IOC Report
Ot7EdLwo881ajbV.exe

loading gif

Files

File Path
Type
Category
Malicious
Ot7EdLwo881ajbV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ot7EdLwo881ajbV.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe
"C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe"
malicious
C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe
"C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\ipconfig.exe
"C:\Windows\SysWOW64\ipconfig.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\Ot7EdLwo881ajbV.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
www.ractice-eiddyy.xyz/dr14/
malicious
http://www.ieryfiertzframing.cfd
unknown
http://www.pioux.xyzReferer:
unknown
https://api.msn.com:443/v1/news/Feed/Windows?t
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
unknown
http://www.ractice-eiddyy.xyzReferer:
unknown
http://www.ltj-democratic.xyz/dr14/
unknown
http://www.lhakikas.net/dr14/www.olicy-yzipy.xyz
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://www.ieryfiertzframing.cfdReferer:
unknown
http://www.olicy-yzipy.xyz/dr14/
unknown
http://www.ltj-democratic.xyz/dr14/www.onoyekorerolaothoe.cfd
unknown
http://www.oneydewsolutions.net/dr14/www.adgeter.xyz
unknown
http://www.onoyekorerolaothoe.cfd/dr14/www.test-octopus.click
unknown
http://www.pon-nacgrz.xyz/dr14/www.ypewriter.pro
unknown
http://www.oneydewsolutions.net/dr14/
unknown
http://www.ypewriter.pro/dr14/
unknown
http://www.oneydewsolutions.netReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
unknown
http://www.bwuc-ball.xyz/dr14/www.iadomus.net
unknown
http://www.iadomus.netReferer:
unknown
http://www.olicy-yzipy.xyzReferer:
unknown
https://wns.windows.com/
unknown
http://www.ractice-eiddyy.xyz
unknown
http://www.bwuc-ball.xyz
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.iadomus.net
unknown
https://word.office.com
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.bwuc-ball.xyzReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
unknown
http://www.onoyekorerolaothoe.cfd/dr14/
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.adgeter.xyz/dr14/
unknown
https://outlook.com
unknown
http://www.pon-nacgrz.xyz/dr14/
unknown
http://www.alzgroup.netReferer:
unknown
http://www.test-octopus.click
unknown
http://www.lhakikas.net/dr14/
unknown
http://www.oneydewsolutions.net
unknown
http://www.adgeter.xyz/dr14/www.lhakikas.net
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.bwuc-ball.xyz/dr14/
unknown
http://www.ntalaxlesbabbool.cfd/dr14/www.ltj-democratic.xyz
unknown
http://www.alzgroup.net/dr14/www.ieryfiertzframing.cfd
unknown
http://www.pioux.xyz/dr14/www.pon-nacgrz.xyz
unknown
http://www.olicy-yzipy.xyz
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://www.onoyekorerolaothoe.cfdReferer:
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
unknown
http://www.ractice-eiddyy.xyz/dr14/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://www.pollensense.com/
unknown
http://www.olicy-yzipy.xyz/dr14/www.pioux.xyz
unknown
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
unknown
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
unknown
http://schemas.micro
unknown
http://www.ltj-democratic.xyz
unknown
http://www.ntalaxlesbabbool.cfd
unknown
http://www.pioux.xyz
unknown
http://www.lhakikas.net
unknown
http://www.alzgroup.net/dr14/
unknown
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
unknown
http://www.pon-nacgrz.xyzReferer:
unknown
https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
unknown
http://www.iadomus.net/dr14/
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.ractice-eiddyy.xyz/dr14/P
unknown
http://www.ypewriter.pro
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
http://www.ieryfiertzframing.cfd/dr14/www.ntalaxlesbabbool.cfd
unknown
http://www.ntalaxlesbabbool.cfdReferer:
unknown
https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
unknown
http://www.adgeter.xyzReferer:
unknown
http://www.lhakikas.netReferer:
unknown
http://www.ltj-democratic.xyzReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://powerpoint.office.com
unknown
http://www.pioux.xyz/dr14/
unknown
http://www.foreca.com
unknown
http://www.alzgroup.net
unknown
http://www.test-octopus.click/dr14/www.ractice-eiddyy.xyz
unknown
http://www.test-octopus.click/dr14/
unknown
http://www.ieryfiertzframing.cfd/dr14/
unknown
http://www.ypewriter.pro/dr14/www.bwuc-ball.xyz
unknown
http://www.iadomus.net/dr14/www.alzgroup.net
unknown
http://www.test-octopus.clickReferer:
unknown
http://www.adgeter.xyz
unknown
http://www.pon-nacgrz.xyz
unknown
https://api.msn.com/
unknown
http://www.ypewriter.proReferer:
unknown
http://www.onoyekorerolaothoe.cfd
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
http://www.ntalaxlesbabbool.cfd/dr14/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.lhakikas.net
unknown
malicious
www.olicy-yzipy.xyz
unknown
malicious
www.oneydewsolutions.net
unknown
malicious
www.iadomus.net
unknown
malicious
www.alzgroup.net
unknown
malicious
www.ntalaxlesbabbool.cfd
unknown
malicious
www.pon-nacgrz.xyz
unknown
malicious
www.ypewriter.pro
unknown
malicious
198.187.3.20.in-addr.arpa
unknown
malicious
www.bwuc-ball.xyz
unknown
malicious
www.adgeter.xyz
unknown
malicious
www.ieryfiertzframing.cfd
unknown
malicious
There are 2 hidden domains, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
There are 190 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
710000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2D50000
unclassified section
page execute and read and write
malicious
3421000
trusted library allocation
page read and write
malicious
2D80000
trusted library allocation
page read and write
malicious
4F00000
trusted library section
page read and write
malicious
F90000
heap
page read and write
7FF557607000
unkown
page readonly
7FF557429000
unkown
page readonly
B080000
unkown
page read and write
7FF5571A1000
unkown
page readonly
50B0000
unkown
page write copy
7FF557554000
unkown
page readonly
AE2B000
stack
page read and write
995E000
stack
page read and write
89C0000
unkown
page read and write
73C86000
unkown
page readonly
23E0000
trusted library allocation
page read and write
2A40000
heap
page read and write
BFD0000
unkown
page read and write
7FF55764C000
unkown
page readonly
C06D000
unkown
page read and write
7FF5572C9000
unkown
page readonly
7FF55720D000
unkown
page readonly
C4A3000
unkown
page read and write
732B000
unkown
page read and write
7FF5572D4000
unkown
page readonly
8EDD000
unkown
page read and write
FD0000
unkown
page readonly
FBB000
unclassified section
page execute and read and write
8D78000
unkown
page read and write
B84000
heap
page read and write
5A70000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
A0BD000
unkown
page read and write
9013000
unkown
page read and write
7FF5570B5000
unkown
page readonly
732E000
unkown
page read and write
C0F3000
unkown
page read and write
7FF557239000
unkown
page readonly
980E000
stack
page read and write
A222000
unkown
page read and write
72FE000
unkown
page read and write
7FF556E7C000
unkown
page readonly
3220000
unkown
page readonly
7F630000
trusted library allocation
page execute and read and write
77D0000
unkown
page read and write
7FF5574BA000
unkown
page readonly
90C9000
unkown
page read and write
3230000
unkown
page read and write
7FF5575D5000
unkown
page readonly
2DB0000
trusted library allocation
page read and write
1160000
heap
page read and write
7FF5570E7000
unkown
page readonly
2400000
trusted library allocation
page read and write
71FC000
unkown
page read and write
A858000
unkown
page read and write
717A000
unkown
page read and write
7DF468981000
unkown
page execute read
8F27000
unkown
page read and write
7FF55719C000
unkown
page readonly
8F83000
unkown
page read and write
C3A8000
unkown
page read and write
86CE000
stack
page read and write
30D4000
heap
page read and write
7FF5573A9000
unkown
page readonly
788B000
stack
page read and write
A850000
unkown
page read and write
9086000
unkown
page read and write
9580000
unkown
page readonly
3269000
unkown
page read and write
6797000
heap
page read and write
9D8E000
stack
page read and write
A877000
unkown
page read and write
C22B000
unkown
page read and write
7FF55733F000
unkown
page readonly
3440000
unkown
page readonly
50B0000
unkown
page write copy
7E03000
stack
page read and write
2640000
heap
page read and write
C126000
unkown
page read and write
C58F000
unkown
page read and write
23F0000
trusted library allocation
page read and write
B050000
unkown
page read and write
A0FF000
unkown
page read and write
16F9000
direct allocation
page execute and read and write
B84000
heap
page read and write
788B000
stack
page read and write
C1DB000
unkown
page read and write
10B0000
unkown
page readonly
90CF000
unkown
page read and write
4A22000
trusted library allocation
page read and write
5161000
unkown
page read and write
2A3F000
stack
page read and write
7FF557617000
unkown
page readonly
4840000
unkown
page read and write
7169000
unkown
page read and write
7FF557235000
unkown
page readonly
7FF55761F000
unkown
page readonly
7FF55714D000
unkown
page readonly
7321000
unkown
page read and write
320D000
direct allocation
page execute and read and write
C12D000
unkown
page read and write
2E41000
heap
page read and write
7FF557501000
unkown
page readonly
9013000
unkown
page read and write
7FF5574A9000
unkown
page readonly
E1B9000
stack
page read and write
8EF5000
unkown
page read and write
5A70000
trusted library allocation
page read and write
88F0000
unkown
page read and write
7FF557330000
unkown
page readonly
116A5000
system
page execute and read and write
7FF55706A000
unkown
page readonly
7803000
unkown
page read and write
9CDC000
stack
page read and write
B84000
heap
page read and write
B84000
heap
page read and write
7FF5575BF000
unkown
page readonly
7FF557302000
unkown
page readonly
7A60000
unkown
page readonly
7FF5569F1000
unkown
page readonly
B10000
heap
page read and write
5520000
heap
page read and write
1881000
direct allocation
page execute and read and write
7FF557045000
unkown
page readonly
32E6000
unkown
page read and write
4800000
unkown
page read and write
8820000
unkown
page readonly
76B0000
unkown
page read and write
7FF55760F000
unkown
page readonly
72FC000
unkown
page read and write
2230000
trusted library allocation
page read and write
8F27000
unkown
page read and write
88FC000
unkown
page read and write
7FF557568000
unkown
page readonly
7FF5572D4000
unkown
page readonly
7FF557062000
unkown
page readonly
7FF5571E2000
unkown
page readonly
A154000
unkown
page read and write
8530000
unkown
page readonly
780000
trusted library allocation
page read and write
7FF5571B3000
unkown
page readonly
7FF55738F000
unkown
page readonly
798E000
stack
page read and write
7FF55745B000
unkown
page readonly
2FD0000
trusted library allocation
page execute and read and write
8FE4000
unkown
page read and write
754000
heap
page read and write
8AE6000
unkown
page read and write
7FF5569E8000
unkown
page readonly
2F36000
heap
page read and write
9B6000
stack
page read and write
7178000
unkown
page read and write
1141000
trusted library allocation
page execute and read and write
4880000
unkown
page read and write
88F6000
unkown
page read and write
C1E9000
unkown
page read and write
7FF557174000
unkown
page readonly
70D000
stack
page read and write
88B0000
unkown
page read and write
7FF55733B000
unkown
page readonly
8D74000
unkown
page read and write
959E000
stack
page read and write
7FF5569F1000
unkown
page readonly
7A4000
heap
page read and write
A1FD000
unkown
page read and write
88F6000
unkown
page read and write
88A0000
unkown
page read and write
7FF557393000
unkown
page readonly
88BC000
unkown
page read and write
A00A000
stack
page read and write
4785000
unkown
page read and write
2590000
heap
page read and write
7FF5573D5000
unkown
page readonly
9F0E000
stack
page read and write
715C000
unkown
page read and write
7FF5570D6000
unkown
page readonly
A850000
unkown
page read and write
223B000
trusted library allocation
page execute and read and write
147D000
trusted library allocation
page execute and read and write
9E8E000
stack
page read and write
7FF557661000
unkown
page readonly
7FF5571B3000
unkown
page readonly
B84000
heap
page read and write
72D7000
unkown
page read and write
C0FB000
unkown
page read and write
7FF5570D4000
unkown
page readonly
7FF557302000
unkown
page readonly
7FF55700F000
unkown
page readonly
7FF557382000
unkown
page readonly
A157000
unkown
page read and write
2E88000
stack
page read and write
C1DB000
unkown
page read and write
19C000
unkown
page readonly
84E0000
unkown
page readonly
7FF5573ED000
unkown
page readonly
136F000
stack
page read and write
49D0000
trusted library allocation
page read and write
8DA6000
unkown
page read and write
85A0000
unkown
page readonly
72FC000
unkown
page read and write
98DA000
stack
page read and write
90F2000
unkown
page read and write
7FF557594000
unkown
page readonly
7320000
unkown
page read and write
8D78000
unkown
page read and write
2F8C000
stack
page read and write
7FF557554000
unkown
page readonly
8D76000
unkown
page read and write
E290000
unkown
page read and write
A87E000
unkown
page read and write
69C0000
trusted library allocation
page execute and read and write
32E3000
unkown
page read and write
BEBF000
stack
page read and write
7FF557661000
unkown
page readonly
4940000
trusted library allocation
page read and write
B070000
unkown
page read and write
7FF5575AB000
unkown
page readonly
7FF557187000
unkown
page readonly
1440000
unkown
page readonly
7FF556E98000
unkown
page readonly
3450000
unkown
page read and write
662E000
heap
page read and write
A218000
unkown
page read and write
8EEE000
unkown
page read and write
1045B000
unkown
page read and write
A118000
unkown
page read and write
104D6000
unkown
page read and write
A1FD000
unkown
page read and write
7FF55733F000
unkown
page readonly
8F09000
unkown
page read and write
46E0000
unkown
page read and write
32DB000
unkown
page read and write
15D0000
direct allocation
page execute and read and write
7FF557589000
unkown
page readonly
7FF556E9A000
unkown
page readonly
7FF557245000
unkown
page readonly
10554000
unkown
page read and write
A280000
unkown
page read and write
7DF4689B1000
unkown
page execute read
7FF557467000
unkown
page readonly
C3A8000
unkown
page read and write
A0A5000
unkown
page read and write
A70000
heap
page read and write
2C30000
heap
page read and write
7FF557487000
unkown
page readonly
7FF556FFF000
unkown
page readonly
A231000
unkown
page read and write
C56F000
unkown
page read and write
B42F000
stack
page read and write
7FF5574B3000
unkown
page readonly
C0F9000
unkown
page read and write
7FF55710A000
unkown
page readonly
4DB0000
heap
page read and write
8EF5000
unkown
page read and write
7FF5570FE000
unkown
page readonly
6DB000
stack
page read and write
B030000
unkown
page readonly
4880000
unkown
page read and write
7FF5573B5000
unkown
page readonly
A286000
unkown
page read and write
C20E000
unkown
page read and write
7FF557210000
unkown
page readonly
8EDD000
unkown
page read and write
B84000
heap
page read and write
7FF55708D000
unkown
page readonly
90CF000
unkown
page read and write
A286000
unkown
page read and write
4830000
unkown
page read and write
904C000
unkown
page read and write
7FF5570F7000
unkown
page readonly
330A000
unkown
page read and write
C544000
unkown
page read and write
7FF5573F3000
unkown
page readonly
7FF55753D000
unkown
page readonly
AE2B000
stack
page read and write
7FF5574F4000
unkown
page readonly
7FF55707D000
unkown
page readonly
EEC000
stack
page read and write
E1B9000
stack
page read and write
7FF557583000
unkown
page readonly
7FF557026000
unkown
page readonly
4EBD000
stack
page read and write
C24F000
unkown
page read and write
C233000
unkown
page read and write
7FF5570C1000
unkown
page readonly
7173000
unkown
page read and write
7FF55714F000
unkown
page readonly
7FF55756D000
unkown
page readonly
88F6000
unkown
page read and write
B84000
heap
page read and write
8D86000
unkown
page read and write
7C00000
unkown
page readonly
E3FD000
stack
page read and write
7FF557042000
unkown
page readonly
C24F000
unkown
page read and write
7FF55730C000
unkown
page readonly
780000
trusted library allocation
page read and write
8D60000
unkown
page read and write
BF3F000
stack
page read and write
A0BF000
unkown
page read and write
8EEE000
unkown
page read and write
32E3000
unkown
page read and write
7DF468970000
unkown
page readonly
7FF5574A9000
unkown
page readonly
4820000
unkown
page read and write
B84000
heap
page read and write
9022000
unkown
page read and write
E2A0000
heap
page read and write
E280000
unkown
page read and write
9B6000
stack
page read and write
B84000
heap
page read and write
7FF5575B1000
unkown
page readonly
7FF556FEE000
unkown
page readonly
7FF557106000
unkown
page readonly
C450000
unkown
page read and write
8EC5000
unkown
page read and write
10514000
unkown
page read and write
7FF5573BB000
unkown
page readonly
7FF5573C1000
unkown
page readonly
A88A000
unkown
page read and write
B82A000
stack
page read and write
8D80000
unkown
page read and write
8810000
unkown
page readonly
D47000
system
page execute and read and write
7FF556E85000
unkown
page readonly
6790000
heap
page read and write
9854000
unkown
page read and write
A60000
trusted library allocation
page read and write
7FF557239000
unkown
page readonly
7FF556FFB000
unkown
page readonly
D14000
heap
page read and write
7173000
unkown
page read and write
7FF000
stack
page read and write
B84000
heap
page read and write
BBD0000
unkown
page readonly
8D7A000
unkown
page read and write
7FF5575D0000
unkown
page readonly
7FF5573E2000
unkown
page readonly
3213000
stack
page read and write
7FF557330000
unkown
page readonly
7FF55706A000
unkown
page readonly
780000
trusted library allocation
page read and write
77C0000
unkown
page read and write
A0DA000
unkown
page read and write
A231000
unkown
page read and write
7FF557627000
unkown
page readonly
8593000
unkown
page read and write
8F4D000
unkown
page read and write
C3A8000
unkown
page read and write
C428000
unkown
page read and write
8ED5000
unkown
page read and write
7FF556F90000
unkown
page readonly
51E3000
unkown
page read and write
7FF557594000
unkown
page readonly
7FF55719C000
unkown
page readonly
A8A0000
unkown
page read and write
7FF5573ED000
unkown
page readonly
935E000
stack
page read and write
A215000
unkown
page read and write
A810000
unkown
page read and write
7FF5573B5000
unkown
page readonly
7FF557531000
unkown
page readonly
C072000
unkown
page read and write
33AD000
direct allocation
page execute and read and write
7FF557426000
unkown
page readonly
7FF556E9A000
unkown
page readonly
2E2E000
stack
page read and write
7FF55750F000
unkown
page readonly
7FF55763D000
unkown
page readonly
6A0E000
stack
page read and write
7FF557579000
unkown
page readonly
7FF557476000
unkown
page readonly
AF6D000
stack
page read and write
A129000
unkown
page read and write
C4E2000
unkown
page read and write
780000
trusted library allocation
page read and write
7FF557653000
unkown
page readonly
46F6000
unkown
page read and write
7FF55702F000
unkown
page readonly
A22F000
unkown
page read and write
728000
heap
page read and write
C123000
unkown
page read and write
A85E000
unkown
page read and write
7FF5571DF000
unkown
page readonly
945F000
stack
page read and write
7FF55710A000
unkown
page readonly
7FF5571AC000
unkown
page readonly
C063000
unkown
page read and write
C1DB000
unkown
page read and write
79B0000
unkown
page read and write
6CE000
stack
page read and write
E13B000
stack
page read and write
C51D000
unkown
page read and write
910000
unkown
page readonly
8D7A000
unkown
page read and write
90F2000
unkown
page read and write
C101000
unkown
page read and write
7FF556E3B000
unkown
page readonly
7E10000
unkown
page read and write
7FF55724C000
unkown
page readonly
B84000
heap
page read and write
2280000
trusted library allocation
page execute and read and write
7FF557426000
unkown
page readonly
7FF55731B000
unkown
page readonly
C31000
unkown
page readonly
8D6A000
unkown
page read and write
30AE000
stack
page read and write
7FF55726A000
unkown
page readonly
8ECE000
unkown
page read and write
8510000
unkown
page read and write
7FF557599000
unkown
page readonly
7FF5572A2000
unkown
page readonly
4DA0000
heap
page read and write
3350000
unkown
page readonly
913F000
unkown
page read and write
A157000
unkown
page read and write
7FF556E7E000
unkown
page readonly
904C000
unkown
page read and write
B82A000
stack
page read and write
A1FD000
unkown
page read and write
7FF5573CB000
unkown
page readonly
7FF5570FE000
unkown
page readonly
913F000
unkown
page read and write
C4A3000
unkown
page read and write
10514000
unkown
page read and write
C12D000
unkown
page read and write
9CDC000
stack
page read and write
C50000
heap
page read and write
780000
trusted library allocation
page read and write
4985000
trusted library allocation
page read and write
C56B000
unkown
page read and write
7FF5573E6000
unkown
page readonly
C544000
unkown
page read and write
E13B000
stack
page read and write
176E000
direct allocation
page execute and read and write
7FF5572B4000
unkown
page readonly
7FF55752A000
unkown
page readonly
C23A000
unkown
page read and write
2E41000
heap
page read and write
7FF556F90000
unkown
page readonly
BBE0000
unkown
page readonly
90DB000
unkown
page read and write
7FF556F26000
unkown
page readonly
330A000
unkown
page read and write
1896000
direct allocation
page execute and read and write
4732000
unkown
page read and write
1920000
unclassified section
page execute and read and write
7DF4689A1000
unkown
page execute read
4820000
unkown
page read and write
7FF55764C000
unkown
page readonly
C421000
unkown
page read and write
B84000
heap
page read and write
32B9000
unkown
page read and write
C1DF000
unkown
page read and write
8D86000
unkown
page read and write
E260000
unkown
page read and write
A8DA000
unkown
page read and write
7FF546F2F000
unkown
page readonly
A131000
unkown
page read and write
7FF5573FF000
unkown
page readonly
7FF557009000
unkown
page readonly
780000
trusted library allocation
page read and write
7BC1000
unkown
page read and write
A877000
unkown
page read and write
B84000
heap
page read and write
7FF557589000
unkown
page readonly
3253000
unkown
page read and write
7FF55752E000
unkown
page readonly
A22F000
unkown
page read and write
7DF468980000
unkown
page readonly
ADC000
stack
page read and write
90CF000
unkown
page read and write
C427000
unkown
page read and write
73C70000
unkown
page readonly
3249000
unkown
page read and write
4C4B000
stack
page read and write
7185000
unkown
page read and write
96DE000
stack
page read and write
7FF556F87000
unkown
page readonly
32DB000
unkown
page read and write
32F3000
unkown
page read and write
780000
trusted library allocation
page read and write
2222000
trusted library allocation
page read and write
A89A000
unkown
page read and write
7FF557148000
unkown
page readonly
E260000
unkown
page read and write
B84000
heap
page read and write
7FF55750F000
unkown
page readonly
77F0000
unkown
page read and write
8F09000
unkown
page read and write
7FF557352000
unkown
page readonly
C101000
unkown
page read and write
91E000
stack
page read and write
7FF55761F000
unkown
page readonly
8D74000
unkown
page read and write
84DC000
stack
page read and write
4A40000
trusted library allocation
page read and write
79A0000
unkown
page read and write
7FF5575EA000
unkown
page readonly
7FF557293000
unkown
page readonly
32C4000
unkown
page read and write
4730000
unkown
page read and write
90C9000
unkown
page read and write
305F000
heap
page read and write
8EF5000
unkown
page read and write
7FF557583000
unkown
page readonly
7DF4689A1000
unkown
page execute read
E7BB000
stack
page read and write
A218000
unkown
page read and write
7FF55703F000
unkown
page readonly
8DFE000
unkown
page read and write
47DB000
unkown
page read and write
2670000
heap
page read and write
C3B3000
unkown
page read and write
7FF5570E7000
unkown
page readonly
4769000
unkown
page read and write
C214000
unkown
page read and write
A225000
unkown
page read and write
7FF557456000
unkown
page readonly
7FF5575BB000
unkown
page readonly
7FF557026000
unkown
page readonly
90C9000
unkown
page read and write
10414000
unkown
page read and write
7162000
unkown
page read and write
C22F000
unkown
page read and write
F47A000
heap
page read and write
7140000
unkown
page read and write
A280000
unkown
page read and write
798D000
stack
page read and write
780000
trusted library allocation
page read and write
7FF5574BD000
unkown
page readonly
71A4000
unkown
page read and write
7FF557045000
unkown
page readonly
90C9000
unkown
page read and write
1045B000
unkown
page read and write
73C5000
stack
page read and write
7FF556E36000
unkown
page readonly
88F2000
unkown
page read and write
C3B3000
unkown
page read and write
8D72000
unkown
page read and write
7300000
unkown
page read and write
B84000
heap
page read and write
8DA6000
unkown
page read and write
2237000
trusted library allocation
page execute and read and write
7FF5574F9000
unkown
page readonly
B84000
heap
page read and write
C4E2000
unkown
page read and write
7C70000
unkown
page readonly
A118000
unkown
page read and write
7FF5572C1000
unkown
page readonly
7FF557257000
unkown
page readonly
2F90000
unkown
page readonly
7FF5574F1000
unkown
page readonly
10C10000
heap
page read and write
7FF55700F000
unkown
page readonly
7FF557416000
unkown
page readonly
32D7000
unkown
page read and write
C0F3000
unkown
page read and write
10452000
unkown
page read and write
A0B9000
unkown
page read and write
7185000
unkown
page read and write
72E000
heap
page read and write
4718000
unkown
page read and write
7FF557669000
unkown
page readonly
84E0000
unkown
page readonly
1918000
direct allocation
page execute and read and write
4734000
unkown
page read and write
90C9000
unkown
page read and write
8D70000
unkown
page read and write
3460000
unkown
page read and write
2E48000
heap
page read and write
A0FF000
unkown
page read and write
C421000
unkown
page read and write
900000
unkown
page readonly
717C000
unkown
page read and write
717E000
unkown
page read and write
7FF5569E8000
unkown
page readonly
7FF546F35000
unkown
page readonly
8EEE000
unkown
page read and write
BB3F000
stack
page read and write
32D3000
unkown
page read and write
780000
trusted library allocation
page read and write
B91000
heap
page read and write
7A4B000
stack
page read and write
7FF556F31000
unkown
page readonly
8F4D000
unkown
page read and write
7FF557009000
unkown
page readonly
46F0000
unkown
page read and write
C1DF000
unkown
page read and write
22DE000
stack
page read and write
A23B000
unkown
page read and write
7FF55714A000
unkown
page readonly
C2E4000
unkown
page read and write
7FF55710F000
unkown
page readonly
2E39000
heap
page read and write
1440000
unkown
page readonly
904C000
unkown
page read and write
A0A5000
unkown
page read and write
7FF557413000
unkown
page readonly
1060000
unkown
page read and write
A85E000
unkown
page read and write
71B2000
unkown
page read and write
9013000
unkown
page read and write
B1A0000
unkown
page read and write
10C10000
heap
page read and write
7FF5571E6000
unkown
page readonly
C0F9000
unkown
page read and write
7FF557393000
unkown
page readonly
B91000
heap
page read and write
7FF557549000
unkown
page readonly
C24F000
unkown
page read and write
7FF5570A6000
unkown
page readonly
8DB0000
unkown
page read and write
88E5000
unkown
page read and write
A0FC000
unkown
page read and write
88F0000
unkown
page read and write
327E000
direct allocation
page execute and read and write
4CF0000
heap
page read and write
780000
trusted library allocation
page read and write
8C59000
stack
page read and write
A110000
unkown
page read and write
7DF468991000
unkown
page execute read
7BC1000
unkown
page read and write
A88A000
unkown
page read and write
C3B3000
unkown
page read and write
7FF5569FA000
unkown
page readonly
2E48000
heap
page read and write
7FF55728F000
unkown
page readonly
E40B000
unkown
page read and write
7176000
unkown
page read and write
A1FD000
unkown
page read and write
780000
trusted library allocation
page read and write
7FF557434000
unkown
page readonly
7DF468970000
unkown
page readonly
32C9000
unkown
page read and write
8DB0000
unkown
page read and write
47EE000
unkown
page read and write
A50000
trusted library allocation
page read and write
7FF55702F000
unkown
page readonly
B84000
heap
page read and write
4781000
unkown
page read and write
7306000
unkown
page read and write
90CF000
unkown
page read and write
C374000
unkown
page read and write
32C9000
unkown
page read and write
7FF556F2A000
unkown
page readonly
A15C000
unkown
page read and write
1130000
trusted library allocation
page execute and read and write
B84000
heap
page read and write
4F60000
trusted library allocation
page read and write
E60000
unkown
page readonly
7FF557602000
unkown
page readonly
7B6000
heap
page read and write
47C0000
unkown
page read and write
C3F7000
unkown
page read and write
7FF5575B9000
unkown
page readonly
C3E7000
unkown
page read and write
8BD9000
stack
page read and write
7FF557653000
unkown
page readonly
A280000
unkown
page read and write
C10000
unkown
page read and write
7FF557065000
unkown
page readonly
7FF557095000
unkown
page readonly
C24F000
unkown
page read and write
780000
trusted library allocation
page read and write
7FF5570A6000
unkown
page readonly
16FD000
direct allocation
page execute and read and write
7FF556FC4000
unkown
page readonly
A40000
trusted library allocation
page read and write
7906000
stack
page read and write
4810000
unkown
page read and write
A218000
unkown
page read and write
C478000
unkown
page read and write
A225000
unkown
page read and write
7FF556E6C000
unkown
page readonly
C328000
unkown
page read and write
32B9000
unkown
page read and write
116B7000
system
page execute and read and write
8AE6000
unkown
page read and write
B070000
unkown
page read and write
32C9000
unkown
page read and write
9050000
unkown
page read and write
3063000
heap
page read and write
7FF556F84000
unkown
page readonly
780000
trusted library allocation
page read and write
C481000
unkown
page read and write
7FF5575AB000
unkown
page readonly
537000
stack
page read and write
FA0000
unclassified section
page execute and read and write
A110000
unkown
page read and write
49B3000
heap
page read and write
8510000
unkown
page read and write
7FF5572A4000
unkown
page readonly
7FF557420000
unkown
page readonly
B84000
heap
page read and write
7FF557535000
unkown
page readonly
B84000
heap
page read and write
AFFF000
stack
page read and write
7FF5570C1000
unkown
page readonly
7FF556E66000
unkown
page readonly
C51C000
unkown
page read and write
9854000
unkown
page read and write
7FF556E8D000
unkown
page readonly
7FF557285000
unkown
page readonly
B52D000
stack
page read and write
AFFF000
stack
page read and write
5A70000
trusted library allocation
page read and write
7276000
unkown
page read and write
FB0000
unkown
page read and write
B84000
heap
page read and write
C1DD000
unkown
page read and write
8D60000
unkown
page read and write
7E03000
stack
page read and write
4A10000
heap
page read and write
C23A000
unkown
page read and write
4972000
trusted library allocation
page read and write
C22F000
unkown
page read and write
B5AE000
stack
page read and write
7FF5573EA000
unkown
page readonly
67C6000
heap
page read and write
2E88000
stack
page read and write
7FF5572AC000
unkown
page readonly
C44D000
unkown
page read and write
A222000
unkown
page read and write
7306000
unkown
page read and write
2C04000
stack
page read and write
7FF557437000
unkown
page readonly
7FF557463000
unkown
page readonly
7B99000
stack
page read and write
864F000
stack
page read and write
ACBE000
stack
page read and write
C6D000
heap
page read and write
C374000
unkown
page read and write
780000
trusted library allocation
page read and write
7FF557257000
unkown
page readonly
10414000
unkown
page read and write
7FF5572A2000
unkown
page readonly
7DF468990000
unkown
page readonly
C04B000
unkown
page read and write
9259000
stack
page read and write
326A000
unkown
page read and write
A131000
unkown
page read and write
494B000
trusted library allocation
page read and write
B080000
unkown
page read and write
7FF55752E000
unkown
page readonly
7FF5570CA000
unkown
page readonly
472C000
unkown
page read and write
C5A5000
unkown
page read and write
A87D000
unkown
page read and write
B30000
heap
page read and write
8D6C000
unkown
page read and write
4F50000
trusted library allocation
page read and write
A08D000
stack
page read and write
7FF556F87000
unkown
page readonly
7FF55738F000
unkown
page readonly
7FF5574B3000
unkown
page readonly
1020000
heap
page read and write
C430000
unkown
page read and write
7FF557033000
unkown
page readonly
32E3000
unkown
page read and write
C481000
unkown
page read and write
32DB000
unkown
page read and write
A87A000
unkown
page read and write
7FF5573D8000
unkown
page readonly
72FC000
unkown
page read and write
7A50000
unkown
page readonly
7FF557602000
unkown
page readonly
7FF557245000
unkown
page readonly
7DF468991000
unkown
page execute read
32C4000
unkown
page read and write
2C06000
stack
page read and write
7FF557437000
unkown
page readonly
32D7000
unkown
page read and write
7FF5575A1000
unkown
page readonly
293F000
unkown
page read and write
8ED5000
unkown
page read and write
C23A000
unkown
page read and write
8DFE000
unkown
page read and write
7FF55703C000
unkown
page readonly
7FF556E7E000
unkown
page readonly
7FF55765C000
unkown
page readonly
C244000
unkown
page read and write
51F9000
unkown
page read and write
88E4000
unkown
page read and write
32F3000
unkown
page read and write
7D0E000
stack
page read and write
85A0000
unkown
page readonly
7162000
unkown
page read and write
7FF557599000
unkown
page readonly
7FF5571AC000
unkown
page readonly
7FF5572BD000
unkown
page readonly
9E8E000
stack
page read and write
73D0000
unkown
page read and write
7FF5572C9000
unkown
page readonly
10469000
unkown
page read and write
8EC5000
unkown
page read and write
8D6C000
unkown
page read and write
7FF55765C000
unkown
page readonly
C2D3000
unkown
page read and write
A87A000
unkown
page read and write
8ECE000
unkown
page read and write
761000
heap
page read and write
C328000
unkown
page read and write
780000
trusted library allocation
page read and write
9052000
unkown
page read and write
874E000
stack
page read and write
7FF5572BD000
unkown
page readonly
7FF5570C5000
unkown
page readonly
7FF55704A000
unkown
page readonly
88F2000
unkown
page read and write
102000
unkown
page readonly
9086000
unkown
page read and write
910000
unkown
page readonly
B91000
heap
page read and write
B040000
unkown
page readonly
780000
trusted library allocation
page read and write
C57E000
unkown
page read and write
6620000
heap
page read and write
780000
trusted library allocation
page read and write
7FF5573D3000
unkown
page readonly
F472000
heap
page read and write
7FF557607000
unkown
page readonly
C10000
unkown
page read and write
FB0000
unkown
page read and write
780000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
2E0A000
stack
page read and write
A89A000
unkown
page read and write
718B000
unkown
page read and write
7FF557065000
unkown
page readonly
A0A8000
unkown
page read and write
C3ED000
unkown
page read and write
73D0000
unkown
page read and write
7140000
unkown
page read and write
E370000
unkown
page read and write
8EEE000
unkown
page read and write
90DB000
unkown
page read and write
7FF557187000
unkown
page readonly
C374000
unkown
page read and write
3118000
stack
page read and write
C3ED000
unkown
page read and write
30E0000
direct allocation
page execute and read and write
C3AE000
unkown
page read and write
88E2000
unkown
page read and write
8EDD000
unkown
page read and write
A873000
unkown
page read and write
90DB000
unkown
page read and write
A114000
unkown
page read and write
C3E7000
unkown
page read and write
A156000
unkown
page read and write
C00000
heap
page read and write
717E000
unkown
page read and write
2F90000
unkown
page readonly
3213000
stack
page read and write
780000
trusted library allocation
page read and write
B84000
heap
page read and write
71FC000
unkown
page read and write
BC10000
unkown
page read and write
7FF556FEE000
unkown
page readonly
242D000
trusted library allocation
page read and write
4781000
unkown
page read and write
910E000
unkown
page read and write
A0BF000
unkown
page read and write
7FF556F2A000
unkown
page readonly
73F0000
unkown
page read and write
A54000
trusted library allocation
page read and write
7FF556E66000
unkown
page readonly
B628000
stack
page read and write
7FF557413000
unkown
page readonly
7FF556E3B000
unkown
page readonly
7FF55723F000
unkown
page readonly
3460000
unkown
page read and write
C478000
unkown
page read and write
7FF5570B5000
unkown
page readonly
7FF5575E0000
unkown
page readonly
1117000
unclassified section
page execute and read and write
A858000
unkown
page read and write
2E42000
heap
page read and write
8DAD000
unkown
page read and write
904C000
unkown
page read and write
84DC000
stack
page read and write
4785000
unkown
page read and write
C1E9000
unkown
page read and write
7178000
unkown
page read and write
4800000
unkown
page read and write
222A000
trusted library allocation
page execute and read and write
9052000
unkown
page read and write
9F8F000
stack
page read and write
88A0000
unkown
page read and write
7FF557174000
unkown
page readonly
7E05000
stack
page read and write
7FF5575E3000
unkown
page readonly
8B21000
unkown
page read and write
995E000
stack
page read and write
95DE000
stack
page read and write
7300000
unkown
page read and write
3440000
unkown
page readonly
B84000
heap
page read and write
C1DD000
unkown
page read and write
7FF557434000
unkown
page readonly
3029000
stack
page read and write
90DB000
unkown
page read and write
51E3000
unkown
page read and write
7FF557429000
unkown
page readonly
C1DF000
unkown
page read and write
10A0000
heap
page read and write
A5D000
trusted library allocation
page execute and read and write
7FF5573B0000
unkown
page readonly
B91000
heap
page read and write
7FF5573B0000
unkown
page readonly
8DAD000
unkown
page read and write
7FF5572C1000
unkown
page readonly
4961000
trusted library allocation
page read and write
902B000
unkown
page read and write
7FF5575FC000
unkown
page readonly
2DB0000
trusted library allocation
page read and write
7FF557285000
unkown
page readonly
88F0000
unkown
page read and write
6D2E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
325F000
unkown
page read and write
7FF5574EF000
unkown
page readonly
7169000
unkown
page read and write
CFE000
heap
page read and write
C31000
unkown
page readonly
C2E4000
unkown
page read and write
C4E2000
unkown
page read and write
8914000
unkown
page read and write
5530000
heap
page read and write
ADAF000
stack
page read and write
7FF5573D5000
unkown
page readonly
7FF556F98000
unkown
page readonly
842F000
stack
page read and write
9052000
unkown
page read and write
7160000
unkown
page read and write
670000
heap
page read and write
25FE000
unkown
page read and write
4F30000
heap
page read and write
8EC5000
unkown
page read and write
4A30000
trusted library allocation
page execute and read and write
A85A000
unkown
page read and write
79B0000
unkown
page read and write
9E0F000
stack
page read and write
8D68000
unkown
page read and write
4A20000
trusted library allocation
page read and write
C04F000
unkown
page read and write
7FF556F31000
unkown
page readonly
1A2F000
unclassified section
page execute and read and write
10452000
unkown
page read and write
B84000
heap
page read and write
7FF5573F3000
unkown
page readonly
7FF55732D000
unkown
page readonly
7DF468971000
unkown
page execute read
780000
trusted library allocation
page read and write
88E1000
unkown
page read and write
7C70000
unkown
page readonly
4830000
unkown
page read and write
7FF5572B4000
unkown
page readonly
79A0000
unkown
page read and write
9005000
unkown
page read and write
C1DD000
unkown
page read and write
8EB8000
unkown
page read and write
717A000
unkown
page read and write
7FF55751D000
unkown
page readonly
9E0F000
stack
page read and write
8F83000
unkown
page read and write
7FF557493000
unkown
page readonly
900000
unkown
page readonly
43A000
stack
page read and write
981E000
stack
page read and write
32D3000
unkown
page read and write
C40B000
unkown
page read and write
660000
heap
page read and write
4EC0000
trusted library allocation
page execute and read and write
4980000
trusted library allocation
page read and write
7FF55741C000
unkown
page readonly
C2D3000
unkown
page read and write
88D0000
unkown
page read and write
A0B9000
unkown
page read and write
7FF55703F000
unkown
page readonly
7803000
unkown
page read and write
A231000
unkown
page read and write
8EF5000
unkown
page read and write
A0FC000
unkown
page read and write
C3F7000
unkown
page read and write
49B0000
heap
page read and write
A0DA000
unkown
page read and write
A215000
unkown
page read and write
115F0000
system
page execute and read and write
6C80000
trusted library section
page read and write
C20000
unkown
page read and write
BDB000
stack
page read and write
BBD0000
unkown
page readonly
7FF556F84000
unkown
page readonly
32D3000
unkown
page read and write
7FF556E8D000
unkown
page readonly
7FF557420000
unkown
page readonly
C328000
unkown
page read and write
7FF557062000
unkown
page readonly
7C60000
unkown
page readonly
88F2000
unkown
page read and write
2E42000
heap
page read and write
7FF5570BB000
unkown
page readonly
D1D000
heap
page read and write
5A70000
trusted library allocation
page read and write
C20000
unkown
page read and write
3249000
unkown
page read and write
4718000
unkown
page read and write
7FF557627000
unkown
page readonly
9821000
trusted library allocation
page read and write
BC00000
unkown
page readonly
7FF557571000
unkown
page readonly
7D8E000
stack
page read and write
7FF5575D0000
unkown
page readonly
7FF556FFB000
unkown
page readonly
913F000
unkown
page read and write
2E0A000
stack
page read and write
A53000
trusted library allocation
page execute and read and write
72C3000
unkown
page read and write
7FF5573C1000
unkown
page readonly
E2A0000
heap
page read and write
7FF557467000
unkown
page readonly
7FF55703C000
unkown
page readonly
330A000
unkown
page read and write
A225000
unkown
page read and write
BFD0000
unkown
page read and write
864F000
stack
page read and write
7FF556A1B000
unkown
page readonly
1060000
unkown
page read and write
7DF468971000
unkown
page execute read
7306000
unkown
page read and write
C3E7000
unkown
page read and write
23DE000
stack
page read and write
32E6000
unkown
page read and write
7FF557411000
unkown
page readonly
732E000
unkown
page read and write
7FF557113000
unkown
page readonly
A87F000
unkown
page read and write
477D000
unkown
page read and write
F472000
heap
page read and write
C54D000
unkown
page read and write
7FF55710F000
unkown
page readonly
44FC000
stack
page read and write
C43B000
unkown
page read and write
2F41000
trusted library allocation
page execute and read and write
90F2000
unkown
page read and write
C3AE000
unkown
page read and write
D14000
heap
page read and write
E7BB000
stack
page read and write
913F000
unkown
page read and write
8D6A000
unkown
page read and write
A215000
unkown
page read and write
2D0B000
stack
page read and write
7FF557037000
unkown
page readonly
BF3F000
stack
page read and write
842F000
stack
page read and write
9050000
unkown
page read and write
10493000
unkown
page read and write
BBC0000
unkown
page read and write
B80000
heap
page read and write
7FF557501000
unkown
page readonly
7FF55726C000
unkown
page readonly
3209000
direct allocation
page execute and read and write
6E2E000
stack
page read and write
263E000
stack
page read and write
580000
heap
page read and write
910F000
unkown
page read and write
7A4B000
stack
page read and write
780000
trusted library allocation
page read and write
8ECE000
unkown
page read and write
1023000
heap
page read and write
716B000
unkown
page read and write
3436000
unclassified section
page read and write
4746000
unkown
page read and write
9F0000
unkown
page readonly
7FF55731B000
unkown
page readonly
BEBF000
stack
page read and write
7DF468981000
unkown
page execute read
FD0000
heap
page read and write
8DFE000
unkown
page read and write
A23B000
unkown
page read and write
A63000
trusted library allocation
page read and write
8ED5000
unkown
page read and write
88E5000
unkown
page read and write
32B9000
unkown
page read and write
7FF557642000
unkown
page readonly
C2E4000
unkown
page read and write
7FF5572B6000
unkown
page readonly
B7AA000
stack
page read and write
A22F000
unkown
page read and write
7FF557387000
unkown
page readonly
146F000
stack
page read and write
9086000
unkown
page read and write
7FF5573A9000
unkown
page readonly
7FF5575A1000
unkown
page readonly
716E000
unkown
page read and write
88FC000
unkown
page read and write
4730000
unkown
page read and write
4BF0000
trusted library allocation
page read and write
7FF556F9E000
unkown
page readonly
8530000
unkown
page readonly
7FF557476000
unkown
page readonly
7FF5573E6000
unkown
page readonly
47C0000
unkown
page read and write
77D0000
unkown
page read and write
7FF5572B6000
unkown
page readonly
7FF556FD2000
unkown
page readonly
780000
trusted library allocation
page read and write
E270000
unkown
page read and write
45FC000
stack
page read and write
A810000
unkown
page read and write
7A80000
unkown
page readonly
8ECE000
unkown
page read and write
73F0000
unkown
page read and write
88ED000
unkown
page read and write
C23A000
unkown
page read and write
88ED000
unkown
page read and write
7FF557106000
unkown
page readonly
E60000
unkown
page readonly
2E42000
heap
page read and write
2226000
trusted library allocation
page execute and read and write
A8DA000
unkown
page read and write
BBE0000
unkown
page readonly
7FF55747D000
unkown
page readonly
7FF556FE3000
unkown
page readonly
7FF556FE3000
unkown
page readonly
7FF55753D000
unkown
page readonly
6B0E000
stack
page read and write
F8E000
stack
page read and write
472C000
unkown
page read and write
C4A3000
unkown
page read and write
7FF557099000
unkown
page readonly
77B0000
unkown
page read and write
4769000
unkown
page read and write
9050000
unkown
page read and write
C18A000
unkown
page read and write
89C0000
unkown
page read and write
C063000
unkown
page read and write
B84000
heap
page read and write
7FF55747D000
unkown
page readonly
B72B000
stack
page read and write
E23A000
stack
page read and write
7FF557571000
unkown
page readonly
2FE1000
trusted library allocation
page execute and read and write
2290000
heap
page execute and read and write
7FF5572AC000
unkown
page readonly
C90000
heap
page read and write
7FF55714D000
unkown
page readonly
47C6000
unkown
page read and write
780000
trusted library allocation
page read and write
7C00000
unkown
page readonly
8DFE000
unkown
page read and write
7FF55714A000
unkown
page readonly
362F000
unclassified section
page read and write
7DF468980000
unkown
page readonly
C18A000
unkown
page read and write
C3F7000
unkown
page read and write
A22F000
unkown
page read and write
C22F000
unkown
page read and write
8F4D000
unkown
page read and write
780000
trusted library allocation
page read and write
A8DA000
unkown
page read and write
90CF000
unkown
page read and write
7FF557103000
unkown
page readonly
73C8F000
unkown
page readonly
32C4000
unkown
page read and write
86FD000
stack
page read and write
A1F000
stack
page read and write
A222000
unkown
page read and write
46F0000
unkown
page read and write
7FF546F2F000
unkown
page readonly
C0FB000
unkown
page read and write
7BE000
stack
page read and write
7FF557579000
unkown
page readonly
7FF5573FF000
unkown
page readonly
A215000
unkown
page read and write
83A0000
unkown
page readonly
8F4D000
unkown
page read and write
7FF55748F000
unkown
page readonly
3422000
direct allocation
page execute and read and write
8D76000
unkown
page read and write
C90000
trusted library allocation
page read and write
7D8E000
stack
page read and write
C1E9000
unkown
page read and write
B84000
heap
page read and write
7FF5570BB000
unkown
page readonly
77F0000
unkown
page read and write
7FF557103000
unkown
page readonly
B4A6000
stack
page read and write
8D72000
unkown
page read and write
780000
trusted library allocation
page read and write
7FF55714F000
unkown
page readonly
7FF55742B000
unkown
page readonly
B628000
stack
page read and write
495E000
trusted library allocation
page read and write
7FF5570CA000
unkown
page readonly
A89A000
unkown
page read and write
3230000
unkown
page read and write
73C5000
stack
page read and write
961B000
stack
page read and write
9004000
unkown
page read and write
9F0E000
stack
page read and write
C1DF000
unkown
page read and write
C12D000
unkown
page read and write
2E48000
heap
page read and write
FE0000
heap
page read and write
A280000
unkown
page read and write
C091000
unkown
page read and write
104DB000
unkown
page read and write
32E3000
unkown
page read and write
7FF55708D000
unkown
page readonly
780000
trusted library allocation
page read and write
32B9000
unkown
page read and write
7FF557617000
unkown
page readonly
72FE000
unkown
page read and write
2421000
trusted library allocation
page read and write
8EB8000
unkown
page read and write
7FF557549000
unkown
page readonly
32C7000
unkown
page read and write
8B21000
unkown
page read and write
4810000
unkown
page read and write
32F3000
unkown
page read and write
B5AE000
stack
page read and write
8850000
unkown
page read and write
7FF55763D000
unkown
page readonly
7DF468990000
unkown
page readonly
7E10000
unkown
page read and write
680000
heap
page read and write
32C9000
unkown
page read and write
7FF5573EA000
unkown
page readonly
F6C000
stack
page read and write
330A000
unkown
page read and write
B84000
heap
page read and write
8D80000
unkown
page read and write
7FF556FC4000
unkown
page readonly
7FF5573D8000
unkown
page readonly
C12D000
unkown
page read and write
32D7000
unkown
page read and write
BC00000
unkown
page readonly
7FF557280000
unkown
page readonly
C1DB000
unkown
page read and write
7FF5573BB000
unkown
page readonly
C474000
unkown
page read and write
C5A5000
unkown
page read and write
7FF55741A000
unkown
page readonly
7FF556E75000
unkown
page readonly
2F30000
trusted library allocation
page execute and read and write
B84000
heap
page read and write
4C50000
heap
page execute and read and write
E40B000
unkown
page read and write
7276000
unkown
page read and write
9052000
unkown
page read and write
4746000
unkown
page read and write
AD10000
unkown
page readonly
46F6000
unkown
page read and write
7FF557083000
unkown
page readonly
B010000
unkown
page readonly
780000
trusted library allocation
page read and write
4840000
unkown
page read and write
C233000
unkown
page read and write
8EB8000
unkown
page read and write
7FF55751D000
unkown
page readonly
C3ED000
unkown
page read and write
2C8E000
stack
page read and write
7FF5575BD000
unkown
page readonly
2232000
trusted library allocation
page read and write
7FF5574EF000
unkown
page readonly
7FF55724C000
unkown
page readonly
8FE0000
unkown
page read and write
7FF55732D000
unkown
page readonly
496D000
trusted library allocation
page read and write
A225000
unkown
page read and write
7FF557083000
unkown
page readonly
32DB000
unkown
page read and write
1020000
heap
page read and write
715C000
unkown
page read and write
C2E4000
unkown
page read and write
4966000
trusted library allocation
page read and write
C3E7000
unkown
page read and write
7FF557352000
unkown
page readonly
2F09000
stack
page read and write
7FF5575BF000
unkown
page readonly
780000
trusted library allocation
page read and write
7FF5575C5000
unkown
page readonly
73C8D000
unkown
page read and write
B6AA000
stack
page read and write
7FF556F26000
unkown
page readonly
8EC5000
unkown
page read and write
3450000
unkown
page read and write
7FF55741C000
unkown
page readonly
51F9000
unkown
page read and write
10469000
unkown
page read and write
5161000
unkown
page read and write
88EE000
unkown
page read and write
7FF556F9E000
unkown
page readonly
A873000
unkown
page read and write
91D9000
stack
page read and write
8820000
unkown
page readonly
A77000
heap
page read and write
2E42000
heap
page read and write
10590000
unkown
page execute and read and write
73C71000
unkown
page execute read
10493000
unkown
page read and write
C2D3000
unkown
page read and write
C244000
unkown
page read and write
7A60000
unkown
page readonly
B84000
heap
page read and write
7FF5574C6000
unkown
page readonly
8EB8000
unkown
page read and write
B84000
heap
page read and write
B010000
unkown
page readonly
B84000
heap
page read and write
7FF55756D000
unkown
page readonly
47EE000
unkown
page read and write
BFB9000
stack
page read and write
3350000
unkown
page readonly
104DB000
unkown
page read and write
7FF557099000
unkown
page readonly
C04F000
unkown
page read and write
267C000
heap
page read and write
7FF546F35000
unkown
page readonly
32E6000
unkown
page read and write
9050000
unkown
page read and write
C6D000
heap
page read and write
7FF5571E6000
unkown
page readonly
D40000
system
page execute and read and write
7300000
unkown
page read and write
7FF5574BD000
unkown
page readonly
10A0000
heap
page read and write
7FF5575BD000
unkown
page readonly
C22B000
unkown
page read and write
7FF557669000
unkown
page readonly
B84000
heap
page read and write
FBF000
unclassified section
page execute and read and write
7E05000
stack
page read and write
902C000
unkown
page read and write
2260000
heap
page read and write
BBC0000
unkown
page read and write
7FF55745B000
unkown
page readonly
716E000
unkown
page read and write
8FDF000
unkown
page read and write
7FF55748F000
unkown
page readonly
32C7000
unkown
page read and write
FD0000
unkown
page readonly
7FF556A1B000
unkown
page readonly
2DB0000
trusted library allocation
page read and write
100000
unkown
page readonly
8F27000
unkown
page read and write
9050000
unkown
page read and write
717C000
unkown
page read and write
C214000
unkown
page read and write
32D3000
unkown
page read and write
7FF556FFF000
unkown
page readonly
25B0000
heap
page read and write
3220000
unkown
page readonly
8593000
unkown
page read and write
7FF5575FC000
unkown
page readonly
266F000
trusted library allocation
page read and write
C3ED000
unkown
page read and write
AEE7000
stack
page read and write
7FF55730C000
unkown
page readonly
B90000
heap
page read and write
A89A000
unkown
page read and write
8EDD000
unkown
page read and write
7FF5574C6000
unkown
page readonly
C59000
heap
page read and write
A114000
unkown
page read and write
A15C000
unkown
page read and write
2E37000
heap
page read and write
256D000
stack
page read and write
B84000
heap
page read and write
7FF5574F4000
unkown
page readonly
4990000
trusted library allocation
page read and write
C22F000
unkown
page read and write
E290000
unkown
page read and write
7FF557456000
unkown
page readonly
7FF5574F1000
unkown
page readonly
7FF5575D5000
unkown
page readonly
A23B000
unkown
page read and write
7FF557037000
unkown
page readonly
7FF5570D6000
unkown
page readonly
9F0000
unkown
page readonly
4F40000
trusted library allocation
page execute and read and write
718B000
unkown
page read and write
2C8E000
stack
page read and write
B84000
heap
page read and write
32F3000
unkown
page read and write
477D000
unkown
page read and write
76B0000
unkown
page read and write
9052000
unkown
page read and write
7FF5575C5000
unkown
page readonly
2250000
trusted library allocation
page read and write
F4E000
stack
page read and write
33B1000
direct allocation
page execute and read and write
C244000
unkown
page read and write
10E1F000
system
page read and write
A0A8000
unkown
page read and write
1110000
unclassified section
page execute and read and write
72C3000
unkown
page read and write
C10B000
unkown
page read and write
7FF557493000
unkown
page readonly
C3AE000
unkown
page read and write
AD10000
unkown
page readonly
7FF5575BB000
unkown
page readonly
7FF556E98000
unkown
page readonly
7D0E000
stack
page read and write
F47A000
heap
page read and write
69C000
stack
page read and write
780000
trusted library allocation
page read and write
7FF5573DE000
unkown
page readonly
C1DD000
unkown
page read and write
C18A000
unkown
page read and write
7FF557042000
unkown
page readonly
7160000
unkown
page read and write
7FF556E85000
unkown
page readonly
971E000
stack
page read and write
7FF55742B000
unkown
page readonly
7FF557487000
unkown
page readonly
7FF557280000
unkown
page readonly
C214000
unkown
page read and write
C06D000
unkown
page read and write
2D8A000
stack
page read and write
902C000
unkown
page read and write
BBBB000
stack
page read and write
7FF556E75000
unkown
page readonly
7FF5574F9000
unkown
page readonly
77B0000
unkown
page read and write
A87B000
unkown
page read and write
88B0000
unkown
page read and write
7FF55752A000
unkown
page readonly
1170000
heap
page read and write
7FF557293000
unkown
page readonly
7FF557416000
unkown
page readonly
72FE000
unkown
page read and write
C328000
unkown
page read and write
7FF557387000
unkown
page readonly
913F000
unkown
page read and write
7FF557210000
unkown
page readonly
E280000
unkown
page read and write
902C000
unkown
page read and write
4F35000
heap
page read and write
7FF557535000
unkown
page readonly
C74000
heap
page read and write
88E1000
unkown
page read and write
AEE7000
stack
page read and write
C233000
unkown
page read and write
7FF557463000
unkown
page readonly
F470000
heap
page read and write
BBBB000
stack
page read and write
C091000
unkown
page read and write
A85A000
unkown
page read and write
9021000
unkown
page read and write
C10B000
unkown
page read and write
949E000
stack
page read and write
C50000
heap
page read and write
7909000
stack
page read and write
A6D000
trusted library allocation
page execute and read and write
A156000
unkown
page read and write
7A80000
unkown
page readonly
C374000
unkown
page read and write
7176000
unkown
page read and write
7FF5575B1000
unkown
page readonly
904C000
unkown
page read and write
C59000
heap
page read and write
7FF556E6C000
unkown
page readonly
B040000
unkown
page readonly
4734000
unkown
page read and write
B84000
heap
page read and write
4C60000
trusted library section
page readonly
A222000
unkown
page read and write
B050000
unkown
page read and write
7FF55760F000
unkown
page readonly
10A5000
heap
page read and write
7FF557113000
unkown
page readonly
7FF5573DE000
unkown
page readonly
189D000
direct allocation
page execute and read and write
8D70000
unkown
page read and write
C04B000
unkown
page read and write
BC10000
unkown
page read and write
32C7000
unkown
page read and write
4428000
trusted library allocation
page read and write
C2D3000
unkown
page read and write
A0BD000
unkown
page read and write
319C000
stack
page read and write
7FF5571E2000
unkown
page readonly
7FF5575B9000
unkown
page readonly
9259000
stack
page read and write
8914000
unkown
page read and write
83A0000
unkown
page readonly
A08D000
stack
page read and write
7FF55733B000
unkown
page readonly
7FF5569FA000
unkown
page readonly
B84000
heap
page read and write
32E6000
unkown
page read and write
7FF556FD2000
unkown
page readonly
C072000
unkown
page read and write
7FF55704A000
unkown
page readonly
C123000
unkown
page read and write
7314000
unkown
page read and write
1178000
heap
page read and write
46E0000
unkown
page read and write
3260000
unkown
page read and write
7FF556E36000
unkown
page readonly
C22B000
unkown
page read and write
8810000
unkown
page readonly
7FF557328000
unkown
page readonly
A154000
unkown
page read and write
47DB000
unkown
page read and write
7FF557382000
unkown
page readonly
C18A000
unkown
page read and write
C474000
unkown
page read and write
E370000
unkown
page read and write
7FF557095000
unkown
page readonly
AF6E000
stack
page read and write
4732000
unkown
page read and write
B1A0000
unkown
page read and write
2DB0000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
10A5000
heap
page read and write
10554000
unkown
page read and write
7A50000
unkown
page readonly
90DB000
unkown
page read and write
732B000
unkown
page read and write
B84000
heap
page read and write
7FF55720D000
unkown
page readonly
7FF5573E2000
unkown
page readonly
7FF55728F000
unkown
page readonly
7FF55722A000
unkown
page readonly
7FF556FF3000
unkown
page readonly
1023000
heap
page read and write
7FF556FF3000
unkown
page readonly
7FF5570C5000
unkown
page readonly
9F8F000
stack
page read and write
7FF557531000
unkown
page readonly
716B000
unkown
page read and write
2410000
heap
page read and write
2220000
trusted library allocation
page read and write
90F2000
unkown
page read and write
8F09000
unkown
page read and write
7FF557411000
unkown
page readonly
720000
heap
page read and write
2E30000
heap
page read and write
A286000
unkown
page read and write
1DD000
stack
page read and write
7FF557328000
unkown
page readonly
C3F7000
unkown
page read and write
C74000
heap
page read and write
9086000
unkown
page read and write
3029000
stack
page read and write
C3B3000
unkown
page read and write
C592000
unkown
page read and write
CB4000
heap
page read and write
7FF556E7B000
unkown
page readonly
1193000
heap
page read and write
10C26000
system
page read and write
9086000
unkown
page read and write
8D68000
unkown
page read and write
A23B000
unkown
page read and write
7FF5570F7000
unkown
page readonly
90F2000
unkown
page read and write
116A7000
system
page execute and read and write
4F20000
trusted library allocation
page read and write
D00000
heap
page read and write
C3AE000
unkown
page read and write
7C60000
unkown
page readonly
7FF55722A000
unkown
page readonly
E270000
unkown
page read and write
7FF5574B9000
unkown
page readonly
9310000
trusted library allocation
page read and write
4944000
trusted library allocation
page read and write
C244000
unkown
page read and write
10B0000
unkown
page readonly
8ED5000
unkown
page read and write
77C0000
unkown
page read and write
A286000
unkown
page read and write
B84000
heap
page read and write
47C6000
unkown
page read and write
88FC000
unkown
page read and write
7FF557642000
unkown
page readonly
D1D000
heap
page read and write
7FF5575E0000
unkown
page readonly
B42F000
stack
page read and write
7FF5571DF000
unkown
page readonly
A231000
unkown
page read and write
F470000
heap
page read and write
104D6000
unkown
page read and write
C00000
heap
page read and write
7FF5575E3000
unkown
page readonly
9D8E000
stack
page read and write
326A000
unkown
page read and write
32C4000
unkown
page read and write
C214000
unkown
page read and write
7FF557148000
unkown
page readonly
2E37000
heap
page read and write
770000
heap
page read and write
780000
trusted library allocation
page read and write
8F09000
unkown
page read and write
C22B000
unkown
page read and write
A218000
unkown
page read and write
9580000
unkown
page readonly
C233000
unkown
page read and write
7FF557235000
unkown
page readonly
8F74000
unkown
page read and write
32C7000
unkown
page read and write
8C59000
stack
page read and write
A129000
unkown
page read and write
9013000
unkown
page read and write
10660000
unkown
page execute and read and write
7FF55726A000
unkown
page readonly
7FF5572A4000
unkown
page readonly
780000
trusted library allocation
page read and write
2F05000
stack
page read and write
5A60000
trusted library allocation
page read and write
7FD000
heap
page read and write
ADAF000
stack
page read and write
C56F000
unkown
page read and write
7FF557568000
unkown
page readonly
C3A8000
unkown
page read and write
7FF55707D000
unkown
page readonly
7FF5570D4000
unkown
page readonly
2D0B000
stack
page read and write
B84000
heap
page read and write
C1E9000
unkown
page read and write
4970000
trusted library allocation
page read and write
7B99000
stack
page read and write
7DF4689B1000
unkown
page execute read
8F27000
unkown
page read and write
7FF5571A1000
unkown
page readonly
7FF55726C000
unkown
page readonly
B7AA000
stack
page read and write
7FF5575EA000
unkown
page readonly
32D7000
unkown
page read and write
685000
heap
page read and write
71A4000
unkown
page read and write
E30000
heap
page read and write
C40B000
unkown
page read and write
1069F000
unkown
page execute and read and write
780000
trusted library allocation
page read and write
There are 1630 hidden memdumps, click here to show them.