack
page read and write
7FF5569CB000
unkown
page readonly
7FF556FFF000
unkown
page readonly
7FF5570BB000
unkown
page readonly
4459000
direct allocation
page read and write
8BD9000
stack
page read and write
B80000
heap
page read and write
7FF557264000
unkown
page readonly
7FF557099000
unkown
page readonly
8D68000
unkown
page read and write
590000
trusted library allocation
page read and write
BBBB000
stack
page read and write
8EC5000
unkown
page read and write
26A0000
heap
page read and write
7FF5573D3000
unkown
page readonly
7FF557352000
unkown
page readonly
7FF5575BB000
unkown
page readonly
7FF5572C1000
unkown
page readonly
7FF5574F1000
unkown
page readonly
7FF55731B000
unkown
page readonly
C5D6000
unkown
page read and write
7FF55726A000
unkown
page readonly
8810000
unkown
page readonly
B5AE000
stack
page read and write
7FF5573D8000
unkown
page readonly
A85A000
unkown
page read and write
7DF468980000
unkown
page readonly
8F4D000
unkown
page read and write
7FF55726C000
unkown
page readonly
A222000
unkown
page read and write
7FF557411000
unkown
page readonly
9F0E000
stack
page read and write
7FF55700F000
unkown
page readonly
7FF557174000
unkown
page readonly
716B000
unkown
page read and write
A225000
unkown
page read and write
7FF5572A8000
unkown
page readonly
B1A0000
unkown
page read and write
8D86000
unkown
page read and write
3249000
unkown
page read and write
3012000
heap
page read and write
12C000
stack
page read and write
35A0000
heap
page read and write
7FF557113000
unkown
page readonly
A23B000
unkown
page read and write
A131000
unkown
page read and write
7FF557026000
unkown
page readonly
910000
unkown
page readonly
A85A000
unkown
page read and write
1BD5000
heap
page read and write
8D60000
unkown
page read and write
7FF557617000
unkown
page readonly
B81000
heap
page read and write
7FF5573DE000
unkown
page readonly
A118000
unkown
page read and write
2F90000
unkown
page readonly
A8CA000
unkown
page read and write
C00000
heap
page read and write
716E000
unkown
page read and write
B7AA000
stack
page read and write
19DF000
heap
page read and write
9052000
unkown
page read and write
C3ED000
unkown
page read and write
716E000
unkown
page read and write
7FF556F31000
unkown
page readonly
A215000
unkown
page read and write
1BE2000
heap
page read and write
7FF5571E2000
unkown
page readonly
7306000
unkown
page read and write
7FF5573FF000
unkown
page readonly
9052000
unkown
page read and write
A873000
unkown
page read and write
7FF557579000
unkown
page readonly
7FF5574EF000
unkown
page readonly
2F70000
unkown
page readonly
44CE000
direct allocation
page read and write
FD6E000
unkown
page read and write
C1DF000
unkown
page read and write
7FF556E9A000
unkown
page readonly
7FF557247000
unkown
page readonly
913F000
unkown
page read and write
7FF55752E000
unkown
page readonly
C1E9000
unkown
page read and write
379E000
direct allocation
page execute and read and write
77D0000
unkown
page read and write
8EB8000
unkown
page read and write
7FF55741C000
unkown
page readonly
7FF5570BB000
unkown
page readonly
7FF557293000
unkown
page readonly
874E000
stack
page read and write
7FF5572C9000
unkown
page readonly
4330000
direct allocation
page read and write
90CF000
unkown
page read and write
43B7000
heap
page read and write
7FF556FF3000
unkown
page readonly
874C000
stack
page read and write
3220000
unkown
page readonly
D81000
unkown
page execute read
C428000
unkown
page read and write
4718000
unkown
page read and write
7FF556F90000
unkown
page readonly
7FF5570B5000
unkown
page readonly
7FF556E3D000
unkown
page readonly
7FF5572A2000
unkown
page readonly
4459000
direct allocation
page read and write
C42C000
unkown
page read and write
C511000
unkown
page read and write
83A0000
unkown
page read and write
7FF5575D0000
unkown
page readonly
1A10000
heap
page read and write
8810000
unkown
page readonly
9854000
unkown
page read and write
901F000
unkown
page read and write
2F80000
unkown
page readonly
C22B000
unkown
page read and write
BEBF000
stack
page read and write
7140000
unkown
page read and write
19A4000
heap
page read and write
7FF5572BD000
unkown
page readonly
C063000
unkown
page read and write
C452000
unkown
page read and write
7FF556F9E000
unkown
page readonly
C04B000
unkown
page read and write
7FF5574F4000
unkown
page readonly
F6BB000
unkown
page read and write
32F3000
unkown
page read and write
7FF5571DF000
unkown
page readonly
7FF5570E7000
unkown
page readonly
C42C000
unkown
page read and write
B5AE000
stack
page read and write
4190000
direct allocation
page read and write
43BB000
heap
page read and write
C13000
heap
page read and write
7FF55714F000
unkown
page readonly
4569000
direct allocation
page execute and read and write
C6D000
heap
page read and write
FD7A000
unkown
page read and write
7320000
unkown
page read and write
B010000
unkown
page readonly
C233000
unkown
page read and write
77B0000
unkown
page read and write
1A2F000
heap
page read and write
7FF557062000
unkown
page readonly
8D78000
unkown
page read and write
C3AE000
unkown
page read and write
7FF557083000
unkown
page readonly
8371000
unkown
page read and write
7A60000
unkown
page readonly
7FF55710F000
unkown
page readonly
630000
heap
page read and write
7300000
unkown
page read and write
7FF557280000
unkown
page readonly
90F2000
unkown
page read and write
BFD0000
unkown
page read and write
3220000
unkown
page readonly
A231000
unkown
page read and write
C10000
unkown
page read and write
C06D000
unkown
page read and write
2F9D000
stack
page read and write
D1D000
heap
page read and write
7A50000
unkown
page readonly
7FF557264000
unkown
page readonly
4840000
unkown
page read and write
7FF557352000
unkown
page readonly
8D6C000
unkown
page read and write
2D0B000
stack
page read and write
7FF5575D5000
unkown
page readonly
8871000
unkown
page read and write
2F9E000
stack
page read and write
7FF557148000
unkown
page readonly
4810000
unkown
page read and write
10D16000
system
page read and write
71B2000
unkown
page read and write
590000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
7FF5571AC000
unkown
page readonly
C2E4000
unkown
page read and write
7FF5572A8000
unkown
page readonly
7FF5574BA000
unkown
page readonly
8AE6000
unkown
page read and write
7FF556E6C000
unkown
page readonly
FD6D000
unkown
page read and write
7160000
unkown
page read and write
C572000
unkown
page read and write
4796000
unclassified section
page read and write
A0BF000
unkown
page read and write
4769000
unkown
page read and write
7FF5569F1000
unkown
page readonly
7FF5573D5000
unkown
page readonly
8EDD000
unkown
page read and write
C13000
heap
page read and write
A280000
unkown
page read and write
9013000
unkown
page read and write
EBE5000
system
page execute and read and write
7FF5573C9000
unkown
page readonly
7FF55731B000
unkown
page readonly
3256000
unkown
page read and write
8D72000
unkown
page read and write
485A000
unkown
page read and write
7FF557627000
unkown
page readonly
83A0000
unkown
page read and write
6A0000
trusted library allocation
page read and write
798D000
stack
page read and write
8D80000
unkown
page read and write
485A000
unkown
page read and write
FD62000
unkown
page read and write
C572000
unkown
page read and write
A0FC000
unkown
page read and write
D14000
heap
page read and write
A222000
unkown
page read and write
730A000
unkown
page read and write
C480000
unkown
page read and write
7185000
unkown
page read and write
44CE000
direct allocation
page read and write
8EB8000
unkown
page read and write
4330000
direct allocation
page read and write
7FF557095000
unkown
page readonly
7FF5574A9000
unkown
page readonly
7FF55714D000
unkown
page readonly
7FF546F2F000
unkown
page readonly
70D000
heap
page read and write
7FF557642000
unkown
page readonly
7DF468991000
unkown
page execute read
A280000
unkown
page read and write
C5D6000
unkown
page read and write
32C4000
unkown
page read and write
32C9000
unkown
page read and write
B040000
unkown
page readonly
8ED5000
unkown
page read and write
7FF557549000
unkown
page readonly
4459000
direct allocation
page read and write
8ED5000
unkown
page read and write
9E0000
heap
page read and write
4734000
unkown
page read and write
524000
heap
page read and write
90F2000
unkown
page read and write
9086000
unkown
page read and write
C1DB000
unkown
page read and write
C22B000
unkown
page read and write
7FF55752A000
unkown
page readonly
A877000
unkown
page read and write
7E05000
stack
page read and write
3213000
stack
page read and write
A0B9000
unkown
page read and write
7FF55710A000
unkown
page readonly
C3E7000
unkown
page read and write
3350000
unkown
page readonly
7FF557487000
unkown
page readonly
47C6000
unkown
page read and write
7E05000
stack
page read and write
E13B000
stack
page read and write
7DF4689B1000
unkown
page execute read
C101000
unkown
page read and write
ADAF000
stack
page read and write
7FF557420000
unkown
page readonly
7FF5573A9000
unkown
page readonly
A850000
unkown
page read and write
BBC0000
unkown
page read and write
7300000
unkown
page read and write
7FF5574EF000
unkown
page readonly
17D0000
heap
page read and write
90CF000
unkown
page read and write
7DF468970000
unkown
page readonly
77C0000
unkown
page read and write
7FF5574B3000
unkown
page readonly
7FF557065000
unkown
page readonly
2F90000
unkown
page readonly
E3F000
unkown
page write copy
5161000
unkown
page read and write
4E0000
trusted library allocation
page read and write
A8CE000
unkown
page read and write
50B0000
unkown
page write copy
7DF4689B1000
unkown
page execute read
FE40000
heap
page read and write
40D0000
trusted library allocation
page execute and read and write
8EEE000
unkown
page read and write
7C00000
unkown
page readonly
7FF5569E8000
unkown
page readonly
7FF5575A1000
unkown
page readonly
F330000
unkown
page execute and read and write
7176000
unkown
page read and write
33FF000
stack
page read and write
32E3000
unkown
page read and write
7BC1000
unkown
page read and write
7FF5573DE000
unkown
page readonly
732E000
unkown
page read and write
FD61000
unkown
page read and write
7FF557042000
unkown
page readonly
4E0000
trusted library allocation
page read and write
C5B2000
unkown
page read and write
7FF557239000
unkown
page readonly
7FF557103000
unkown
page readonly
7FF5570CF000
unkown
page readonly
A0FF000
unkown
page read and write
4190000
direct allocation
page read and write
4734000
unkown
page read and write
9854000
unkown
page read and write
A8D1000
unkown
page read and write
7A80000
unkown
page readonly
7FF55764C000
unkown
page readonly
531D000
unclassified section
page execute and read and write
7FF557476000
unkown
page readonly
7FF5569F1000
unkown
page readonly
7FF557594000
unkown
page readonly
590000
trusted library allocation
page read and write
32E6000
unkown
page read and write
7FF556E9A000
unkown
page readonly
8D7A000
unkown
page read and write
7FF5573EA000
unkown
page readonly
C00000
heap
page read and write
73C5000
stack
page read and write
42B3000
direct allocation
page read and write
8D70000
unkown
page read and write
8D74000
unkown
page read and write
4E0000
trusted library allocation
page read and write
7FF557235000
unkown
page readonly
372D000
direct allocation
page execute and read and write
4820000
unkown
page read and write
7FF5575C5000
unkown
page readonly
32F3000
unkown
page read and write
7FF55747D000
unkown
page readonly
7FF557594000
unkown
page readonly
46F6000
unkown
page read and write
A1FD000
unkown
page read and write
8ECE000
unkown
page read and write
7FF5570F7000
unkown
page readonly
7FF557437000
unkown
page readonly
4800000
unkown
page read and write
32C4000
unkown
page read and write
472C000
unkown
page read and write
7FF557568000
unkown
page readonly
B070000
unkown
page read and write
2F20000
trusted library allocation
page read and write
C22B000
unkown
page read and write
7FF5575B9000
unkown
page readonly
C57E000
unkown
page read and write
90CF000
unkown
page read and write
C12D000
unkown
page read and write
7FF5572D4000
unkown
page readonly
842F000
stack
page read and write
8ECE000
unkown
page read and write
FD7A000
unkown
page read and write
7FF55708D000
unkown
page readonly
A08D000
stack
page read and write
590000
trusted library allocation
page read and write
46E0000
unkown
page read and write
C2E4000
unkown
page read and write
7FF556F90000
unkown
page readonly
A225000
unkown
page read and write
8EEE000
unkown
page read and write
718000
heap
page read and write
3350000
unkown
page readonly
7FF557434000
unkown
page readonly
1023000
heap
page read and write
1B18000
heap
page read and write
3005000
heap
page read and write
F6F4000
unkown
page read and write
B080000
unkown
page read and write
7FF557669000
unkown
page readonly
487A000
unkown
page read and write
3101000
heap
page read and write
7FF557493000
unkown
page readonly
C427000
unkown
page read and write
7FF5571E6000
unkown
page readonly
C90000
system
page execute and read and write
4E0000
trusted library allocation
page read and write
C22F000
unkown
page read and write
8DA6000
unkown
page read and write
19C0000
heap
page read and write
71D000
heap
page read and write
7FF5573E2000
unkown
page readonly
7FF55707D000
unkown
page readonly
A156000
unkown
page read and write
B42F000
stack
page read and write
9013000
unkown
page read and write
178E000
stack
page read and write
7306000
unkown
page read and write
C328000
unkown
page read and write
712000
heap
page read and write
7FF55750F000
unkown
page readonly
C13000
heap
page read and write
7FF556F31000
unkown
page readonly
F7F4000
unkown
page read and write
F6C9000
unkown
page read and write
35AC000
heap
page read and write
1B7B000
heap
page read and write
7FF55703F000
unkown
page readonly
FE42000
heap
page read and write
C546000
unkown
page read and write
7FF5573C1000
unkown
page readonly
8D76000
unkown
page read and write
A00A000
stack
page read and write
A858000
unkown
page read and write
7FF556E8D000
unkown
page readonly
8D78000
unkown
page read and write
32C9000
unkown
page read and write
1630000
heap
page read and write
472C000
unkown
page read and write
7FF556FE3000
unkown
page readonly
8EDD000
unkown
page read and write
7FF5572A4000
unkown
page readonly
FC9000
stack
page read and write
8371000
unkown
page read and write
7FF5575D0000
unkown
page readonly
7A4B000
stack
page read and write
9CDC000
stack
page read and write
7176000
unkown
page read and write
F6C000
stack
page read and write
7FF556E75000
unkown
page readonly
C74000
heap
page read and write
8D80000
unkown
page read and write
A87B000
unkown
page read and write
7FF5573D8000
unkown
page readonly
892E000
stack
page read and write
C5BE000
unkown
page read and write
7FF5570CF000
unkown
page readonly
32E3000
unkown
page read and write
C74000
heap
page read and write
76B0000
unkown
page read and write
90DB000
unkown
page read and write
FD65000
unkown
page read and write
72FC000
unkown
page read and write
7FF5573E6000
unkown
page readonly
C244000
unkown
page read and write
90F2000
unkown
page read and write
7FF557568000
unkown
page readonly
8D6C000
unkown
page read and write
42B3000
direct allocation
page read and write
352D000
heap
page read and write
A8E5000
unkown
page read and write
7FF557328000
unkown
page readonly
C24F000
unkown
page read and write
7E03000
stack
page read and write
4810000
unkown
page read and write
7FF55726A000
unkown
page readonly
51F9000
unkown
page read and write
C3AE000
unkown
page read and write
7FF55748F000
unkown
page readonly
90AC000
unkown
page read and write
A8D1000
unkown
page read and write
C18A000
unkown
page read and write
A0DA000
unkown
page read and write
C3A8000
unkown
page read and write
32FD000
stack
page read and write
32E6000
unkown
page read and write
8D76000
unkown
page read and write
C5F2000
unkown
page read and write
F6B2000
unkown
page read and write
7FF5571E2000
unkown
page readonly
C0FB000
unkown
page read and write
2D8A000
stack
page read and write
A0A5000
unkown
page read and write
7FF5569FA000
unkown
page readonly
3249000
unkown
page read and write
7D8E000
stack
page read and write
7FF556FFB000
unkown
page readonly
15BF000
stack
page read and write
4E0000
trusted library allocation
page read and write
477D000
unkown
page read and write
4E0000
trusted library allocation
page read and write
FD72000
unkown
page read and write
A850000
unkown
page read and write
4E0000
trusted library allocation
page read and write
50B0000
unkown
page write copy
7FF556F26000
unkown
page readonly
4730000
unkown
page read and write
445D000
direct allocation
page read and write
718B000
unkown
page read and write
7FF556FF3000
unkown
page readonly
FE4A000
heap
page read and write
7FF557330000
unkown
page readonly
7FF55702F000
unkown
page readonly
7FF557045000
unkown
page readonly
7FF557249000
unkown
page readonly
42B3000
direct allocation
page read and write
715C000
unkown
page read and write
A0DA000
unkown
page read and write
7FF5571AC000
unkown
page readonly
A87A000
unkown
page read and write
9259000
stack
page read and write
7FF5575EA000
unkown
page readonly
7FF55751D000
unkown
page readonly
A810000
unkown
page read and write
73D0000
unkown
page read and write
C0FB000
unkown
page read and write
590000
trusted library allocation
page read and write
7FF557429000
unkown
page readonly
C546000
unkown
page read and write
15CF000
stack
page read and write
C55A000
unkown
page read and write
C13000
heap
page read and write
7FF5571B3000
unkown
page readonly
AD10000
unkown
page readonly
7FF557535000
unkown
page readonly
F7B4000
unkown
page read and write
7A60000
unkown
page readonly
FB0000
unkown
page read and write
330A000
unkown
page read and write
8820000
unkown
page readonly
17B4000
heap
page read and write
7E03000
stack
page read and write
7169000
unkown
page read and write
98DA000
stack
page read and write
212E000
stack
page read and write
7FF5575BF000
unkown
page readonly
7FF5573C9000
unkown
page readonly
7FF557042000
unkown
page readonly
718B000
unkown
page read and write
A87A000
unkown
page read and write
B628000
stack
page read and write
7FF557589000
unkown
page readonly
732B000
unkown
page read and write
4E0000
trusted library allocation
page read and write
7C70000
unkown
page readonly
7FF557037000
unkown
page readonly
E3F000
unkown
page read and write
7FF55719C000
unkown
page readonly
7FF556E7C000
unkown
page readonly
C50000
heap
page read and write
2C8E000
stack
page read and write
330A000
unkown
page read and write
C3E7000
unkown
page read and write
32DB000
unkown
page read and write
32C7000
unkown
page read and write
C374000
unkown
page read and write
C557000
unkown
page read and write
7DF468970000
unkown
page readonly
7FF557437000
unkown
page readonly
7FF557434000
unkown
page readonly
712000
heap
page read and write
E280000
unkown
page read and write
8DAD000
unkown
page read and write
7FF55747D000
unkown
page readonly
8871000
unkown
page read and write
8FE1000
unkown
page read and write
3000000
heap
page read and write
7FF55748F000
unkown
page readonly
C50000
heap
page read and write
7FF5573C1000
unkown
page readonly
9013000
unkown
page read and write
7FF557571000
unkown
page readonly
9E8E000
stack
page read and write
445D000
direct allocation
page read and write
89AE000
stack
page read and write
524000
heap
page read and write
7FF5573A9000
unkown
page readonly
71FC000
unkown
page read and write
72C3000
unkown
page read and write
4E0000
trusted library allocation
page read and write
C072000
unkown
page read and write
C3ED000
unkown
page read and write
C5B2000
unkown
page read and write
19AF000
heap
page read and write
4440000
direct allocation
page execute and read and write
C328000
unkown
page read and write
8DFE000
unkown
page read and write
7FF556E7E000
unkown
page readonly
9E0F000
stack
page read and write
A8DD000
unkown
page read and write
90F2000
unkown
page read and write
C1E9000
unkown
page read and write
C1DB000
unkown
page read and write
7FF55707D000
unkown
page readonly
9013000
unkown
page read and write
7FF557493000
unkown
page readonly
C12D000
unkown
page read and write
7FF55764C000
unkown
page readonly
4E0000
trusted library allocation
page read and write
7FF556F26000
unkown
page readonly
7173000
unkown
page read and write
7FF5574F9000
unkown
page readonly
7DF468980000
unkown
page readonly
445D000
direct allocation
page read and write
A23B000
unkown
page read and write
19DF000
heap
page read and write
C3A8000
unkown
page read and write
2FD0000
trusted library allocation
page execute and read and write
9086000
unkown
page read and write
B82A000
stack
page read and write
8DB0000
unkown
page read and write
330A000
unkown
page read and write
524000
heap
page read and write
FD91000
unkown
page read and write
76B0000
unkown
page read and write
8DAD000
unkown
page read and write
113FF000
system
page read and write
7FF557627000
unkown
page readonly
F77B000
unkown
page read and write
C328000
unkown
page read and write
7FF55753D000
unkown
page readonly
10B0000
unkown
page readonly
8D74000
unkown
page read and write
7FF556FC4000
unkown
page readonly
7FF55742B000
unkown
page readonly
8D60000
unkown
page read and write
90C9000
unkown
page read and write
5161000
unkown
page read and write
B7AA000
stack
page read and write
18C0000
direct allocation
page execute and read and write
7FF55765C000
unkown
page readonly
3300000
heap
page read and write
7FF55720D000
unkown
page readonly
B42F000
stack
page read and write
174E000
stack
page read and write
C124000
unkown
page read and write
7FF5573BB000
unkown
page readonly
4782000
direct allocation
page execute and read and write
8F83000
unkown
page read and write
913F000
unkown
page read and write
3AED000
unclassified section
page execute and read and write
A8E4000
unkown
page read and write
524000
heap
page read and write
712000
heap
page read and write
7FF557174000
unkown
page readonly
A0BD000
unkown
page read and write
7FF5570FE000
unkown
page readonly
51F9000
unkown
page read and write
7E10000
unkown
page read and write
C2E4000
unkown
page read and write
C23A000
unkown
page read and write
7FF5572D4000
unkown
page readonly
AEE7000
stack
page read and write
707000
heap
page read and write
38CD000
direct allocation
page execute and read and write
7FF557285000
unkown
page readonly
E60000
unkown
page readonly
7FF556A1B000
unkown
page readonly
7FF55763D000
unkown
page readonly
32F3000
unkown
page read and write
7276000
unkown
page read and write
44CE000
direct allocation
page read and write
A8E5000
unkown
page read and write
7FF556F9E000
unkown
page readonly
90C9000
unkown
page read and write
C2D3000
unkown
page read and write
1440000
unkown
page readonly
8D68000
unkown
page read and write
A87B000
unkown
page read and write
B81000
heap
page read and write
7FF55738F000
unkown
page readonly
C591000
unkown
page read and write
E13B000
stack
page read and write
1441000
unkown
page readonly
32DB000
unkown
page read and write
2F70000
unkown
page readonly
7FF557387000
unkown
page readonly
8F27000
unkown
page read and write
8530000
unkown
page readonly
2F10000
heap
page read and write
7FF557467000
unkown
page readonly
8F4D000
unkown
page read and write
4170000
trusted library allocation
page execute and read and write
C5E7000
unkown
page read and write
7FF557285000
unkown
page readonly
7FF557106000
unkown
page readonly
7162000
unkown
page read and write
7FF556E66000
unkown
page readonly
AF6D000
stack
page read and write
4190000
direct allocation
page read and write
902C000
unkown
page read and write
8F83000
unkown
page read and write
7140000
unkown
page read and write
There are 1580 hidden memdumps, click here to show them.