IOC Report
vierm_soft_x64.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
vierm_soft_x64.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_vie_9d18ffd745e85a2e45f96e262f427525b6e8c80_521fc9a8_c4adbf37-59c1-4825-8620-812c334e58b1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_vie_b59ea1c308c3a03fedfbb82d3ba77dcda0f14f_521fc9a8_6634b2f7-63a0-4e64-b355-544c896eff14\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_vie_b59ea1c308c3a03fedfbb82d3ba77dcda0f14f_521fc9a8_fdc61285-e436-4443-932d-ddd2ea739cae\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_vie_b59ea1c308c3a03fedfbb82d3ba77dcda0f14f_521fc9a8_fdf005b5-1a28-4dce-bf44-fb0190b4fbfb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_vie_c6a6fbb15ed5c8cc571154b49674bd13dbd31f5_521fc9a8_71f73fd6-6b3e-4607-9047-6ca8f3853fae\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_vie_c6a6fbb15ed5c8cc571154b49674bd13dbd31f5_521fc9a8_b6104caa-1983-4b71-878f-bd35263514ce\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C74.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 18:44:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C84.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 18:44:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D12.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D42.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DBF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DEE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6761.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 18:44:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER67A1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER67D1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7367.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 18:45:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73E5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7444.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER826B.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 18:45:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER82AA.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 18:45:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8385.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8395.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83D5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83E4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\vierm_soft_x64.dll.dll,AXA
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\vierm_soft_x64.dll.dll,AXC
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\vierm_soft_x64.dll.dll,AXD
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",AXA
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",AXC
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",AXD
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",AXS
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll",GetDeepDVCState
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\vierm_soft_x64.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7148 -s 328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3648 -s 316
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7376 -s 328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7468 -s 320
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7596 -s 324
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7620 -s 320
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://isomicrotich.com/
unknown
malicious
https://isomicrotich.com/test/
188.114.96.3
malicious
https://opewolumeras.com/test/
malicious
https://isomicrotich.com/test/a
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://greshunka.com:8041/bazar.php.
unknown
https://wns.windows.com/bat
unknown
https://www.stacker.com/arizona/phoenix
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://tiguanin.com:8041/admin.phpN
unknown
https://tiguanin.com:8041/net.com:8041/
unknown
https://bazarunet.com:8041/bazar.phpm
unknown
https://bazarunet.com:8041/net.com:8041/bazar.php
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://www.starsinsider.com/n/154870?utm_source=msn.com&utm_medium=display&utm_campaign=referral_de
unknown
https://excel.office.com
unknown
https://isomicrotich.com/test/T
unknown
https://tiguanin.com:8041/admin.phpW
unknown
https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp(
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
https://tiguanin.com:8041/bazar.php
unknown
https://isomicrotich.com/test/ons
unknown
https://bazarunet.com:8041/bazar.phpV
unknown
https://tiguanin.com:8041/admin.phpte
unknown
https://bazarunet.com:8041/p
unknown
https://android.notify.windows.com/iOSp
unknown
https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=A1668CA4549A443399161CE8D2237D12&timeOut=5000&oc
unknown
https://greshunka.com:8041/admin.phpn
unknown
https://www.msn.com/en-us/foodanddrink/foodnews/the-best-burger-place-in-phoenix-plus-see-the-rest-o
unknown
https://api.msn.com/rT
unknown
https://greshunka.com:8041/admin.phpad
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
https://greshunka.com:8041/admin.phpo
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://isomicrotich.com/test/&
unknown
https://word.office.com
unknown
https://greshunka.com:8041/net.com:8041/0
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://tiguanin.com:8041/in.com:8041/bazar.php
unknown
http://r10.o.lencr.org0#
unknown
https://android.notify.windows.com/iOSJM
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPi8-dark
unknown
https://outlook.com
unknown
https://greshunka.com:8041/bazar.php
unknown
https://bazarunet.com:8041/bazar.php
unknown
https://isomicrotich.com/test/H
unknown
https://tiguanin.com:8041/in.com:8041/
unknown
https://android.notify.windows.com/iOSZM
unknown
https://android.notify.windows.com/iOS
unknown
https://www.yelp.com
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://tiguanin.com:8041/p
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://greshunka.com:8041/
unknown
https://bazarunet.com:8041/%
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
https://tiguanin.com/zi
unknown
http://r10.i.lencr.org/0
unknown
http://r10.o.lenc
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb-dark
unknown
https://api.msn.com/v1/news/Feed/Windows?z$
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPfv-dark
unknown
https://tiguanin.com:8041/bazar.phpn
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
unknown
https://bazarunet.com:8041/admin.phpN
unknown
https://tiguanin.com:8041/bazar.phpk
unknown
https://tiguanin.com:8041/E
unknown
https://www.msn.com/en-us/news/world/a-second-war-could-easily-erupt-in-europe-while-everyone-s-dist
unknown
https://isomicrotich.com/a
unknown
https://tiguanin.com:8041/;
unknown
https://greshunka.com/vi
unknown
https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
unknown
https://greshunka.com:8041/0
unknown
http://schemas.micro
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
unknown
https://parade.com/61481/toriavey/where-did-hamburgers-originate
unknown
https://tiguanin.com:8041/N
unknown
https://greshunka.com:8041/)
unknown
https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
unknown
https://api.msn.com/~T
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://greshunka.com/~i
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://greshunka.com:8041/bazar.phpad
unknown
https://tiguanin.com:8041/0
unknown
https://bazarunet.com:8041/admin.php=
unknown
https://greshunka.com:8041/M
unknown
https://www.msn.com/en-us/news/politics/here-s-what-house-rules-say-about-trump-serving-as-speaker-o
unknown
https://greshunka.com:8041/bazar.phpy
unknown
https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
unknown
https://bazarunet.com:8041/
unknown
https://greshunka.com:8041/E
unknown
https://bazarunet.com:8041/admin.php1
unknown
https://tiguanin.com:8041/admin.php
unknown
https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
isomicrotich.com
188.114.96.3
malicious
greshunka.com
82.115.223.39
malicious
tiguanin.com
80.78.24.30
malicious
bazarunet.com
80.78.24.30
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
isomicrotich.com
European Union
malicious
82.115.223.39
greshunka.com
Russian Federation
malicious
80.78.24.30
tiguanin.com
Cyprus
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{200b692d-3f84-08f6-792b-a9df19ebb0fb}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8FA4A2E4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 48 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29F3B8A5000
heap
page read and write
malicious
29F39C98000
heap
page read and write
malicious
29F3B6B0000
direct allocation
page read and write
malicious
29F3B750000
direct allocation
page execute and read and write
malicious
29F3B8A5000
heap
page read and write
malicious
8AAC000
stack
page read and write
malicious
7FF4F30F6000
unkown
page readonly
9590000
unkown
page read and write
7EBB000
stack
page read and write
29F3BEF0000
trusted library allocation
page read and write
B74E000
stack
page read and write
97AE000
stack
page read and write
BCD4000
unkown
page read and write
7FF4F30DB000
unkown
page readonly
B9BA000
stack
page read and write
28CEE808000
heap
page read and write
F9100FF000
trusted library allocation
page read and write
BD5C000
unkown
page read and write
7F20000
unkown
page read and write
257E000
stack
page read and write
29F3BDED000
heap
page read and write
29F3BEF0000
trusted library allocation
page read and write
C268000
unkown
page read and write
85F4000
unkown
page read and write
2DFC000
stack
page read and write
29F3B825000
heap
page read and write
7DF40CFD0000
unkown
page readonly
8554000
unkown
page read and write
7FF4F2FAB000
unkown
page readonly
180077000
unkown
page readonly
9B3A000
unkown
page read and write
225BF910000
heap
page read and write
7FF4F2DCB000
unkown
page readonly
2890A710000
heap
page read and write
7FF4F30CC000
unkown
page readonly
8B48000
stack
page read and write
A50AF0B000
stack
page read and write
766E000
stack
page read and write
7320000
unkown
page read and write
29F3B852000
heap
page read and write
CD5000
heap
page read and write
7680000
unkown
page execute and read and write
7FF4F2D9B000
unkown
page readonly
7FF4F3103000
unkown
page readonly
F9100FF000
trusted library allocation
page read and write
88BA000
unkown
page read and write
2EF1000
unkown
page read and write
CD0000
heap
page read and write
1B3AFB10000
heap
page read and write
89D0000
unkown
page execute and read and write
96FC000
stack
page read and write
7FF4F2D11000
unkown
page readonly
FB14000
unkown
page read and write
C0C8000
unkown
page read and write
7541000
unkown
page read and write
29F3BDED000
heap
page read and write
A9E0000
unkown
page readonly
8E08000
stack
page read and write
BB4B000
stack
page read and write
DECF000
stack
page read and write
7065000
unkown
page read and write
9650000
unkown
page readonly
2F56000
unkown
page read and write
7FF4F30D4000
unkown
page readonly
29F3BE13000
heap
page read and write
7838000
stack
page read and write
29F3B82E000
heap
page read and write
7FF4F312A000
unkown
page readonly
7FF4F2C8C000
unkown
page readonly
74D0000
unkown
page readonly
7DF50F37E000
unkown
page readonly
7FF4F2F13000
unkown
page readonly
7FF4F2CE7000
unkown
page readonly
F9105FF000
trusted library allocation
page read and write
8996000
unkown
page read and write
7FF4F2B64000
unkown
page readonly
1C8D5768000
heap
page read and write
6E60000
unkown
page read and write
7FF4E7E40000
unkown
page readonly
7FF4F2C29000
unkown
page readonly
7FF4F2D2D000
unkown
page readonly
F9100F5000
trusted library allocation
page read and write
7FF4F331B000
unkown
page readonly
C0C9000
unkown
page read and write
E9D2000
unkown
page read and write
20A33A40000
heap
page read and write
9F0000
unkown
page read and write
4328000
unkown
page read and write
8AC2E7F000
stack
page read and write
BD1C000
unkown
page read and write
7FF4F3103000
unkown
page readonly
9CB5000
unkown
page read and write
180001000
unkown
page execute read
7FF4F3273000
unkown
page readonly
7FF4F30E3000
unkown
page readonly
9C9B000
unkown
page read and write
7FF4F2E5F000
unkown
page readonly
7FF4F2CEC000
unkown
page readonly
9B37000
unkown
page read and write
29F3B916000
direct allocation
page read and write
C2AE000
unkown
page read and write
29F3B825000
heap
page read and write
B74E000
stack
page read and write
225BF850000
heap
page read and write
89E4000
unkown
page execute and read and write
DE49000
stack
page read and write
2A10000
unkown
page readonly
A355000
unkown
page read and write
F9105FF000
trusted library allocation
page read and write
29F3BCE0000
trusted library allocation
page read and write
2A20000
unkown
page readonly
9CA8000
unkown
page read and write
29F3B84A000
heap
page read and write
9CB8000
unkown
page read and write
9BD8000
unkown
page read and write
7FF4F32C8000
unkown
page readonly
7FF4F30CA000
unkown
page readonly
445A000
unkown
page read and write
7FF4F2F8D000
unkown
page readonly
A2A0000
unkown
page read and write
2EA0000
unkown
page read and write
BD6D000
unkown
page read and write
749387F000
stack
page read and write
F9103FB000
stack
page read and write
7FF4F32C4000
unkown
page readonly
8AC2B9C000
stack
page read and write
29F3BE08000
heap
page read and write
24A0000
unkown
page execute and read and write
7FF4F2E6B000
unkown
page readonly
7FF4F3039000
unkown
page readonly
C144000
unkown
page read and write
7007000
unkown
page read and write
6FB6000
unkown
page read and write
7FF4F30F1000
unkown
page readonly
7670000
unkown
page readonly
7FF4F30EF000
unkown
page readonly
8921000
unkown
page read and write
225BF890000
heap
page read and write
43C0000
unkown
page read and write
1C1F87B0000
heap
page read and write
F9105FF000
trusted library allocation
page read and write
2F38000
unkown
page read and write
7FF4F2E50000
unkown
page readonly
88BB000
unkown
page read and write
29F3B869000
heap
page read and write
18005F000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
899E000
unkown
page read and write
E9D0000
unkown
page read and write
2E70000
stack
page read and write
29F3B923000
direct allocation
page read and write
6FF1000
unkown
page read and write
29F3B81A000
heap
page read and write
7FF4F2F33000
unkown
page readonly
29F3B845000
heap
page read and write
82D0000
unkown
page readonly
B2C0000
unkown
page readonly
7FF4F2EAA000
unkown
page readonly
7FF4F2298000
unkown
page readonly
29F3B796000
direct allocation
page execute and read and write
8C80000
unkown
page readonly
6FB6000
unkown
page read and write
8200000
unkown
page read and write
82F0000
unkown
page execute and read and write
BF0A000
unkown
page read and write
18007C000
unkown
page write copy
7FF4F32ED000
unkown
page readonly
29F3B92A000
direct allocation
page read and write
772D000
stack
page read and write
7FF4F2D50000
unkown
page readonly
957D000
stack
page read and write
B8B8000
stack
page read and write
C123000
unkown
page read and write
8210000
unkown
page read and write
C079000
unkown
page read and write
438D000
unkown
page read and write
8996000
unkown
page read and write
5F0000
unkown
page readonly
580000
unkown
page readonly
A368000
unkown
page read and write
7FF4F2FEB000
unkown
page readonly
8971000
unkown
page read and write
29F3B7E1000
heap
page read and write
180001000
unkown
page execute read
BDA7000
unkown
page read and write
7FF4F321A000
unkown
page readonly
C0C3000
unkown
page read and write
7FF4F2EA4000
unkown
page readonly
29F3BE1D000
heap
page read and write
7FF4F2FB4000
unkown
page readonly
4E63000
unkown
page read and write
7FF4F32D8000
unkown
page readonly
BDAF000
unkown
page read and write
74E0000
unkown
page readonly
E9D0000
unkown
page read and write
8220000
unkown
page read and write
BEF2000
unkown
page read and write
7FF4F30E3000
unkown
page readonly
24C0000
unkown
page execute and read and write
29F3BEF0000
trusted library allocation
page read and write
7FF4F30F3000
unkown
page readonly
22E619A0000
heap
page read and write
FB1D27F000
stack
page read and write
180073000
unkown
page read and write
85F2000
unkown
page read and write
7FF4F2701000
unkown
page readonly
CC0000
unkown
page read and write
4A4267C000
stack
page read and write
7FF4F30B7000
unkown
page readonly
29F3BE1D000
heap
page read and write
225BF880000
heap
page read and write
E990000
unkown
page read and write
9F0000
unkown
page read and write
29F3B853000
heap
page read and write
180074000
unkown
page write copy
9C83000
unkown
page read and write
29F3BCE0000
remote allocation
page read and write
717A000
unkown
page read and write
7FF4F2C32000
unkown
page readonly
7E3E000
stack
page read and write
9BD6000
unkown
page read and write
74D0000
unkown
page readonly
AAD0000
unkown
page read and write
1B3AF8B1000
heap
page read and write
3948FCF000
stack
page read and write
A50B3FF000
stack
page read and write
7FF4F325F000
unkown
page readonly
AB00000
unkown
page read and write
76A0000
unkown
page read and write
2D10000
unkown
page readonly
AAC0000
unkown
page read and write
7058000
unkown
page read and write
AAF0000
unkown
page readonly
180000000
unkown
page readonly
A30E000
unkown
page read and write
7FF4E7E40000
unkown
page readonly
7DF49BA20000
direct allocation
page read and write
1071000
unkown
page readonly
7FF4F2E56000
unkown
page readonly
29F3B7C0000
trusted library allocation
page read and write
9C9E000
unkown
page read and write
C23F000
unkown
page read and write
29F3B862000
heap
page read and write
C00000
unkown
page readonly
F9105F5000
trusted library allocation
page read and write
4344000
unkown
page read and write
2F60000
unkown
page read and write
29F3B845000
heap
page read and write
20A33A48000
heap
page read and write
7FF4F2C32000
unkown
page readonly
22E619C0000
heap
page read and write
29F3B7FD000
heap
page read and write
7FF4F32A4000
unkown
page readonly
78B9000
stack
page read and write
7FF4F3016000
unkown
page readonly
2C60000
unkown
page readonly
18007C000
unkown
page write copy
899E000
unkown
page read and write
7FF4F30CA000
unkown
page readonly
7730000
unkown
page read and write
AA60000
heap
page read and write
7DF40CFB1000
unkown
page execute read
29F3BE04000
heap
page read and write
F9105FF000
trusted library allocation
page read and write
88E6000
unkown
page read and write
7FF4F2CFB000
unkown
page readonly
28CEEA00000
heap
page read and write
7FF4F30F6000
unkown
page readonly
F9105FF000
trusted library allocation
page read and write
7DF40CFC0000
unkown
page readonly
C27D000
unkown
page read and write
2F58000
unkown
page read and write
273F40000
direct allocation
page read and write
2B59000
stack
page read and write
7FF4F32D8000
unkown
page readonly
7FF4F312A000
unkown
page readonly
225BF918000
heap
page read and write
2F10000
unkown
page read and write
C17C000
unkown
page read and write
2A90000
unkown
page execute and read and write
A20000
heap
page read and write
74C0000
unkown
page readonly
4430000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
29F3B853000
heap
page read and write
8971000
unkown
page read and write
7FF4F2F68000
unkown
page readonly
9273000
unkown
page read and write
7FF4F2CFE000
unkown
page readonly
BFA7000
unkown
page read and write
1EF99320000
heap
page read and write
9A2F000
stack
page read and write
29F3BEF0000
trusted library allocation
page read and write
29F3BEF0000
trusted library allocation
page read and write
E9CE000
unkown
page read and write
8230000
unkown
page execute and read and write
29F3B854000
heap
page read and write
85F2000
unkown
page read and write
64F73FF000
stack
page read and write
29F3BE08000
heap
page read and write
7FF4F31A5000
unkown
page readonly
9BB3000
unkown
page read and write
7FF4F2B64000
unkown
page readonly
29F3B825000
heap
page read and write
444A000
unkown
page read and write
C07F000
unkown
page read and write
4300000
unkown
page read and write
BDC8000
unkown
page read and write
A2A0000
unkown
page read and write
7FF4F2CB6000
unkown
page readonly
8979000
unkown
page read and write
7FF4F30B2000
unkown
page readonly
7DF40CFD0000
unkown
page readonly
7FF4F2D82000
unkown
page readonly
7FF4F2E01000
unkown
page readonly
992F000
stack
page read and write
7FF4F2D95000
unkown
page readonly
F9105FF000
trusted library allocation
page read and write
29F3BE2A000
heap
page read and write
6FF5000
unkown
page read and write
4480000
unkown
page read and write
B180000
unkown
page readonly
7FF4F3111000
unkown
page readonly
7FF4F3303000
unkown
page readonly
8771000
unkown
page read and write
A50B2FF000
stack
page read and write
7FF4F2EFD000
unkown
page readonly
7FF4F3133000
unkown
page readonly
7FF4F2DE0000
unkown
page readonly
29F39CB2000
heap
page read and write
BCD0000
unkown
page read and write
2F6F000
unkown
page read and write
7FF4F32AC000
unkown
page readonly
9B53000
unkown
page read and write
29F3B92B000
direct allocation
page readonly
180077000
unkown
page readonly
7DF40CFE1000
unkown
page execute read
7480000
unkown
page readonly
7FF4F313F000
unkown
page readonly
29F39CB2000
heap
page read and write
29F3BEF0000
trusted library allocation
page read and write
7FF4F320C000
unkown
page readonly
F9104FF000
trusted library allocation
page read and write
7FF4F31DE000
unkown
page readonly
BDC8000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
BCCF000
stack
page read and write
9CB8000
unkown
page read and write
74F0000
unkown
page readonly
880000
heap
page read and write
29F3BEF0000
trusted library allocation
page read and write
BFAB000
unkown
page read and write
28CEE7FD000
heap
page read and write
18005F000
unkown
page readonly
9BD6000
unkown
page read and write
7FF4F2C8F000
unkown
page readonly
9DB000
stack
page read and write
29F3B7C0000
trusted library allocation
page read and write
7FF4F3121000
unkown
page readonly
7FF4F2EAA000
unkown
page readonly
8761000
unkown
page read and write
7FF4F2D74000
unkown
page readonly
BD22000
unkown
page read and write
7FF4F331B000
unkown
page readonly
C079000
unkown
page read and write
1B3AF8C1000
heap
page read and write
6FC7000
unkown
page read and write
FADB000
unkown
page read and write
A2E0000
unkown
page read and write
29F39C70000
heap
page read and write
9776DEC000
stack
page read and write
29F3B7C0000
trusted library allocation
page read and write
7FF4F328E000
unkown
page readonly
2890A780000
heap
page read and write
18007D000
unkown
page readonly
6E40000
unkown
page read and write
29F3B8B1000
heap
page read and write
9D08000
unkown
page read and write
29F3BE04000
heap
page read and write
F9105F5000
trusted library allocation
page read and write
29F3B872000
heap
page read and write
8300000
unkown
page readonly
7FF4F321E000
unkown
page readonly
8602000
unkown
page read and write
18007D000
unkown
page readonly
9C9E000
unkown
page read and write
8250000
unkown
page execute and read and write
7DF40CFB0000
unkown
page readonly
29F3B8AB000
heap
page read and write
7FF4F3181000
unkown
page readonly
7FF4F3058000
unkown
page readonly
7FF4F2F89000
unkown
page readonly
7FF4F32F6000
unkown
page readonly
29F3B81B000
heap
page read and write
24FA000
stack
page read and write
22E61900000
heap
page read and write
1C1F88B0000
heap
page read and write
B2C0000
unkown
page readonly
BD60000
unkown
page read and write
7FF4F2E56000
unkown
page readonly
1071000
unkown
page readonly
9C3D000
unkown
page read and write
7FF4F2709000
unkown
page readonly
29F39DF5000
heap
page read and write
81F0000
heap
page read and write
7730000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
2890A787000
heap
page read and write
1B3AF8A7000
heap
page read and write
9AAE000
stack
page read and write
7FF4F2D2D000
unkown
page readonly
7FF4F30AD000
unkown
page readonly
29F3B842000
heap
page read and write
F9105F5000
trusted library allocation
page read and write
1B3AF8B4000
heap
page read and write
29F3B864000
heap
page read and write
FC14000
unkown
page read and write
BD69000
unkown
page read and write
24A0000
unkown
page execute and read and write
7FF4F2298000
unkown
page readonly
964E000
stack
page read and write
7430000
unkown
page read and write
BFB3000
unkown
page read and write
F9105FF000
trusted library allocation
page read and write
BACE000
stack
page read and write
7FF4F2F71000
unkown
page readonly
A44000
heap
page read and write
1B3AF890000
heap
page read and write
180000000
unkown
page readonly
7FF4F2B98000
unkown
page readonly
2F7B000
unkown
page read and write
7FF4F2D48000
unkown
page readonly
9C9E000
unkown
page read and write
9B50000
unkown
page read and write
7FF4F2C98000
unkown
page readonly
F9105F5000
trusted library allocation
page read and write
7DF49B9D0000
direct allocation
page read and write
1B3AF8B4000
heap
page read and write
7FF4F2B90000
unkown
page readonly
6FDC000
unkown
page read and write
8200000
unkown
page read and write
C29A000
unkown
page read and write
29F3BE04000
heap
page read and write
7FF4F2D9B000
unkown
page readonly
1B3AF8AA000
heap
page read and write
7FF4F3149000
unkown
page readonly
87C0000
unkown
page read and write
BD6D000
unkown
page read and write
7FF4F329F000
unkown
page readonly
7FF4F3142000
unkown
page readonly
FB53000
unkown
page read and write
BF2E000
unkown
page read and write
1EF97790000
heap
page read and write
888E000
unkown
page read and write
97770FF000
stack
page read and write
9B88000
unkown
page read and write
1B3AF898000
heap
page read and write
29F3B8A6000
heap
page read and write
1C8D58F5000
heap
page read and write
18005F000
unkown
page readonly
2AB0000
unkown
page execute and read and write
BD75000
unkown
page read and write
7FF4F316E000
unkown
page readonly
C19F000
unkown
page read and write
8780000
unkown
page read and write
BE00000
unkown
page read and write
29F39B90000
heap
page read and write
2F60000
unkown
page read and write
4306000
unkown
page read and write
7FF4F2F05000
unkown
page readonly
CD5000
heap
page read and write
4430000
unkown
page read and write
8390000
unkown
page execute and read and write
7FF4F329F000
unkown
page readonly
180000000
unkown
page readonly
BEF6000
unkown
page read and write
24C0000
unkown
page execute and read and write
8685000
unkown
page read and write
2610000
heap
page read and write
FBD4000
unkown
page read and write
C168000
unkown
page read and write
7FF4F2DD5000
unkown
page readonly
4356000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
7DF40CFC0000
unkown
page readonly
C19E000
unkown
page read and write
7052000
unkown
page read and write
29F3B8EE000
heap
page read and write
1B3AF8C5000
heap
page read and write
29F3BE0F000
heap
page read and write
A8BD000
stack
page read and write
7FF4F2F91000
unkown
page readonly
7FF4F2EA4000
unkown
page readonly
9B3A000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
29F3BEF0000
trusted library allocation
page read and write
4E79000
unkown
page read and write
446A000
unkown
page read and write
876F000
unkown
page read and write
C00000
unkown
page readonly
7FF4F319E000
unkown
page readonly
8602000
unkown
page read and write
F91007F000
stack
page read and write
88E6000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
29F3BE1D000
heap
page read and write
2F7B000
unkown
page read and write
1B3AF8AA000
heap
page read and write
29F3B848000
heap
page read and write
C50000
unkown
page readonly
FB53000
unkown
page read and write
7FF4F3336000
unkown
page readonly
AAD0000
unkown
page read and write
4400000
unkown
page read and write
AC30000
unkown
page read and write
7FF4F32C4000
unkown
page readonly
7FF4F2F01000
unkown
page readonly
BF16000
unkown
page read and write
A363000
unkown
page read and write
7FF4F2F68000
unkown
page readonly
7FF4F2DE3000
unkown
page readonly
A301000
unkown
page read and write
F90FDAC000
stack
page read and write
7FF4F3245000
unkown
page readonly
8993000
unkown
page read and write
BD6D000
unkown
page read and write
225C12A0000
heap
page read and write
9B65000
unkown
page read and write
7FF4F3020000
unkown
page readonly
BFF8000
unkown
page read and write
24F0000
unkown
page execute and read and write
29F3B82B000
heap
page read and write
8921000
unkown
page read and write
6FB0000
unkown
page read and write
7FF4F3051000
unkown
page readonly
78C0000
unkown
page read and write
BD99000
unkown
page read and write
F9105F5000
trusted library allocation
page read and write
180073000
unkown
page read and write
841D000
stack
page read and write
225BF860000
heap
page read and write
7FF4F2F05000
unkown
page readonly
E750000
heap
page read and write
7541000
unkown
page read and write
433C000
unkown
page read and write
24E0000
unkown
page execute and read and write
2AD0000
unkown
page execute and read and write
C1CE000
unkown
page read and write
4CB0000
unkown
page write copy
7FF4F30CC000
unkown
page readonly
2C56000
stack
page read and write
18007D000
unkown
page readonly
29F3B8C1000
heap
page read and write
7FF4F2D1C000
unkown
page readonly
876F000
unkown
page read and write
64F727A000
stack
page read and write
180073000
unkown
page read and write
FB14000
unkown
page read and write
908F000
stack
page read and write
1B3AFAA3000
heap
page read and write
24F0000
unkown
page execute and read and write
4393000
unkown
page read and write
F9105F5000
trusted library allocation
page read and write
7FF4F318C000
unkown
page readonly
7FF4F2D1F000
unkown
page readonly
BEDC000
unkown
page read and write
88E6000
unkown
page read and write
24D0000
unkown
page execute and read and write
2610000
heap
page read and write
6FD4000
unkown
page read and write
2F8A000
unkown
page read and write
7F20000
unkown
page read and write
7FF4F2DF3000
unkown
page readonly
29F3B825000
heap
page read and write
2F1A000
unkown
page read and write
7FF4F316B000
unkown
page readonly
7FF4F3361000
unkown
page readonly
2C56000
stack
page read and write
20A33C75000
heap
page read and write
7FF4F2E8F000
unkown
page readonly
7FF4F319E000
unkown
page readonly
9BD8000
unkown
page read and write
7FF4F3181000
unkown
page readonly
BF36000
unkown
page read and write
BF2E000
unkown
page read and write
7FF4F30FB000
unkown
page readonly
7FF4F3016000
unkown
page readonly
1C1F8C00000
heap
page read and write
FC14000
unkown
page read and write
7FF4F3196000
unkown
page readonly
2F67000
unkown
page read and write
E4CB000
stack
page read and write
F9105FF000
trusted library allocation
page read and write
AC30000
unkown
page read and write
7EF0000
unkown
page readonly
6FD4000
unkown
page read and write
2D50000
unkown
page read and write
FB1CF3C000
stack
page read and write
29F3B862000
heap
page read and write
8765000
unkown
page read and write
29F3B853000
heap
page read and write
2C60000
unkown
page readonly
9B9F000
unkown
page read and write
F9105F5000
trusted library allocation
page read and write
2FB0000
unkown
page readonly
29F3B856000
heap
page read and write
180000000
unkown
page readonly
7FF4F3240000
unkown
page readonly
7DF49BA34000
direct allocation
page read and write
BCD0000
unkown
page read and write
7FF4F2CF1000
unkown
page readonly
7FF4F2D4C000
unkown
page readonly
A8BD000
stack
page read and write
7FF4F3278000
unkown
page readonly
29F3B861000
heap
page read and write
29F3B8BD000
heap
page read and write
24C0000
unkown
page execute and read and write
29F3BEF0000
trusted library allocation
page read and write
75C0000
unkown
page readonly
7FF4F2D0A000
unkown
page readonly
29F3BDED000
heap
page read and write
7FF4F2F01000
unkown
page readonly
18005F000
unkown
page readonly
1C8D5620000
heap
page read and write
9CAB000
unkown
page read and write
6E40000
unkown
page read and write
7FF4F2E6B000
unkown
page readonly
9273000
unkown
page read and write
7FF4F31FE000
unkown
page readonly
DF4E000
stack
page read and write
BF1B000
unkown
page read and write
7FF4F31C3000
unkown
page readonly
E750000
heap
page read and write
7FF4F3121000
unkown
page readonly
8300000
unkown
page readonly
29F3B7E0000
heap
page read and write
F9105FF000
trusted library allocation
page read and write
7FF4F2D68000
unkown
page readonly
7FF4F3238000
unkown
page readonly
29F3BDED000
heap
page read and write
7FF4F2FD4000
unkown
page readonly
257E000
stack
page read and write
8220000
unkown
page read and write
DFCE000
stack
page read and write
A9BD000
stack
page read and write
7FF4F2FB4000
unkown
page readonly
6E60000
unkown
page read and write
29F3B856000
heap
page read and write
180077000
unkown
page readonly
9B8C000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
29F3BCF0000
trusted library allocation
page read and write
29F3B8E0000
direct allocation
page readonly
180074000
unkown
page write copy
899E000
unkown
page read and write
7FF4F3068000
unkown
page readonly
AA62000
heap
page read and write
7430000
unkown
page read and write
4379000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
7FF4F2FBD000
unkown
page readonly
7112000
unkown
page read and write
7FF4F2B86000
unkown
page readonly
7DF40CFD1000
unkown
page execute read
7DF40CFC1000
unkown
page execute read
7FF4F2EA2000
unkown
page readonly
78C0000
unkown
page read and write
76A0000
unkown
page read and write
7150000
unkown
page read and write
7FF4F3058000
unkown
page readonly
29F3B8AF000
heap
page read and write
180073000
unkown
page read and write
E4CB000
stack
page read and write
7FF4F2C35000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
7FF4F2CF7000
unkown
page readonly
BFAB000
unkown
page read and write
590000
unkown
page readonly
4328000
unkown
page read and write
18005F000
unkown
page readonly
2AA0000
unkown
page execute and read and write
7FF4F3178000
unkown
page readonly
7FF4F318C000
unkown
page readonly
20A339C0000
heap
page read and write
85F4000
unkown
page read and write
85F0000
unkown
page read and write
9D08000
unkown
page read and write
F9105F5000
trusted library allocation
page read and write
CD0000
heap
page read and write
7FF4F3254000
unkown
page readonly
A9BD000
stack
page read and write
A2FE000
unkown
page read and write
6FE1000
unkown
page read and write
4400000
unkown
page read and write
7FF4F31BE000
unkown
page readonly
6FD0000
unkown
page read and write
7FF4F2D29000
unkown
page readonly
9CB5000
unkown
page read and write
29F3B962000
heap
page read and write
89E4000
unkown
page execute and read and write
BD75000
unkown
page read and write
2A80000
unkown
page execute and read and write
180073000
unkown
page read and write
F9105FF000
trusted library allocation
page read and write
24A0000
unkown
page execute and read and write
A301000
unkown
page read and write
9CC2000
unkown
page read and write
8993000
unkown
page read and write
BE00000
unkown
page read and write
D5ED77E000
stack
page read and write
E9D2000
unkown
page read and write
74A0000
unkown
page read and write
6FC0000
unkown
page read and write
7FF4F2F35000
unkown
page readonly
FB96000
unkown
page read and write
7FF4F2F71000
unkown
page readonly
7FF4F2D74000
unkown
page readonly
A20000
heap
page read and write
BFA7000
unkown
page read and write
C0B9000
unkown
page read and write
A819000
stack
page read and write
22E61800000
heap
page read and write
7FF4F3314000
unkown
page readonly
29F3B82A000
heap
page read and write
81E0000
unkown
page read and write
C145000
unkown
page read and write
DDCB000
stack
page read and write
7FF4F30C2000
unkown
page readonly
7FF4F32B6000
unkown
page readonly
C16F000
unkown
page read and write
7027000
unkown
page read and write
7FBE000
stack
page read and write
29F3B84A000
heap
page read and write
74A0000
unkown
page read and write
7FF4F3278000
unkown
page readonly
7FF4F2CBF000
unkown
page readonly
F9105F5000
trusted library allocation
page read and write
29F3BCE0000
remote allocation
page read and write
85D0000
unkown
page read and write
2890A78F000
heap
page read and write
7FF4F3240000
unkown
page readonly
1C1F8890000
heap
page read and write
B0CB000
stack
page read and write
29F3B833000
heap
page read and write
BEFF000
unkown
page read and write
AA21000
unkown
page read and write
8759000
unkown
page read and write
29F3B845000
heap
page read and write
7FF4F317B000
unkown
page readonly
F9105F5000
trusted library allocation
page read and write
2D20000
unkown
page read and write
29F3B91E000
direct allocation
page read and write
6FE9000
unkown
page read and write
BF36000
unkown
page read and write
8971000
unkown
page read and write
1B3AFB1B000
heap
page read and write
29F3B740000
heap
page read and write
7FF4F2DE7000
unkown
page readonly
64F72FF000
stack
page read and write
BEDC000
unkown
page read and write
7FF4F3273000
unkown
page readonly
85FC000
unkown
page read and write
7FF4F2FAB000
unkown
page readonly
C0B3000
unkown
page read and write
7FF4F2D79000
unkown
page readonly
F9105FF000
trusted library allocation
page read and write
BDA7000
unkown
page read and write
7FF4F2FC4000
unkown
page readonly
29F3BE04000
heap
page read and write
7FF4F32D1000
unkown
page readonly
85F0000
unkown
page read and write
7FF4F32FC000
unkown
page readonly
7FF4F3245000
unkown
page readonly
8AC2EFE000
stack
page read and write
896B000
unkown
page read and write
7FF4F3149000
unkown
page readonly
18005F000
unkown
page readonly
1C1F8C05000
heap
page read and write
7FF4F2E5F000
unkown
page readonly
2890AA80000
heap
page read and write
4420000
unkown
page read and write
7FF4F2714000
unkown
page readonly
7FF4F30B2000
unkown
page readonly
1B3AF7E0000
heap
page read and write
C07F000
unkown
page read and write
BDC8000
unkown
page read and write
AA6A000
heap
page read and write
29F3B918000
direct allocation
page readonly
29F3B7E4000
heap
page read and write
7F00000
unkown
page read and write
F9100F5000
trusted library allocation
page read and write
7FF4F3343000
unkown
page readonly
7FF4F32D1000
unkown
page readonly
87B2000
unkown
page read and write
590000
unkown
page readonly
438D000
unkown
page read and write
99AF000
stack
page read and write
C2B0000
unkown
page read and write
C0C3000
unkown
page read and write
7FF4F30DD000
unkown
page readonly
703A000
unkown
page read and write
29F3B84C000
heap
page read and write
C07F000
unkown
page read and write
29F3BE19000
heap
page read and write
180001000
unkown
page execute read
74E0000
unkown
page readonly
7490000
unkown
page read and write
F9100F5000
trusted library allocation
page read and write
29F39DF0000
heap
page read and write
9B8C000
unkown
page read and write
7FF4F2CB6000
unkown
page readonly
A01000
unkown
page readonly
7FF4F2C35000
unkown
page readonly
C1C1000
unkown
page read and write
1C1FA3F0000
heap
page read and write
180077000
unkown
page readonly
C2DE000
unkown
page read and write
7058000
unkown
page read and write
AA60000
heap
page read and write
29F3B825000
heap
page read and write
7FF4F30EF000
unkown
page readonly
9D08000
unkown
page read and write
7FF4F3307000
unkown
page readonly
445A000
unkown
page read and write
1C1F8BE0000
remote allocation
page read and write
8765000
unkown
page read and write
BD80000
unkown
page read and write
7112000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
7FF4F30C2000
unkown
page readonly
7FF4F2FC7000
unkown
page readonly
180073000
unkown
page read and write
1B3AF800000
heap
page read and write
BD22000
unkown
page read and write
937D000
stack
page read and write
7E3E000
stack
page read and write
7DF40CFE1000
unkown
page execute read
29F3BE08000
heap
page read and write
180000000
unkown
page readonly
C2AA000
unkown
page read and write
29F3B84A000
heap
page read and write
7FF4F3231000
unkown
page readonly
4306000
unkown
page read and write
2A70000
unkown
page execute and read and write
7007000
unkown
page read and write
7FF4F3020000
unkown
page readonly
43F6000
unkown
page read and write
E9D6000
unkown
page read and write
7FF4F30FB000
unkown
page readonly
29F3B7C0000
trusted library allocation
page read and write
C2A2000
unkown
page read and write
A799000
stack
page read and write
2F45000
unkown
page read and write
7FF4F3051000
unkown
page readonly
4395000
unkown
page read and write
96FC000
stack
page read and write
7838000
stack
page read and write
7FF4F2CF1000
unkown
page readonly
9CC2000
unkown
page read and write
4410000
unkown
page read and write
BD69000
unkown
page read and write
82D0000
unkown
page readonly
9B92000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
9B33000
unkown
page read and write
7FF4F313F000
unkown
page readonly
89B9000
unkown
page read and write
A355000
unkown
page read and write
7FF4F2DE7000
unkown
page readonly
7FF4F2B60000
unkown
page readonly
9BD6000
unkown
page read and write
8C80000
unkown
page readonly
AECE000
stack
page read and write
29F3B84A000
heap
page read and write
85FC000
unkown
page read and write
8685000
unkown
page read and write
7680000
unkown
page execute and read and write
8240000
unkown
page execute and read and write
1B3AFAA0000
heap
page read and write
9B88000
unkown
page read and write
7FF4F2DEA000
unkown
page readonly
E9C1000
unkown
page read and write
F9101FF000
stack
page read and write
29F3BE08000
heap
page read and write
29F39CB5000
heap
page read and write
2F1A000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
18007C000
unkown
page write copy
6FEF000
unkown
page read and write
7FF4F3343000
unkown
page readonly
BD17000
unkown
page read and write
7FF4F2C29000
unkown
page readonly
7490000
unkown
page read and write
2F58000
unkown
page read and write
29F39CEA000
heap
page read and write
DD4C000
stack
page read and write
1B3B12C0000
heap
page read and write
7FF4F3137000
unkown
page readonly
7477000
unkown
page read and write
7FF4F32F0000
unkown
page readonly
7FF4F2FD4000
unkown
page readonly
2AD6000
stack
page read and write
E9D6000
unkown
page read and write
A366000
unkown
page read and write
7FF4F2DF3000
unkown
page readonly
29F3B85D000
heap
page read and write
180074000
unkown
page write copy
BF36000
unkown
page read and write
29F3BE12000
heap
page read and write
7FF4F2DDD000
unkown
page readonly
29F3BE09000
heap
page read and write
F9105F5000
trusted library allocation
page read and write
F9105F5000
trusted library allocation
page read and write
7FF4F30FF000
unkown
page readonly
DECF000
stack
page read and write
29F3B853000
heap
page read and write
7FF4F333D000
unkown
page readonly
A2FE000
unkown
page read and write
2F38000
unkown
page read and write
E9CD000
unkown
page read and write
7FF4F32BC000
unkown
page readonly
7FF4F31A5000
unkown
page readonly
E9C4000
unkown
page read and write
7FF4F2DA4000
unkown
page readonly
7FF4F32ED000
unkown
page readonly
C30000
unkown
page read and write
89B9000
unkown
page read and write
7FF4F2CEC000
unkown
page readonly
1EF97760000
heap
page read and write
C1EB000
unkown
page read and write
C2B3000
unkown
page read and write
81DC000
stack
page read and write
9DB000
stack
page read and write
9A2F000
stack
page read and write
7DF49BA40000
direct allocation
page execute read
180077000
unkown
page readonly
1C8D5700000
heap
page read and write
18007C000
unkown
page write copy
D5ED6FE000
stack
page read and write
C1C0000
unkown
page read and write
29F3B858000
heap
page read and write
29F3B81A000
heap
page read and write
7F00000
unkown
page read and write
18007C000
unkown
page write copy
CE0000
unkown
page readonly
B788000
unkown
page read and write
2DFC000
stack
page read and write
FB96000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
433C000
unkown
page read and write
BACE000
stack
page read and write
7FF4F30C5000
unkown
page readonly
CE0000
unkown
page readonly
F9105FF000
trusted library allocation
page read and write
7FF4F31C5000
unkown
page readonly
7164000
unkown
page read and write
7DF40CFC1000
unkown
page execute read
C0C3000
unkown
page read and write
82AF000
unkown
page read and write
4344000
unkown
page read and write
22E61C85000
heap
page read and write
92F7000
stack
page read and write
7FF4F32DE000
unkown
page readonly
4A426FF000
stack
page read and write
A9E0000
unkown
page readonly
29F3BE04000
heap
page read and write
29F3BEF0000
trusted library allocation
page read and write
7FF4F307B000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
7FF4F3374000
unkown
page readonly
7FF4F2EFD000
unkown
page readonly
180077000
unkown
page readonly
7FF4F323C000
unkown
page readonly
9B75000
unkown
page read and write
29F3BE04000
heap
page read and write
7FF4F3294000
unkown
page readonly
7FF4F3367000
unkown
page readonly
7FF4F321E000
unkown
page readonly
9D0D000
unkown
page read and write
9AAE000
stack
page read and write
180074000
unkown
page write copy
7FF4F30DD000
unkown
page readonly
7FF4F30AD000
unkown
page readonly
9B9F000
unkown
page read and write
C0B9000
unkown
page read and write
85F0000
unkown
page read and write
9B92000
unkown
page read and write
BEF6000
unkown
page read and write
2EA0000
unkown
page read and write
7FF4F32C8000
unkown
page readonly
7FF4F2FBD000
unkown
page readonly
8B48000
stack
page read and write
BF16000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
2E70000
stack
page read and write
7FF4F3367000
unkown
page readonly
29F3BE1D000
heap
page read and write
29F3B853000
heap
page read and write
29F0000
unkown
page readonly
4E79000
unkown
page read and write
43F6000
unkown
page read and write
BF0A000
unkown
page read and write
7FF4F3137000
unkown
page readonly
9E0000
unkown
page read and write
29F39CEA000
heap
page read and write
2D10000
unkown
page readonly
7FF4F32F0000
unkown
page readonly
7FF4F31E7000
unkown
page readonly
6E35000
stack
page read and write
97AD000
stack
page read and write
9CA8000
unkown
page read and write
7480000
unkown
page readonly
C237000
unkown
page read and write
7FF4F31B1000
unkown
page readonly
BB4B000
stack
page read and write
29F3BE1D000
heap
page read and write
7FF4F2D1C000
unkown
page readonly
BEFF000
unkown
page read and write
7FF4F31DE000
unkown
page readonly
7FF4F30DB000
unkown
page readonly
2D60000
unkown
page read and write
F9105F5000
trusted library allocation
page read and write
4391000
unkown
page read and write
7FF4F30B7000
unkown
page readonly
BD80000
unkown
page read and write
FBD4000
unkown
page read and write
C1D4000
unkown
page read and write
8755000
unkown
page read and write
29F3B853000
heap
page read and write
29F3BEF0000
trusted library allocation
page read and write
1EF97798000
heap
page read and write
F9100F5000
trusted library allocation
page read and write
F9105FF000
trusted library allocation
page read and write
89E1000
unkown
page execute and read and write
4E63000
unkown
page read and write
E9D2000
unkown
page read and write
7FF4F2FA3000
unkown
page readonly
AB00000
unkown
page read and write
C14A000
unkown
page read and write
4410000
unkown
page read and write
7FF4F2F91000
unkown
page readonly
4379000
unkown
page read and write
87BB000
unkown
page read and write
7440000
unkown
page read and write
9D0D000
unkown
page read and write
87BB000
unkown
page read and write
BF16000
unkown
page read and write
BD1C000
unkown
page read and write
180000000
unkown
page readonly
C1EB000
unkown
page read and write
2F6F000
unkown
page read and write
F9100F5000
trusted library allocation
page read and write
7FF4F2D4C000
unkown
page readonly
180001000
unkown
page execute read
180073000
unkown
page read and write
7027000
unkown
page read and write
7420000
unkown
page read and write
E9D6000
unkown
page read and write
C045000
unkown
page read and write
29F3B825000
heap
page read and write
7FF4F31CB000
unkown
page readonly
BCD4000
unkown
page read and write
BFAB000
unkown
page read and write
7FF4F316E000
unkown
page readonly
7FF4F2701000
unkown
page readonly
9B9F000
unkown
page read and write
FB9B000
unkown
page read and write
7FF4F30F1000
unkown
page readonly
24C0000
unkown
page execute and read and write
7477000
unkown
page read and write
7FF4F32B6000
unkown
page readonly
29F3BE08000
heap
page read and write
6FC0000
unkown
page read and write
2EF1000
unkown
page read and write
F9105FF000
trusted library allocation
page read and write
7FF4F30D4000
unkown
page readonly
7FF4F321A000
unkown
page readonly
7FF4F2F0F000
unkown
page readonly
9CB8000
unkown
page read and write
29F3BCF0000
heap
page read and write
6FF1000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
8C70000
unkown
page readonly
7FF4F302B000
unkown
page readonly
29F3B7C0000
trusted library allocation
page read and write
7440000
unkown
page read and write
6FF3000
unkown
page read and write
3948F4E000
stack
page read and write
9B53000
unkown
page read and write
7FF4F2C8F000
unkown
page readonly
C29E000
unkown
page read and write
7173000
unkown
page read and write
81F0000
heap
page read and write
29F3B81B000
heap
page read and write
8E08000
stack
page read and write
F9105FF000
trusted library allocation
page read and write
C28B000
unkown
page read and write
AA21000
unkown
page read and write
C1C0000
unkown
page read and write
29F3B84A000
heap
page read and write
7FF4F3039000
unkown
page readonly
7FF4F2D21000
unkown
page readonly
7FF4F32F4000
unkown
page readonly
749356C000
stack
page read and write
29F3B8E1000
direct allocation
page execute read
7FF4F31B1000
unkown
page readonly
7DF40CFF1000
unkown
page execute read
7FF4F2B94000
unkown
page readonly
7FF4F32A4000
unkown
page readonly
444A000
unkown
page read and write
C0B3000
unkown
page read and write
772D000
stack
page read and write
29F3BCF0000
trusted library allocation
page read and write
8C70000
unkown
page readonly
7FF4F3178000
unkown
page readonly
9B88000
unkown
page read and write
7FF4F2D82000
unkown
page readonly
2E90000
unkown
page readonly
273F41000
direct allocation
page execute and read and write
957D000
stack
page read and write
29F3B845000
heap
page read and write
9C9B000
unkown
page read and write
E990000
unkown
page read and write
4CB0000
unkown
page write copy
DE49000
stack
page read and write
898F000
unkown
page read and write
C045000
unkown
page read and write
29F3BE2C000
heap
page read and write
7FF4F2FC4000
unkown
page readonly
20A35600000
heap
page read and write
7FF4F2FAF000
unkown
page readonly
F9101E7000
stack
page read and write
1B3AF700000
heap
page read and write
A2E3000
unkown
page read and write
7460000
unkown
page read and write
29F3B84A000
heap
page read and write
BF1B000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
D5ED67C000
stack
page read and write
7FF4F3374000
unkown
page readonly
7DF40CFB1000
unkown
page execute read
7FF4F2DCB000
unkown
page readonly
F9100F5000
trusted library allocation
page read and write
8796000
unkown
page read and write
9BB3000
unkown
page read and write
29F3B845000
heap
page read and write
4420000
unkown
page read and write
99AF000
stack
page read and write
9590000
unkown
page read and write
180074000
unkown
page write copy
F9102FB000
stack
page read and write
862F000
unkown
page read and write
18007D000
unkown
page readonly
FAD2000
unkown
page read and write
29F3B928000
direct allocation
page read and write
7DF49B9F0000
direct allocation
page readonly
9B4B000
unkown
page read and write
1B3AF8B8000
heap
page read and write
7FF4F2D93000
unkown
page readonly
28CEE7F0000
heap
page read and write
7FF4F2E8F000
unkown
page readonly
18007D000
unkown
page readonly
7590000
unkown
page execute and read and write
7FF4F3294000
unkown
page readonly
F91037F000
stack
page read and write
29F3B84A000
heap
page read and write
7FF4F313B000
unkown
page readonly
7FF4F32DE000
unkown
page readonly
2E90000
unkown
page readonly
7FF4F2DA4000
unkown
page readonly
6FDC000
unkown
page read and write
7FF4F2F8D000
unkown
page readonly
7FF4F2B60000
unkown
page readonly
7FF4F2E50000
unkown
page readonly
E9C2000
unkown
page read and write
7FF4F2DA8000
unkown
page readonly
BE00000
unkown
page read and write
7FF4F3111000
unkown
page readonly
F9100FF000
trusted library allocation
page read and write
B0CB000
stack
page read and write
1C8D5720000
heap
page read and write
4DE1000
unkown
page read and write
88E9000
unkown
page read and write
9D15000
unkown
page read and write
4340000
unkown
page read and write
BF2E000
unkown
page read and write
7DF40CFB0000
unkown
page readonly
2F67000
unkown
page read and write
43C4000
unkown
page read and write
F9100FF000
trusted library allocation
page read and write
7FF4F307B000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
7FF4F2FD0000
unkown
page readonly
FB9B000
unkown
page read and write
29F3B8C1000
heap
page read and write
E9C1000
unkown
page read and write
29F3BDED000
heap
page read and write
29F3B845000
heap
page read and write
180074000
unkown
page write copy
9B75000
unkown
page read and write
7FF4F2B86000
unkown
page readonly
180073000
unkown
page read and write
7FF4F31E7000
unkown
page readonly
7FF4F2F8B000
unkown
page readonly
FAD2000
unkown
page read and write
9C83000
unkown
page read and write
7FF4F335A000
unkown
page readonly
29F3B920000
direct allocation
page read and write
BD1C000
unkown
page read and write
2F10000
unkown
page read and write
29F3B8BD000
heap
page read and write
28CEE730000
heap
page read and write
180001000
unkown
page execute read
A93B000
stack
page read and write
4300000
unkown
page read and write
85F2000
unkown
page read and write
2F56000
unkown
page read and write
9B8C000
unkown
page read and write
2490000
unkown
page execute and read and write
29F3B7C0000
trusted library allocation
page read and write
7FF4F2D48000
unkown
page readonly
24C0000
unkown
page execute and read and write
BFF8000
unkown
page read and write
7FF4F2FC7000
unkown
page readonly
8771000
unkown
page read and write
7FF4F3238000
unkown
page readonly
A2E3000
unkown
page read and write
8430000
unkown
page read and write
7FF4F3307000
unkown
page readonly
9B33000
unkown
page read and write
7FF4F2D79000
unkown
page readonly
F9105F5000
trusted library allocation
page read and write
7FF4F32BC000
unkown
page readonly
7FF4F2D93000
unkown
page readonly
7FF4F3303000
unkown
page readonly
7FF4F2FA7000
unkown
page readonly
9BD8000
unkown
page read and write
7FF4F2FEB000
unkown
page readonly
225BF885000
heap
page read and write
F9105F5000
trusted library allocation
page read and write
75A0000
unkown
page execute and read and write
29F3B81A000
heap
page read and write
9D15000
unkown
page read and write
8E87000
stack
page read and write
7FF4F3254000
unkown
page readonly
FADB000
unkown
page read and write
4395000
unkown
page read and write
7FF4F2E01000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
A799000
stack
page read and write
7FF4F2FA7000
unkown
page readonly
7FF4F30FF000
unkown
page readonly
7FF4F2C8C000
unkown
page readonly
7FF4F3284000
unkown
page readonly
7FF4F32F6000
unkown
page readonly
7FF4F2CFB000
unkown
page readonly
43C4000
unkown
page read and write
8E89000
stack
page read and write
74935EF000
stack
page read and write
29F3BE20000
heap
page read and write
F91017F000
stack
page read and write
7FF4F32F4000
unkown
page readonly
C1D4000
unkown
page read and write
7150000
unkown
page read and write
85E0000
unkown
page read and write
4D79000
stack
page read and write
C2B2000
unkown
page read and write
7FF4F2BA0000
unkown
page readonly
85D0000
unkown
page read and write
F9105FF000
trusted library allocation
page read and write
18007C000
unkown
page write copy
BD5C000
unkown
page read and write
8780000
unkown
page read and write
64F737F000
stack
page read and write
BDAF000
unkown
page read and write
F9105F5000
trusted library allocation
page read and write
29F39C90000
heap
page read and write
7420000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
2B59000
stack
page read and write
7052000
unkown
page read and write
9CAB000
unkown
page read and write
982C000
stack
page read and write
7FF4F2D26000
unkown
page readonly
7DF49BA31000
direct allocation
page read and write
18005F000
unkown
page readonly
18007C000
unkown
page write copy
29F3B853000
heap
page read and write
2D60000
unkown
page read and write
7FF4F320C000
unkown
page readonly
29F0000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
7FF4F3144000
unkown
page readonly
7FF4F2D29000
unkown
page readonly
9B20000
unkown
page read and write
24C0000
unkown
page execute and read and write
2D50000
unkown
page read and write
2A50000
unkown
page readonly
C1D4000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
2613000
heap
page read and write
7FF4F327C000
unkown
page readonly
7FF4F2CE7000
unkown
page readonly
1C8D7250000
heap
page read and write
8759000
unkown
page read and write
A2E0000
unkown
page read and write
7FF4F3205000
unkown
page readonly
29F3BE0F000
heap
page read and write
7164000
unkown
page read and write
7FF4F2B98000
unkown
page readonly
BFA7000
unkown
page read and write
6FE9000
unkown
page read and write
29F3BE24000
heap
page read and write
2D20000
unkown
page read and write
8554000
unkown
page read and write
9CAB000
unkown
page read and write
2F52000
unkown
page read and write
180001000
unkown
page execute read
C1CE000
unkown
page read and write
8260000
unkown
page execute and read and write
7FF4F30F3000
unkown
page readonly
DD4C000
stack
page read and write
BDA7000
unkown
page read and write
7FF4F3205000
unkown
page readonly
7FF4F2F6B000
unkown
page readonly
8761000
unkown
page read and write
180001000
unkown
page execute read
7FF4F32C6000
unkown
page readonly
A2FA000
unkown
page read and write
7FF4F31BE000
unkown
page readonly
BEC0000
unkown
page read and write
1EF97740000
heap
page read and write
7EBB000
stack
page read and write
4393000
unkown
page read and write
C079000
unkown
page read and write
7FF4F2D68000
unkown
page readonly
7FF4F2CC6000
unkown
page readonly
29F3B925000
direct allocation
page read and write
F9100FF000
trusted library allocation
page read and write
7FF4F3196000
unkown
page readonly
A355000
unkown
page read and write
BEFF000
unkown
page read and write
180077000
unkown
page readonly
C1CB000
unkown
page read and write
703A000
unkown
page read and write
BEF2000
unkown
page read and write
180077000
unkown
page readonly
7FF4F2F8B000
unkown
page readonly
180074000
unkown
page write copy
29F3B7EA000
heap
page read and write
9C9B000
unkown
page read and write
1C1F8940000
heap
page read and write
24C0000
unkown
page execute and read and write
BEDC000
unkown
page read and write
7FF4F2DEA000
unkown
page readonly
7DF40CFF1000
unkown
page execute read
875000
stack
page read and write
74C0000
unkown
page readonly
BD75000
unkown
page read and write
29F3BEF0000
trusted library allocation
page read and write
2890A730000
heap
page read and write
AA6A000
heap
page read and write
20A33C70000
heap
page read and write
7FF4F23D0000
unkown
page readonly
C30000
unkown
page read and write
7FF4F313B000
unkown
page readonly
7FF4F2BA0000
unkown
page readonly
9B37000
unkown
page read and write
7FF4F2FD2000
unkown
page readonly
29F3B853000
heap
page read and write
FAE9000
unkown
page read and write
AECE000
stack
page read and write
7FF4F3361000
unkown
page readonly
F91027B000
stack
page read and write
29F3BEF0000
trusted library allocation
page read and write
7FF4F2FE3000
unkown
page readonly
24A0000
unkown
page execute and read and write
29F3BEF0000
trusted library allocation
page read and write
29F3BE04000
heap
page read and write
7FF4F3314000
unkown
page readonly
7FF4E7E46000
unkown
page readonly
B8B8000
stack
page read and write
2A50000
unkown
page readonly
9B8F000
unkown
page read and write
7FF4F2D50000
unkown
page readonly
7FF4F2D11000
unkown
page readonly
29F3BE08000
heap
page read and write
C123000
unkown
page read and write
B939000
stack
page read and write
7FF4F31C3000
unkown
page readonly
7FF4F2D0A000
unkown
page readonly
B04A000
stack
page read and write
7FF4F2F19000
unkown
page readonly
7FF4F2CBF000
unkown
page readonly
9B65000
unkown
page read and write
9B8F000
unkown
page read and write
87C0000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
273F85000
direct allocation
page execute and read and write
B04A000
stack
page read and write
7FF4F2C98000
unkown
page readonly
2BDA000
stack
page read and write
20A338C0000
heap
page read and write
9B92000
unkown
page read and write
DFCE000
stack
page read and write
5F0000
unkown
page readonly
18005F000
unkown
page readonly
9650000
unkown
page readonly
896B000
unkown
page read and write
A93B000
stack
page read and write
24A0000
unkown
page execute and read and write
1B3AFA80000
heap
page read and write
29F3B856000
heap
page read and write
7FF4F2DC6000
unkown
page readonly
2890AA85000
heap
page read and write
9B8F000
unkown
page read and write
B9D000
stack
page read and write
BD80000
unkown
page read and write
6FF5000
unkown
page read and write
7FF4F3133000
unkown
page readonly
29F3BCE0000
trusted library allocation
page read and write
7FF4F2DA8000
unkown
page readonly
F9105F5000
trusted library allocation
page read and write
BD99000
unkown
page read and write
29F3BDED000
heap
page read and write
8602000
unkown
page read and write
7FF4F2F78000
unkown
page readonly
43C0000
unkown
page read and write
7FF4F2F9B000
unkown
page readonly
7FF4F2D01000
unkown
page readonly
7FF4F335A000
unkown
page readonly
29F3B88F000
heap
page read and write
1C8D5760000
heap
page read and write
24A0000
unkown
page execute and read and write
F9105FF000
trusted library allocation
page read and write
22E619C8000
heap
page read and write
29F3B81A000
heap
page read and write
9B20000
unkown
page read and write
8250000
unkown
page execute and read and write
BD22000
unkown
page read and write
8796000
unkown
page read and write
7FBE000
stack
page read and write
29F3B7C0000
trusted library allocation
page read and write
B788000
unkown
page read and write
1B3AF8B9000
heap
page read and write
8921000
unkown
page read and write
7FF4F317B000
unkown
page readonly
1B3B2E60000
trusted library allocation
page read and write
8430000
unkown
page read and write
89B9000
unkown
page read and write
7FF4F302B000
unkown
page readonly
F9104FE000
stack
page read and write
1B3AF8B4000
heap
page read and write
BF1B000
unkown
page read and write
BFB3000
unkown
page read and write
29F3B845000
heap
page read and write
A819000
stack
page read and write
7FF4F2D26000
unkown
page readonly
7FF4F2EDB000
unkown
page readonly
2A20000
unkown
page readonly
7FF4F2CF7000
unkown
page readonly
AAC0000
unkown
page read and write
A71D000
stack
page read and write
C50000
unkown
page readonly
7FF4F2F89000
unkown
page readonly
29F3BE21000
heap
page read and write
7FF4F2CFE000
unkown
page readonly
7FF4F323C000
unkown
page readonly
2FB0000
unkown
page readonly
7FF4F2B4F000
unkown
page readonly
A44000
heap
page read and write
8993000
unkown
page read and write
CC0000
unkown
page read and write
BCCF000
stack
page read and write
839E000
stack
page read and write
F9105F5000
trusted library allocation
page read and write
DF4E000
stack
page read and write
7FF4E7E46000
unkown
page readonly
BD60000
unkown
page read and write
9CA8000
unkown
page read and write
1C1F8948000
heap
page read and write
2EFD000
unkown
page read and write
4480000
unkown
page read and write
BFB3000
unkown
page read and write
E9C5000
unkown
page read and write
898F000
unkown
page read and write
A2FA000
unkown
page read and write
7FF4F2FB1000
unkown
page readonly
7065000
unkown
page read and write
875000
stack
page read and write
7FF4F2DD5000
unkown
page readonly
78B9000
stack
page read and write
29F3B8B9000
heap
page read and write
6FCC000
unkown
page read and write
9CC2000
unkown
page read and write
7FF4F2FE3000
unkown
page readonly
2F8A000
unkown
page read and write
2BDA000
stack
page read and write
BEC0000
unkown
page read and write
9B65000
unkown
page read and write
6FC7000
unkown
page read and write
29F3BDED000
heap
page read and write
2D30000
unkown
page read and write
7FF4F2F19000
unkown
page readonly
446A000
unkown
page read and write
29F3B867000
heap
page read and write
2F0E000
unkown
page read and write
7EF0000
unkown
page readonly
29F3BE1D000
heap
page read and write
7FF4F3068000
unkown
page readonly
7FF4F32C6000
unkown
page readonly
9C83000
unkown
page read and write
BF0A000
unkown
page read and write
8979000
unkown
page read and write
E9CD000
unkown
page read and write
7680000
unkown
page execute and read and write
8240000
unkown
page execute and read and write
85FC000
unkown
page read and write
7FF4F2FA3000
unkown
page readonly
898F000
unkown
page read and write
E9D0000
unkown
page read and write
FAE9000
unkown
page read and write
1EF97730000
heap
page read and write
3948ECC000
stack
page read and write
1EF97A30000
heap
page read and write
F9105F5000
trusted library allocation
page read and write
20A339A0000
heap
page read and write
1EF97A35000
heap
page read and write
29F39CB0000
heap
page read and write
9CB5000
unkown
page read and write
7FF4F2F13000
unkown
page readonly
6FD0000
unkown
page read and write
4DE1000
unkown
page read and write
29F39CB5000
heap
page read and write
1B3AFB15000
heap
page read and write
25F7000
stack
page read and write
29F3BE0D000
heap
page read and write
4391000
unkown
page read and write
7FF4F31FE000
unkown
page readonly
766E000
stack
page read and write
2A10000
unkown
page readonly
7FF4F32CA000
unkown
page readonly
7FF4F325F000
unkown
page readonly
18007D000
unkown
page readonly
C0FA000
unkown
page read and write
7FF4F316B000
unkown
page readonly
29F39CD7000
heap
page read and write
29F3B871000
heap
page read and write
7FF4F2709000
unkown
page readonly
B180000
unkown
page readonly
BDAF000
unkown
page read and write
7FF4F2B4F000
unkown
page readonly
A71D000
stack
page read and write
9D15000
unkown
page read and write
8979000
unkown
page read and write
9C3D000
unkown
page read and write
7FF4F2EA2000
unkown
page readonly
7FF4F2714000
unkown
page readonly
4D79000
stack
page read and write
7FF4F327C000
unkown
page readonly
6E35000
stack
page read and write
29F3BE09000
heap
page read and write
18007D000
unkown
page readonly
180001000
unkown
page execute read
82AF000
unkown
page read and write
7FF4F2D01000
unkown
page readonly
9BB3000
unkown
page read and write
6FF3000
unkown
page read and write
29F3BE08000
heap
page read and write
29F3B81A000
heap
page read and write
7FF4F2B8F000
unkown
page readonly
E9F3000
unkown
page read and write
88BB000
unkown
page read and write
9E0000
unkown
page read and write
C282000
unkown
page read and write
6FCC000
unkown
page read and write
1C8D58F0000
heap
page read and write
29F3B825000
heap
page read and write
7FF4F30AB000
unkown
page readonly
C0B3000
unkown
page read and write
C0B9000
unkown
page read and write
85F4000
unkown
page read and write
F9100FF000
trusted library allocation
page read and write
4356000
unkown
page read and write
6FB0000
unkown
page read and write
7181000
unkown
page read and write
9B53000
unkown
page read and write
AA62000
heap
page read and write
7FF4F2F78000
unkown
page readonly
7DF40CFD1000
unkown
page execute read
888E000
unkown
page read and write
4340000
unkown
page read and write
880000
heap
page read and write
876D000
unkown
page read and write
2F0E000
unkown
page read and write
29F3B88C000
heap
page read and write
74F0000
unkown
page readonly
6FE1000
unkown
page read and write
F9105FF000
trusted library allocation
page read and write
6FEF000
unkown
page read and write
7FF4F2FD2000
unkown
page readonly
180074000
unkown
page write copy
C045000
unkown
page read and write
2EFD000
unkown
page read and write
22E618E0000
heap
page read and write
7FF4F333D000
unkown
page readonly
7FF4F32CA000
unkown
page readonly
29F39D90000
heap
page read and write
4A4277F000
stack
page read and write
B9B000
stack
page read and write
BD60000
unkown
page read and write
29F3BE12000
heap
page read and write
7FF4F2FAF000
unkown
page readonly
7670000
unkown
page readonly
7FF4F3284000
unkown
page readonly
7FF4F2DDD000
unkown
page readonly
29F3B8B9000
heap
page read and write
977707E000
stack
page read and write
28CEE620000
heap
page read and write
7FF4F2DE0000
unkown
page readonly
E9F3000
unkown
page read and write
9C3D000
unkown
page read and write
2890C3A0000
heap
page read and write
BFF8000
unkown
page read and write
BEC0000
unkown
page read and write
87B2000
unkown
page read and write
28CEE700000
heap
page read and write
92F7000
stack
page read and write
7FF4F3142000
unkown
page readonly
B939000
stack
page read and write
876D000
unkown
page read and write
7FF4F31C5000
unkown
page readonly
FB1CFBF000
stack
page read and write
7FF4F2FD0000
unkown
page readonly
18007C000
unkown
page write copy
180000000
unkown
page readonly
22E61C80000
heap
page read and write
2F52000
unkown
page read and write
180000000
unkown
page readonly
29F3B7A0000
direct allocation
page execute and read and write
7FF4F2DE3000
unkown
page readonly
BD99000
unkown
page read and write
7460000
unkown
page read and write
7FF4F32AC000
unkown
page readonly
8996000
unkown
page read and write
7FF4F328E000
unkown
page readonly
29F3B845000
heap
page read and write
C2B6000
unkown
page read and write
7FF4F30C5000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
7FF4F2EDB000
unkown
page readonly
7FF4F2D95000
unkown
page readonly
9D0D000
unkown
page read and write
BD5C000
unkown
page read and write
8210000
unkown
page read and write
29F3B7C0000
trusted library allocation
page read and write
BD69000
unkown
page read and write
29F3B720000
heap
page readonly
29F3BEF0000
trusted library allocation
page read and write
29F3B7C0000
trusted library allocation
page read and write
2890A700000
heap
page read and write
7FF4F31CB000
unkown
page readonly
BEF2000
unkown
page read and write
7FF4F30AB000
unkown
page readonly
81E0000
unkown
page read and write
75C0000
unkown
page readonly
8755000
unkown
page read and write
C19E000
unkown
page read and write
7FF4F2CC6000
unkown
page readonly
862F000
unkown
page read and write
7FF4F32FC000
unkown
page readonly
29F3BE1D000
heap
page read and write
BEF6000
unkown
page read and write
992F000
stack
page read and write
7FF4F2B94000
unkown
page readonly
F9105FF000
trusted library allocation
page read and write
29F3BE1D000
heap
page read and write
89D0000
unkown
page execute and read and write
29F3B861000
heap
page read and write
A01000
unkown
page readonly
2D30000
unkown
page read and write
25F7000
stack
page read and write
7FF4F23D0000
unkown
page readonly
29F3BCE0000
remote allocation
page read and write
7FF4F2DC6000
unkown
page readonly
B9BA000
stack
page read and write
7FF4F3144000
unkown
page readonly
29F3BEF0000
trusted library allocation
page read and write
7FF4F2FB1000
unkown
page readonly
18007D000
unkown
page readonly
F9104F5000
trusted library allocation
page read and write
580000
unkown
page readonly
7320000
unkown
page read and write
7FF4F3231000
unkown
page readonly
7FF4F3336000
unkown
page readonly
2613000
heap
page read and write
9B75000
unkown
page read and write
7FF4F2F0F000
unkown
page readonly
There are 1688 hidden memdumps, click here to show them.