IOC Report
DOC_PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
DOC_PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DOC_PDF.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DOC_PDF.exe
"C:\Users\user\Desktop\DOC_PDF.exe"
malicious
C:\Users\user\Desktop\DOC_PDF.exe
"C:\Users\user\Desktop\DOC_PDF.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\msdt.exe
"C:\Windows\SysWOW64\msdt.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\DOC_PDF.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
www.awlc7038.vip/b31a/
malicious
https://word.office.comon
unknown
http://www.resdai.xyzReferer:
unknown
http://www.rojectleadzone.website
unknown
http://www.rojectleadzone.website/b31a/
unknown
http://www.indjuvedermdoctorsnearby.todayReferer:
unknown
http://www.resdai.xyz
unknown
http://www.bykmr.shop/b31a/www.utebolshirts.shop
unknown
http://www.hegdg.netReferer:
unknown
https://powerpoint.office.comcember
unknown
http://www.ashforhouse19.onlineReferer:
unknown
http://www.awlc7038.vip/b31a/www.rojectleadzone.website
unknown
http://www.resdai.xyz/b31a/
unknown
http://www.utebolshirts.shop
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
http://www.igh-class-jewelry.infoReferer:
unknown
http://www.olf-cart-82894.bond
unknown
http://www.igh-class-jewelry.info/b31a/
unknown
http://www.aemoruhagic.click/b31a/www.-web-p102.buzz
unknown
http://www.utebolshirts.shop/b31a/www.resdai.xyz
unknown
http://www.2239d3.christmasReferer:
unknown
http://www.indjuvedermdoctorsnearby.today/b31a/
unknown
http://www.autoitscript.E
unknown
http://www.indjuvedermdoctorsnearby.today
unknown
http://www.rojectleadzone.websiteReferer:
unknown
http://www.utebolshirts.shop/b31a/
unknown
http://www.olf-cart-82894.bond/b31a/www.hewieandfriends.info
unknown
http://www.ewancash.boats
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.indjuvedermdoctorsnearby.today/b31a/www.ashforhouse19.online
unknown
http://www.awlc7038.vip/b31a/
unknown
http://www.ewancash.boatsReferer:
unknown
http://www.48827496.topReferer:
unknown
http://www.aemoruhagic.clickReferer:
unknown
http://www.igh-class-jewelry.info
unknown
https://wns.windows.com/)s
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.-web-p102.buzz/b31a/www.indjuvedermdoctorsnearby.today
unknown
http://www.-web-p102.buzz
unknown
http://www.2239d3.christmas/b31a/
unknown
http://www.hegdg.net
unknown
http://www.48827496.top
unknown
http://www.hewieandfriends.info/b31a/www.ewancash.boats
unknown
http://www.48827496.top/b31a/
unknown
http://www.ashforhouse19.online
unknown
http://www.bykmr.shopReferer:
unknown
http://www.awlc7038.vip
unknown
http://www.igh-class-jewelry.info/b31a/www.48827496.top
unknown
http://www.ewancash.boats/b31a/www.igh-class-jewelry.info
unknown
http://www.-web-p102.buzz/b31a/
unknown
http://www.hewieandfriends.infoReferer:
unknown
http://www.-web-p102.buzzReferer:
unknown
http://www.resdai.xyz/b31a/www.hegdg.net
unknown
http://www.rojectleadzone.website/b31a/www.olf-cart-82894.bond
unknown
http://www.olf-cart-82894.bond/b31a/
unknown
https://outlook.com
unknown
http://www.hewieandfriends.info
unknown
http://www.ewancash.boats/b31a/
unknown
http://www.hegdg.net/b31a/
unknown
http://www.bykmr.shop/b31a/
unknown
http://www.hewieandfriends.info/b31a/
unknown
http://www.aemoruhagic.click
unknown
https://android.notify.windows.com/iOS
unknown
http://www.bykmr.shop
unknown
http://www.2239d3.christmas/b31a/h
unknown
http://www.2239d3.christmas
unknown
https://api.msn.com/
unknown
http://www.utebolshirts.shopReferer:
unknown
http://www.aemoruhagic.click/b31a/
unknown
http://www.ashforhouse19.online/b31a/www.2239d3.christmas
unknown
http://www.olf-cart-82894.bondReferer:
unknown
http://www.hegdg.net/b31a/www.aemoruhagic.click
unknown
http://www.48827496.top/b31a/www.bykmr.shop
unknown
http://www.awlc7038.vipReferer:
unknown
http://crl.v
unknown
http://www.ashforhouse19.online/b31a/
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.awlc7038.vip
unknown
malicious
www.48827496.top
unknown
malicious
www.olf-cart-82894.bond
unknown
malicious
www.ewancash.boats
unknown
malicious
www.aemoruhagic.click
unknown
malicious
www.rojectleadzone.website
unknown
malicious
www.bykmr.shop
unknown
malicious
www.utebolshirts.shop
unknown
malicious
www.hegdg.net
unknown
malicious
www.hewieandfriends.info
unknown
malicious
www.igh-class-jewelry.info
unknown
malicious
There are 1 hidden domains, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{0BF754AA-C967-445C-AB3D-D8FDA9BAE7EF} {000214E4-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\System32\display.dll,-4
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-123
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Windows\system32\themecpl.dll,-10
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-174
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-131
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-101
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 195 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
4C50000
unclassified section
page execute and read and write
malicious
4C80000
trusted library allocation
page read and write
malicious
2E70000
system
page execute and read and write
malicious
448F000
trusted library allocation
page read and write
malicious
45CB000
trusted library allocation
page read and write
malicious
B980000
unkown
page readonly
30FB000
stack
page read and write
7FF5D7604000
unkown
page readonly
A9FD000
unkown
page read and write
C863000
unkown
page read and write
1000000
heap
page read and write
7FF5D741B000
unkown
page readonly
A40E000
unkown
page read and write
4EE5000
heap
page read and write
8964000
unkown
page read and write
35F4000
unkown
page read and write
8ECB000
unkown
page read and write
7FF5D7722000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
A40E000
unkown
page read and write
7618000
unkown
page read and write
C7C6000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
4A16000
unkown
page read and write
7FF5D7808000
unkown
page readonly
9A8E000
unkown
page read and write
1438000
heap
page read and write
2EE0000
trusted library allocation
page read and write
7FF5D77D2000
unkown
page readonly
7FF5D71AF000
unkown
page readonly
43D000
stack
page read and write
7FF5D7394000
unkown
page readonly
3626000
unkown
page read and write
7A92000
trusted library allocation
page read and write
C47F000
unkown
page read and write
49D6000
unkown
page read and write
E84E000
stack
page read and write
4CB0000
trusted library allocation
page read and write
7FF5D7797000
unkown
page readonly
C653000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
7FF5D75CB000
unkown
page readonly
A220000
unkown
page read and write
7FF5D774A000
unkown
page readonly
7FF5D75D9000
unkown
page readonly
60F0000
trusted library allocation
page read and write
7FF5D72BF000
unkown
page readonly
99C0000
unkown
page read and write
10346000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
5361000
direct allocation
page execute and read and write
BDC0000
unkown
page read and write
10284000
unkown
page read and write
1250000
unkown
page read and write
C8EB000
unkown
page read and write
4D20000
heap
page read and write
7FF5D7745000
unkown
page readonly
7FF5D7450000
unkown
page readonly
77A2000
unkown
page read and write
A9A0000
unkown
page read and write
186F000
stack
page read and write
2EE0000
trusted library allocation
page read and write
53E1000
unkown
page read and write
3545000
unkown
page read and write
362D000
unkown
page read and write
C9D7000
unkown
page read and write
F2C000
stack
page read and write
5090000
direct allocation
page execute and read and write
49C2000
unkown
page read and write
35B5000
unkown
page read and write
7FF5D7244000
unkown
page readonly
7FF5D705D000
unkown
page readonly
14B0000
heap
page read and write
7FF5D7792000
unkown
page readonly
4BAB000
heap
page read and write
B4BF000
stack
page read and write
1A80000
trusted library allocation
page read and write
5DE000
unkown
page read and write
1740000
trusted library allocation
page read and write
9AC3000
unkown
page read and write
7FF5D7458000
unkown
page readonly
7FF5D7795000
unkown
page readonly
5D1E000
stack
page read and write
7FF5D71EA000
unkown
page readonly
1281000
unkown
page readonly
10303000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
3500000
stack
page read and write
58AC000
stack
page read and write
7FF5D74F2000
unkown
page readonly
843F000
stack
page read and write
AE0E000
stack
page read and write
EF8000
heap
page read and write
7FF5D77A8000
unkown
page readonly
EF0000
heap
page read and write
1370000
heap
page read and write
3400000
unkown
page read and write
7FF5D7648000
unkown
page readonly
AA44000
unkown
page read and write
172E000
stack
page read and write
1D30000
unclassified section
page execute and read and write
7FF5D706E000
unkown
page readonly
9ABD000
unkown
page read and write
590000
heap
page read and write
7FF5D7705000
unkown
page readonly
7FF5D7591000
unkown
page readonly
A3AC000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
1CD1000
unclassified section
page execute and read and write
35C9000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
7FF5D776F000
unkown
page readonly
4AC0000
unkown
page read and write
4A71000
heap
page read and write
C44F000
stack
page read and write
C5FD000
unkown
page read and write
7FF5D748C000
unkown
page readonly
33A0000
heap
page read and write
7FF5D764F000
unkown
page readonly
35B3000
unkown
page read and write
49FD000
unkown
page read and write
35CF000
unkown
page read and write
33C0000
unkown
page read and write
7FF5D719C000
unkown
page readonly
C621000
unkown
page read and write
7FF5D7292000
unkown
page readonly
C876000
unkown
page read and write
35BD000
unkown
page read and write
7FF5D76AF000
unkown
page readonly
9C21000
unkown
page read and write
A28D000
unkown
page read and write
779E000
unkown
page read and write
8870000
unkown
page readonly
35C9000
unkown
page read and write
34C2000
trusted library allocation
page read and write
7FF5D7799000
unkown
page readonly
16FC000
stack
page read and write
EF82000
unkown
page execute and read and write
7FF5D7215000
unkown
page readonly
3400000
unkown
page read and write
7FF5D748A000
unkown
page readonly
2F7E000
stack
page read and write
C981000
unkown
page read and write
7FF5D71D7000
unkown
page readonly
4AFA000
unkown
page read and write
85BE000
stack
page read and write
C78A000
unkown
page read and write
8812000
heap
page read and write
9ABD000
unkown
page read and write
7B60000
unkown
page readonly
7FF5D768B000
unkown
page readonly
7FF5D7455000
unkown
page readonly
53E6000
unclassified section
page read and write
1000000
heap
page read and write
3170000
unkown
page read and write
A264000
unkown
page read and write
7FF5D77EB000
unkown
page readonly
C7BE000
unkown
page read and write
7FF5D75E9000
unkown
page readonly
7FF5D7641000
unkown
page readonly
7FF5D77E3000
unkown
page readonly
FC0000
heap
page read and write
9AA8000
unkown
page read and write
3540000
unkown
page read and write
8900000
unkown
page read and write
10510000
system
page execute and read and write
7DF4F24A1000
unkown
page execute read
7FF5D71BF000
unkown
page readonly
7FF5D71C8000
unkown
page readonly
A384000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
AFBE000
stack
page read and write
7FF5D771A000
unkown
page readonly
522E000
direct allocation
page execute and read and write
C450000
unkown
page read and write
A9E9000
unkown
page read and write
C617000
unkown
page read and write
35D5000
unkown
page read and write
4A44000
unkown
page read and write
2F7F000
stack
page read and write
4B90000
heap
page read and write
9AA8000
unkown
page read and write
7810000
unkown
page read and write
A3C3000
unkown
page read and write
1383000
heap
page read and write
839E000
stack
page read and write
3540000
unkown
page read and write
7FF5D7244000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
7FF5D74B8000
unkown
page readonly
C8F2000
unkown
page read and write
C62D000
unkown
page read and write
35BD000
unkown
page read and write
B330000
unkown
page read and write
1482000
trusted library allocation
page read and write
FD0000
unclassified section
page execute and read and write
C653000
unkown
page read and write
AA53000
unkown
page read and write
14F6000
heap
page read and write
4ADA000
unkown
page read and write
881A000
heap
page read and write
C920000
unkown
page read and write
12B0000
unkown
page read and write
B0BD000
stack
page read and write
760F000
unkown
page read and write
E54D000
stack
page read and write
B4D0000
unkown
page readonly
7FF5D75BF000
unkown
page readonly
A313000
unkown
page read and write
35D3000
unkown
page read and write
5AC0000
heap
page read and write
7FF5D7641000
unkown
page readonly
1405000
heap
page read and write
10906000
system
page read and write
7FF5D7267000
unkown
page readonly
2FA0000
heap
page read and write
75F8000
unkown
page read and write
A3B6000
unkown
page read and write
7FF5D75F2000
unkown
page readonly
E64E000
stack
page read and write
7B80000
unkown
page readonly
7FF5D7267000
unkown
page readonly
35BD000
unkown
page read and write
9B2C000
unkown
page read and write
6380000
heap
page read and write
7FF5D77EB000
unkown
page readonly
7FF5D7376000
unkown
page readonly
AA08000
unkown
page read and write
14A0000
trusted library allocation
page read and write
7FF5D777A000
unkown
page readonly
A384000
unkown
page read and write
7611000
unkown
page read and write
7FF5D783B000
unkown
page readonly
8931000
unkown
page read and write
BE90000
unkown
page read and write
7AF1000
unkown
page read and write
895F000
unkown
page read and write
A39C000
unkown
page read and write
85BE000
stack
page read and write
9EB0000
unkown
page readonly
3630000
unkown
page readonly
7FF5D749B000
unkown
page readonly
4986000
unkown
page read and write
7FF5D7703000
unkown
page readonly
7FF5D7404000
unkown
page readonly
B85A000
stack
page read and write
7FF5D762F000
unkown
page readonly
7FF5D76C8000
unkown
page readonly
353D000
unkown
page read and write
AA4D000
stack
page read and write
7FF5D7837000
unkown
page readonly
35B3000
unkown
page read and write
35CD000
unkown
page read and write
AA1B000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
12F7000
stack
page read and write
364C000
trusted library allocation
page read and write
C916000
unkown
page read and write
35C9000
unkown
page read and write
A2A2000
unkown
page read and write
1395000
heap
page read and write
A391000
unkown
page read and write
9B41000
unkown
page read and write
A408000
unkown
page read and write
7FF5D772C000
unkown
page readonly
35DC000
unkown
page read and write
C65E000
unkown
page read and write
B85A000
stack
page read and write
1B41000
direct allocation
page execute and read and write
7FF5D7336000
unkown
page readonly
F13000
heap
page read and write
7FF5D77B9000
unkown
page readonly
1890000
direct allocation
page execute and read and write
9A8E000
unkown
page read and write
7FF5D76F5000
unkown
page readonly
AA01000
unkown
page read and write
779E000
unkown
page read and write
AA0D000
stack
page read and write
7FF5D7643000
unkown
page readonly
7FF5D7407000
unkown
page readonly
650000
heap
page read and write
7FF5D7230000
unkown
page readonly
7FF5D72DF000
unkown
page readonly
A3AA000
unkown
page read and write
C81C000
unkown
page read and write
49BB000
unkown
page read and write
35CF000
unkown
page read and write
7FF5D770A000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
1DA0000
heap
page read and write
C908000
unkown
page read and write
4AEA000
unkown
page read and write
BB10000
heap
page read and write
4CB0000
trusted library allocation
page read and write
AFBE000
stack
page read and write
768E000
unkown
page read and write
49FD000
unkown
page read and write
7FF5D7215000
unkown
page readonly
C615000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
7FF5D7799000
unkown
page readonly
CA1C000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
768E000
unkown
page read and write
8890000
unkown
page readonly
94F4000
unkown
page read and write
7FF5D760B000
unkown
page readonly
280000
system
page execute and read and write
51B9000
direct allocation
page execute and read and write
7DF4F24A1000
unkown
page execute read
9A8C000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
1A5F000
stack
page read and write
2E3C000
stack
page read and write
1360000
heap
page read and write
769A000
unkown
page read and write
7FF5D77C2000
unkown
page readonly
9D67000
unkown
page read and write
7AE0000
unkown
page read and write
7FF5D7077000
unkown
page readonly
2F20000
heap
page read and write
CA06000
unkown
page read and write
99B1000
unkown
page read and write
7AB0000
unkown
page read and write
3170000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
AA40000
unkown
page read and write
7FF5D77CD000
unkown
page readonly
9FAF000
stack
page read and write
7FF5D76E8000
unkown
page readonly
A2B5000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
43D9000
trusted library allocation
page read and write
7DF4F2470000
unkown
page readonly
35B0000
unkown
page read and write
CA3D000
unkown
page read and write
8CB8000
stack
page read and write
CA09000
unkown
page read and write
2F24000
heap
page read and write
75AE000
stack
page read and write
8A70000
unkown
page read and write
3500000
stack
page read and write
7AA0000
unkown
page read and write
7FF5D720F000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
A1AF000
stack
page read and write
7FF5D77E3000
unkown
page readonly
7FF5D75CB000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
35D5000
unkown
page read and write
3530000
unkown
page read and write
87C0000
unkown
page read and write
C46F000
unkown
page read and write
A286000
unkown
page read and write
FF0000
unkown
page readonly
C8E8000
unkown
page read and write
7FF5D752F000
unkown
page readonly
10346000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
1710000
heap
page read and write
35CD000
unkown
page read and write
C800000
unkown
page read and write
7609000
unkown
page read and write
8330000
trusted library allocation
page read and write
2FD0000
heap
page read and write
49D6000
unkown
page read and write
338C000
stack
page read and write
7FF5D7458000
unkown
page readonly
35C3000
unkown
page read and write
362D000
unkown
page read and write
10520000
system
page execute and read and write
2EE0000
trusted library allocation
page read and write
75F8000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
2FCA000
heap
page read and write
620000
heap
page read and write
A286000
unkown
page read and write
35FA000
unkown
page read and write
5860000
heap
page read and write
7FF5D72E9000
unkown
page readonly
1C20000
unclassified section
page execute and read and write
1034B000
unkown
page read and write
7FF5D7523000
unkown
page readonly
4AB0000
unkown
page read and write
32E4000
trusted library allocation
page read and write
33C0000
heap
page execute and read and write
76E3000
heap
page read and write
8810000
heap
page read and write
60F0000
trusted library allocation
page read and write
7FF5D7795000
unkown
page readonly
7FF5D7669000
unkown
page readonly
769A000
unkown
page read and write
A3AC000
unkown
page read and write
1B5D000
direct allocation
page execute and read and write
AA40000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
761E000
unkown
page read and write
C2CE000
stack
page read and write
7C80000
unkown
page read and write
10400000
unkown
page read and write
AA40000
unkown
page read and write
53D000
stack
page read and write
35DC000
unkown
page read and write
C981000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
7FF5D7394000
unkown
page readonly
A39C000
unkown
page read and write
C916000
unkown
page read and write
7631000
unkown
page read and write
A39F000
unkown
page read and write
7FF5D7398000
unkown
page readonly
C460000
unkown
page read and write
7FF5D72C8000
unkown
page readonly
A28D000
unkown
page read and write
7DF4F2481000
unkown
page execute read
C5EC000
unkown
page read and write
D64000
unkown
page read and write
9AAA000
unkown
page read and write
4980000
unkown
page read and write
1A60000
trusted library allocation
page read and write
9679000
stack
page read and write
CA2C000
unkown
page read and write
35F4000
unkown
page read and write
B0BD000
stack
page read and write
7FF5D76D5000
unkown
page readonly
AA0C000
unkown
page read and write
BB10000
heap
page read and write
A3B9000
unkown
page read and write
7FF5D7236000
unkown
page readonly
A1AF000
stack
page read and write
CA1D000
unkown
page read and write
500E000
heap
page read and write
7FF5D7682000
unkown
page readonly
BE90000
unkown
page read and write
7FF5D748A000
unkown
page readonly
7FF5D7700000
unkown
page readonly
C5F4000
unkown
page read and write
7FF5D74B8000
unkown
page readonly
7FF5D729E000
unkown
page readonly
7DBC000
stack
page read and write
102D9000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
98FD000
stack
page read and write
35B0000
unkown
page read and write
A391000
unkown
page read and write
7FF5D7591000
unkown
page readonly
7FF5D77A8000
unkown
page readonly
35C3000
unkown
page read and write
7CB0000
unkown
page readonly
CA77000
unkown
page read and write
35D5000
unkown
page read and write
8948000
unkown
page read and write
7693000
unkown
page read and write
9AB2000
unkown
page read and write
7FF5D749B000
unkown
page readonly
760F000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
362D000
unkown
page read and write
34C4000
trusted library allocation
page read and write
7FF5D7523000
unkown
page readonly
76F8000
unkown
page read and write
BDC0000
unkown
page read and write
103C4000
unkown
page read and write
9AB2000
unkown
page read and write
C8D8000
unkown
page read and write
5479000
unkown
page read and write
9B2C000
unkown
page read and write
7E60000
unkown
page read and write
7FF5D7309000
unkown
page readonly
7FF5D71F9000
unkown
page readonly
AF4E000
stack
page read and write
7DF4F2471000
unkown
page execute read
EB5000
stack
page read and write
35B0000
unkown
page read and write
7FF5D7784000
unkown
page readonly
C3CD000
stack
page read and write
7FF5D77FD000
unkown
page readonly
4D30000
heap
page read and write
7FF5D7722000
unkown
page readonly
7FF5D7808000
unkown
page readonly
86E0000
unkown
page readonly
76B0000
trusted library section
page read and write
4AFA000
unkown
page read and write
35D5000
unkown
page read and write
C61B000
unkown
page read and write
A23A000
unkown
page read and write
7DF4F2480000
unkown
page readonly
35F4000
unkown
page read and write
1B56000
direct allocation
page execute and read and write
C617000
unkown
page read and write
35CF000
unkown
page read and write
76AF000
stack
page read and write
2EE0000
trusted library allocation
page read and write
3520000
unkown
page readonly
9ADB000
unkown
page read and write
7FF5D771A000
unkown
page readonly
AAA4000
unkown
page read and write
35B0000
unkown
page read and write
8F49000
stack
page read and write
185E000
stack
page read and write
7FF5D7752000
unkown
page readonly
60F0000
trusted library allocation
page read and write
9C96000
unkown
page read and write
9AB4000
unkown
page read and write
35C1000
unkown
page read and write
C4BD000
unkown
page read and write
10AFF000
system
page read and write
7FF5D6BEF000
unkown
page readonly
A233000
unkown
page read and write
C916000
unkown
page read and write
8A00000
unkown
page read and write
76C0000
heap
page read and write
86D0000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
9AAA000
unkown
page read and write
A9FD000
unkown
page read and write
5012000
heap
page read and write
7609000
unkown
page read and write
C460000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
FF0000
unkown
page readonly
B03B000
stack
page read and write
7FF5D72D0000
unkown
page readonly
10384000
unkown
page read and write
7C31000
unkown
page read and write
7DF4F2481000
unkown
page execute read
9A9E000
unkown
page read and write
EF0000
heap
page read and write
7FF5D7438000
unkown
page readonly
7654000
unkown
page read and write
7FF5D7425000
unkown
page readonly
C9A7000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
C1CC000
stack
page read and write
EB6000
stack
page read and write
1160000
unkown
page read and write
7FF5CE343000
unkown
page readonly
FEF000
unclassified section
page execute and read and write
C806000
unkown
page read and write
8940000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
3626000
unkown
page read and write
84BB000
stack
page read and write
A39C000
unkown
page read and write
9A8C000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
C800000
unkown
page read and write
7FF5D71EF000
unkown
page readonly
A39F000
unkown
page read and write
7FF5D728E000
unkown
page readonly
7FF5D710B000
unkown
page readonly
2FBF000
heap
page read and write
7FF5D77DD000
unkown
page readonly
7FF5D766E000
unkown
page readonly
C0BA000
stack
page read and write
AA26000
unkown
page read and write
8CB8000
stack
page read and write
A251000
unkown
page read and write
49A8000
unkown
page read and write
7B60000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
7691000
unkown
page read and write
A408000
unkown
page read and write
7FF5D7648000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
9D67000
unkown
page read and write
AE1D000
stack
page read and write
7FF5D77D2000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
99B0000
unkown
page read and write
7FF5D7691000
unkown
page readonly
7FF5D72D7000
unkown
page readonly
893D000
unkown
page read and write
9AB4000
unkown
page read and write
8ECB000
unkown
page read and write
7B20000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
A9DF000
unkown
page read and write
7FF5D7284000
unkown
page readonly
13FD000
stack
page read and write
BEA0000
unkown
page readonly
AA1B000
unkown
page read and write
7FD80000
trusted library allocation
page execute and read and write
35F4000
unkown
page read and write
14E6000
heap
page read and write
77DB000
unkown
page read and write
7FF5D7077000
unkown
page readonly
3530000
unkown
page read and write
7FF5D7280000
unkown
page readonly
A2B5000
unkown
page read and write
7DF4F2461000
unkown
page execute read
C806000
unkown
page read and write
35D3000
unkown
page read and write
8C39000
stack
page read and write
4980000
unkown
page read and write
7FF5D7396000
unkown
page readonly
7FF5D77CD000
unkown
page readonly
35D3000
unkown
page read and write
7FF5D776D000
unkown
page readonly
7FF5D758D000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
C8EB000
unkown
page read and write
9A90000
unkown
page read and write
C48B000
unkown
page read and write
5830000
trusted library allocation
page execute and read and write
C24E000
stack
page read and write
7FF5D770F000
unkown
page readonly
75E0000
unkown
page read and write
1BD8000
direct allocation
page execute and read and write
8948000
unkown
page read and write
C981000
unkown
page read and write
7C80000
unkown
page read and write
3553000
unkown
page read and write
A273000
unkown
page read and write
2F70000
heap
page read and write
7FF5D7398000
unkown
page readonly
1700000
heap
page read and write
148B000
trusted library allocation
page execute and read and write
C8D5000
unkown
page read and write
8FD9000
stack
page read and write
7FF5D7485000
unkown
page readonly
53D2000
direct allocation
page execute and read and write
4B00000
unkown
page read and write
35BD000
unkown
page read and write
E4CC000
stack
page read and write
A3C3000
unkown
page read and write
7FF5D7396000
unkown
page readonly
1395000
heap
page read and write
354E000
unkown
page read and write
35D1000
unkown
page read and write
4ADA000
unkown
page read and write
8931000
unkown
page read and write
2EA1000
unkown
page read and write
C035000
stack
page read and write
1202000
unkown
page read and write
1340000
unkown
page read and write
EFC1000
unkown
page execute and read and write
A313000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
7FF5D7792000
unkown
page readonly
14F3000
heap
page read and write
7FF5D6A4B000
unkown
page readonly
7460000
unkown
page read and write
C926000
unkown
page read and write
9A98000
unkown
page read and write
ED2000
unkown
page readonly
7686000
unkown
page read and write
C4C6000
unkown
page read and write
C5FD000
unkown
page read and write
A3B6000
unkown
page read and write
2947000
heap
page read and write
75E0000
unkown
page read and write
2F24000
heap
page read and write
9D67000
unkown
page read and write
ED0000
unkown
page readonly
14BE000
heap
page read and write
7FF5D7593000
unkown
page readonly
7FF5D775C000
unkown
page readonly
A233000
unkown
page read and write
7FF5D7593000
unkown
page readonly
C035000
stack
page read and write
7DF4F2460000
unkown
page readonly
1A2E000
direct allocation
page execute and read and write
35BD000
unkown
page read and write
AA01000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
7FF5D7360000
unkown
page readonly
7FF5D72CE000
unkown
page readonly
1206000
unkown
page read and write
7FF5D758D000
unkown
page readonly
80EE000
stack
page read and write
9B95000
unkown
page read and write
7FF5CE343000
unkown
page readonly
35F4000
unkown
page read and write
A02E000
stack
page read and write
7FF5D77B9000
unkown
page readonly
7FF5D77B6000
unkown
page readonly
9A92000
unkown
page read and write
51BD000
direct allocation
page execute and read and write
7FF5D7073000
unkown
page readonly
362A000
unkown
page read and write
2940000
heap
page read and write
A40E000
unkown
page read and write
9AC3000
unkown
page read and write
7FF5D781A000
unkown
page readonly
7FF5D7703000
unkown
page readonly
E10000
unkown
page readonly
853C000
stack
page read and write
98FD000
stack
page read and write
9A80000
unkown
page read and write
33F0000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
A408000
unkown
page read and write
9A9E000
unkown
page read and write
5AE0000
trusted library allocation
page read and write
7FF5D74F2000
unkown
page readonly
7FF5D7206000
unkown
page readonly
35FA000
unkown
page read and write
7FF5D770F000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
8940000
unkown
page read and write
5330000
unkown
page write copy
7637000
unkown
page read and write
7B80000
unkown
page readonly
7FF5D7507000
unkown
page readonly
3280000
unkown
page read and write
33A3000
heap
page read and write
9A8E000
unkown
page read and write
7FF5D7589000
unkown
page readonly
55DF000
unclassified section
page read and write
5C10000
heap
page read and write
9D67000
unkown
page read and write
7FF5D7482000
unkown
page readonly
7FF5D71F9000
unkown
page readonly
B7DD000
stack
page read and write
1A70000
trusted library allocation
page read and write
1400000
heap
page read and write
49FA000
unkown
page read and write
A12F000
stack
page read and write
1250000
unkown
page read and write
1390000
heap
page read and write
7440000
unkown
page read and write
8920000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
9AB2000
unkown
page read and write
1463000
trusted library allocation
page read and write
35B0000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7637000
unkown
page read and write
1731000
unkown
page readonly
54CC000
stack
page read and write
9AA0000
unkown
page read and write
C5F4000
unkown
page read and write
2EC0000
unkown
page readonly
60F0000
trusted library allocation
page read and write
CA5E000
unkown
page read and write
7DC0000
unkown
page readonly
7FF5D738E000
unkown
page readonly
7FF5D66E8000
unkown
page readonly
7FF5D7055000
unkown
page readonly
76F8000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
EF10000
unkown
page execute and read and write
B4BF000
stack
page read and write
7FF5D74C3000
unkown
page readonly
9A96000
unkown
page read and write
AA08000
unkown
page read and write
12FB000
stack
page read and write
C920000
unkown
page read and write
7CB0000
unkown
page readonly
7FF5D769E000
unkown
page readonly
7FF5D769E000
unkown
page readonly
767C000
unkown
page read and write
35B5000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
102C2000
unkown
page read and write
1383000
heap
page read and write
7FF5D7558000
unkown
page readonly
7FF5D7488000
unkown
page readonly
8900000
unkown
page read and write
7FF5D760B000
unkown
page readonly
5AD0000
heap
page read and write
7FF5D76C8000
unkown
page readonly
A02E000
stack
page read and write
C44F000
stack
page read and write
977E000
stack
page read and write
7FF5D7073000
unkown
page readonly
3248000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
63A0000
heap
page read and write
7FF5D71E6000
unkown
page readonly
4A71000
unkown
page read and write
A9E9000
unkown
page read and write
7FF5D7558000
unkown
page readonly
7605000
unkown
page read and write
9E2E000
stack
page read and write
C609000
unkown
page read and write
C9A7000
unkown
page read and write
7FF5D7075000
unkown
page readonly
7FF5D7407000
unkown
page readonly
33D1000
trusted library allocation
page read and write
C5F8000
unkown
page read and write
7FF5D7820000
unkown
page readonly
C8BC000
unkown
page read and write
B980000
unkown
page readonly
5B20000
heap
page execute and read and write
32EB000
trusted library allocation
page read and write
77C0000
trusted library allocation
page read and write
7E58000
stack
page read and write
7FF5D75B3000
unkown
page readonly
9ADB000
unkown
page read and write
894A000
unkown
page read and write
3120000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
7DBC000
stack
page read and write
9AAC000
unkown
page read and write
2CC0000
heap
page read and write
7FF5D764F000
unkown
page readonly
D5C000
unkown
page read and write
8880000
unkown
page readonly
7FF5D7065000
unkown
page readonly
4AEA000
unkown
page read and write
10303000
unkown
page read and write
77DB000
unkown
page read and write
602E000
stack
page read and write
2EE0000
trusted library allocation
page read and write
C908000
unkown
page read and write
7FF5D7760000
unkown
page readonly
A2DE000
unkown
page read and write
7FF5D7507000
unkown
page readonly
99C0000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7FF5D71E6000
unkown
page readonly
7FF5D71A6000
unkown
page readonly
2FC5000
heap
page read and write
19BD000
direct allocation
page execute and read and write
8935000
unkown
page read and write
B220000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
53E1000
unkown
page read and write
C642000
unkown
page read and write
C873000
unkown
page read and write
E10000
unkown
page readonly
2BFC000
stack
page read and write
2EE0000
trusted library allocation
page read and write
AA0C000
unkown
page read and write
9A94000
unkown
page read and write
C7CB000
unkown
page read and write
9D67000
unkown
page read and write
8A70000
unkown
page read and write
3312000
trusted library allocation
page read and write
BFB8000
stack
page read and write
10284000
unkown
page read and write
7FF5D747F000
unkown
page readonly
A0A6000
stack
page read and write
779E000
unkown
page read and write
43D1000
trusted library allocation
page read and write
7FF5D7376000
unkown
page readonly
7FF5D765F000
unkown
page readonly
A3AC000
unkown
page read and write
B950000
unkown
page readonly
86D0000
unkown
page readonly
1A90000
heap
page read and write
7FF5D72CE000
unkown
page readonly
8948000
unkown
page read and write
A313000
unkown
page read and write
35D1000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
7FF5D7643000
unkown
page readonly
3544000
unkown
page read and write
7FF5D7452000
unkown
page readonly
C981000
unkown
page read and write
9A72000
unkown
page read and write
2FCA000
heap
page read and write
A3AC000
unkown
page read and write
7DD0000
heap
page read and write
362A000
unkown
page read and write
E6CD000
stack
page read and write
7FF5D716B000
unkown
page readonly
7FF5D7740000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
3630000
unkown
page readonly
7FF5D77E9000
unkown
page readonly
7FF5D7669000
unkown
page readonly
2F24000
heap
page read and write
7FF5D7419000
unkown
page readonly
7FF5D7752000
unkown
page readonly
187D000
trusted library allocation
page execute and read and write
35C3000
unkown
page read and write
8964000
unkown
page read and write
35E4000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
8350000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
4CB0000
trusted library allocation
page read and write
C483000
unkown
page read and write
A3AA000
unkown
page read and write
C981000
unkown
page read and write
35B3000
unkown
page read and write
3520000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
91F0000
unkown
page readonly
7DF4F2470000
unkown
page readonly
115C000
stack
page read and write
7FF5D7065000
unkown
page readonly
C4DC000
unkown
page read and write
A3B6000
unkown
page read and write
2FA7000
heap
page read and write
9D67000
unkown
page read and write
C450000
unkown
page read and write
FEB000
unclassified section
page execute and read and write
8940000
unkown
page read and write
7EAE000
stack
page read and write
A33F000
unkown
page read and write
7FF5D741F000
unkown
page readonly
4A44000
unkown
page read and write
35DC000
unkown
page read and write
3340000
trusted library allocation
page read and write
7FF5D77F0000
unkown
page readonly
C615000
unkown
page read and write
7FF5D762F000
unkown
page readonly
2F24000
heap
page read and write
C915000
unkown
page read and write
1281000
unkown
page readonly
4E53000
heap
page read and write
7FF5D723C000
unkown
page readonly
9AA0000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
7AA0000
unkown
page read and write
35C3000
unkown
page read and write
35C1000
unkown
page read and write
7FF5D75F6000
unkown
page readonly
893E000
unkown
page read and write
A39F000
unkown
page read and write
A3C3000
unkown
page read and write
77A2000
unkown
page read and write
7FF5D6BE4000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
A416000
unkown
page read and write
7FF5D728E000
unkown
page readonly
75FD000
unkown
page read and write
7FF5D719C000
unkown
page readonly
C90E000
unkown
page read and write
9A84000
unkown
page read and write
4A0E000
unkown
page read and write
14B8000
heap
page read and write
1430000
heap
page read and write
9AB4000
unkown
page read and write
C62D000
unkown
page read and write
32E0000
trusted library allocation
page read and write
7FF5D732D000
unkown
page readonly
A3C3000
unkown
page read and write
12D0000
unkown
page readonly
3398000
trusted library allocation
page read and write
C8DE000
unkown
page read and write
3626000
unkown
page read and write
7FF5D774C000
unkown
page readonly
AA24000
unkown
page read and write
9579000
stack
page read and write
894A000
unkown
page read and write
997C000
stack
page read and write
4AB0000
unkown
page read and write
1034B000
unkown
page read and write
C92E000
unkown
page read and write
9B95000
unkown
page read and write
7FF5D751F000
unkown
page readonly
C625000
unkown
page read and write
3100000
unkown
page read and write
146D000
trusted library allocation
page execute and read and write
9AF9000
unkown
page read and write
7FF5D71AF000
unkown
page readonly
1450000
trusted library allocation
page read and write
A416000
unkown
page read and write
154F000
heap
page read and write
AC10000
heap
page read and write
2EE0000
trusted library allocation
page read and write
7FF5D7740000
unkown
page readonly
C981000
unkown
page read and write
35C1000
unkown
page read and write
C8F6000
unkown
page read and write
A3AA000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
A33F000
unkown
page read and write
10384000
unkown
page read and write
7FF5D766E000
unkown
page readonly
77DB000
unkown
page read and write
1340000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
822F000
stack
page read and write
E00000
unkown
page readonly
C663000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
7FF5D72FB000
unkown
page readonly
760D000
unkown
page read and write
7E60000
unkown
page read and write
7FF5D7745000
unkown
page readonly
4986000
unkown
page read and write
AAA4000
unkown
page read and write
C669000
unkown
page read and write
C8BC000
unkown
page read and write
7AB0000
unkown
page read and write
7FF5D7764000
unkown
page readonly
2FCA000
heap
page read and write
9A76000
unkown
page read and write
9A6A000
unkown
page read and write
C916000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
9B0B000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
11C1000
unkown
page read and write
176E000
stack
page read and write
9AA8000
unkown
page read and write
4A71000
heap
page read and write
2FD0000
heap
page read and write
87DA000
unkown
page read and write
8890000
unkown
page readonly
96FE000
stack
page read and write
49FA000
unkown
page read and write
9A72000
unkown
page read and write
7FF5D71C4000
unkown
page readonly
9A98000
unkown
page read and write
B220000
unkown
page read and write
9E2D000
stack
page read and write
F90000
heap
page read and write
7FF5D772C000
unkown
page readonly
849E000
stack
page read and write
1454000
trusted library allocation
page read and write
7FF5D77DA000
unkown
page readonly
7FF5D6ABD000
unkown
page readonly
5330000
unkown
page write copy
1A97000
heap
page read and write
F0C000
heap
page read and write
7DF4F2460000
unkown
page readonly
7E58000
stack
page read and write
35DC000
unkown
page read and write
4A71000
heap
page read and write
7FF5D75AF000
unkown
page readonly
7FF5D7691000
unkown
page readonly
95FD000
stack
page read and write
3392000
trusted library allocation
page read and write
A416000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
A391000
unkown
page read and write
7FF5D745B000
unkown
page readonly
A40E000
unkown
page read and write
1750000
heap
page read and write
362A000
unkown
page read and write
9B41000
unkown
page read and write
35B5000
unkown
page read and write
5AF0000
trusted library allocation
page read and write
1487000
trusted library allocation
page execute and read and write
87DA000
unkown
page read and write
7FF5D7438000
unkown
page readonly
7FF5D75F9000
unkown
page readonly
2F24000
heap
page read and write
F13000
heap
page read and write
7FF5D743F000
unkown
page readonly
2F24000
heap
page read and write
1731000
unkown
page readonly
3554000
unkown
page read and write
4A90000
unkown
page read and write
7FF5D7262000
unkown
page readonly
7FF5D7272000
unkown
page readonly
7FF5D723F000
unkown
page readonly
8932000
unkown
page read and write
7618000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
C7C6000
unkown
page read and write
362A000
unkown
page read and write
7DF4F2491000
unkown
page execute read
9AF9000
unkown
page read and write
AA04000
unkown
page read and write
CA32000
unkown
page read and write
140E000
stack
page read and write
7FF5D7442000
unkown
page readonly
7FF5D77C2000
unkown
page readonly
893D000
unkown
page read and write
2F24000
heap
page read and write
7FF5D66E3000
unkown
page readonly
7FF5D75AF000
unkown
page readonly
7FF5D7764000
unkown
page readonly
3301000
trusted library allocation
page read and write
4AA0000
unkown
page read and write
5FEE000
stack
page read and write
9A84000
unkown
page read and write
7FF5D7820000
unkown
page readonly
C8E8000
unkown
page read and write
7FF5D7546000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
E7CC000
stack
page read and write
C625000
unkown
page read and write
1350000
unkown
page readonly
3120000
unkown
page read and write
1453000
trusted library allocation
page execute and read and write
A2D7000
unkown
page read and write
C5F8000
unkown
page read and write
7FF5D7784000
unkown
page readonly
9A94000
unkown
page read and write
7FF5D7360000
unkown
page readonly
CA5D000
unkown
page read and write
9B41000
unkown
page read and write
7FF5D7485000
unkown
page readonly
7686000
unkown
page read and write
535D000
direct allocation
page execute and read and write
1480000
trusted library allocation
page read and write
8A46000
unkown
page read and write
7605000
unkown
page read and write
7FF5D748C000
unkown
page readonly
8360000
unkown
page read and write
3160000
unkown
page read and write
4AC0000
unkown
page read and write
7FF5D6AB6000
unkown
page readonly
C65E000
unkown
page read and write
102D9000
unkown
page read and write
B330000
unkown
page read and write
C621000
unkown
page read and write
7FF5D7391000
unkown
page readonly
A33F000
unkown
page read and write
35E4000
unkown
page read and write
7FF5D75F2000
unkown
page readonly
BFB8000
stack
page read and write
B8DB000
stack
page read and write
7FF5D73F5000
unkown
page readonly
13A0000
unkown
page readonly
BF3E000
stack
page read and write
8DCB000
stack
page read and write
BE70000
unkown
page readonly
A264000
unkown
page read and write
A416000
unkown
page read and write
14D8000
heap
page read and write
7FF5D781A000
unkown
page readonly
9A96000
unkown
page read and write
7FF5D7257000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
C95A000
unkown
page read and write
35C1000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
9ABD000
unkown
page read and write
C496000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
7FF5D710B000
unkown
page readonly
7440000
unkown
page read and write
35B3000
unkown
page read and write
8870000
unkown
page readonly
7FF5D76DA000
unkown
page readonly
C863000
unkown
page read and write
7FF5D720A000
unkown
page readonly
7FF5D72BD000
unkown
page readonly
4CB0000
trusted library allocation
page read and write
3532000
unkown
page read and write
76F8000
unkown
page read and write
7AF1000
unkown
page read and write
7FF5D7262000
unkown
page readonly
8934000
unkown
page read and write
32C0000
heap
page read and write
5083000
heap
page read and write
7C31000
unkown
page read and write
A3B6000
unkown
page read and write
AC0D000
stack
page read and write
1160000
unkown
page read and write
2F24000
heap
page read and write
E00000
unkown
page readonly
1A85000
trusted library allocation
page read and write
94AB000
stack
page read and write
7FF5D72C8000
unkown
page readonly
9A6A000
unkown
page read and write
7FF5D7385000
unkown
page readonly
9A72000
unkown
page read and write
7FF5D7202000
unkown
page readonly
4AA0000
unkown
page read and write
9AAC000
unkown
page read and write
7FF5D760E000
unkown
page readonly
4A71000
unkown
page read and write
1561000
heap
page read and write
7693000
unkown
page read and write
B950000
unkown
page readonly
7DC0000
unkown
page readonly
156C000
heap
page read and write
12D0000
unkown
page readonly
AA1A000
unkown
page read and write
7AE0000
unkown
page read and write
49BB000
unkown
page read and write
7FF5D729E000
unkown
page readonly
35FA000
unkown
page read and write
C908000
unkown
page read and write
35D3000
unkown
page read and write
3100000
unkown
page read and write
7FF5D768B000
unkown
page readonly
7FF5D75A6000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
8812000
heap
page read and write
7FF5D7694000
unkown
page readonly
7FF5D751F000
unkown
page readonly
9B2C000
unkown
page read and write
2F24000
heap
page read and write
7AC0000
unkown
page read and write
7FF5D705D000
unkown
page readonly
33B0000
trusted library allocation
page execute and read and write
4A70000
heap
page read and write
7C90000
unkown
page read and write
AA40000
unkown
page read and write
7DF4F2491000
unkown
page execute read
2EE0000
trusted library allocation
page read and write
8360000
unkown
page read and write
A3B9000
unkown
page read and write
C61B000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
1050E000
system
page execute and read and write
9A94000
unkown
page read and write
3140000
unkown
page read and write
7FAE000
stack
page read and write
7FF5D723F000
unkown
page readonly
7693000
unkown
page read and write
7654000
unkown
page read and write
FA0000
heap
page read and write
7FF5D76F5000
unkown
page readonly
7FF5D6BDB000
unkown
page readonly
9A96000
unkown
page read and write
7FF5D774C000
unkown
page readonly
9FAF000
stack
page read and write
7FF5D7705000
unkown
page readonly
B8DB000
stack
page read and write
C73E000
unkown
page read and write
4D41000
trusted library allocation
page execute and read and write
9AAA000
unkown
page read and write
4A12000
unkown
page read and write
7989000
stack
page read and write
2B3F000
stack
page read and write
86E0000
unkown
page readonly
35D1000
unkown
page read and write
C8BC000
unkown
page read and write
BE49000
stack
page read and write
2FCA000
heap
page read and write
AA16000
unkown
page read and write
7435000
stack
page read and write
C78A000
unkown
page read and write
C883000
unkown
page read and write
3160000
unkown
page read and write
4D30000
trusted library allocation
page execute and read and write
7FF5D7604000
unkown
page readonly
AA1A000
unkown
page read and write
1530000
heap
page read and write
5B00000
trusted library allocation
page execute and read and write
A2D7000
unkown
page read and write
9A76000
unkown
page read and write
1460000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
B559000
stack
page read and write
CA06000
unkown
page read and write
A220000
unkown
page read and write
9579000
stack
page read and write
7FF5D745B000
unkown
page readonly
C605000
unkown
page read and write
3626000
unkown
page read and write
2FF9000
stack
page read and write
75FD000
unkown
page read and write
7FF5D7419000
unkown
page readonly
9C22000
unkown
page read and write
9AF9000
unkown
page read and write
769A000
unkown
page read and write
C73E000
unkown
page read and write
7B00000
unkown
page readonly
7FF5D72D7000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
A237000
unkown
page read and write
4DD0000
trusted library allocation
page execute and read and write
C642000
unkown
page read and write
B0E0000
unkown
page readonly
C5F0000
unkown
page read and write
7C70000
unkown
page readonly
9AA0000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
9C92000
unkown
page read and write
2FCA000
heap
page read and write
9A8C000
unkown
page read and write
7FF5D7442000
unkown
page readonly
35FA000
unkown
page read and write
BEA0000
unkown
page readonly
7FF5D778A000
unkown
page readonly
7FF5D75FF000
unkown
page readonly
C862000
unkown
page read and write
AAA4000
unkown
page read and write
3380000
heap
page read and write
7FF5D776D000
unkown
page readonly
7FF5D7404000
unkown
page readonly
5463000
unkown
page read and write
9A80000
unkown
page read and write
7FF5D716B000
unkown
page readonly
7FF5D75E9000
unkown
page readonly
A237000
unkown
page read and write
84BB000
stack
page read and write
894A000
unkown
page read and write
C5EC000
unkown
page read and write
AA0A000
unkown
page read and write
3626000
unkown
page read and write
35CD000
unkown
page read and write
7FF5D7639000
unkown
page readonly
7FF5D783B000
unkown
page readonly
7DD0000
heap
page read and write
8320000
trusted library allocation
page read and write
1350000
unkown
page readonly
C0BA000
stack
page read and write
9A9E000
unkown
page read and write
C496000
unkown
page read and write
2EC0000
unkown
page readonly
9A90000
unkown
page read and write
3486000
stack
page read and write
4A0E000
unkown
page read and write
4A40000
unkown
page read and write
F68000
unkown
page readonly
C5F0000
unkown
page read and write
2F24000
heap
page read and write
35B5000
unkown
page read and write
60F0000
trusted library allocation
page read and write
7FF5D7589000
unkown
page readonly
C909000
unkown
page read and write
35D1000
unkown
page read and write
A251000
unkown
page read and write
7FF5D7272000
unkown
page readonly
F0C000
heap
page read and write
C7CB000
unkown
page read and write
AA0D000
unkown
page read and write
1410000
trusted library allocation
page execute and read and write
7FF5D74A6000
unkown
page readonly
32FE000
trusted library allocation
page read and write
7C70000
unkown
page readonly
7FF5D71EF000
unkown
page readonly
7FF5D69BB000
unkown
page readonly
7FF5D7385000
unkown
page readonly
2F24000
heap
page read and write
2EE0000
trusted library allocation
page read and write
77A2000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
C24E000
stack
page read and write
97FF000
stack
page read and write
C9DB000
unkown
page read and write
145D000
trusted library allocation
page execute and read and write
2EE0000
trusted library allocation
page read and write
881A000
heap
page read and write
7FF5D717C000
unkown
page readonly
2FFE000
stack
page read and write
7FF5D66E8000
unkown
page readonly
7FF5D7797000
unkown
page readonly
102C2000
unkown
page read and write
1390000
heap
page read and write
7FF5D7292000
unkown
page readonly
7631000
unkown
page read and write
3306000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
7FF5D71D7000
unkown
page readonly
7B10000
unkown
page read and write
A384000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
9A76000
unkown
page read and write
C91A000
unkown
page read and write
7FF5D778A000
unkown
page readonly
35CF000
unkown
page read and write
7D3E000
stack
page read and write
35CD000
unkown
page read and write
2FBF000
heap
page read and write
3535000
unkown
page read and write
1421000
trusted library allocation
page execute and read and write
AAA9000
unkown
page read and write
B03B000
stack
page read and write
7FF5D7202000
unkown
page readonly
1270000
unkown
page read and write
7FF5D7482000
unkown
page readonly
997C000
stack
page read and write
35C1000
unkown
page read and write
AA33000
unkown
page read and write
147A000
trusted library allocation
page execute and read and write
33F0000
unkown
page read and write
2FCA000
heap
page read and write
362D000
unkown
page read and write
3320000
trusted library allocation
page read and write
7C90000
unkown
page read and write
C61D000
unkown
page read and write
C609000
unkown
page read and write
7FF5D77DD000
unkown
page readonly
4DE1000
trusted library allocation
page execute and read and write
7FF5D76E8000
unkown
page readonly
4BA0000
trusted library allocation
page read and write
7FF5D7546000
unkown
page readonly
AA49000
unkown
page read and write
7DF4F2480000
unkown
page readonly
353D000
unkown
page read and write
7470000
heap
page read and write
9679000
stack
page read and write
C472000
unkown
page read and write
16BE000
stack
page read and write
103C4000
unkown
page read and write
35B3000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
7FF5D74A6000
unkown
page readonly
7FF5D720A000
unkown
page readonly
C669000
unkown
page read and write
87C0000
unkown
page read and write
AE1D000
stack
page read and write
33B0000
unkown
page readonly
7FF5D717C000
unkown
page readonly
35CF000
unkown
page read and write
7AC0000
unkown
page read and write
7FF5D77F7000
unkown
page readonly
AA07000
unkown
page read and write
4A12000
unkown
page read and write
35DC000
unkown
page read and write
3140000
unkown
page read and write
9ADB000
unkown
page read and write
BE49000
stack
page read and write
11C1000
unkown
page read and write
C1CC000
stack
page read and write
A408000
unkown
page read and write
2F24000
heap
page read and write
A9A0000
unkown
page read and write
3531000
unkown
page read and write
C85F000
unkown
page read and write
5C15000
heap
page read and write
C908000
unkown
page read and write
A9DF000
unkown
page read and write
7B00000
unkown
page readonly
C9D9000
unkown
page read and write
A3B9000
unkown
page read and write
A39C000
unkown
page read and write
A12F000
stack
page read and write
2F24000
heap
page read and write
7FF5D706F000
unkown
page readonly
102CB000
unkown
page read and write
7FF5D7455000
unkown
page readonly
C605000
unkown
page read and write
7FF5D76CD000
unkown
page readonly
7B10000
unkown
page read and write
7FF5D723C000
unkown
page readonly
C8E8000
unkown
page read and write
9B0B000
unkown
page read and write
330D000
trusted library allocation
page read and write
FFA000
stack
page read and write
7FF5D6A4B000
unkown
page readonly
7FF5D77DA000
unkown
page readonly
362A000
unkown
page read and write
35B5000
unkown
page read and write
7FF5D7488000
unkown
page readonly
7FF5D744E000
unkown
page readonly
AA2B000
unkown
page read and write
7FF5D75B3000
unkown
page readonly
7FF5CE33D000
unkown
page readonly
C81C000
unkown
page read and write
35E4000
unkown
page read and write
3110000
unkown
page readonly
7FF5D75BF000
unkown
page readonly
7FF5D765F000
unkown
page readonly
7FEE000
stack
page read and write
8C39000
stack
page read and write
35C3000
unkown
page read and write
A313000
unkown
page read and write
C663000
unkown
page read and write
C911000
unkown
page read and write
9AAC000
unkown
page read and write
1270000
unkown
page read and write
120F000
unkown
page read and write
35C9000
unkown
page read and write
7FF5D720F000
unkown
page readonly
7FF5D779E000
unkown
page readonly
19B9000
direct allocation
page execute and read and write
CA09000
unkown
page read and write
9429000
stack
page read and write
3534000
unkown
page read and write
7FF5D7280000
unkown
page readonly
7FF5D7425000
unkown
page readonly
7FF5D7534000
unkown
page readonly
7FF5D775C000
unkown
page readonly
61E000
stack
page read and write
99B0000
unkown
page read and write
C9D9000
unkown
page read and write
6370000
heap
page read and write
8880000
unkown
page readonly
2ED0000
heap
page read and write
760B000
unkown
page read and write
C4C6000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
C5FA000
unkown
page read and write
1380000
heap
page read and write
2F24000
heap
page read and write
7FF5D760E000
unkown
page readonly
3110000
unkown
page readonly
7FF5D743F000
unkown
page readonly
7DF4F2461000
unkown
page execute read
5479000
unkown
page read and write
7FF5D7257000
unkown
page readonly
2FC5000
heap
page read and write
A33F000
unkown
page read and write
9A84000
unkown
page read and write
8D3C000
stack
page read and write
7FF5D75D6000
unkown
page readonly
C4DC000
unkown
page read and write
AA07000
unkown
page read and write
7FF5D7336000
unkown
page readonly
35E4000
unkown
page read and write
A273000
unkown
page read and write
C89D000
unkown
page read and write
99C0000
unkown
page read and write
7FF5D738E000
unkown
page readonly
8810000
heap
page read and write
761E000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
115E000
stack
page read and write
35FA000
unkown
page read and write
362D000
unkown
page read and write
10400000
system
page execute and read and write
843F000
stack
page read and write
C47F000
unkown
page read and write
91F0000
unkown
page readonly
9EAD000
stack
page read and write
895F000
unkown
page read and write
49C2000
unkown
page read and write
A3B9000
unkown
page read and write
7FF5D7236000
unkown
page readonly
4A90000
unkown
page read and write
5850000
trusted library section
page readonly
C908000
unkown
page read and write
7FF5D7760000
unkown
page readonly
BB9C000
stack
page read and write
9A80000
unkown
page read and write
760D000
unkown
page read and write
CA5D000
unkown
page read and write
E74D000
stack
page read and write
C46F000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
35C9000
unkown
page read and write
35D5000
unkown
page read and write
35D1000
unkown
page read and write
3390000
trusted library allocation
page read and write
1360000
unkown
page readonly
C883000
unkown
page read and write
5B10000
trusted library allocation
page read and write
AE4E000
stack
page read and write
7FF5D7534000
unkown
page readonly
7B20000
unkown
page read and write
7FF5D73F5000
unkown
page readonly
7DF4F2471000
unkown
page execute read
C959000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
AA04000
unkown
page read and write
35E4000
unkown
page read and write
9A98000
unkown
page read and write
7FF5D776F000
unkown
page readonly
28EE000
unkown
page read and write
C90E000
unkown
page read and write
747E000
heap
page read and write
7FF5D7694000
unkown
page readonly
35D3000
unkown
page read and write
7FF5D7075000
unkown
page readonly
C8EF000
unkown
page read and write
A39F000
unkown
page read and write
4CB0000
trusted library allocation
page read and write
7810000
unkown
page read and write
1360000
unkown
page readonly
C7BE000
unkown
page read and write
13BE000
stack
page read and write
7FF5D774A000
unkown
page readonly
7FF5D72BF000
unkown
page readonly
49A8000
unkown
page read and write
2FC1000
heap
page read and write
7FF5D732D000
unkown
page readonly
12B0000
unkown
page read and write
A2A2000
unkown
page read and write
7FF5D7309000
unkown
page readonly
1472000
trusted library allocation
page read and write
A0A8000
stack
page read and write
7460000
unkown
page read and write
B0E0000
unkown
page readonly
A3AA000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
768E000
unkown
page read and write
1523000
heap
page read and write
35CD000
unkown
page read and write
AA49000
unkown
page read and write
7FF5D770A000
unkown
page readonly
C8E8000
unkown
page read and write
C472000
unkown
page read and write
7FF5D7639000
unkown
page readonly
8A00000
unkown
page read and write
C5FA000
unkown
page read and write
1476000
trusted library allocation
page execute and read and write
354D000
unkown
page read and write
33B0000
unkown
page readonly
1440000
trusted library allocation
page read and write
9A92000
unkown
page read and write
7435000
stack
page read and write
2FCA000
heap
page read and write
7FF5D7230000
unkown
page readonly
9AC3000
unkown
page read and write
7FF5D71DA000
unkown
page readonly
760B000
unkown
page read and write
A384000
unkown
page read and write
9A6A000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
7FF5D76AF000
unkown
page readonly
9A90000
unkown
page read and write
94F4000
unkown
page read and write
7FF5D77E9000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
BB0E000
stack
page read and write
195E000
stack
page read and write
C913000
unkown
page read and write
2FC6000
heap
page read and write
B4D0000
unkown
page readonly
7D3E000
stack
page read and write
D62000
unkown
page read and write
A391000
unkown
page read and write
7FF5D752F000
unkown
page readonly
927E000
stack
page read and write
AAA9000
unkown
page read and write
A23A000
unkown
page read and write
AA53000
unkown
page read and write
7611000
unkown
page read and write
7FF5D75F9000
unkown
page readonly
7FF5D7837000
unkown
page readonly
7FF5D744E000
unkown
page readonly
C4BD000
unkown
page read and write
A2DE000
unkown
page read and write
7FF5D7682000
unkown
page readonly
4A40000
unkown
page read and write
7FF5D779E000
unkown
page readonly
96FE000
stack
page read and write
33C0000
unkown
page read and write
82B0000
trusted library section
page read and write
BF3E000
stack
page read and write
7FF5D7284000
unkown
page readonly
9EB0000
unkown
page readonly
812E000
stack
page read and write
C61D000
unkown
page read and write
7FF5D7391000
unkown
page readonly
7FF5D777A000
unkown
page readonly
8E4E000
stack
page read and write
8A46000
unkown
page read and write
7FF5D7452000
unkown
page readonly
CA5E000
unkown
page read and write
7FF5D7700000
unkown
page readonly
7686000
unkown
page read and write
C90C000
unkown
page read and write
C483000
unkown
page read and write
C930000
unkown
page read and write
9A92000
unkown
page read and write
13A0000
unkown
page readonly
2F24000
heap
page read and write
1730000
trusted library allocation
page execute and read and write
E5CE000
stack
page read and write
4A16000
unkown
page read and write
5463000
unkown
page read and write
7FF5D747F000
unkown
page readonly
4B00000
unkown
page read and write
C981000
unkown
page read and write
102CB000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
C48B000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
7FF5D75FF000
unkown
page readonly
There are 1631 hidden memdumps, click here to show them.