IOC Report
SecuriteInfo.com.Win32.RATX-gen.11894.20893.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.RATX-gen.11894.20893.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.RATX-gen.11894.20893.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp89CA.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\KfYvtUBOq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\KfYvtUBOq.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KfYvtUBOq.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2m55bhzl.3io.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hsaurdy.f4g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfqqjebp.dkc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmwoz1io.f1e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9563.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.11894.20893.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.11894.20893.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KfYvtUBOq.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KfYvtUBOq" /XML "C:\Users\user\AppData\Local\Temp\tmp89CA.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\KfYvtUBOq.exe
C:\Users\user\AppData\Roaming\KfYvtUBOq.exe
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KfYvtUBOq" /XML "C:\Users\user\AppData\Local\Temp\tmp9563.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\SysWOW64\rundll32.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\SysWOW64\rundll32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\autoconv.exe
"C:\Windows\SysWOW64\autoconv.exe"
C:\Windows\SysWOW64\autochk.exe
"C:\Windows\SysWOW64\autochk.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
www.dunia188j.store/gy15/
malicious
http://www.carmen-asa.com/gy15/?RzuTsp=ojuzNIgvg1BwHmAcToIecm58HYsz0PWD/adWnxcLSOv/0CtFh7ct+QMG65Nx8hG2JCp7w1BwJA==&hL08qP=ojn0sl
157.53.227.1
malicious
http://www.dandevonald.com/gy15/?RzuTsp=Y/N4KrVAXY1kocpgzu8WnG77ol+AHv4xLUA59fG9L70w7yqxHWlTkc1yvlLlDHtztMKBj2yhyA==&hL08qP=ojn0sl
172.67.134.182
malicious
http://www.99812.photos/gy15/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
unknown
http://www.286live.com
unknown
http://www.dandevonald.com
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.20allhen.onlineReferer:
unknown
https://word.office.comM
unknown
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
unknown
http://www.dunia188j.store/gy15/www.midsouthhealthcare.com
unknown
http://www.tqqft8l5.xyz/gy15/
unknown
https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
unknown
http://www.rs-alohafactorysaleuua.shop/gy15/www.tqqft8l5.xyz
unknown
http://www.rs-alohafactorysaleuua.shop/gy15/?RzuTsp=XHNRiWOL6AKBRIWnLgJD49myVGc8KkvpE41aN949WbE5iIv/qrJ/+jvCIwl+PYhctV8eVI3XMQ==&hL08qP=ojn0sl
3.33.130.190
http://www.286live.com/gy15/
unknown
http://www.99812.photosReferer:
unknown
http://www.jwoalhbn.xyz
unknown
http://www.99812.photos
unknown
http://www.ttyijlaw.com/gy15/
unknown
https://wns.windows.com/e
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.insurancebygarry.com/gy15/
unknown
http://www.286live.comReferer:
unknown
http://www.autoitscript.com/autoit3/J
unknown
http://www.vivehogar.net/gy15/www.insurancebygarry.com
unknown
http://www.carmen-asa.com/gy15/
unknown
http://www.rs-alohafactorysaleuua.shop/gy15/
unknown
http://www.incrediblyxb.christmas/gy15/
unknown
http://www.tqqft8l5.xyzReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.20allhen.online/gy15/
unknown
http://www.midsouthhealthcare.comReferer:
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
unknown
http://www.dunia188j.store
unknown
http://www.jwoalhbn.xyz/gy15/
unknown
http://www.ttyijlaw.com
unknown
http://www.incrediblyxb.christmas/:80gy15?RzuTsp=0BfZhhXj03xBTAibP1YuAxS
unknown
https://android.notify.windows.com/iOS
unknown
https://outlook.come
unknown
http://www.dandevonald.comReferer:
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
http://www.insurancebygarry.com
unknown
http://www.oiupa.xyz
unknown
https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
unknown
https://api.msn.com/v1/news/Feed/Windows?
unknown
https://api.msn.com/I
unknown
http://www.dunia188j.store/gy15/
unknown
http://www.99812.photos/gy15/www.20allhen.online
unknown
http://www.vivehogar.net/gy15/
unknown
http://www.incrediblyxb.christmasReferer:
unknown
http://www.dandevonald.com/gy15/
unknown
http://www.insurancebygarry.com/gy15/www.mariaslakedistrict.com
unknown
http://www.insurancebygarry.comReferer:
unknown
http://www.midsouthhealthcare.com/gy15/
unknown
http://schemas.micro
unknown
http://www.jwoalhbn.xyz/gy15/www.99812.photos
unknown
http://www.mariaslakedistrict.comReferer:
unknown
http://www.tqqft8l5.xyz
unknown
http://www.dandevonald.com/gy15/www.carmen-asa.com
unknown
http://www.vivehogar.netReferer:
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.tqqft8l5.xyz/gy15/www.jwoalhbn.xyz
unknown
http://www.286live.com/gy15/www.vivehogar.net
unknown
http://www.rs-alohafactorysaleuua.shopReferer:
unknown
http://www.oiupa.xyzReferer:
unknown
https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
unknown
https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
unknown
http://www.midsouthhealthcare.com
unknown
http://www.carmen-asa.com
unknown
http://www.vivehogar.net
unknown
http://www.ttyijlaw.comReferer:
unknown
http://www.incrediblyxb.christmas/gy15/www.dunia188j.store
unknown
http://www.rs-alohafactorysaleuua.shop
unknown
http://www.carmen-asa.comReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
unknown
https://excel.office.com-
unknown
http://www.dunia188j.storeReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
http://www.incrediblyxb.christmas
unknown
http://www.mariaslakedistrict.com/gy15/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
unknown
https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
unknown
http://www.jwoalhbn.xyzReferer:
unknown
http://www.midsouthhealthcare.com/gy15/www.286live.com
unknown
https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
unknown
https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
unknown
http://www.oiupa.xyz/gy15/
unknown
https://powerpoint.office.comEMd
unknown
http://www.ttyijlaw.com/gy15/www.incrediblyxb.christmas
unknown
https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
unknown
https://api.msn.com/
unknown
http://www.20allhen.online
unknown
http://www.carmen-asa.com/gy15/www.rs-alohafactorysaleuua.shop
unknown
http://www.20allhen.online/gy15/www.ttyijlaw.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.dandevonald.com
172.67.134.182
malicious
286live.com
206.233.130.31
malicious
www.carmen-asa.com
157.53.227.1
malicious
rs-alohafactorysaleuua.shop
3.33.130.190
malicious
www.dunia188j.store
unknown
malicious
www.tqqft8l5.xyz
unknown
malicious
www.jwoalhbn.xyz
unknown
malicious
www.99812.photos
unknown
malicious
www.rs-alohafactorysaleuua.shop
unknown
malicious
www.286live.com
unknown
malicious
www.ttyijlaw.com
unknown
malicious
www.midsouthhealthcare.com
3.64.163.50
gtml.huksa.huhusddfnsuegcdn.com
194.41.37.230
www.incrediblyxb.christmas
167.172.226.170
www.20allhen.online
103.224.182.210
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.134.182
www.dandevonald.com
United States
malicious
157.53.227.1
www.carmen-asa.com
United States
malicious
3.33.130.190
rs-alohafactorysaleuua.shop
United States
malicious

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Unpacker
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
@explorerframe.dll,-13137
malicious
unknown
@explorerframe.dll,-13138
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
Paint.Picture
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
Outlook.File.msg.15
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 176 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3E08000
trusted library allocation
page read and write
malicious
3D79000
trusted library allocation
page read and write
malicious
2990000
system
page execute and read and write
malicious
49D0000
trusted library allocation
page read and write
malicious
49A0000
unclassified section
page execute and read and write
malicious
2B50000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12BE000
stack
page read and write
7FF5DF08F000
unkown
page readonly
2CE0000
trusted library allocation
page read and write
97C4000
unkown
page read and write
E80000
unkown
page read and write
7FF5DF5F6000
unkown
page readonly
12F0000
heap
page read and write
7FF5DF0A2000
unkown
page readonly
7DF4E6770000
unkown
page readonly
C439000
unkown
page read and write
A104000
unkown
page read and write
7FF5DF091000
unkown
page readonly
ED3A000
heap
page read and write
2980000
heap
page read and write
1250000
trusted library allocation
page read and write
7FF5DF18E000
unkown
page readonly
7FF5DF5B5000
unkown
page readonly
ED75000
unkown
page read and write
7FF5DF429000
unkown
page readonly
2E10000
trusted library allocation
page read and write
7FF5DF191000
unkown
page readonly
9D9F000
stack
page read and write
7FF5DF045000
unkown
page readonly
ED71000
unkown
page read and write
FA3000
heap
page read and write
A0FC000
unkown
page read and write
F75000
heap
page read and write
AEA000
stack
page read and write
7FF5DF53F000
unkown
page readonly
7910000
unkown
page readonly
C1CC000
unkown
page read and write
7810000
unkown
page read and write
1076000
heap
page read and write
D60000
heap
page read and write
9F7C000
unkown
page read and write
7FF5DF081000
unkown
page readonly
2890000
unkown
page readonly
A3BE000
stack
page read and write
C183000
unkown
page read and write
7991000
unkown
page read and write
4CBE000
direct allocation
page execute and read and write
9B1E000
stack
page read and write
965A000
trusted library allocation
page read and write
FB3000
heap
page read and write
5650000
heap
page read and write
7FF5DF038000
unkown
page readonly
962B000
unkown
page read and write
7DF4E6780000
unkown
page readonly
973C000
unkown
page read and write
2E10000
trusted library allocation
page read and write
B120000
unkown
page readonly
D50000
unkown
page read and write
A4FE000
stack
page read and write
7FF5DF0F6000
unkown
page readonly
9D1B000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
7FF5DF50F000
unkown
page readonly
7FF5DF443000
unkown
page readonly
47A2000
unkown
page read and write
99AB000
unkown
page read and write
7FF5DF435000
unkown
page readonly
3D59000
trusted library allocation
page read and write
52D9000
unkown
page read and write
B120000
unkown
page readonly
96ED000
unkown
page read and write
291C000
stack
page read and write
C3A8000
unkown
page read and write
4820000
trusted library allocation
page read and write
ED40000
unkown
page read and write
2D90000
heap
page execute and read and write
FBE000
stack
page read and write
1223000
direct allocation
page execute and read and write
E0F000
heap
page read and write
7FF5DF349000
unkown
page readonly
7FF5DE535000
unkown
page readonly
C19D000
unkown
page read and write
2E10000
trusted library allocation
page read and write
1056000
unclassified section
page execute and read and write
BFA7000
unkown
page read and write
7FF5DF49C000
unkown
page readonly
7FF5DF0A5000
unkown
page readonly
9E9E000
stack
page read and write
8C00000
heap
page read and write
7FF5DF58A000
unkown
page readonly
C1C4000
unkown
page read and write
7FF5DF24E000
unkown
page readonly
47C1000
heap
page read and write
1030000
trusted library allocation
page read and write
AFA000
stack
page read and write
901B000
stack
page read and write
A02D000
unkown
page read and write
51F6000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
ECD000
trusted library allocation
page execute and read and write
13A0000
unkown
page readonly
7230000
unkown
page read and write
7FF5DF361000
unkown
page readonly
A6EE000
unkown
page read and write
A09A000
unkown
page read and write
BF9B000
unkown
page read and write
7FF5DF4AB000
unkown
page readonly
C474000
unkown
page read and write
73D0000
trusted library allocation
page execute and read and write
7FF5DF41B000
unkown
page readonly
1084000
heap
page read and write
987C000
unkown
page read and write
B9BF000
stack
page read and write
7D90000
unkown
page read and write
7FF5DEFC2000
unkown
page readonly
EA0000
heap
page read and write
7DF4E6780000
unkown
page readonly
7FF5DF20A000
unkown
page readonly
7ACE000
stack
page read and write
7FF5DF5B0000
unkown
page readonly
7FF5DF488000
unkown
page readonly
83D0000
unkown
page read and write
C23D000
unkown
page read and write
FE4B000
unkown
page read and write
C354000
unkown
page read and write
EC4000
trusted library allocation
page read and write
AEEE000
stack
page read and write
7FF5DF2ED000
unkown
page readonly
9C9D000
stack
page read and write
7FF5DF248000
unkown
page readonly
2BE4000
heap
page read and write
98A7000
unkown
page read and write
7FF5DF341000
unkown
page readonly
2EC0000
unkown
page readonly
73B4000
unkown
page read and write
7ACE000
stack
page read and write
2F10000
unkown
page read and write
77F0000
unkown
page read and write
D60000
heap
page read and write
34C0000
unkown
page read and write
7FF5DF26F000
unkown
page readonly
5210000
trusted library allocation
page read and write
6F6E000
heap
page read and write
7FF5DF201000
unkown
page readonly
2F3C000
heap
page read and write
78E000
stack
page read and write
C048000
unkown
page read and write
7DF5E895F000
unkown
page readonly
9E1E000
stack
page read and write
848E000
stack
page read and write
4AA7000
heap
page read and write
7FF5DF3C2000
unkown
page readonly
FD84000
unkown
page read and write
C50D000
unkown
page read and write
7399000
unkown
page read and write
B4DB000
stack
page read and write
F9F000
stack
page read and write
7940000
unkown
page readonly
4B40000
trusted library allocation
page read and write
48A1000
heap
page read and write
7FF5DF2E2000
unkown
page readonly
ED7E000
unkown
page read and write
9718000
unkown
page read and write
2CEF000
trusted library allocation
page read and write
9B95000
stack
page read and write
9F60000
unkown
page read and write
2E10000
trusted library allocation
page read and write
3375000
unkown
page read and write
99AB000
unkown
page read and write
73A7000
unkown
page read and write
2E50000
unkown
page readonly
B60A000
stack
page read and write
7D0D000
stack
page read and write
7FF5DF08B000
unkown
page readonly
7FF5DEFE2000
unkown
page readonly
57C0000
heap
page read and write
7FF5DF39C000
unkown
page readonly
7FF5DF392000
unkown
page readonly
99B000
stack
page read and write
3DC9000
trusted library allocation
page read and write
2D40000
heap
page read and write
7FF5DF606000
unkown
page readonly
7FF5DEFCB000
unkown
page readonly
7FF5DF3DF000
unkown
page readonly
B1C0000
unkown
page readonly
7FF5DF081000
unkown
page readonly
7FF5DF3F7000
unkown
page readonly
3304000
unkown
page read and write
BFEF000
unkown
page read and write
7FF5DF55A000
unkown
page readonly
9E0000
unkown
page readonly
A6EA000
unkown
page read and write
73E5000
unkown
page read and write
4F66000
unclassified section
page read and write
2890000
unkown
page readonly
6FBC000
heap
page read and write
7FF5DF478000
unkown
page readonly
7DF4E6791000
unkown
page execute read
7FF5DF4F3000
unkown
page readonly
7FF5DF57F000
unkown
page readonly
1270000
trusted library allocation
page read and write
2E9F000
stack
page read and write
7FF5DF3FC000
unkown
page readonly
7FF5DF0C9000
unkown
page readonly
6F91000
heap
page read and write
104FF000
unkown
page execute and read and write
3185000
stack
page read and write
C1A9000
unkown
page read and write
7FF5DF4F7000
unkown
page readonly
7FF5DF382000
unkown
page readonly
7DF4E6791000
unkown
page execute read
2EB0000
unkown
page readonly
9700000
unkown
page read and write
5230000
trusted library allocation
page read and write
738E000
stack
page read and write
2870000
unkown
page read and write
4820000
trusted library allocation
page read and write
2CDE000
stack
page read and write
5DA0000
trusted library allocation
page read and write
B50000
heap
page read and write
C23D000
unkown
page read and write
70BF000
stack
page read and write
4820000
trusted library allocation
page read and write
7FF5DF2E5000
unkown
page readonly
7FF5DF48B000
unkown
page readonly
98AD000
unkown
page read and write
DA0000
heap
page read and write
7DF4E6760000
unkown
page readonly
4970000
trusted library allocation
page read and write
10BF000
unclassified section
page execute and read and write
2B90000
heap
page read and write
C2E4000
unkown
page read and write
B4DB000
stack
page read and write
BF6D000
unkown
page read and write
E80000
unkown
page read and write
9F27000
unkown
page read and write
B6ED000
stack
page read and write
4090000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
7FF5DF3B9000
unkown
page readonly
7FF5DF47E000
unkown
page readonly
9F10000
unkown
page read and write
4B40000
trusted library allocation
page read and write
EDA3000
unkown
page read and write
124E000
stack
page read and write
BF10000
trusted library allocation
page read and write
335B000
unkown
page read and write
FF5000
heap
page read and write
7FF5DEF57000
unkown
page readonly
4828000
unkown
page read and write
BF9F000
unkown
page read and write
95F0000
unkown
page read and write
7FF5DF0A5000
unkown
page readonly
52C3000
unkown
page read and write
4D8C000
stack
page read and write
C1A9000
unkown
page read and write
2F2A000
heap
page read and write
48A1000
heap
page read and write
FE03000
unkown
page read and write
BF8C000
unkown
page read and write
88E0000
unkown
page read and write
9F92000
unkown
page read and write
A736000
unkown
page read and write
9718000
unkown
page read and write
7800000
unkown
page read and write
C24C000
unkown
page read and write
3107000
stack
page read and write
874C000
stack
page read and write
989F000
unkown
page read and write
48AE000
heap
page read and write
A734000
unkown
page read and write
A02D000
unkown
page read and write
48A0000
unkown
page read and write
28A0000
unkown
page readonly
995E000
stack
page read and write
89C000
stack
page read and write
293D000
stack
page read and write
E22F000
stack
page read and write
83B0000
unkown
page readonly
9C9D000
stack
page read and write
7FF5DF626000
unkown
page readonly
7FF5DE9CB000
unkown
page readonly
47CA000
heap
page read and write
110E000
stack
page read and write
7FF5DF25E000
unkown
page readonly
C183000
unkown
page read and write
A73A000
unkown
page read and write
7FF5DF203000
unkown
page readonly
B09E000
stack
page read and write
3362000
unkown
page read and write
BFAD000
unkown
page read and write
9D1F000
stack
page read and write
7FF5DF341000
unkown
page readonly
FD84000
unkown
page read and write
336F000
unkown
page read and write
5220000
heap
page read and write
7FF5DF0F6000
unkown
page readonly
8A36000
unkown
page read and write
C3EB000
unkown
page read and write
9F74000
unkown
page read and write
B9EE000
stack
page read and write
729000
system
page execute and read and write
2BAC000
heap
page read and write
9F60000
unkown
page read and write
A0A5000
unkown
page read and write
FE8B000
unkown
page read and write
7FF5DF4C6000
unkown
page readonly
9F3E000
unkown
page read and write
2EB0000
unkown
page readonly
C406000
unkown
page read and write
C3ED000
unkown
page read and write
BF10000
unkown
page readonly
B45A000
stack
page read and write
97F3000
unkown
page read and write
7FF5DF3EA000
unkown
page readonly
EF6000
heap
page read and write
1112000
heap
page read and write
73E5000
unkown
page read and write
8C4A000
heap
page read and write
7FF5DF4FB000
unkown
page readonly
4B18000
heap
page read and write
7FF5DF20A000
unkown
page readonly
9409000
stack
page read and write
3DA1000
trusted library allocation
page read and write
7FF5DF488000
unkown
page readonly
7499000
unkown
page read and write
7FF5DF0F1000
unkown
page readonly
98A1000
unkown
page read and write
96ED000
unkown
page read and write
7D89000
stack
page read and write
5800000
trusted library section
page read and write
5230000
trusted library allocation
page read and write
BF7E000
unkown
page read and write
1150000
unclassified section
page execute and read and write
4A5B000
heap
page read and write
4C10000
direct allocation
page execute and read and write
108EF000
system
page read and write
B8EF000
stack
page read and write
27D0000
unkown
page read and write
BEF0000
trusted library allocation
page execute and read and write
7FF5DF623000
unkown
page readonly
77F0000
unkown
page read and write
7415000
unkown
page read and write
7FF5DF310000
unkown
page readonly
7FF5DF2DA000
unkown
page readonly
C298000
unkown
page read and write
7FF5DF424000
unkown
page readonly
34C0000
unkown
page read and write
1023000
trusted library allocation
page execute and read and write
7FF5DF2F3000
unkown
page readonly
AE6F000
stack
page read and write
7FF5DF21C000
unkown
page readonly
C4D0000
unkown
page read and write
790A000
stack
page read and write
6D9E000
heap
page read and write
7FF5DF532000
unkown
page readonly
7FF5DEF06000
unkown
page readonly
2B80000
trusted library allocation
page read and write
11A0000
unkown
page readonly
4B20000
direct allocation
page execute and read and write
72AE000
stack
page read and write
E0AD000
stack
page read and write
7FF5DF1FF000
unkown
page readonly
75C2000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
B09E000
stack
page read and write
9380000
unkown
page readonly
D91000
trusted library allocation
page execute and read and write
7FF5DF567000
unkown
page readonly
C525000
unkown
page read and write
BF9D000
unkown
page read and write
4B40000
trusted library allocation
page read and write
FE99000
unkown
page read and write
4820000
trusted library allocation
page read and write
7FF5DF626000
unkown
page readonly
73A0000
trusted library allocation
page read and write
7FF5DF248000
unkown
page readonly
1339000
direct allocation
page execute and read and write
C192000
unkown
page read and write
7DF4E6770000
unkown
page readonly
A08D000
unkown
page read and write
283D000
stack
page read and write
4828000
unkown
page read and write
B6F0000
heap
page read and write
5DA0000
trusted library allocation
page read and write
335B000
unkown
page read and write
7FF5DF45A000
unkown
page readonly
A690000
unkown
page read and write
ED0000
heap
page read and write
7FF5DEFA6000
unkown
page readonly
AFB000
stack
page read and write
7FF5DF2E5000
unkown
page readonly
73B8000
unkown
page read and write
874C000
stack
page read and write
5DA0000
trusted library allocation
page read and write
C474000
unkown
page read and write
C24C000
unkown
page read and write
5500000
heap
page read and write
C35F000
unkown
page read and write
2E01000
unkown
page read and write
7FF5DF396000
unkown
page readonly
7FF5DF39C000
unkown
page readonly
3373000
unkown
page read and write
1229000
direct allocation
page execute and read and write
E3C3000
system
page execute and read and write
7FF5DEFF5000
unkown
page readonly
7FF5DF12A000
unkown
page readonly
7FF5DF095000
unkown
page readonly
4E9C000
stack
page read and write
7FF5DF3BE000
unkown
page readonly
7FF5DF4BD000
unkown
page readonly
2E76000
heap
page read and write
1053E000
unkown
page execute and read and write
9FA0000
unkown
page read and write
2BE4000
heap
page read and write
7FF5DF55A000
unkown
page readonly
1126000
direct allocation
page execute and read and write
7A40000
unkown
page readonly
73AF000
unkown
page read and write
7FF5DF26F000
unkown
page readonly
32B1000
unkown
page read and write
D80000
trusted library allocation
page execute and read and write
5256000
trusted library allocation
page read and write
98A1000
unkown
page read and write
2F60000
heap
page read and write
73B4000
unkown
page read and write
52C3000
unkown
page read and write
83E0000
unkown
page read and write
97F3000
unkown
page read and write
73C3000
unkown
page read and write
2DBF000
stack
page read and write
7FF5DF49C000
unkown
page readonly
2E10000
trusted library allocation
page read and write
AD2B000
stack
page read and write
987C000
unkown
page read and write
B010000
unkown
page read and write
935D000
stack
page read and write
7FF5DF5AE000
unkown
page readonly
28D0000
heap
page read and write
3F2E000
trusted library allocation
page read and write
7FF5DF0C3000
unkown
page readonly
7FF5DF398000
unkown
page readonly
9714000
unkown
page read and write
2BE0000
heap
page read and write
13A0000
unkown
page readonly
2FD000
stack
page read and write
98A7000
unkown
page read and write
7FF5DF25B000
unkown
page readonly
7FF5DF60D000
unkown
page readonly
8400000
heap
page read and write
2BE4000
heap
page read and write
7FF5DF25E000
unkown
page readonly
2E10000
trusted library allocation
page read and write
C40C000
unkown
page read and write
5206000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
1050000
heap
page read and write
706E000
stack
page read and write
6F50000
heap
page read and write
7FF5DF222000
unkown
page readonly
BF6D000
unkown
page read and write
52F2000
trusted library allocation
page read and write
33C0000
unkown
page readonly
BFC000
heap
page read and write
7DF4E6761000
unkown
page execute read
335B000
unkown
page read and write
7FF5DF382000
unkown
page readonly
3371000
unkown
page read and write
98E0000
unkown
page read and write
A5FE000
stack
page read and write
54F0000
heap
page read and write
7FF5DEF87000
unkown
page readonly
13CD000
direct allocation
page execute and read and write
79E0000
unkown
page readonly
739B000
unkown
page read and write
7FF5DF0C9000
unkown
page readonly
8590000
unkown
page readonly
7FF5DEEEB000
unkown
page readonly
7FF5DF584000
unkown
page readonly
7FF5DF537000
unkown
page readonly
13AE000
direct allocation
page execute and read and write
83E0000
unkown
page read and write
7FF5DF422000
unkown
page readonly
4DAE000
direct allocation
page execute and read and write
BFDF000
unkown
page read and write
C1C4000
unkown
page read and write
838B000
stack
page read and write
7FF5DEF84000
unkown
page readonly
914B000
stack
page read and write
71B0000
trusted library allocation
page read and write
7FF5DF349000
unkown
page readonly
7FF5DF210000
unkown
page readonly
962B000
unkown
page read and write
105A0000
system
page execute and read and write
9F10000
unkown
page read and write
BEF0000
heap
page read and write
9C1D000
stack
page read and write
74F000
unkown
page read and write
B359000
stack
page read and write
7FF5DEFE8000
unkown
page readonly
57F0000
trusted library allocation
page read and write
B010000
unkown
page read and write
2DE6000
trusted library allocation
page read and write
4C4D000
direct allocation
page execute and read and write
83D0000
unkown
page read and write
AC0D000
stack
page read and write
2BE4000
heap
page read and write
7FF5DEF94000
unkown
page readonly
7FF5DEF87000
unkown
page readonly
7FF5DF42F000
unkown
page readonly
7542000
unkown
page read and write
47EC000
unkown
page read and write
BF10000
unkown
page readonly
C458000
unkown
page read and write
ED82000
unkown
page read and write
7FF5DEFF0000
unkown
page readonly
52D0000
heap
page execute and read and write
BFC3000
unkown
page read and write
4788000
unkown
page read and write
9FA0000
unkown
page read and write
7FF5DEFBD000
unkown
page readonly
A757000
unkown
page read and write
104A000
trusted library allocation
page execute and read and write
3362000
unkown
page read and write
BEF0000
heap
page read and write
5420000
heap
page read and write
7B60000
unkown
page readonly
7FF5DF3C2000
unkown
page readonly
566D000
stack
page read and write
111D000
trusted library allocation
page execute and read and write
C424000
unkown
page read and write
7FF5DF5D6000
unkown
page readonly
47F3000
unkown
page read and write
C19D000
unkown
page read and write
8C55000
heap
page read and write
C01A000
unkown
page read and write
C3F0000
unkown
page read and write
562F000
trusted library section
page readonly
C24C000
unkown
page read and write
27F0000
unkown
page readonly
32B4000
unkown
page read and write
9F0000
heap
page read and write
4D3D000
direct allocation
page execute and read and write
2E10000
trusted library allocation
page read and write
97C4000
unkown
page read and write
479B000
unkown
page read and write
564F000
unclassified section
page read and write
7DF4E6771000
unkown
page execute read
970C000
unkown
page read and write
ED7D000
unkown
page read and write
9B2000
unkown
page readonly
523B000
trusted library allocation
page read and write
7FF5DF24E000
unkown
page readonly
AB0D000
stack
page read and write
A74A000
unkown
page read and write
7FF5DF169000
unkown
page readonly
7FF5DF3F7000
unkown
page readonly
5110000
unkown
page write copy
BC9B000
stack
page read and write
7FF5DE531000
unkown
page readonly
C18A000
unkown
page read and write
9E0000
unkown
page readonly
C192000
unkown
page read and write
BF84000
unkown
page read and write
C1A9000
unkown
page read and write
7FF5DEE56000
unkown
page readonly
8C28000
stack
page read and write
7FF5DF029000
unkown
page readonly
7FF5DF36A000
unkown
page readonly
7FF5DF567000
unkown
page readonly
7FF5DF5FF000
unkown
page readonly
8EA9000
stack
page read and write
5510000
trusted library allocation
page read and write
B9E0000
unkown
page read and write
970C000
unkown
page read and write
F20000
heap
page read and write
57E0000
trusted library allocation
page read and write
73A3000
unkown
page read and write
7FF5DF195000
unkown
page readonly
ED3A000
heap
page read and write
2BA0000
heap
page read and write
2E76000
heap
page read and write
B9F0000
unkown
page read and write
734D000
stack
page read and write
4E62000
direct allocation
page execute and read and write
B259000
stack
page read and write
2D2E000
stack
page read and write
5620000
trusted library section
page readonly
133D000
direct allocation
page execute and read and write
5215000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
2E76000
heap
page read and write
7FF5DF4F3000
unkown
page readonly
1159000
unclassified section
page execute and read and write
125B000
trusted library allocation
page execute and read and write
7FF5DF08F000
unkown
page readonly
2BE4000
heap
page read and write
7FF5DF3F5000
unkown
page readonly
51DB000
stack
page read and write
7FF5DF0C1000
unkown
page readonly
7FF5DF4E3000
unkown
page readonly
ADAC000
stack
page read and write
C319000
unkown
page read and write
7FF5DF58A000
unkown
page readonly
7300000
trusted library allocation
page execute and read and write
7860000
unkown
page read and write
AF7E000
stack
page read and write
9716000
unkown
page read and write
5DA0000
trusted library allocation
page read and write
C1CC000
unkown
page read and write
1042000
trusted library allocation
page read and write
4AB1000
trusted library allocation
page execute and read and write
73BA000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
7300000
trusted library allocation
page execute and read and write
8C02000
heap
page read and write
4100000
trusted library allocation
page read and write
5110000
unkown
page write copy
4760000
unkown
page read and write
12F7000
heap
page read and write
7FF5DEFE2000
unkown
page readonly
A734000
unkown
page read and write
7FF5DF5AE000
unkown
page readonly
7FF5DF09B000
unkown
page readonly
F10000
heap
page read and write
ED32000
heap
page read and write
7FF5DF591000
unkown
page readonly
154F000
stack
page read and write
7FF5DEE5A000
unkown
page readonly
74A9000
unkown
page read and write
2AF7000
trusted library allocation
page execute and read and write
7FF5DF366000
unkown
page readonly
9F78000
unkown
page read and write
BAE000
unkown
page read and write
2DA0000
heap
page read and write
7FF5DF591000
unkown
page readonly
7FF5DF45C000
unkown
page readonly
989F000
unkown
page read and write
3304000
unkown
page read and write
A072000
unkown
page read and write
AD9000
stack
page read and write
7FF5DF435000
unkown
page readonly
9564000
unkown
page read and write
7FF5DEFF8000
unkown
page readonly
7FF5DEFAF000
unkown
page readonly
7FF5DEFB7000
unkown
page readonly
74A9000
unkown
page read and write
7FF5DEF90000
unkown
page readonly
48A0000
heap
page read and write
1195000
heap
page read and write
124F000
stack
page read and write
7B4B000
stack
page read and write
7FF5DEFDD000
unkown
page readonly
2D9F000
unkown
page read and write
8390000
unkown
page read and write
4AA0000
trusted library allocation
page execute and read and write
7FF5DF21B000
unkown
page readonly
103D000
trusted library allocation
page execute and read and write
7FF5DF458000
unkown
page readonly
A6F1000
unkown
page read and write
7FF5DF3DF000
unkown
page readonly
7FF5DF25B000
unkown
page readonly
2870000
unkown
page read and write
2E6B000
heap
page read and write
541B000
stack
page read and write
2BC0000
heap
page read and write
E00000
heap
page read and write
739B000
unkown
page read and write
618000
heap
page read and write
980000
unkown
page readonly
12E0000
heap
page execute and read and write
2BE4000
heap
page read and write
7B0000
heap
page read and write
1094000
heap
page read and write
7FF5DF551000
unkown
page readonly
574E000
stack
page read and write
2E10000
trusted library allocation
page read and write
BF90000
unkown
page read and write
7190000
trusted library allocation
page read and write
7B50000
unkown
page readonly
2BB0000
heap
page read and write
EDA0000
unkown
page read and write
A08D000
unkown
page read and write
47F3000
unkown
page read and write
726E000
stack
page read and write
2DA4000
heap
page read and write
9489000
stack
page read and write
B81C000
stack
page read and write
515F000
unclassified section
page read and write
2CF0000
heap
page read and write
52C0000
trusted library allocation
page execute and read and write
2DA4000
heap
page read and write
3070000
heap
page read and write
E39C000
system
page execute and read and write
4820000
trusted library allocation
page read and write
A80000
heap
page read and write
7FF5DF478000
unkown
page readonly
106F000
heap
page read and write
FE2000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
9F27000
unkown
page read and write
2E70000
trusted library allocation
page read and write
134E000
stack
page read and write
5270000
trusted library allocation
page read and write
7FF5DF396000
unkown
page readonly
3364000
unkown
page read and write
3356000
unkown
page read and write
3382000
unkown
page read and write
2C9A000
stack
page read and write
2D7E000
stack
page read and write
165F000
stack
page read and write
7FF5DF532000
unkown
page readonly
BEDE000
stack
page read and write
3D51000
trusted library allocation
page read and write
748E000
stack
page read and write
7FF5DF392000
unkown
page readonly
7FF5DF582000
unkown
page readonly
7FF5DE5CC000
unkown
page readonly
A098000
unkown
page read and write
3394000
unkown
page read and write
ED7D000
unkown
page read and write
51E4000
trusted library allocation
page read and write
FE82000
unkown
page read and write
9714000
unkown
page read and write
ED72000
unkown
page read and write
B259000
stack
page read and write
C183000
unkown
page read and write
4820000
trusted library allocation
page read and write
3373000
unkown
page read and write
AB8C000
stack
page read and write
102D000
trusted library allocation
page execute and read and write
4BF9000
heap
page read and write
9E9E000
stack
page read and write
B4E000
stack
page read and write
FE82000
unkown
page read and write
7FF5DF507000
unkown
page readonly
3F0000
heap
page read and write
B1AB000
stack
page read and write
E50000
heap
page read and write
6D90000
heap
page read and write
9B0000
unkown
page readonly
7D89000
stack
page read and write
830F000
stack
page read and write
336C000
unkown
page read and write
3E43000
trusted library allocation
page read and write
3FA7000
trusted library allocation
page read and write
2F50000
heap
page read and write
306B000
heap
page read and write
7FF5DF577000
unkown
page readonly
11A0000
unkown
page readonly
2A9E000
unkown
page read and write
9F23000
unkown
page read and write
5251000
trusted library allocation
page read and write
2D7E000
stack
page read and write
970000
unkown
page readonly
3DA9000
trusted library allocation
page read and write
4A11000
trusted library allocation
page execute and read and write
B3EE000
stack
page read and write
48D8000
heap
page read and write
2C9E000
stack
page read and write
FD3000
trusted library allocation
page read and write
7FF5DE5CC000
unkown
page readonly
ED82000
unkown
page read and write
9716000
unkown
page read and write
48B0000
unkown
page read and write
1100000
direct allocation
page execute and read and write
A610000
trusted library allocation
page read and write
7940000
unkown
page readonly
98AD000
unkown
page read and write
7FF5DF0A2000
unkown
page readonly
7FF5DF2CB000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
971A000
unkown
page read and write
1040000
trusted library allocation
page read and write
7FF5DF23B000
unkown
page readonly
7FF5DF486000
unkown
page readonly
15FE000
stack
page read and write
C034000
unkown
page read and write
A072000
unkown
page read and write
73BC000
unkown
page read and write
9F63000
unkown
page read and write
DCB000
heap
page read and write
7FF5DF126000
unkown
page readonly
BD7F000
stack
page read and write
973C000
unkown
page read and write
1550000
unclassified section
page execute and read and write
7FF5DEFFC000
unkown
page readonly
74A9000
unkown
page read and write
2AF2000
trusted library allocation
page read and write
7FF5DEFF5000
unkown
page readonly
336C000
unkown
page read and write
A75C000
unkown
page read and write
7800000
unkown
page read and write
B00000
heap
page read and write
1195000
heap
page read and write
7FF5DF519000
unkown
page readonly
4820000
trusted library allocation
page read and write
E39E000
system
page execute and read and write
3199000
unkown
page read and write
73B2000
unkown
page read and write
2DA4000
heap
page read and write
FE8B000
unkown
page read and write
73B2000
unkown
page read and write
EA1000
unkown
page read and write
B60000
unclassified section
page execute and read and write
7FF5DF095000
unkown
page readonly
5212000
trusted library allocation
page read and write
2E7C000
heap
page read and write
B1C0000
unkown
page readonly
7DF5E896A000
unkown
page readonly
D99000
heap
page read and write
72C000
system
page execute and read and write
BB2E000
stack
page read and write
4855000
unkown
page read and write
88DE000
stack
page read and write
1046000
trusted library allocation
page execute and read and write
3290000
unkown
page readonly
ABD000
stack
page read and write
7FF5DF3A1000
unkown
page readonly
2F3E000
heap
page read and write
B9E0000
unkown
page read and write
4020000
trusted library allocation
page read and write
7B4B000
stack
page read and write
7FF5DF3C6000
unkown
page readonly
AEF0000
unkown
page read and write
73BA000
unkown
page read and write
A0A5000
unkown
page read and write
1140000
heap
page read and write
ED30000
heap
page read and write
7FF5DF12A000
unkown
page readonly
A757000
unkown
page read and write
B45A000
stack
page read and write
AFF6000
stack
page read and write
73CD000
unkown
page read and write
9B5E000
stack
page read and write
96F1000
unkown
page read and write
2E50000
heap
page read and write
7FF5DF3F5000
unkown
page readonly
7810000
unkown
page read and write
A0A7000
unkown
page read and write
C159000
unkown
page read and write
F48000
stack
page read and write
32B0000
unkown
page read and write
B2D9000
stack
page read and write
7FF5DF191000
unkown
page readonly
FE0000
trusted library allocation
page read and write
76F0000
unkown
page read and write
7FF5DF43C000
unkown
page readonly
718F000
trusted library allocation
page read and write
7FF5DF156000
unkown
page readonly
28D3000
heap
page read and write
336C000
unkown
page read and write
7FF5DF5F6000
unkown
page readonly
9F63000
unkown
page read and write
7FF5DF1FD000
unkown
page readonly
914B000
stack
page read and write
B500000
unkown
page readonly
52B2000
trusted library allocation
page read and write
7FF5DF41B000
unkown
page readonly
7499000
unkown
page read and write
7FF5DF5FC000
unkown
page readonly
2F43000
heap
page read and write
971C000
unkown
page read and write
7FF5DF577000
unkown
page readonly
901B000
stack
page read and write
7FF5DF18E000
unkown
page readonly
2DA1000
trusted library allocation
page read and write
2F3C000
heap
page read and write
7FF5DF04D000
unkown
page readonly
7FF5DEE52000
unkown
page readonly
7FF5DF5B3000
unkown
page readonly
53B0000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
EA0000
heap
page read and write
4BBE000
stack
page read and write
9FC3000
unkown
page read and write
7FF5DE9C3000
unkown
page readonly
73CD000
unkown
page read and write
47F1000
unkown
page read and write
7180000
trusted library allocation
page read and write
9B99000
stack
page read and write
5260000
trusted library allocation
page read and write
7FF5DF4C6000
unkown
page readonly
11C2000
direct allocation
page execute and read and write
C45B000
unkown
page read and write
2BE4000
heap
page read and write
A15F000
stack
page read and write
2E6F000
stack
page read and write
3382000
unkown
page read and write
7FF5DF43C000
unkown
page readonly
D7E000
stack
page read and write
B830000
unkown
page readonly
7FF5DF16B000
unkown
page readonly
BFA5000
unkown
page read and write
7FF5DF398000
unkown
page readonly
7FF5DF3B9000
unkown
page readonly
7A30000
unkown
page read and write
2BE4000
heap
page read and write
4820000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
A0B1000
unkown
page read and write
3394000
unkown
page read and write
B4EE000
stack
page read and write
7FF5DEF90000
unkown
page readonly
51F4000
trusted library allocation
page read and write
7FF5DF388000
unkown
page readonly
2AA0000
heap
page read and write
FE0000
unkown
page read and write
10643000
system
page execute and read and write
C525000
unkown
page read and write
28D0000
heap
page read and write
7FF5DF3F1000
unkown
page readonly
F71000
heap
page read and write
C4C7000
unkown
page read and write
7DF4E6771000
unkown
page execute read
51DB000
stack
page read and write
99AB000
unkown
page read and write
9F92000
unkown
page read and write
7FF5DF47E000
unkown
page readonly
A0B1000
unkown
page read and write
73B6000
unkown
page read and write
2E6B000
heap
page read and write
7FF5DF2BA000
unkown
page readonly
A743000
unkown
page read and write
7FF5DF45C000
unkown
page readonly
10C6000
heap
page read and write
E1AA000
stack
page read and write
7FF5DF537000
unkown
page readonly
7FF5DF07D000
unkown
page readonly
5201000
trusted library allocation
page read and write
738E000
stack
page read and write
7FF5DF195000
unkown
page readonly
2D61000
unkown
page read and write
E91000
unkown
page read and write
2B10000
trusted library allocation
page read and write
3060000
heap
page read and write
A736000
unkown
page read and write
7FF5DF36A000
unkown
page readonly
7FF5C0B6B000
unkown
page readonly
7FF5DF539000
unkown
page readonly
51E0000
trusted library allocation
page read and write
A6F1000
unkown
page read and write
7FF5DF5A8000
unkown
page readonly
2D61000
unkown
page read and write
73AF000
unkown
page read and write
7FF5DF038000
unkown
page readonly
96DF000
unkown
page read and write
47D9000
unkown
page read and write
7FF5DF091000
unkown
page readonly
A37C000
stack
page read and write
4766000
unkown
page read and write
C319000
unkown
page read and write
51D0000
trusted library allocation
page execute and read and write
B1AB000
stack
page read and write
FE46000
unkown
page read and write
48E0000
unkown
page read and write
2E30000
unkown
page read and write
1252000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
989F000
unkown
page read and write
2AFB000
trusted library allocation
page execute and read and write
C1C4000
unkown
page read and write
7FF5DEFA6000
unkown
page readonly
4820000
trusted library allocation
page read and write
83B0000
unkown
page readonly
7D0D000
stack
page read and write
A6EE000
unkown
page read and write
7FF5DF089000
unkown
page readonly
5290000
trusted library allocation
page read and write
C013000
unkown
page read and write
ED88000
unkown
page read and write
7DF4E6781000
unkown
page execute read
BF9B000
unkown
page read and write
98A7000
unkown
page read and write
7FF5DF09B000
unkown
page readonly
561D000
stack
page read and write
2D51000
trusted library allocation
page read and write
48A0000
unkown
page read and write
2DA4000
heap
page read and write
9F7C000
unkown
page read and write
4855000
unkown
page read and write
E00000
heap
page read and write
7FF5DF519000
unkown
page readonly
33A000
stack
page read and write
FE0000
unkown
page read and write
BF8C000
unkown
page read and write
C34E000
unkown
page read and write
FEA000
trusted library allocation
page execute and read and write
C048000
unkown
page read and write
A106000
unkown
page read and write
7FF5DF203000
unkown
page readonly
7830000
unkown
page read and write
B9F0000
unkown
page read and write
2E10000
trusted library allocation
page read and write
EDA3000
unkown
page read and write
5755000
heap
page read and write
73C3000
unkown
page read and write
7FF5DF507000
unkown
page readonly
7FF5DF07D000
unkown
page readonly
7FF5DF2E2000
unkown
page readonly
2E84000
heap
page read and write
2B60000
trusted library allocation
page execute and read and write
9F51000
unkown
page read and write
7FF5DF4D5000
unkown
page readonly
B5EE000
stack
page read and write
C3F9000
unkown
page read and write
4AA3000
heap
page read and write
97BD000
unkown
page read and write
5530000
trusted library allocation
page execute and read and write
7FF5DF3A1000
unkown
page readonly
70D0000
trusted library section
page read and write
3371000
unkown
page read and write
5DA0000
trusted library allocation
page read and write
7DF5E896A000
unkown
page readonly
1116000
heap
page read and write
1210000
direct allocation
page execute and read and write
524E000
trusted library allocation
page read and write
7FF5DF5F0000
unkown
page readonly
5241000
unkown
page read and write
BF40000
unkown
page read and write
BE7000
stack
page read and write
A0FC000
unkown
page read and write
5200000
trusted library allocation
page read and write
7FF5DF1CD000
unkown
page readonly
7FF5DF452000
unkown
page readonly
978C000
unkown
page read and write
79C000
stack
page read and write
885E000
stack
page read and write
7FF5DF017000
unkown
page readonly
7FF5DF2BA000
unkown
page readonly
7FF5DF0C3000
unkown
page readonly
FE6000
trusted library allocation
page execute and read and write
BD7000
stack
page read and write
1742000
unclassified section
page execute and read and write
C19D000
unkown
page read and write
5DD0000
heap
page read and write
4D39000
direct allocation
page execute and read and write
8390000
unkown
page read and write
7FF5DF1D1000
unkown
page readonly
716F000
stack
page read and write
BFA3000
unkown
page read and write
FED000
trusted library allocation
page execute and read and write
3362000
unkown
page read and write
7FF5DF4BD000
unkown
page readonly
1257000
trusted library allocation
page execute and read and write
7FF5DF60D000
unkown
page readonly
EC3000
trusted library allocation
page execute and read and write
3280000
heap
page read and write
7FF5DEE43000
unkown
page readonly
52C0000
heap
page execute and read and write
C013000
unkown
page read and write
74D6000
unkown
page read and write
96DF000
unkown
page read and write
4788000
unkown
page read and write
2E01000
unkown
page read and write
73B0000
trusted library allocation
page execute and read and write
FE03000
unkown
page read and write
ED71000
unkown
page read and write
7FF5DF443000
unkown
page readonly
7FF5DF571000
unkown
page readonly
C192000
unkown
page read and write
4017000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
B589000
stack
page read and write
9F74000
unkown
page read and write
C298000
unkown
page read and write
7FF5DF59E000
unkown
page readonly
2DA4000
heap
page read and write
74D6000
unkown
page read and write
49A0000
trusted library allocation
page read and write
7FF5DEFCB000
unkown
page readonly
2DA4000
heap
page read and write
3185000
stack
page read and write
8770000
unkown
page read and write
A08A000
unkown
page read and write
7FF5DF48B000
unkown
page readonly
7F3B0000
trusted library allocation
page execute and read and write
2E10000
trusted library allocation
page read and write
7A30000
unkown
page read and write
FF00000
unkown
page read and write
7860000
unkown
page read and write
7FF5DF08B000
unkown
page readonly
7FF5DEFF8000
unkown
page readonly
47A2000
unkown
page read and write
B60000
heap
page read and write
7FF5DEFE8000
unkown
page readonly
A6D2000
unkown
page read and write
7FF5DF4A6000
unkown
page readonly
7FF5DF54D000
unkown
page readonly
C319000
unkown
page read and write
7FF5DF5B5000
unkown
page readonly
7FF5DF126000
unkown
page readonly
7414000
unkown
page read and write
7FF5DF458000
unkown
page readonly
10A0000
unclassified section
page execute and read and write
B500000
unkown
page readonly
2E5A000
heap
page read and write
8770000
unkown
page read and write
ACAE000
stack
page read and write
47C1000
heap
page read and write
DA0000
heap
page read and write
FEC4000
unkown
page read and write
7FF5DF3AA000
unkown
page readonly
C3A9000
unkown
page read and write
8A36000
unkown
page read and write
2DEF000
stack
page read and write
B9BF000
stack
page read and write
7395000
unkown
page read and write
830F000
stack
page read and write
9729000
unkown
page read and write
7FF5DEFAF000
unkown
page readonly
D69000
heap
page read and write
E60000
heap
page read and write
4820000
trusted library allocation
page read and write
74A0000
heap
page read and write
9700000
unkown
page read and write
73B6000
unkown
page read and write
9729000
unkown
page read and write
34B0000
unkown
page readonly
8910000
unkown
page read and write
A106000
unkown
page read and write
F30000
heap
page read and write
7FF5DEFC2000
unkown
page readonly
48ED000
heap
page read and write
2AF0000
trusted library allocation
page read and write
7FF5DF045000
unkown
page readonly
3281000
stack
page read and write
7FF5DF01B000
unkown
page readonly
1660000
unclassified section
page execute and read and write
2E30000
unkown
page read and write
A757000
unkown
page read and write
106F6000
system
page read and write
96F5000
unkown
page read and write
1180000
direct allocation
page execute and read and write
7FF5DEF57000
unkown
page readonly
7380000
unkown
page read and write
BD0000
heap
page read and write
7FF5DEFAC000
unkown
page readonly
A6EA000
unkown
page read and write
7B50000
unkown
page readonly
4170000
trusted library allocation
page read and write
C034000
unkown
page read and write
2DF3000
trusted library allocation
page read and write
E70000
unkown
page readonly
4EDD000
direct allocation
page execute and read and write
7FF5DEE56000
unkown
page readonly
1010000
heap
page read and write
7FF5DF029000
unkown
page readonly
7FF5DF284000
unkown
page readonly
48A1000
heap
page read and write
2E2E000
stack
page read and write
7FF5DF53F000
unkown
page readonly
BFB3000
unkown
page read and write
7FF5DF207000
unkown
page readonly
2DA4000
heap
page read and write
13B1000
direct allocation
page execute and read and write
7B60000
unkown
page readonly
7840000
unkown
page read and write
2E86000
heap
page read and write
2DEF000
trusted library allocation
page read and write
4760000
unkown
page read and write
1024000
trusted library allocation
page read and write
2ADC000
stack
page read and write
72C000
system
page execute and read and write
610000
heap
page read and write
7FF5DF429000
unkown
page readonly
B90000
heap
page read and write
2D7B000
stack
page read and write
10DDF000
system
page read and write
7FF5DF3BE000
unkown
page readonly
7FF5DEE4E000
unkown
page readonly
A08A000
unkown
page read and write
7FF5DF5A3000
unkown
page readonly
A098000
unkown
page read and write
1033000
trusted library allocation
page read and write
7FF5DF623000
unkown
page readonly
4860000
unkown
page read and write
54E0000
trusted library section
page readonly
7FF5DF067000
unkown
page readonly
105E000
heap
page read and write
7FF5DF52D000
unkown
page readonly
7DF4E6760000
unkown
page readonly
7FF5DF551000
unkown
page readonly
168E000
unclassified section
page execute and read and write
7FF5DF4E7000
unkown
page readonly
2BE4000
heap
page read and write
BFA1000
unkown
page read and write
7FF5DF3D4000
unkown
page readonly
BAD000
trusted library allocation
page execute and read and write
7FF5DEF4B000
unkown
page readonly
52D9000
unkown
page read and write
C3B9000
unkown
page read and write
7FF5DE539000
unkown
page readonly
8CE000
stack
page read and write
BF9D000
unkown
page read and write
9B1D000
stack
page read and write
7FF5DF5BE000
unkown
page readonly
7D90000
unkown
page read and write
7FF5DF2FE000
unkown
page readonly
2E7C000
heap
page read and write
970000
unkown
page readonly
1186000
direct allocation
page execute and read and write
7FF5C0B65000
unkown
page readonly
7FF5DF45A000
unkown
page readonly
2B5E000
stack
page read and write
9D9F000
stack
page read and write
33C0000
unkown
page readonly
7FF5DF4E7000
unkown
page readonly
2F10000
unkown
page read and write
1140000
heap
page read and write
5DC0000
heap
page read and write
720000
system
page execute and read and write
109F000
stack
page read and write
9704000
unkown
page read and write
848E000
stack
page read and write
9489000
stack
page read and write
987C000
unkown
page read and write
729000
system
page execute and read and write
5635000
heap
page read and write
74F1000
unkown
page read and write
497A000
heap
page read and write
13C6000
direct allocation
page execute and read and write
7FF5DF62C000
unkown
page readonly
C003000
unkown
page read and write
3371000
unkown
page read and write
7FF5DF2FE000
unkown
page readonly
A6CF000
unkown
page read and write
A6D2000
unkown
page read and write
7FF5DF486000
unkown
page readonly
2E10000
trusted library allocation
page read and write
ED60000
unkown
page read and write
9D1F000
stack
page read and write
3356000
unkown
page read and write
4B88000
heap
page read and write
7FF5DF221000
unkown
page readonly
8C5B000
heap
page read and write
52E0000
trusted library allocation
page read and write
7FF5DEE5A000
unkown
page readonly
C2E4000
unkown
page read and write
1190000
heap
page read and write
7FF5DEFB7000
unkown
page readonly
9E70000
heap
page read and write
95EE000
stack
page read and write
48B0000
unkown
page read and write
9F51000
unkown
page read and write
7FF5DF5B3000
unkown
page readonly
2CDE000
stack
page read and write
7FF5DF0F1000
unkown
page readonly
ADC0000
unkown
page readonly
AFFC000
stack
page read and write
C23D000
unkown
page read and write
7FF5DE535000
unkown
page readonly
2B1C000
stack
page read and write
7FF5DF5E9000
unkown
page readonly
4824000
unkown
page read and write
57D0000
trusted library section
page read and write
2CD0000
heap
page read and write
7FF5DF343000
unkown
page readonly
5223000
heap
page read and write
BF90000
unkown
page read and write
7380000
unkown
page read and write
F7E000
stack
page read and write
7910000
unkown
page readonly
AE6F000
stack
page read and write
ED40000
unkown
page read and write
8650000
unkown
page read and write
295C000
stack
page read and write
54DB000
stack
page read and write
3107000
stack
page read and write
A6CF000
unkown
page read and write
7FF5DF0CC000
unkown
page readonly
7FF5DF59E000
unkown
page readonly
10682000
system
page execute and read and write
4DF1000
direct allocation
page execute and read and write
5630000
heap
page read and write
5750000
heap
page read and write
47C0000
heap
page read and write
A27C000
stack
page read and write
7FF5DF3E4000
unkown
page readonly
7502000
unkown
page read and write
7FF5DF361000
unkown
page readonly
5220000
trusted library allocation
page read and write
7FF5DF1D1000
unkown
page readonly
8910000
unkown
page read and write
4BFE000
stack
page read and write
9F0000
heap
page read and write
74F1000
unkown
page read and write
7FF5DF42F000
unkown
page readonly
5550000
trusted library allocation
page execute and read and write
AB0D000
stack
page read and write
7FF5DF1CD000
unkown
page readonly
7FF5DF229000
unkown
page readonly
51EB000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
97B8000
unkown
page read and write
A09A000
unkown
page read and write
7FF5DF04D000
unkown
page readonly
2E3D000
trusted library allocation
page read and write
991F000
stack
page read and write
C75000
stack
page read and write
E40000
heap
page read and write
47B6000
unkown
page read and write
BA76000
stack
page read and write
3304000
unkown
page read and write
7FF5DF3FC000
unkown
page readonly
73BC000
unkown
page read and write
BF98000
unkown
page read and write
7FF5DF380000
unkown
page readonly
EC0000
trusted library allocation
page read and write
790A000
stack
page read and write
C354000
unkown
page read and write
C187000
unkown
page read and write
2D2E000
stack
page read and write
ADC0000
unkown
page readonly
47F1000
unkown
page read and write
7FF5DF2CB000
unkown
page readonly
97B8000
unkown
page read and write
FF1000
unkown
page readonly
9F23000
unkown
page read and write
1558000
direct allocation
page execute and read and write
336F000
unkown
page read and write
7FF5DF364000
unkown
page readonly
BF84000
unkown
page read and write
8C28000
stack
page read and write
3349000
unkown
page read and write
5253000
heap
page read and write
AC0D000
stack
page read and write
BFAF000
unkown
page read and write
7FF5DEFF0000
unkown
page readonly
E3AE000
system
page execute and read and write
7FF5DF0D2000
unkown
page readonly
10400000
unkown
page execute and read and write
5250000
heap
page read and write
9F2A000
unkown
page read and write
7FF5DF5D6000
unkown
page readonly
9F2A000
unkown
page read and write
7FF5DF549000
unkown
page readonly
9E60000
heap
page read and write
AD2B000
stack
page read and write
28A0000
unkown
page readonly
AEF0000
unkown
page read and write
7F370000
trusted library allocation
page execute and read and write
5DF0000
heap
page read and write
52F0000
trusted library allocation
page read and write
7FF5DE531000
unkown
page readonly
6ECE000
heap
page read and write
7FF5DF5BE000
unkown
page readonly
7DF4E6761000
unkown
page execute read
C423000
unkown
page read and write
ED30000
heap
page read and write
7FF5DEF06000
unkown
page readonly
BFA5000
unkown
page read and write
E5E000
heap
page read and write
7FF5DF3AA000
unkown
page readonly
A0A7000
unkown
page read and write
7FF5DF3E4000
unkown
page readonly
9704000
unkown
page read and write
3373000
unkown
page read and write
BD7F000
stack
page read and write
4820000
trusted library allocation
page read and write
4766000
unkown
page read and write
BFAD000
unkown
page read and write
ED82000
unkown
page read and write
BFAB000
unkown
page read and write
720000
system
page execute and read and write
BFAB000
unkown
page read and write
7FF5DF1FD000
unkown
page readonly
5300000
trusted library allocation
page execute and read and write
E70000
unkown
page readonly
738E000
unkown
page read and write
73B8000
unkown
page read and write
48E0000
unkown
page read and write
10BB000
unclassified section
page execute and read and write
9A6C000
stack
page read and write
7FF5DF57F000
unkown
page readonly
5241000
unkown
page read and write
7FF5DF0C1000
unkown
page readonly
2C9E000
stack
page read and write
7FF5DF089000
unkown
page readonly
479B000
unkown
page read and write
7FF5DF388000
unkown
page readonly
7FF5DF5B0000
unkown
page readonly
7FF5DF21F000
unkown
page readonly
7FF5DEE43000
unkown
page readonly
52E0000
heap
page read and write
2B0E000
stack
page read and write
2F47000
heap
page read and write
97F3000
unkown
page read and write
C75000
stack
page read and write
C34E000
unkown
page read and write
7FF5DEF84000
unkown
page readonly
FE7000
heap
page read and write
4EE1000
direct allocation
page execute and read and write
3364000
unkown
page read and write
3375000
unkown
page read and write
7930000
unkown
page readonly
C003000
unkown
page read and write
29F0000
heap
page read and write
C40F000
unkown
page read and write
2BE4000
heap
page read and write
C159000
unkown
page read and write
7FF5DE539000
unkown
page readonly
47B6000
unkown
page read and write
7C89000
stack
page read and write
9FC3000
unkown
page read and write
9A6C000
stack
page read and write
2E10000
trusted library allocation
page read and write
1102000
heap
page read and write
838B000
stack
page read and write
1107000
direct allocation
page execute and read and write
BF82000
unkown
page read and write
95EE000
stack
page read and write
2E10000
trusted library allocation
page read and write
7FF5DEFDD000
unkown
page readonly
49D1000
heap
page read and write
95F0000
unkown
page read and write
2D3F000
unkown
page read and write
7FF5DE9C3000
unkown
page readonly
2BE4000
heap
page read and write
7FF5DF3EA000
unkown
page readonly
7FF5DEF4B000
unkown
page readonly
BCFD000
stack
page read and write
6EC0000
heap
page read and write
2DED000
stack
page read and write
4B40000
trusted library allocation
page read and write
2F47000
heap
page read and write
7FF5DEF94000
unkown
page readonly
2F47000
heap
page read and write
1091000
heap
page read and write
9C5E000
stack
page read and write
9380000
unkown
page readonly
27F0000
unkown
page readonly
98AD000
unkown
page read and write
7FF5DF017000
unkown
page readonly
D50000
unkown
page read and write
7FF5DF364000
unkown
page readonly
2F4D000
heap
page read and write
EDA0000
unkown
page read and write
2E76000
heap
page read and write
2EC0000
unkown
page readonly
A630000
trusted library allocation
page execute and read and write
2CE0000
trusted library allocation
page read and write
3199000
unkown
page read and write
7FF5DF4FB000
unkown
page readonly
B70A000
heap
page read and write
2BE4000
heap
page read and write
3A0000
heap
page read and write
A757000
unkown
page read and write
7840000
unkown
page read and write
978C000
unkown
page read and write
7FF5DEEEB000
unkown
page readonly
C18A000
unkown
page read and write
51F0000
trusted library allocation
page read and write
73A3000
unkown
page read and write
7230000
unkown
page read and write
E0F000
heap
page read and write
C409000
unkown
page read and write
72BE000
stack
page read and write
C4E000
stack
page read and write
5DA0000
trusted library allocation
page read and write
7FF5DE9CB000
unkown
page readonly
9C1D000
stack
page read and write
4F52000
direct allocation
page execute and read and write
98A1000
unkown
page read and write
C461000
unkown
page read and write
1190000
heap
page read and write
C3EA000
unkown
page read and write
7FF5DF122000
unkown
page readonly
A74A000
unkown
page read and write
7FF5C0B6B000
unkown
page readonly
BFA1000
unkown
page read and write
27D0000
unkown
page read and write
FDE000
stack
page read and write
723F000
stack
page read and write
7FF5DF0CC000
unkown
page readonly
3F7E000
trusted library allocation
page read and write
2DA4000
heap
page read and write
BF82000
unkown
page read and write
EDE000
heap
page read and write
7DF5E895F000
unkown
page readonly
7FF5DF52D000
unkown
page readonly
3375000
unkown
page read and write
14C1000
direct allocation
page execute and read and write
ACAE000
stack
page read and write
9D5F000
stack
page read and write
BF40000
unkown
page read and write
8400000
heap
page read and write
115C000
unclassified section
page execute and read and write
FDD000
trusted library allocation
page execute and read and write
34B0000
unkown
page readonly
3394000
unkown
page read and write
2E10000
trusted library allocation
page read and write
7FF5DF156000
unkown
page readonly
C298000
unkown
page read and write
ED4C000
unkown
page read and write
8C8D000
heap
page read and write
C4DD000
unkown
page read and write
4750000
unkown
page read and write
7830000
unkown
page read and write
BD9C000
stack
page read and write
4B40000
trusted library allocation
page read and write
7FF5DEFBD000
unkown
page readonly
C18A000
unkown
page read and write
BDDE000
stack
page read and write
7FF5DF62C000
unkown
page readonly
7A40000
unkown
page readonly
7FF5DF366000
unkown
page readonly
7FF5DF4F7000
unkown
page readonly
980000
unkown
page readonly
7FF5DF4EC000
unkown
page readonly
DA7000
heap
page read and write
2AC0000
heap
page read and write
5520000
trusted library allocation
page read and write
88E0000
unkown
page read and write
EB0000
trusted library allocation
page read and write
9F3E000
unkown
page read and write
7870000
unkown
page read and write
7FF5DF4AB000
unkown
page readonly
BF7E000
unkown
page read and write
8590000
unkown
page readonly
FE0000
heap
page read and write
FE4B000
unkown
page read and write
2E50000
unkown
page readonly
3364000
unkown
page read and write
9F78000
unkown
page read and write
A05E000
stack
page read and write
FEC4000
unkown
page read and write
C354000
unkown
page read and write
C34E000
unkown
page read and write
7FF5DF5F0000
unkown
page readonly
7FF5C0B65000
unkown
page readonly
7FF5DF122000
unkown
page readonly
2BE4000
heap
page read and write
4C49000
direct allocation
page execute and read and write
2F4D000
heap
page read and write
70C0000
trusted library allocation
page read and write
734D000
stack
page read and write
FE46000
unkown
page read and write
5640000
heap
page read and write
99AB000
unkown
page read and write
3349000
unkown
page read and write
2BE4000
heap
page read and write
3356000
unkown
page read and write
C159000
unkown
page read and write
F13000
heap
page read and write
2F47000
heap
page read and write
5225000
trusted library allocation
page read and write
7FF5DF3F1000
unkown
page readonly
7FF5DF5CC000
unkown
page readonly
7FF5DF5E9000
unkown
page readonly
C35C000
unkown
page read and write
BFB3000
unkown
page read and write
B589000
stack
page read and write
74D6000
unkown
page read and write
2D96000
trusted library allocation
page read and write
3EE000
unkown
page read and write
7FF5DF582000
unkown
page readonly
FE99000
unkown
page read and write
7FF5DF571000
unkown
page readonly
1088000
heap
page read and write
7DF4E6781000
unkown
page execute read
7FF5DF3D4000
unkown
page readonly
C086000
unkown
page read and write
7499000
unkown
page read and write
7FF5DF4D5000
unkown
page readonly
BFA3000
unkown
page read and write
7FF5DE4F2000
unkown
page readonly
7FF5DF380000
unkown
page readonly
BFC3000
unkown
page read and write
7399000
unkown
page read and write
EDA000
heap
page read and write
7930000
unkown
page readonly
120E000
stack
page read and write
7FF5DF06F000
unkown
page readonly
FDC4000
unkown
page read and write
A74A000
unkown
page read and write
2E10000
trusted library allocation
page read and write
4A00000
trusted library allocation
page execute and read and write
520D000
trusted library allocation
page read and write
B359000
stack
page read and write
9E1E000
stack
page read and write
E0AD000
stack
page read and write
BFF000
heap
page read and write
2E8B000
trusted library allocation
page read and write
C60000
heap
page read and write
4824000
unkown
page read and write
C50000
heap
page read and write
BF98000
unkown
page read and write
3382000
unkown
page read and write
7991000
unkown
page read and write
BFA7000
unkown
page read and write
47D9000
unkown
page read and write
A690000
unkown
page read and write
47EC000
unkown
page read and write
7FF5DF606000
unkown
page readonly
C187000
unkown
page read and write
3281000
stack
page read and write
12C0000
heap
page read and write
FDC4000
unkown
page read and write
2CE5000
trusted library allocation
page read and write
28D3000
heap
page read and write
A4BE000
stack
page read and write
32B0000
unkown
page read and write
A0F7000
unkown
page read and write
A600000
trusted library allocation
page read and write
2DA4000
heap
page read and write
971C000
unkown
page read and write
7DF4E67A1000
unkown
page execute read
7FF5DF207000
unkown
page readonly
14D6000
direct allocation
page execute and read and write
7FF5DF0D2000
unkown
page readonly
73A7000
unkown
page read and write
4B84000
heap
page read and write
4DED000
direct allocation
page execute and read and write
A747000
unkown
page read and write
A104000
unkown
page read and write
C2E4000
unkown
page read and write
7FF5DF310000
unkown
page readonly
9E5D000
stack
page read and write
52A0000
heap
page read and write
8EA9000
stack
page read and write
7FF5DF3B5000
unkown
page readonly
BF9F000
unkown
page read and write
9605000
unkown
page read and write
2F47000
heap
page read and write
41F000
remote allocation
page execute and read and write
7FF5DF067000
unkown
page readonly
7FF5DF4E3000
unkown
page readonly
74F1000
unkown
page read and write
FD0000
trusted library allocation
page read and write
2D1E000
stack
page read and write
7FF5DF4EC000
unkown
page readonly
E12D000
stack
page read and write
7FF5DF50F000
unkown
page readonly
7FF5DF210000
unkown
page readonly
7FF5DF5FC000
unkown
page readonly
C3F2000
unkown
page read and write
BFAF000
unkown
page read and write
2F20000
heap
page read and write
7FF5DF3C6000
unkown
page readonly
7FF5DEFFC000
unkown
page readonly
BD8000
heap
page read and write
5560000
heap
page read and write
FF1000
unkown
page readonly
7FF5DF452000
unkown
page readonly
D99000
heap
page read and write
4820000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
BA2D000
stack
page read and write
909E000
stack
page read and write
7FF5DEE52000
unkown
page readonly
3290000
unkown
page readonly
7FF5DF3B5000
unkown
page readonly
B7B000
unclassified section
page execute and read and write
7395000
unkown
page read and write
ED32000
heap
page read and write
ED88000
unkown
page read and write
2D30000
heap
page read and write
ED88000
unkown
page read and write
971A000
unkown
page read and write
B830000
unkown
page readonly
525D000
trusted library allocation
page read and write
E330000
system
page execute and read and write
2F47000
heap
page read and write
10F7000
heap
page read and write
753F000
unkown
page read and write
7FF5DF01B000
unkown
page readonly
BA76000
stack
page read and write
BB0000
heap
page read and write
BFEF000
unkown
page read and write
92DB000
stack
page read and write
2D80000
trusted library allocation
page read and write
2BE4000
heap
page read and write
7FF5DF2ED000
unkown
page readonly
7FF5DF343000
unkown
page readonly
B60A000
stack
page read and write
C01A000
unkown
page read and write
7870000
unkown
page read and write
7FF5DF5CC000
unkown
page readonly
7FF5DF2F3000
unkown
page readonly
727E000
stack
page read and write
98E3000
unkown
page read and write
2D1E000
stack
page read and write
7FF5DF06F000
unkown
page readonly
9564000
unkown
page read and write
C187000
unkown
page read and write
7FF5DF169000
unkown
page readonly
7FF5DEFAC000
unkown
page readonly
14DD000
direct allocation
page execute and read and write
7FF5DF54D000
unkown
page readonly
7FF5DF2DA000
unkown
page readonly
BF00000
trusted library allocation
page read and write
7FF5DF5FF000
unkown
page readonly
105B000
heap
page read and write
BFDF000
unkown
page read and write
FF0000
heap
page read and write
2DA4000
heap
page read and write
2E89000
trusted library allocation
page read and write
7FF5DF584000
unkown
page readonly
9605000
unkown
page read and write
E5E000
heap
page read and write
2BE4000
heap
page read and write
4860000
unkown
page read and write
8650000
unkown
page read and write
339C000
unkown
page read and write
7FF5DF5A3000
unkown
page readonly
6FCA000
heap
page read and write
7FF5DF229000
unkown
page readonly
4E8C000
stack
page read and write
2E10000
trusted library allocation
page read and write
7FF5DF4A6000
unkown
page readonly
4750000
unkown
page read and write
C1CC000
unkown
page read and write
7FF5DF539000
unkown
page readonly
ED74000
unkown
page read and write
7FF5DF16B000
unkown
page readonly
96F1000
unkown
page read and write
2E10000
trusted library allocation
page read and write
A0F7000
unkown
page read and write
7FF5DF549000
unkown
page readonly
96F5000
unkown
page read and write
C3BA000
unkown
page read and write
7FF5DF284000
unkown
page readonly
7DF4E67A1000
unkown
page execute read
1000000
heap
page read and write
C00000
heap
page read and write
76F0000
unkown
page read and write
57D0000
heap
page read and write
2E72000
heap
page read and write
336F000
unkown
page read and write
There are 1722 hidden memdumps, click here to show them.