IOC Report
yaM8XR1HfL.exe

loading gif

Files

File Path
Type
Category
Malicious
yaM8XR1HfL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yaM8XR1HfL.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yaM8XR1HfL.exe
"C:\Users\user\Desktop\yaM8XR1HfL.exe"
malicious
C:\Users\user\Desktop\yaM8XR1HfL.exe
"C:\Users\user\Desktop\yaM8XR1HfL.exe"
malicious
C:\Users\user\Desktop\yaM8XR1HfL.exe
"C:\Users\user\Desktop\yaM8XR1HfL.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\WWAHost.exe
"C:\Windows\SysWOW64\WWAHost.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\yaM8XR1HfL.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
www.liamcollinai.com/na10/
malicious
http://www.nftees.tech/na10/?y2=vxBAV4x3qjJKkl3AB8S3aH8FdY2weIJ3+CekvXUcdu0/pCH7SUv9XlMLgROraoBr2jfW&DV=lbC06h
217.160.0.1
malicious
http://www.bz59.topReferer:
unknown
https://word.office.comon
unknown
http://www.thelonelyteacup.com/na10/
unknown
http://www.nbvci.xyz/na10/www.abc8bet6.com
unknown
http://www.giorgiaclerico.comReferer:
unknown
http://www.nftees.tech/na10/
unknown
http://www.productivagc.comReferer:
unknown
http://www.dexcoenergy.com/na10/www.hokivegasslots.club
unknown
http://www.abc8bet6.comReferer:
unknown
http://www.giorgiaclerico.com
unknown
https://powerpoint.office.comcember
unknown
http://www.sasoera.com/na10/www.liamcollinai.com
unknown
http://www.bz59.top/na10/www.jakobniinja.xyz
unknown
http://www.nbvci.xyzReferer:
unknown
http://www.nftees.techReferer:
unknown
http://www.nona23.lat/na10/www.giorgiaclerico.com
unknown
http://www.snykee.com/na10/www.awclog.com
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
http://www.dexcoenergy.comReferer:
unknown
http://www.nbvci.xyz
unknown
http://www.hokivegasslots.club/na10/www.thelonelyteacup.com
unknown
http://www.osthirmaker.comReferer:
unknown
http://www.liamcollinai.com
unknown
http://www.snykee.com/na10/
unknown
http://www.osthirmaker.com/na10/www.nftees.tech
unknown
http://www.abc8bet6.com/na10/www.productivagc.com
unknown
http://www.awclog.com/na10/www.sasoera.com
unknown
http://www.nftees.tech/na10/www.nbvci.xyz
unknown
http://www.awclog.com
unknown
http://www.osthirmaker.com/na10/
unknown
http://www.snykee.com
unknown
http://www.nbvci.xyz/na10/
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.giorgiaclerico.com/na10/
unknown
http://www.liamcollinai.comReferer:
unknown
http://www.nona23.latReferer:
unknown
http://www.productivagc.com/na10/www.dexcoenergy.com
unknown
https://wns.windows.com/)s
unknown
http://www.nftees.tech
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.hokivegasslots.club/na10/
unknown
http://www.liamcollinai.com/na10/www.nona23.lat
unknown
http://www.nona23.lat
unknown
http://www.awclog.comReferer:
unknown
http://www.thelonelyteacup.comReferer:
unknown
http://www.hokivegasslots.clubReferer:
unknown
http://www.jakobniinja.xyz
unknown
http://www.productivagc.com/na10/
unknown
http://www.abc8bet6.com
unknown
http://www.jakobniinja.xyz/na10/
unknown
http://www.liamcollinai.com/na10/
unknown
http://www.snykee.comReferer:
unknown
http://www.awclog.com/na10/
unknown
https://outlook.com
unknown
http://www.thelonelyteacup.com
unknown
http://www.osthirmaker.com
unknown
http://www.jakobniinja.xyzReferer:
unknown
http://www.jakobniinja.xyz/na10/e
unknown
http://www.giorgiaclerico.com/na10/www.bz59.top
unknown
http://www.hokivegasslots.club
unknown
http://www.sasoera.com/na10/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.bz59.top
unknown
http://www.sasoera.comReferer:
unknown
http://www.dexcoenergy.com
unknown
http://www.dexcoenergy.com/na10/
unknown
https://api.msn.com/
unknown
http://www.thelonelyteacup.com/na10/www.snykee.com
unknown
http://ns.adobe.
unknown
http://www.productivagc.com
unknown
http://crl.v
unknown
http://iptc.org/std/Iptc4xmde
unknown
http://www.sasoera.com
unknown
http://www.bz59.top/na10/
unknown
http://www.nona23.lat/na10/
unknown
http://www.abc8bet6.com/na10/
unknown
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.nftees.tech
217.160.0.1
malicious
www.osthirmaker.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
217.160.0.1
www.nftees.tech
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 128 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
170000
remote allocation
page execute and read and write
malicious
2851000
trusted library allocation
page read and write
malicious
3590000
trusted library allocation
page read and write
malicious
53F0000
trusted library section
page read and write
malicious
3859000
trusted library allocation
page read and write
malicious
3550000
unclassified section
page execute and read and write
malicious
38E4000
trusted library allocation
page read and write
malicious
2F70000
system
page execute and read and write
malicious
3A0E000
trusted library allocation
page read and write
malicious
2982000
trusted library allocation
page read and write
354F000
unkown
page read and write
E9C000
heap
page read and write
942C000
stack
page read and write
2A17000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
7FF5D73F5000
unkown
page readonly
3400000
unkown
page read and write
C5FA000
unkown
page read and write
C609000
unkown
page read and write
C78A000
unkown
page read and write
2D9B000
trusted library allocation
page read and write
1270000
unkown
page read and write
7435000
stack
page read and write
2A7C000
trusted library allocation
page read and write
3D80000
heap
page read and write
2E1E000
trusted library allocation
page read and write
29D8000
trusted library allocation
page read and write
C61B000
unkown
page read and write
F4C0000
heap
page read and write
3540000
unkown
page read and write
3520000
unkown
page readonly
AD0000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
3500000
stack
page read and write
2B70000
trusted library allocation
page read and write
7FF5D7643000
unkown
page readonly
4A12000
unkown
page read and write
2D1C000
trusted library allocation
page read and write
7FF5D72C8000
unkown
page readonly
7FF5D760B000
unkown
page readonly
AEA000
trusted library allocation
page execute and read and write
4179000
direct allocation
page execute and read and write
28F8000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
7FF5D77C7000
unkown
page readonly
C908000
unkown
page read and write
2CA3000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
18D0000
heap
page read and write
1250000
unkown
page read and write
2AE6000
trusted library allocation
page read and write
AA17000
unkown
page read and write
1154D000
system
page read and write
C862000
unkown
page read and write
C975000
unkown
page read and write
C9DB000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
3584000
heap
page read and write
3584000
heap
page read and write
4647000
unclassified section
page read and write
7FF5D743F000
unkown
page readonly
1731000
unkown
page readonly
2E64000
trusted library allocation
page read and write
7FF5D75B3000
unkown
page readonly
5F0E000
stack
page read and write
5C20000
trusted library allocation
page read and write
10584000
unkown
page read and write
5F0000
heap
page read and write
A33F000
unkown
page read and write
E10000
unkown
page readonly
A9DF000
unkown
page read and write
2A9B000
trusted library allocation
page read and write
7FF5D7691000
unkown
page readonly
2A4D000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
C800000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
7FF5D75F9000
unkown
page readonly
7AA0000
unkown
page read and write
7FF5D705D000
unkown
page readonly
11B0000
unkown
page read and write
AFBE000
stack
page read and write
4D64000
trusted library allocation
page read and write
5368000
heap
page read and write
F532000
unkown
page read and write
7FF5D7740000
unkown
page readonly
7FF5D75F9000
unkown
page readonly
3584000
heap
page read and write
35D5000
unkown
page read and write
6C0000
heap
page read and write
AB0000
trusted library allocation
page read and write
C86F000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
710000
heap
page read and write
7FF5D7280000
unkown
page readonly
35B5000
unkown
page read and write
35CD000
unkown
page read and write
F50D000
unkown
page read and write
1383000
heap
page read and write
2AD1000
trusted library allocation
page read and write
2996000
trusted library allocation
page read and write
C8C1000
unkown
page read and write
F0C000
heap
page read and write
7FF5D7485000
unkown
page readonly
E90000
heap
page read and write
3851000
trusted library allocation
page read and write
8A46000
unkown
page read and write
E2B000
stack
page read and write
FF0000
unkown
page readonly
9B41000
unkown
page read and write
779E000
unkown
page read and write
2AC7000
trusted library allocation
page read and write
A2A2000
unkown
page read and write
2B03000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
7E60000
unkown
page read and write
2D4A000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
33B0000
unkown
page readonly
A2D7000
unkown
page read and write
7FF5D77E3000
unkown
page readonly
C669000
unkown
page read and write
7FF5D7215000
unkown
page readonly
AA0E000
unkown
page read and write
2BF2000
trusted library allocation
page read and write
A3B9000
unkown
page read and write
1798000
direct allocation
page execute and read and write
7FF5D7792000
unkown
page readonly
6D0F000
stack
page read and write
29E7000
trusted library allocation
page read and write
7C70000
unkown
page readonly
2A4A000
trusted library allocation
page read and write
C8C4000
unkown
page read and write
C979000
unkown
page read and write
91BC000
stack
page read and write
33F0000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
5C0E000
stack
page read and write
7FF5D7244000
unkown
page readonly
2920000
trusted library allocation
page read and write
9B41000
unkown
page read and write
29E0000
trusted library allocation
page read and write
7FF5D77A8000
unkown
page readonly
2AB6000
trusted library allocation
page read and write
7FF5D77CD000
unkown
page readonly
2CB4000
trusted library allocation
page read and write
A220000
unkown
page read and write
76F8000
unkown
page read and write
2B3C000
trusted library allocation
page read and write
C669000
unkown
page read and write
7FF5D770F000
unkown
page readonly
35E4000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
AE1D000
stack
page read and write
29DE000
trusted library allocation
page read and write
3170000
unkown
page read and write
2C47000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
7FF5D71F9000
unkown
page readonly
49D6000
unkown
page read and write
C450000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
5479000
unkown
page read and write
7FF5D774C000
unkown
page readonly
3D86000
heap
page read and write
7FF5D7236000
unkown
page readonly
BF3E000
stack
page read and write
C5EC000
unkown
page read and write
7FF5D751F000
unkown
page readonly
C642000
unkown
page read and write
7631000
unkown
page read and write
7FF5D7700000
unkown
page readonly
2BA8000
trusted library allocation
page read and write
2C88000
trusted library allocation
page read and write
C61D000
unkown
page read and write
7FF5D7244000
unkown
page readonly
7FF5D732D000
unkown
page readonly
2A59000
trusted library allocation
page read and write
9A98000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
112A6000
system
page read and write
3584000
heap
page read and write
710C000
heap
page read and write
C0BA000
stack
page read and write
2CCF000
trusted library allocation
page read and write
3554000
unkown
page read and write
2C8A000
trusted library allocation
page read and write
AA01000
unkown
page read and write
7DF4F2480000
unkown
page readonly
7FF5D77F7000
unkown
page readonly
2E75000
trusted library allocation
page read and write
35E4000
unkown
page read and write
459F000
unclassified section
page read and write
DD2000
trusted library allocation
page read and write
A220000
unkown
page read and write
CA39000
unkown
page read and write
2D37000
trusted library allocation
page read and write
7FF5D6BEF000
unkown
page readonly
29DC000
trusted library allocation
page read and write
8F7000
stack
page read and write
AA0000
trusted library allocation
page read and write
7FF5D774C000
unkown
page readonly
3051000
unkown
page read and write
4AE9000
unkown
page read and write
10606000
unkown
page read and write
3F00000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
7FF5D7458000
unkown
page readonly
3584000
heap
page read and write
BDC0000
unkown
page read and write
1340000
unkown
page read and write
C971000
unkown
page read and write
2AE8000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
F18000
heap
page read and write
10644000
unkown
page read and write
2E03000
trusted library allocation
page read and write
A3C3000
unkown
page read and write
7FF5D7292000
unkown
page readonly
BB10000
heap
page read and write
5D50000
heap
page read and write
7B00000
unkown
page readonly
4A40000
unkown
page read and write
4EA3000
heap
page read and write
7FF5D71AF000
unkown
page readonly
BE90000
unkown
page read and write
9A72000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
7FF5D7257000
unkown
page readonly
7FF5D71EA000
unkown
page readonly
7FF5D77CD000
unkown
page readonly
C8C4000
unkown
page read and write
3D91000
heap
page read and write
9AA0000
unkown
page read and write
7B60000
unkown
page readonly
7FF5D7267000
unkown
page readonly
7FF5D71E6000
unkown
page readonly
2979000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
49A8000
unkown
page read and write
7FF5D720F000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
A33F000
unkown
page read and write
7FF5D7450000
unkown
page readonly
F39000
heap
page read and write
7FF5D7398000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
7FF5D76D7000
unkown
page readonly
C7CB000
unkown
page read and write
AA17000
unkown
page read and write
C48B000
unkown
page read and write
3520000
unkown
page readonly
9AA0000
unkown
page read and write
BDC0000
unkown
page read and write
1220000
unkown
page read and write
7FF5D7669000
unkown
page readonly
7FF5D7407000
unkown
page readonly
2DE0000
trusted library allocation
page read and write
A1AF000
stack
page read and write
7FF5D7425000
unkown
page readonly
8A00000
unkown
page read and write
B03B000
stack
page read and write
7FF5D748A000
unkown
page readonly
AA0F000
unkown
page read and write
3584000
heap
page read and write
12B0000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
2C28000
trusted library allocation
page read and write
7FF5D7648000
unkown
page readonly
AA0F000
unkown
page read and write
7DF4F2491000
unkown
page execute read
7FF5D71AF000
unkown
page readonly
8C39000
stack
page read and write
EBA000
heap
page read and write
2CA1000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
7510000
trusted library section
page read and write
7FF5D7398000
unkown
page readonly
2B42000
trusted library allocation
page read and write
29AB000
trusted library allocation
page read and write
C4DC000
unkown
page read and write
2E1C000
trusted library allocation
page read and write
1000000
heap
page read and write
ECE000
stack
page read and write
F50E000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
7FF5D71E6000
unkown
page readonly
52F0000
heap
page read and write
7FF5D77EB000
unkown
page readonly
29B7000
trusted library allocation
page read and write
7FF5D748C000
unkown
page readonly
C8EF000
unkown
page read and write
C7C6000
unkown
page read and write
72AD000
stack
page read and write
7FF5D7797000
unkown
page readonly
7654000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
1060B000
unkown
page read and write
105C3000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
9A96000
unkown
page read and write
7AC0000
unkown
page read and write
3160000
unkown
page read and write
3584000
heap
page read and write
2CEA000
trusted library allocation
page read and write
35FA000
unkown
page read and write
7FF5D765F000
unkown
page readonly
2D18000
trusted library allocation
page read and write
7FF5D71E0000
unkown
page readonly
2DE8000
trusted library allocation
page read and write
7FF5D7722000
unkown
page readonly
35D1000
unkown
page read and write
2DFB000
trusted library allocation
page read and write
2A9F000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
7FF5D7336000
unkown
page readonly
7FF5D706F000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
9B8D000
unkown
page read and write
2C86000
trusted library allocation
page read and write
171D000
direct allocation
page execute and read and write
A2B5000
unkown
page read and write
7FF5D783B000
unkown
page readonly
2B89000
trusted library allocation
page read and write
10644000
unkown
page read and write
EEF000
heap
page read and write
F518000
unkown
page read and write
2ACB000
trusted library allocation
page read and write
3672000
heap
page read and write
7FF5D72E9000
unkown
page readonly
35C9000
unkown
page read and write
7DF4F2481000
unkown
page execute read
7FF5D75F6000
unkown
page readonly
7792000
trusted library allocation
page read and write
7FF5D716B000
unkown
page readonly
2B93000
trusted library allocation
page read and write
1731000
unkown
page readonly
C73E000
unkown
page read and write
35B3000
unkown
page read and write
A7E000
stack
page read and write
7FF5D77C2000
unkown
page readonly
98FD000
stack
page read and write
2CDB000
trusted library allocation
page read and write
7FF5D7643000
unkown
page readonly
7609000
unkown
page read and write
3584000
heap
page read and write
3100000
unkown
page read and write
9A72000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
536F000
heap
page read and write
A39C000
unkown
page read and write
7FF5D768B000
unkown
page readonly
9B7A000
unkown
page read and write
1152B000
system
page read and write
7FF5D71F9000
unkown
page readonly
3584000
heap
page read and write
A264000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
106E7000
unkown
page execute and read and write
C878000
unkown
page read and write
4EA0000
heap
page read and write
1123000
unkown
page read and write
7FF5D7077000
unkown
page readonly
35CD000
unkown
page read and write
5F39000
heap
page read and write
4321000
direct allocation
page execute and read and write
3672000
heap
page read and write
CA94000
unkown
page read and write
99B0000
unkown
page read and write
2D2E000
unkown
page read and write
7FF5D75F2000
unkown
page readonly
7FF5D7523000
unkown
page readonly
7FF5D7682000
unkown
page readonly
3500000
stack
page read and write
B0E0000
unkown
page readonly
5DD0000
heap
page read and write
7FF5D77A4000
unkown
page readonly
7FF5D7745000
unkown
page readonly
7DF4F2480000
unkown
page readonly
2AA1000
trusted library allocation
page read and write
C02000
unkown
page execute read
7FF5D75CB000
unkown
page readonly
C4BD000
unkown
page read and write
2AFF000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
7FF5D7837000
unkown
page readonly
29A5000
trusted library allocation
page read and write
7FF5D7404000
unkown
page readonly
7FF5D705D000
unkown
page readonly
7FF5D7202000
unkown
page readonly
7FF5D7703000
unkown
page readonly
905D000
stack
page read and write
7FF5D781A000
unkown
page readonly
B4BF000
stack
page read and write
7FF5D7292000
unkown
page readonly
35B3000
unkown
page read and write
F50D000
unkown
page read and write
2AFD000
trusted library allocation
page read and write
2994000
trusted library allocation
page read and write
4986000
unkown
page read and write
A23A000
unkown
page read and write
4AB0000
unkown
page read and write
7B80000
unkown
page readonly
7FF5D7604000
unkown
page readonly
35FA000
unkown
page read and write
1383000
heap
page read and write
7FF5D7236000
unkown
page readonly
A39F000
unkown
page read and write
7FF5D7230000
unkown
page readonly
5463000
unkown
page read and write
7FF5D723C000
unkown
page readonly
3D8C000
heap
page read and write
7FF5D75D6000
unkown
page readonly
9679000
stack
page read and write
2A0E000
trusted library allocation
page read and write
2EC0000
unkown
page readonly
7FF5D71EF000
unkown
page readonly
9AA8000
unkown
page read and write
AA40000
unkown
page read and write
7DF4F2460000
unkown
page readonly
4D81000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
35C0000
trusted library allocation
page read and write
35C0000
trusted library allocation
page read and write
C44F000
stack
page read and write
C7C000
unkown
page execute read
7FF5D72C8000
unkown
page readonly
2CB8000
trusted library allocation
page read and write
9B2C000
unkown
page read and write
A3E000
stack
page read and write
BFE000
stack
page read and write
7FF5D7309000
unkown
page readonly
7611000
unkown
page read and write
7FF5D775C000
unkown
page readonly
2E12000
trusted library allocation
page read and write
C9D7000
unkown
page read and write
75E0000
unkown
page read and write
9B8C000
unkown
page read and write
99B0000
unkown
page read and write
2AD6000
trusted library allocation
page read and write
7FF5D775C000
unkown
page readonly
EE4000
heap
page read and write
843F000
stack
page read and write
C653000
unkown
page read and write
A313000
unkown
page read and write
52EF000
stack
page read and write
3669000
heap
page read and write
33C0000
unkown
page read and write
C65E000
unkown
page read and write
E7CE000
stack
page read and write
35FA000
unkown
page read and write
2D97000
trusted library allocation
page read and write
AA40000
unkown
page read and write
7FF5D751F000
unkown
page readonly
2AC5000
trusted library allocation
page read and write
1360000
unkown
page readonly
2A46000
trusted library allocation
page read and write
BFB8000
stack
page read and write
353D000
unkown
page read and write
B0BD000
stack
page read and write
9ABD000
unkown
page read and write
A3B9000
unkown
page read and write
7090000
heap
page read and write
7FF5D772C000
unkown
page readonly
7DBD000
stack
page read and write
7FF5D71BF000
unkown
page readonly
9B86000
unkown
page read and write
3672000
heap
page read and write
3584000
heap
page read and write
7FF5D778A000
unkown
page readonly
F501000
unkown
page read and write
DDB000
trusted library allocation
page execute and read and write
120000
system
page execute and read and write
E6CD000
stack
page read and write
7FF5D77E0000
unkown
page readonly
2A2D000
trusted library allocation
page read and write
AC8000
heap
page read and write
9B8C000
unkown
page read and write
A3AA000
unkown
page read and write
7FF5D774A000
unkown
page readonly
7FF5D7799000
unkown
page readonly
3B51000
heap
page read and write
1340000
unkown
page read and write
3584000
heap
page read and write
9D67000
unkown
page read and write
AB3000
trusted library allocation
page execute and read and write
2AB0000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
7B10000
unkown
page read and write
35B0000
unkown
page read and write
4A71000
unkown
page read and write
760D000
unkown
page read and write
7FF5D758D000
unkown
page readonly
7FF5D7455000
unkown
page readonly
366C000
heap
page read and write
E54D000
stack
page read and write
3489000
stack
page read and write
2EA1000
unkown
page read and write
297B000
trusted library allocation
page read and write
C617000
unkown
page read and write
7DF4F24A1000
unkown
page execute read
49FA000
unkown
page read and write
F97000
heap
page read and write
A0A9000
stack
page read and write
A28D000
unkown
page read and write
7C90000
unkown
page read and write
7FF5D7407000
unkown
page readonly
E64D000
stack
page read and write
2C0B000
trusted library allocation
page read and write
84BB000
stack
page read and write
7FF5D7546000
unkown
page readonly
7FF5D710B000
unkown
page readonly
9EB0000
unkown
page readonly
49EC000
stack
page read and write
B85A000
stack
page read and write
B330000
unkown
page read and write
35C1000
unkown
page read and write
3280000
unkown
page read and write
9B7D000
unkown
page read and write
9AAC000
unkown
page read and write
A384000
unkown
page read and write
ADD000
trusted library allocation
page execute and read and write
7FF5D76CD000
unkown
page readonly
96FE000
stack
page read and write
F4C2000
heap
page read and write
7670000
trusted library allocation
page read and write
7FF5D760B000
unkown
page readonly
13A0000
unkown
page readonly
A9A0000
unkown
page read and write
35C1000
unkown
page read and write
2D1E000
trusted library allocation
page read and write
F52E000
unkown
page read and write
1390000
heap
page read and write
5DE9000
trusted library allocation
page read and write
3584000
heap
page read and write
96FE000
stack
page read and write
9D67000
unkown
page read and write
33C0000
unkown
page read and write
7FF5D7705000
unkown
page readonly
86D0000
unkown
page readonly
761E000
unkown
page read and write
2A29000
trusted library allocation
page read and write
9A90000
unkown
page read and write
A40E000
unkown
page read and write
7FF5D747F000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
5070000
trusted library allocation
page read and write
7FF5D69BB000
unkown
page readonly
2B8B000
trusted library allocation
page read and write
3140000
unkown
page read and write
C625000
unkown
page read and write
2DCD000
trusted library allocation
page read and write
7FF5D74C3000
unkown
page readonly
7FF5D728E000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
B950000
unkown
page readonly
35C0000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
CA4000
unkown
page execute read
2B74000
trusted library allocation
page read and write
76F8000
unkown
page read and write
2DD0000
trusted library allocation
page read and write
3110000
unkown
page readonly
3280000
unkown
page read and write
BE49000
stack
page read and write
2DC7000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
7E58000
stack
page read and write
A1AF000
stack
page read and write
3674000
heap
page read and write
29F1000
trusted library allocation
page read and write
3584000
heap
page read and write
1701000
direct allocation
page execute and read and write
3535000
unkown
page read and write
35D3000
unkown
page read and write
D33D000
stack
page read and write
3540000
unkown
page read and write
3FD3000
heap
page read and write
7104000
heap
page read and write
7FF5D71CC000
unkown
page readonly
53B2000
heap
page read and write
2A5B000
trusted library allocation
page read and write
C3CD000
stack
page read and write
8A46000
unkown
page read and write
7FF5D7591000
unkown
page readonly
7FF5D75DF000
unkown
page readonly
536E000
stack
page read and write
2C45000
trusted library allocation
page read and write
B220000
unkown
page read and write
7FF5D7641000
unkown
page readonly
7691000
unkown
page read and write
2DE6000
trusted library allocation
page read and write
7FF5D76AF000
unkown
page readonly
2E2F000
stack
page read and write
1281000
unkown
page readonly
C800000
unkown
page read and write
7FF5D764F000
unkown
page readonly
C3CC000
stack
page read and write
C5F4000
unkown
page read and write
7FF5D720F000
unkown
page readonly
4B00000
unkown
page read and write
7FF5D7797000
unkown
page readonly
2B76000
trusted library allocation
page read and write
5C30000
trusted library allocation
page execute and read and write
9AB2000
unkown
page read and write
7FF5D75B3000
unkown
page readonly
7AF1000
unkown
page read and write
AA05000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
CA3E000
unkown
page read and write
7FF5D7784000
unkown
page readonly
ED0000
heap
page read and write
A313000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
AA04000
unkown
page read and write
1E0000
system
page execute and read and write
4E9E000
stack
page read and write
942D000
stack
page read and write
B7DC000
stack
page read and write
7FF5D74F2000
unkown
page readonly
7FF5D7808000
unkown
page readonly
2D57000
trusted library allocation
page read and write
9AAC000
unkown
page read and write
2B5F000
trusted library allocation
page read and write
29AD000
trusted library allocation
page read and write
853B000
stack
page read and write
C663000
unkown
page read and write
2D84000
trusted library allocation
page read and write
7FF5D77F7000
unkown
page readonly
2AB2000
trusted library allocation
page read and write
9A9E000
unkown
page read and write
997C000
stack
page read and write
7FF5D720A000
unkown
page readonly
49C2000
unkown
page read and write
2BA6000
trusted library allocation
page read and write
F71000
heap
page read and write
7FF5D7202000
unkown
page readonly
5F4C000
heap
page read and write
CA36000
unkown
page read and write
C8C4000
unkown
page read and write
897B000
stack
page read and write
3667000
heap
page read and write
2BCF000
trusted library allocation
page read and write
11547000
system
page read and write
7680000
trusted library allocation
page execute and read and write
7FF5D7546000
unkown
page readonly
49FD000
unkown
page read and write
4A12000
unkown
page read and write
2ABA000
trusted library allocation
page read and write
3140000
unkown
page read and write
1151F000
system
page read and write
2DE4000
trusted library allocation
page read and write
A40E000
unkown
page read and write
4A0E000
unkown
page read and write
7FF5D765F000
unkown
page readonly
70E000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
C81C000
unkown
page read and write
7FF5D719C000
unkown
page readonly
7440000
unkown
page read and write
7FF5D7648000
unkown
page readonly
7AE0000
unkown
page read and write
7B20000
unkown
page read and write
35F4000
unkown
page read and write
29F9000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
7FF5D749B000
unkown
page readonly
7DF4F2471000
unkown
page execute read
A9E9000
unkown
page read and write
C65E000
unkown
page read and write
A3AA000
unkown
page read and write
761E000
unkown
page read and write
292E000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
3584000
heap
page read and write
3B50000
heap
page read and write
2AF2000
trusted library allocation
page read and write
BE90000
unkown
page read and write
7FF5D7764000
unkown
page readonly
7DBD000
stack
page read and write
C73E000
unkown
page read and write
7FF5D7764000
unkown
page readonly
11530000
system
page read and write
7693000
unkown
page read and write
C91A000
unkown
page read and write
7FF5D7455000
unkown
page readonly
2FD0000
heap
page read and write
2A0A000
trusted library allocation
page read and write
C035000
stack
page read and write
2A40000
trusted library allocation
page read and write
779E000
unkown
page read and write
5DE0000
trusted library allocation
page read and write
2DDE000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
7FF5CE343000
unkown
page readonly
2D54000
trusted library allocation
page read and write
2C7E000
trusted library allocation
page read and write
9E2D000
stack
page read and write
2D52000
trusted library allocation
page read and write
9578000
stack
page read and write
7FF5D771A000
unkown
page readonly
2CBA000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
C8C4000
unkown
page read and write
CA94000
unkown
page read and write
C47F000
unkown
page read and write
7FF5D781A000
unkown
page readonly
C472000
unkown
page read and write
AA0B000
unkown
page read and write
157D000
direct allocation
page execute and read and write
8F49000
stack
page read and write
9AB4000
unkown
page read and write
3650000
heap
page read and write
3678000
heap
page read and write
7FF5D77E9000
unkown
page readonly
C8F9000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
3584000
heap
page read and write
4AD9000
unkown
page read and write
9A90000
unkown
page read and write
35DC000
unkown
page read and write
C621000
unkown
page read and write
F518000
unkown
page read and write
3530000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
AAA7000
unkown
page read and write
8DCB000
stack
page read and write
2E33000
trusted library allocation
page read and write
12D0000
unkown
page readonly
3584000
heap
page read and write
7FF5D760D000
unkown
page readonly
C460000
unkown
page read and write
C9DB000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
AA0E000
unkown
page read and write
A39C000
unkown
page read and write
28E7000
trusted library allocation
page read and write
7FF5D74F2000
unkown
page readonly
2ABC000
trusted library allocation
page read and write
2A95000
trusted library allocation
page read and write
7FF5D7820000
unkown
page readonly
7FF5D717C000
unkown
page readonly
7FF5D75EE000
unkown
page readonly
7FF5D770A000
unkown
page readonly
7989000
stack
page read and write
3584000
heap
page read and write
CA0A000
unkown
page read and write
C952000
unkown
page read and write
12B0000
unkown
page read and write
7FF5D7482000
unkown
page readonly
7FF5D732D000
unkown
page readonly
A2D7000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
3051000
unkown
page read and write
7FF5D7507000
unkown
page readonly
7DF4F2471000
unkown
page execute read
CC6000
unkown
page readonly
3F00000
trusted library allocation
page read and write
35CD000
unkown
page read and write
1060B000
unkown
page read and write
2C2A000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
BE70000
unkown
page readonly
7FF5D6A4B000
unkown
page readonly
11528000
system
page read and write
7FF5D7691000
unkown
page readonly
C472000
unkown
page read and write
3678000
heap
page read and write
2B53000
trusted library allocation
page read and write
1390000
heap
page read and write
7FF5D72CE000
unkown
page readonly
3D9D000
heap
page read and write
7FF5D7462000
unkown
page readonly
7DC0000
unkown
page readonly
8A70000
unkown
page read and write
2D1A000
trusted library allocation
page read and write
7FF5D75F2000
unkown
page readonly
7FF5D747F000
unkown
page readonly
2BEC000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page read and write
7FF5D72D7000
unkown
page readonly
7FF5D77D2000
unkown
page readonly
7FF5D75CB000
unkown
page readonly
10726000
unkown
page execute and read and write
7FF5D7752000
unkown
page readonly
3584000
heap
page read and write
B980000
unkown
page readonly
7FF5D7360000
unkown
page readonly
7FF5D770F000
unkown
page readonly
3CE0000
heap
page read and write
BB9D000
stack
page read and write
7605000
unkown
page read and write
11542000
system
page read and write
2CD5000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
7FF5D72D3000
unkown
page readonly
2A12000
trusted library allocation
page read and write
1153C000
system
page read and write
3170000
unkown
page read and write
9200000
system
page execute and read and write
3584000
heap
page read and write
DF0000
trusted library allocation
page read and write
7FF5D7065000
unkown
page readonly
7DF4F2460000
unkown
page readonly
2D67000
trusted library allocation
page read and write
35D3000
unkown
page read and write
4A16000
unkown
page read and write
4A44000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
7FF5D710B000
unkown
page readonly
2909000
trusted library allocation
page read and write
AE6000
trusted library allocation
page execute and read and write
7FF5D7336000
unkown
page readonly
7FF5D752F000
unkown
page readonly
853B000
stack
page read and write
7FF5D6BDB000
unkown
page readonly
7B80000
unkown
page readonly
362D000
unkown
page read and write
C609000
unkown
page read and write
7FF5CE343000
unkown
page readonly
7DF4F2481000
unkown
page execute read
7FF5D783B000
unkown
page readonly
7FF5D7558000
unkown
page readonly
7FF5D771A000
unkown
page readonly
7D3E000
stack
page read and write
AE2000
trusted library allocation
page read and write
7AE0000
unkown
page read and write
2D69000
trusted library allocation
page read and write
5D55000
heap
page read and write
7FF5D748C000
unkown
page readonly
7FF5D71EA000
unkown
page readonly
2E77000
trusted library allocation
page read and write
A251000
unkown
page read and write
AA0E000
unkown
page read and write
F0C000
heap
page read and write
71B0000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
9679000
stack
page read and write
A416000
unkown
page read and write
7FF5D7589000
unkown
page readonly
7FF5D7442000
unkown
page readonly
35E4000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
7FF5D7488000
unkown
page readonly
35C3000
unkown
page read and write
C62D000
unkown
page read and write
5F20000
heap
page read and write
2B8F000
trusted library allocation
page read and write
7DF4F24A1000
unkown
page execute read
A237000
unkown
page read and write
DD5000
trusted library allocation
page execute and read and write
2A27000
trusted library allocation
page read and write
C605000
unkown
page read and write
7686000
unkown
page read and write
3D69000
heap
page read and write
75F8000
unkown
page read and write
3530000
unkown
page read and write
A23A000
unkown
page read and write
A9A0000
unkown
page read and write
2ACD000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
7460000
unkown
page read and write
9AB2000
unkown
page read and write
AA0A000
unkown
page read and write
2962000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page read and write
E4CD000
stack
page read and write
10606000
unkown
page read and write
75F8000
unkown
page read and write
2C2C000
trusted library allocation
page read and write
50D0000
trusted library allocation
page execute and read and write
A3AC000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
A9FD000
unkown
page read and write
2A8B000
trusted library allocation
page read and write
35CF000
unkown
page read and write
53E1000
unkown
page read and write
7FF5D777A000
unkown
page readonly
AAAB000
unkown
page read and write
3DC0000
trusted library allocation
page execute and read and write
7631000
unkown
page read and write
35C0000
trusted library allocation
page read and write
5F26000
heap
page read and write
4AF9000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
7FF5D7077000
unkown
page readonly
7FF5D7639000
unkown
page readonly
7FF5D758D000
unkown
page readonly
7E58000
stack
page read and write
2AEE000
trusted library allocation
page read and write
9A6A000
unkown
page read and write
94F4000
unkown
page read and write
F505000
unkown
page read and write
D48D000
stack
page read and write
86E0000
unkown
page readonly
7CB0000
unkown
page readonly
417D000
direct allocation
page execute and read and write
7FF5D7215000
unkown
page readonly
7FF5D74C3000
unkown
page readonly
C91C000
unkown
page read and write
7FF5D7385000
unkown
page readonly
9A92000
unkown
page read and write
2915000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
3160000
unkown
page read and write
B4D0000
unkown
page readonly
8DCB000
stack
page read and write
7FF5D7073000
unkown
page readonly
7FF5D738E000
unkown
page readonly
4614000
unclassified section
page read and write
9578000
stack
page read and write
7DF4F2461000
unkown
page execute read
7FF5D729E000
unkown
page readonly
2CDD000
trusted library allocation
page read and write
C861000
unkown
page read and write
1846000
unclassified section
page execute and read and write
C878000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
8A00000
unkown
page read and write
A2B5000
unkown
page read and write
7FF5D729E000
unkown
page readonly
9A94000
unkown
page read and write
CA01000
unkown
page read and write
F532000
unkown
page read and write
4DB0000
trusted library allocation
page read and write
2C52000
trusted library allocation
page read and write
A408000
unkown
page read and write
4D50000
trusted library allocation
page read and write
55D000
stack
page read and write
7FF5D71C8000
unkown
page readonly
7FF5D7309000
unkown
page readonly
CA36000
unkown
page read and write
7D3E000
stack
page read and write
C625000
unkown
page read and write
B0BD000
stack
page read and write
7435000
stack
page read and write
1160000
unkown
page read and write
B559000
stack
page read and write
7DC0000
unkown
page readonly
29DA000
trusted library allocation
page read and write
3EAA000
heap
page read and write
35D1000
unkown
page read and write
7DF4F2470000
unkown
page readonly
C97F000
unkown
page read and write
284F000
stack
page read and write
C46F000
unkown
page read and write
7AA0000
unkown
page read and write
6F0F000
stack
page read and write
7C70000
unkown
page readonly
8890000
unkown
page readonly
C663000
unkown
page read and write
C4BD000
unkown
page read and write
7FF5D72BF000
unkown
page readonly
7FF5D766E000
unkown
page readonly
3CF7000
heap
page read and write
4AA0000
unkown
page read and write
297F000
trusted library allocation
page read and write
C642000
unkown
page read and write
72EE000
stack
page read and write
7FF5D7694000
unkown
page readonly
760F000
unkown
page read and write
7FF5D7820000
unkown
page readonly
3584000
heap
page read and write
2EC0000
unkown
page readonly
3110000
unkown
page readonly
F4CA000
heap
page read and write
2B61000
trusted library allocation
page read and write
3150000
unclassified section
page execute and read and write
7FF5D77FD000
unkown
page readonly
C90C000
unkown
page read and write
7FF5D719C000
unkown
page readonly
4D90000
trusted library allocation
page read and write
AA01000
unkown
page read and write
C975000
unkown
page read and write
2DE2000
trusted library allocation
page read and write
35C9000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
85BE000
stack
page read and write
8360000
unkown
page read and write
9A94000
unkown
page read and write
F51C000
unkown
page read and write
4AF9000
unkown
page read and write
EF1000
heap
page read and write
51EF000
stack
page read and write
29F3000
trusted library allocation
page read and write
3584000
heap
page read and write
F4C2000
heap
page read and write
9E2D000
stack
page read and write
7FF5D706E000
unkown
page readonly
7FF5D7394000
unkown
page readonly
2926000
trusted library allocation
page read and write
35CF000
unkown
page read and write
E54D000
stack
page read and write
11536000
system
page read and write
C93000
unkown
page execute read
3400000
unkown
page read and write
9A76000
unkown
page read and write
C00000
unkown
page readonly
9AC3000
unkown
page read and write
7FF5D7700000
unkown
page readonly
1380000
heap
page read and write
A12F000
stack
page read and write
AB4000
trusted library allocation
page read and write
7FF5D72D0000
unkown
page readonly
3B51000
heap
page read and write
7B10000
unkown
page read and write
7FF5D75FF000
unkown
page readonly
EF8000
heap
page read and write
3630000
unkown
page readonly
9FAF000
stack
page read and write
9A80000
unkown
page read and write
1420000
unclassified section
page execute and read and write
4A16000
unkown
page read and write
C1CC000
stack
page read and write
35CF000
unkown
page read and write
C979000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
3584000
heap
page read and write
9EB0000
unkown
page readonly
2ADA000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
AF0000
heap
page read and write
5DAB000
stack
page read and write
1270000
unkown
page read and write
C02000
unkown
page execute read
1360000
unkown
page readonly
E10000
unkown
page readonly
3584000
heap
page read and write
7FF5D7391000
unkown
page readonly
C920000
unkown
page read and write
8A70000
unkown
page read and write
2A84000
trusted library allocation
page read and write
C5EC000
unkown
page read and write
7FF5D762F000
unkown
page readonly
2D6F000
trusted library allocation
page read and write
9A6A000
unkown
page read and write
7FF5D66E3000
unkown
page readonly
2E46000
trusted library allocation
page read and write
75FD000
unkown
page read and write
2B01000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
769A000
unkown
page read and write
2BF4000
trusted library allocation
page read and write
7FF5D7485000
unkown
page readonly
1350000
unkown
page readonly
9AA8000
unkown
page read and write
2CB6000
trusted library allocation
page read and write
AA0E000
unkown
page read and write
7FF5D7760000
unkown
page readonly
C48B000
unkown
page read and write
3CF5000
heap
page read and write
F13000
heap
page read and write
4DC5000
trusted library allocation
page read and write
C5FD000
unkown
page read and write
2D88000
trusted library allocation
page read and write
4642000
unclassified section
page read and write
2A36000
trusted library allocation
page read and write
7989000
stack
page read and write
2E18000
trusted library allocation
page read and write
7CBE000
stack
page read and write
33B0000
unkown
page readonly
7DD0000
heap
page read and write
7FF5D7429000
unkown
page readonly
2DC9000
trusted library allocation
page read and write
FF0000
unkown
page readonly
7FF5D7284000
unkown
page readonly
2B40000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
3626000
unkown
page read and write
7460000
unkown
page read and write
9ADB000
unkown
page read and write
A408000
unkown
page read and write
3584000
heap
page read and write
29F7000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
106C0000
unkown
page execute and read and write
AA05000
unkown
page read and write
7FF5D7488000
unkown
page readonly
7FF5D76D5000
unkown
page readonly
2A31000
trusted library allocation
page read and write
2A9D000
trusted library allocation
page read and write
3D6F000
heap
page read and write
CA0A000
unkown
page read and write
C9EE000
unkown
page read and write
35B0000
unkown
page read and write
9B2C000
unkown
page read and write
7FF5D779E000
unkown
page readonly
86E0000
unkown
page readonly
13A0000
unkown
page readonly
4D8D000
trusted library allocation
page read and write
2A3C000
trusted library allocation
page read and write
7FF5D75E9000
unkown
page readonly
B950000
unkown
page readonly
C926000
unkown
page read and write
9AF9000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
7FF5D7784000
unkown
page readonly
5C10000
heap
page read and write
4392000
direct allocation
page execute and read and write
A02E000
stack
page read and write
7FF5D71EF000
unkown
page readonly
8880000
unkown
page readonly
C5FD000
unkown
page read and write
98FD000
stack
page read and write
AFBE000
stack
page read and write
35D1000
unkown
page read and write
11553000
system
page read and write
C806000
unkown
page read and write
C9A7000
unkown
page read and write
2E31000
trusted library allocation
page read and write
7637000
unkown
page read and write
EF0000
heap
page read and write
C76000
unkown
page execute read
EF0000
trusted library allocation
page execute and read and write
C913000
unkown
page read and write
B8DB000
stack
page read and write
41EE000
direct allocation
page execute and read and write
768C000
unkown
page read and write
7CB0000
unkown
page readonly
41F000
remote allocation
page execute and read and write
BE49000
stack
page read and write
2ACF000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page execute and read and write
2D86000
trusted library allocation
page read and write
28F2000
trusted library allocation
page read and write
84BB000
stack
page read and write
1123000
unkown
page read and write
AA40000
unkown
page read and write
7FF5D772C000
unkown
page readonly
91F0000
unkown
page readonly
9A80000
unkown
page read and write
A3C3000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
9A9E000
unkown
page read and write
F61000
heap
page read and write
C5F0000
unkown
page read and write
BB10000
heap
page read and write
29A7000
trusted library allocation
page read and write
464D000
unclassified section
page read and write
4A90000
unkown
page read and write
75FD000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
2A80000
trusted library allocation
page read and write
EBE000
heap
page read and write
C8C4000
unkown
page read and write
362D000
unkown
page read and write
3672000
heap
page read and write
9AF9000
unkown
page read and write
7FF5D7639000
unkown
page readonly
3B13000
trusted library allocation
page read and write
7618000
unkown
page read and write
2DFD000
trusted library allocation
page read and write
4A71000
unkown
page read and write
7210000
trusted library allocation
page execute and read and write
2C80000
trusted library allocation
page read and write
3672000
heap
page read and write
7C90000
unkown
page read and write
2F90000
heap
page read and write
C9A7000
unkown
page read and write
1395000
heap
page read and write
2C20000
trusted library allocation
page read and write
C483000
unkown
page read and write
2990000
trusted library allocation
page read and write
7FF5D7694000
unkown
page readonly
2BF9000
trusted library allocation
page read and write
C7C6000
unkown
page read and write
C621000
unkown
page read and write
B7DC000
stack
page read and write
2CA7000
trusted library allocation
page read and write
3626000
unkown
page read and write
F518000
unkown
page read and write
3584000
heap
page read and write
2AEC000
trusted library allocation
page read and write
2B27000
trusted library allocation
page read and write
E64D000
stack
page read and write
ED7000
heap
page read and write
2D8A000
trusted library allocation
page read and write
2A67000
heap
page read and write
A286000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
4980000
unkown
page read and write
35FE000
stack
page read and write
F502000
unkown
page read and write
3E1A000
heap
page read and write
AC0000
heap
page read and write
366E000
heap
page read and write
35C9000
unkown
page read and write
2B2A000
trusted library allocation
page read and write
7686000
unkown
page read and write
77A2000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
3554000
unkown
page read and write
7FF5D776F000
unkown
page readonly
C94F000
unkown
page read and write
2966000
trusted library allocation
page read and write
AAA6000
unkown
page read and write
7FF5D6BE4000
unkown
page readonly
99C0000
unkown
page read and write
2B6C000
trusted library allocation
page read and write
7FF5D77E9000
unkown
page readonly
35D5000
unkown
page read and write
143B000
unclassified section
page execute and read and write
460E000
unclassified section
page read and write
17E0000
unclassified section
page execute and read and write
2D35000
trusted library allocation
page read and write
7FF5D7280000
unkown
page readonly
3317000
unkown
page read and write
760F000
unkown
page read and write
4A40000
unkown
page read and write
C61D000
unkown
page read and write
7FF5D7438000
unkown
page readonly
3584000
heap
page read and write
7FF5D770A000
unkown
page readonly
2F3C000
stack
page read and write
29FC000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
7DD0000
heap
page read and write
2A44000
trusted library allocation
page read and write
DCF000
stack
page read and write
7B70000
trusted library allocation
page execute and read and write
B220000
unkown
page read and write
EF0000
heap
page read and write
C7CB000
unkown
page read and write
7FF5D7065000
unkown
page readonly
7FF5D77DD000
unkown
page readonly
3672000
heap
page read and write
C9D5000
unkown
page read and write
7FF5D744E000
unkown
page readonly
1716000
direct allocation
page execute and read and write
3584000
heap
page read and write
AA92000
unkown
page read and write
3E71000
trusted library allocation
page execute and read and write
2CD1000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
5C50000
heap
page read and write
10684000
unkown
page read and write
1150E000
system
page read and write
33F0000
unkown
page read and write
9A96000
unkown
page read and write
2C07000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
7C31000
unkown
page read and write
2CBC000
trusted library allocation
page read and write
925E000
system
page execute and read and write
7FF5D7458000
unkown
page readonly
C82000
unkown
page execute read
7FF5D75D9000
unkown
page readonly
12D0000
unkown
page readonly
EB0000
heap
page read and write
29B5000
trusted library allocation
page read and write
1E3000
system
page readonly
B85A000
stack
page read and write
7DF4F2461000
unkown
page execute read
7FF5D7705000
unkown
page readonly
C8D000
unkown
page execute read
A3AC000
unkown
page read and write
843F000
stack
page read and write
7FF5D7604000
unkown
page readonly
1395000
heap
page read and write
E00000
unkown
page readonly
C605000
unkown
page read and write
86D0000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
49C2000
unkown
page read and write
9A98000
unkown
page read and write
A233000
unkown
page read and write
7FF5D779E000
unkown
page readonly
2A5D000
trusted library allocation
page read and write
C78A000
unkown
page read and write
9A8E000
unkown
page read and write
7FF5D76AF000
unkown
page readonly
49BB000
unkown
page read and write
7FF5D7740000
unkown
page readonly
C46F000
unkown
page read and write
CA01000
unkown
page read and write
2A21000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
4653000
unclassified section
page read and write
7CE0000
heap
page read and write
35C3000
unkown
page read and write
E00000
heap
page execute and read and write
9ADB000
unkown
page read and write
C70000
unkown
page execute read
5DC0000
heap
page read and write
2D82000
trusted library allocation
page read and write
9A92000
unkown
page read and write
8C39000
stack
page read and write
9AC3000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
1450000
direct allocation
page execute and read and write
9A8C000
unkown
page read and write
EE0000
heap
page read and write
35C3000
unkown
page read and write
2977000
trusted library allocation
page read and write
59A000
stack
page read and write
7FF5D76F5000
unkown
page readonly
2F7F000
stack
page read and write
5F52000
heap
page read and write
E74D000
stack
page read and write
2B78000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
F4DC000
unkown
page read and write
E5CD000
stack
page read and write
4048000
heap
page read and write
9A76000
unkown
page read and write
7FF5D7558000
unkown
page readonly
2D2F000
trusted library allocation
page read and write
3584000
heap
page read and write
18BD000
trusted library allocation
page execute and read and write
F501000
unkown
page read and write
4DE0000
trusted library allocation
page read and write
4628000
unclassified section
page read and write
C24E000
stack
page read and write
2E79000
trusted library allocation
page read and write
C8C1000
unkown
page read and write
C47F000
unkown
page read and write
C0BA000
stack
page read and write
9B8A000
unkown
page read and write
2DC1000
trusted library allocation
page read and write
7FF5D76D7000
unkown
page readonly
1250000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
3584000
heap
page read and write
7FF5D7289000
unkown
page readonly
10684000
unkown
page read and write
2B46000
trusted library allocation
page read and write
7611000
unkown
page read and write
EB5000
stack
page read and write
28ED000
trusted library allocation
page read and write
4630000
unclassified section
page read and write
C929000
unkown
page read and write
7FF5D7257000
unkown
page readonly
2BDB000
trusted library allocation
page read and write
BEA0000
unkown
page readonly
94F4000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
4AE9000
unkown
page read and write
3100000
unkown
page read and write
362D000
unkown
page read and write
2D33000
trusted library allocation
page read and write
3F00000
trusted library allocation
page read and write
3630000
unkown
page readonly
7AB0000
unkown
page read and write
5F43000
heap
page read and write
7FF5D7404000
unkown
page readonly
3D97000
heap
page read and write
9B0B000
unkown
page read and write
F10000
heap
page read and write
3584000
heap
page read and write
7FF5D7289000
unkown
page readonly
35B5000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
2D63000
trusted library allocation
page read and write
7C31000
unkown
page read and write
2B57000
trusted library allocation
page read and write
B559000
stack
page read and write
35F4000
unkown
page read and write
3545000
unkown
page read and write
A28D000
unkown
page read and write
3971000
trusted library allocation
page read and write
4A0E000
unkown
page read and write
290F000
trusted library allocation
page read and write
4980000
unkown
page read and write
1160000
unkown
page read and write
3FD7000
heap
page read and write
141F000
stack
page read and write
AF5000
heap
page read and write
7FF5D77B6000
unkown
page readonly
7FF5D6AB6000
unkown
page readonly
3584000
heap
page read and write
35DC000
unkown
page read and write
7654000
unkown
page read and write
7FF5D748A000
unkown
page readonly
105C3000
unkown
page read and write
75E000
stack
page read and write
35F4000
unkown
page read and write
997C000
stack
page read and write
7DF4F2470000
unkown
page readonly
DD7000
trusted library allocation
page execute and read and write
2B38000
trusted library allocation
page read and write
2998000
trusted library allocation
page read and write
7FF5D776D000
unkown
page readonly
A9DF000
unkown
page read and write
7B60000
unkown
page readonly
29EF000
trusted library allocation
page read and write
7FF5D728E000
unkown
page readonly
9D67000
unkown
page read and write
7FF5D745B000
unkown
page readonly
2D80000
trusted library allocation
page read and write
5330000
unkown
page write copy
85BE000
stack
page read and write
2A99000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
75E0000
unkown
page read and write
7FF5D7745000
unkown
page readonly
8870000
unkown
page readonly
7FF5D738E000
unkown
page readonly
7FF5D723F000
unkown
page readonly
7FF5D7452000
unkown
page readonly
C97F000
unkown
page read and write
A02E000
stack
page read and write
EB5000
stack
page read and write
C653000
unkown
page read and write
7FF5D7703000
unkown
page readonly
9B81000
unkown
page read and write
C9DF000
unkown
page read and write
A264000
unkown
page read and write
F52E000
unkown
page read and write
9EE2000
trusted library allocation
page read and write
C44F000
stack
page read and write
7E60000
unkown
page read and write
9A8C000
unkown
page read and write
7FF5D7391000
unkown
page readonly
4AC0000
unkown
page read and write
C4C6000
unkown
page read and write
7FF5D7795000
unkown
page readonly
1281000
unkown
page readonly
9260000
system
page execute and read and write
7FF5D76E8000
unkown
page readonly
F4C0000
heap
page read and write
2D99000
trusted library allocation
page read and write
C496000
unkown
page read and write
7FF5D7267000
unkown
page readonly
2A97000
trusted library allocation
page read and write
F4D0000
unkown
page read and write
7FF5D7075000
unkown
page readonly
7FF5D7591000
unkown
page readonly
5F10000
heap
page read and write
2B3A000
trusted library allocation
page read and write
7FF5D723F000
unkown
page readonly
35B0000
unkown
page read and write
7FF5D7534000
unkown
page readonly
1350000
unkown
page readonly
B03B000
stack
page read and write
C450000
unkown
page read and write
3F00000
trusted library allocation
page read and write
7FF5D6BDB000
unkown
page readonly
1000000
heap
page read and write
A391000
unkown
page read and write
2FF9000
stack
page read and write
8880000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
CA39000
unkown
page read and write
4D86000
trusted library allocation
page read and write
BFB8000
stack
page read and write
7FF5D7722000
unkown
page readonly
EA0000
trusted library allocation
page execute and read and write
2E2F000
trusted library allocation
page read and write
C460000
unkown
page read and write
2BEE000
trusted library allocation
page read and write
7BBE000
stack
page read and write
3B51000
heap
page read and write
D38E000
stack
page read and write
74B0000
trusted library section
page read and write
7FF5D7452000
unkown
page readonly
3542000
unkown
page read and write
2B72000
trusted library allocation
page read and write
362A000
unkown
page read and write
2BD7000
trusted library allocation
page read and write
A273000
unkown
page read and write
C24E000
stack
page read and write
3584000
heap
page read and write
1220000
unkown
page read and write
C1CC000
stack
page read and write
2E7F000
trusted library allocation
page read and write
7FF5D7073000
unkown
page readonly
C617000
unkown
page read and write
43A6000
unclassified section
page read and write
535D000
heap
page read and write
7FF5D7385000
unkown
page readonly
4986000
unkown
page read and write
7FF5D7669000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
2A82000
trusted library allocation
page read and write
7FF5D7284000
unkown
page readonly
2A7E000
trusted library allocation
page read and write
7FF5D766E000
unkown
page readonly
77DB000
unkown
page read and write
7C80000
unkown
page read and write
7FF5D777A000
unkown
page readonly
C5F0000
unkown
page read and write
35C0000
trusted library allocation
page read and write
C86F000
unkown
page read and write
131E000
stack
page read and write
2992000
trusted library allocation
page read and write
362A000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
2E81000
trusted library allocation
page read and write
769A000
unkown
page read and write
2B55000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
F4CA000
heap
page read and write
9285000
system
page execute and read and write
7FF5D7837000
unkown
page readonly
5050000
trusted library allocation
page read and write
7FF5D76C8000
unkown
page readonly
C5FA000
unkown
page read and write
5DFD000
trusted library allocation
page read and write
7FF5D7641000
unkown
page readonly
9AAA000
unkown
page read and write
299C000
trusted library allocation
page read and write
65D000
stack
page read and write
2D4C000
trusted library allocation
page read and write
CA51000
unkown
page read and write
7FF5D7462000
unkown
page readonly
3F00000
trusted library allocation
page read and write
3667000
heap
page read and write
5479000
unkown
page read and write
7190000
heap
page read and write
461F000
unclassified section
page read and write
C035000
stack
page read and write
3488000
stack
page read and write
8890000
unkown
page readonly
49FA000
unkown
page read and write
2A60000
heap
page read and write
2CEE000
trusted library allocation
page read and write
12DF000
stack
page read and write
2A14000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
4D7E000
trusted library allocation
page read and write
4050000
direct allocation
page execute and read and write
29AF000
trusted library allocation
page read and write
7FF5D75A6000
unkown
page readonly
7FF5D7482000
unkown
page readonly
C4C6000
unkown
page read and write
9A84000
unkown
page read and write
BEA0000
unkown
page readonly
C61B000
unkown
page read and write
CA62000
unkown
page read and write
2DF9000
trusted library allocation
page read and write
7FF5D77EB000
unkown
page readonly
7FF5D774A000
unkown
page readonly
8360000
unkown
page read and write
7FF5D72CE000
unkown
page readonly
365B000
heap
page read and write
7FF5D7799000
unkown
page readonly
4AB0000
unkown
page read and write
F52E000
unkown
page read and write
897B000
stack
page read and write
7FF5D7272000
unkown
page readonly
7FF5D769E000
unkown
page readonly
2D65000
trusted library allocation
page read and write
7FF5D7272000
unkown
page readonly
2A42000
trusted library allocation
page read and write
2FF9000
stack
page read and write
363E000
stack
page read and write
7FF5D77A4000
unkown
page readonly
299E000
trusted library allocation
page read and write
A391000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
768C000
unkown
page read and write
F01000
trusted library allocation
page execute and read and write
C5F4000
unkown
page read and write
50E0000
heap
page execute and read and write
73EE000
stack
page read and write
2CEC000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
4B00000
unkown
page read and write
7FF5D723C000
unkown
page readonly
7AC0000
unkown
page read and write
2D20000
trusted library allocation
page read and write
7B20000
unkown
page read and write
7FF5D7262000
unkown
page readonly
35BD000
unkown
page read and write
E74D000
stack
page read and write
7FF5D7792000
unkown
page readonly
AAA6000
unkown
page read and write
C908000
unkown
page read and write
A3B6000
unkown
page read and write
50CE000
stack
page read and write
7FF5D717C000
unkown
page readonly
71A0000
trusted library allocation
page read and write
7810000
unkown
page read and write
C9DF000
unkown
page read and write
7618000
unkown
page read and write
3120000
unkown
page read and write
F4D0000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
7693000
unkown
page read and write
7FF5D743F000
unkown
page readonly
CAA000
unkown
page execute read
2D4E000
trusted library allocation
page read and write
B330000
unkown
page read and write
3D75000
heap
page read and write
1579000
direct allocation
page execute and read and write
7FF5D76CD000
unkown
page readonly
7FF5D7442000
unkown
page readonly
291A000
trusted library allocation
page read and write
C90C000
unkown
page read and write
A416000
unkown
page read and write
C9E000
unkown
page execute read
3584000
heap
page read and write
2FE0000
heap
page read and write
BB9D000
stack
page read and write
2A2B000
trusted library allocation
page read and write
B4D0000
unkown
page readonly
53E1000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
7FF5D7682000
unkown
page readonly
3590000
trusted library allocation
page read and write
7DF4F2491000
unkown
page execute read
2E66000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
7FF5D776D000
unkown
page readonly
A384000
unkown
page read and write
2B44000
trusted library allocation
page read and write
2AC9000
trusted library allocation
page read and write
362A000
unkown
page read and write
29B1000
trusted library allocation
page read and write
C62D000
unkown
page read and write
A0A9000
stack
page read and write
1149F000
system
page read and write
49BB000
unkown
page read and write
2A25000
trusted library allocation
page read and write
15EE000
direct allocation
page execute and read and write
760B000
unkown
page read and write
91F0000
unkown
page readonly
A273000
unkown
page read and write
F52F000
unkown
page read and write
4A44000
unkown
page read and write
AA92000
unkown
page read and write
4AD9000
unkown
page read and write
7AB0000
unkown
page read and write
10584000
unkown
page read and write
7C80000
unkown
page read and write
C615000
unkown
page read and write
297D000
trusted library allocation
page read and write
E8B000
stack
page read and write
E4E000
stack
page read and write
ABD000
trusted library allocation
page execute and read and write
C4DC000
unkown
page read and write
34D0000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
4A90000
unkown
page read and write
7FF5D75BF000
unkown
page readonly
7FF5D7589000
unkown
page readonly
A12F000
stack
page read and write
8FD9000
stack
page read and write
35D3000
unkown
page read and write
5330000
unkown
page write copy
760000
heap
page read and write
35DC000
unkown
page read and write
2B91000
trusted library allocation
page read and write
7FF5D745B000
unkown
page readonly
755E000
stack
page read and write
9F0000
heap
page read and write
C971000
unkown
page read and write
35C1000
unkown
page read and write
7FF5D7593000
unkown
page readonly
2C11000
trusted library allocation
page read and write
AA19000
unkown
page read and write
48A0000
trusted library allocation
page read and write
11514000
system
page read and write
7FF5D72E9000
unkown
page readonly
7FF5D7450000
unkown
page readonly
2A8F000
trusted library allocation
page read and write
7FF5D7507000
unkown
page readonly
2D39000
trusted library allocation
page read and write
CB5000
unkown
page execute read
49FD000
unkown
page read and write
7FF5D7425000
unkown
page readonly
1E4000
system
page execute and read and write
7FF5D77E0000
unkown
page readonly
C8A000
unkown
page execute read
34D0000
trusted library allocation
page read and write
5DB0000
trusted library section
page readonly
760D000
unkown
page read and write
7FF5D776F000
unkown
page readonly
7609000
unkown
page read and write
7FF5D72D7000
unkown
page readonly
7FF5D7760000
unkown
page readonly
7FF5D74FA000
unkown
page readonly
7FF5D76D5000
unkown
page readonly
F510000
unkown
page read and write
29B3000
trusted library allocation
page read and write
F510000
unkown
page read and write
7FF5D7534000
unkown
page readonly
7B00000
unkown
page readonly
7605000
unkown
page read and write
AE0000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
AA04000
unkown
page read and write
9ABD000
unkown
page read and write
2AF0000
trusted library allocation
page read and write
2A48000
trusted library allocation
page read and write
3CBE000
stack
page read and write
C9EE000
unkown
page read and write
8F49000
stack
page read and write
5E00000
heap
page read and write
2D6D000
trusted library allocation
page read and write
4636000
unclassified section
page read and write
2F7F000
stack
page read and write
7FF5D7075000
unkown
page readonly
3531000
unkown
page read and write
9A8E000
unkown
page read and write
2C3D000
trusted library allocation
page read and write
7FF5D7808000
unkown
page readonly
7FF5D7752000
unkown
page readonly
AE1D000
stack
page read and write
7FF5D77C2000
unkown
page readonly
D2C000
stack
page read and write
7FF5D77DD000
unkown
page readonly
760B000
unkown
page read and write
7FF5D73F5000
unkown
page readonly
3D7D000
heap
page read and write
7560000
trusted library allocation
page execute and read and write
A2A2000
unkown
page read and write
2E14000
trusted library allocation
page read and write
C92F000
unkown
page read and write
2CF0000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
E80000
heap
page read and write
7FF5D75EE000
unkown
page readonly
C861000
unkown
page read and write
3584000
heap
page read and write
3584000
heap
page read and write
7FF5D778A000
unkown
page readonly
5060000
trusted library allocation
page read and write
1380000
heap
page read and write
7810000
unkown
page read and write
C7BE000
unkown
page read and write
33FC000
stack
page read and write
2AB8000
trusted library allocation
page read and write
7FF5D7394000
unkown
page readonly
7FF5D76E8000
unkown
page readonly
C496000
unkown
page read and write
7FF5D7360000
unkown
page readonly
F51C000
unkown
page read and write
3DA8000
heap
page read and write
9270000
system
page execute and read and write
2C9B000
trusted library allocation
page read and write
11B0000
unkown
page read and write
4AA0000
unkown
page read and write
9AB4000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
7FF5D77E3000
unkown
page readonly
CA39000
unkown
page read and write
28FE000
trusted library allocation
page read and write
B980000
unkown
page readonly
E6CD000
stack
page read and write
C81C000
unkown
page read and write
F51C000
unkown
page read and write
7FF5D764F000
unkown
page readonly
F510000
unkown
page read and write
2B25000
trusted library allocation
page read and write
C9A7000
unkown
page read and write
2A93000
trusted library allocation
page read and write
CA51000
unkown
page read and write
3626000
unkown
page read and write
35BD000
unkown
page read and write
7FF5D752F000
unkown
page readonly
B0E0000
unkown
page readonly
2A2F000
trusted library allocation
page read and write
49A8000
unkown
page read and write
B8DB000
stack
page read and write
4D30000
heap
page read and write
A9FD000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
7637000
unkown
page read and write
4AC0000
unkown
page read and write
7FF5D7396000
unkown
page readonly
7AF1000
unkown
page read and write
3317000
unkown
page read and write
9A84000
unkown
page read and write
2C82000
trusted library allocation
page read and write
77DB000
unkown
page read and write
3E60000
trusted library allocation
page execute and read and write
C8C4000
unkown
page read and write
C615000
unkown
page read and write
2B7B000
trusted library allocation
page read and write
A251000
unkown
page read and write
2C22000
trusted library allocation
page read and write
502E000
stack
page read and write
A233000
unkown
page read and write
3DD1000
trusted library allocation
page execute and read and write
7FF5D7438000
unkown
page readonly
353D000
unkown
page read and write
35D5000
unkown
page read and write
E4CD000
stack
page read and write
35BD000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
BF3E000
stack
page read and write
7FF5D7593000
unkown
page readonly
8870000
unkown
page readonly
7FF5D77F0000
unkown
page readonly
49D6000
unkown
page read and write
7FF5D762F000
unkown
page readonly
431D000
direct allocation
page execute and read and write
7FF5D75D9000
unkown
page readonly
C806000
unkown
page read and write
F13000
heap
page read and write
2E21000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page read and write
3120000
unkown
page read and write
C7BE000
unkown
page read and write
463C000
unclassified section
page read and write
F504000
unkown
page read and write
2964000
trusted library allocation
page read and write
A237000
unkown
page read and write
9AAA000
unkown
page read and write
7FF5D744E000
unkown
page readonly
3584000
heap
page read and write
2D6B000
trusted library allocation
page read and write
7FF5D749B000
unkown
page readonly
7FF5D77FD000
unkown
page readonly
7440000
unkown
page read and write
C9D7000
unkown
page read and write
8FD9000
stack
page read and write
462B000
unclassified section
page read and write
5463000
unkown
page read and write
C483000
unkown
page read and write
2B6E000
trusted library allocation
page read and write
3584000
heap
page read and write
7FF5CE33D000
unkown
page readonly
7FF5D76F5000
unkown
page readonly
2C8C000
trusted library allocation
page read and write
CAF000
unkown
page execute read
2A23000
trusted library allocation
page read and write
C9EE000
unkown
page read and write
E00000
unkown
page readonly
4DD0000
trusted library allocation
page read and write
7FF5D7396000
unkown
page readonly
B4BF000
stack
page read and write
A39F000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
7FF5D7230000
unkown
page readonly
99C0000
unkown
page read and write
77A2000
unkown
page read and write
2CA5000
trusted library allocation
page read and write
7FF5D720A000
unkown
page readonly
2BD9000
trusted library allocation
page read and write
488E000
stack
page read and write
533B000
heap
page read and write
2D3C000
trusted library allocation
page read and write
AAA7000
unkown
page read and write
C916000
unkown
page read and write
10E0000
heap
page read and write
7FF5D7262000
unkown
page readonly
3534000
unkown
page read and write
9D67000
unkown
page read and write
7FF5D71D7000
unkown
page readonly
9D0000
heap
page read and write
7FF5D6A4B000
unkown
page readonly
2CBE000
trusted library allocation
page read and write
35B5000
unkown
page read and write
AA96000
unkown
page read and write
7FF5D75D6000
unkown
page readonly
9D42000
unkown
page read and write
A3B6000
unkown
page read and write
2E7B000
trusted library allocation
page read and write
3531000
unkown
page read and write
9FAF000
stack
page read and write
7FF5D768B000
unkown
page readonly
3580000
heap
page read and write
7FF5D72BF000
unkown
page readonly
A286000
unkown
page read and write
35B3000
unkown
page read and write
7FF5D769E000
unkown
page readonly
29F5000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
3090000
unclassified section
page execute and read and write
A9E9000
unkown
page read and write
2CC1000
trusted library allocation
page read and write
There are 1860 hidden memdumps, click here to show them.