IOC Report
z8eokahasflcrscooplasb.exe

loading gif

Files

File Path
Type
Category
Malicious
z8eokahasflcrscooplasb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z8eokahasflcrscooplasb.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp8D16.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hmlPTospxjGJ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0y5qpgge.cea.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2elehaun.fi1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2sdrgnhs.a3v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ek0isiyk.gxo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9CC5.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z8eokahasflcrscooplasb.exe
"C:\Users\user\Desktop\z8eokahasflcrscooplasb.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hmlPTospxjGJ" /XML "C:\Users\user\AppData\Local\Temp\tmp8D16.tmp"
malicious
C:\Users\user\Desktop\z8eokahasflcrscooplasb.exe
"C:\Users\user\Desktop\z8eokahasflcrscooplasb.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe
C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe
malicious
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\SysWOW64\explorer.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hmlPTospxjGJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9CC5.tmp"
malicious
C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe
"C:\Users\user\AppData\Roaming\hmlPTospxjGJ.exe"
malicious
C:\Windows\SysWOW64\mstsc.exe
"C:\Windows\SysWOW64\mstsc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\user\Desktop\z8eokahasflcrscooplasb.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
www.31231851.xyz/dn13/
malicious
https://aka.ms/odirmr
unknown
http://www.pigramescentfeatous.shopReferer:
unknown
http://www.trennebaffinbayamon.cfd
unknown
http://www.f9813.top/dn13/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.anceibizamagazine.net/dn13/
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.ood-packing-iasehq19x224.today/dn13/
unknown
http://www.fontbureau.com/designers
unknown
http://www.ysticsmoke.net/dn13/
unknown
http://www.lindsandfurnishings.shop/dn13/www.ysticsmoke.net
unknown
http://www.wlkflwef3sf2wf.top/dn13/
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.outya.xyz
unknown
http://www.pigramescentfeatous.shop
unknown
http://www.mile-hkajwx.xyz/dn13/
unknown
http://www.outya.xyz/dn13/www.f9813.top
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://www.trennebaffinbayamon.cfdReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
http://www.trennebaffinbayamon.cfd/dn13/www.ashclub.xyz
unknown
http://www.mile-hkajwx.xyz
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.mile-hkajwx.xyzReferer:
unknown
http://www.wlkflwef3sf2wf.topReferer:
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.orty.pro
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.anceibizamagazine.netReferer:
unknown
http://www.trennebaffinbayamon.cfd/dn13/
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://wns.windows.com/L
unknown
http://www.mile-hkajwx.xyz/dn13/www.ood-packing-iasehq19x224.today
unknown
https://word.office.com
unknown
http://www.wlkflwef3sf2wf.top
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
http://www.ysticsmoke.net/dn13/www.pigramescentfeatous.shop
unknown
http://www.lindsandfurnishings.shop
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
http://www.anceibizamagazine.net
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.ozezae7.pro
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://www.ashclub.xyzReferer:
unknown
http://www.ysterywarrior932.topReferer:
unknown
http://www.carterandcone.coml
unknown
http://www.f9813.top/dn13/www.trennebaffinbayamon.cfd
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.outya.xyz/dn13/
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.pigramescentfeatous.shop/dn13/
unknown
http://www.ood-packing-iasehq19x224.todayReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.orty.pro/dn13/www.lindsandfurnishings.shop
unknown
http://www.p9eh2s99b5.top
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
http://www.pigramescentfeatous.shop/dn13/www.outya.xyz
unknown
https://outlook.com_
unknown
http://www.31231851.xyzReferer:
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.p9eh2s99b5.top/dn13/
unknown
http://www.fontbureau.com/designers?
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
http://www.orty.pro/dn13/
unknown
http://www.tiro.com
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
http://www.ashclub.xyz
unknown
http://www.outya.xyzReferer:
unknown
http://www.goodfont.co.kr
unknown
http://schemas.micro
unknown
http://www.wlkflwef3sf2wf.top/dn13/www.anceibizamagazine.net
unknown
http://www.orty.proReferer:
unknown
http://www.typography.netD
unknown
http://www.ysterywarrior932.top/dn13/www.mile-hkajwx.xyz
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.ashclub.xyz/dn13/www.p9eh2s99b5.top
unknown
http://www.lindsandfurnishings.shopReferer:
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.ysticsmoke.net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.orty.pro
unknown
malicious
www.ysticsmoke.net
unknown
malicious
www.f9813.top
unknown
malicious
www.mile-hkajwx.xyz
unknown
malicious
www.ysterywarrior932.top
unknown
malicious
www.pigramescentfeatous.shop
unknown
malicious
www.ood-packing-iasehq19x224.today
unknown
malicious
www.wlkflwef3sf2wf.top
unknown
malicious
www.lindsandfurnishings.shop
unknown
malicious
www.ozezae7.pro
unknown
malicious
www.anceibizamagazine.net
unknown
malicious
There are 1 hidden domains, click here to show them.

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Unpacker
malicious
unknown
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
LastUpdate
malicious
unknown
CheckSetting
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
Outlook.File.msg.15
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
There are 211 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A60000
system
page execute and read and write
malicious
34D0000
unclassified section
page execute and read and write
malicious
4B96000
trusted library allocation
page read and write
malicious
4F0000
system
page execute and read and write
malicious
47B7000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4DD0000
trusted library allocation
page read and write
malicious
BD1D000
stack
page read and write
1480000
heap
page read and write
A479000
unkown
page read and write
C700000
unkown
page read and write
7FF5ED853000
unkown
page readonly
7FF5ED4C6000
unkown
page readonly
7FF5ED810000
unkown
page readonly
7F2E000
stack
page read and write
C999000
unkown
page read and write
33C8000
heap
page read and write
7950000
unkown
page read and write
1750000
heap
page read and write
6DA000
heap
page read and write
7FF5ED915000
unkown
page readonly
A4B8000
unkown
page read and write
3756000
unkown
page read and write
C561000
unkown
page read and write
4BC9000
unkown
page read and write
EE7000
system
page execute and read and write
7FF5EDA47000
unkown
page readonly
987B000
unkown
page read and write
52BD000
direct allocation
page execute and read and write
7FF5ED692000
unkown
page readonly
797D000
unkown
page read and write
7FF5ED349000
unkown
page readonly
B10D000
stack
page read and write
7FF5ED8C1000
unkown
page readonly
A3D4000
unkown
page read and write
7869000
unkown
page read and write
37AE000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
1A00000
heap
page read and write
E92C000
stack
page read and write
E7CF000
stack
page read and write
5179000
heap
page read and write
76C0000
unkown
page read and write
ED9000
system
page execute and read and write
151B000
heap
page read and write
C5A3000
unkown
page read and write
13A5000
heap
page read and write
AD0000
trusted library allocation
page read and write
3410000
unclassified section
page execute and read and write
AAF6000
unkown
page read and write
94A0000
trusted library allocation
page execute and read and write
8720000
unkown
page readonly
7FF5ED821000
unkown
page readonly
3659000
stack
page read and write
7FF5ED939000
unkown
page readonly
2ECB000
trusted library allocation
page read and write
784A000
unkown
page read and write
1095000
stack
page read and write
7FF5ED451000
unkown
page readonly
A3CD000
unkown
page read and write
15CE000
stack
page read and write
9815000
unkown
page read and write
B3AD000
stack
page read and write
C6E3000
unkown
page read and write
3116000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
5010000
trusted library allocation
page read and write
7E50000
unkown
page readonly
4CD0000
heap
page read and write
AD0000
trusted library allocation
page read and write
E58E000
stack
page read and write
7FF5ED986000
unkown
page readonly
3441000
unclassified section
page execute and read and write
93BE000
stack
page read and write
5590000
trusted library allocation
page read and write
B08D000
stack
page read and write
7FF5ED7F1000
unkown
page readonly
7EF70000
trusted library allocation
page execute and read and write
A32A000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
F20000
system
page execute and read and write
89C0000
unkown
page read and write
A479000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
1230000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
7D20000
unkown
page readonly
1740000
heap
page read and write
97C3000
unkown
page read and write
4F4C000
heap
page read and write
CA8E000
unkown
page read and write
7FF5ED94A000
unkown
page readonly
AD0000
trusted library allocation
page read and write
8B60000
unkown
page readonly
7FF5ED8AC000
unkown
page readonly
BDA0000
unkown
page readonly
EC2000
unkown
page readonly
3427000
unclassified section
page execute and read and write
3240000
unkown
page read and write
37B0000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
7FF5ED697000
unkown
page readonly
23FE000
unkown
page read and write
5B20000
trusted library allocation
page read and write
FD29000
unkown
page execute and read and write
7880000
heap
page read and write
5580000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
A3D0000
unkown
page read and write
4709000
direct allocation
page execute and read and write
C88B000
unkown
page read and write
F2CD000
stack
page read and write
7FF5ED71E000
unkown
page readonly
7FF5ED426000
unkown
page readonly
C9E1000
unkown
page read and write
CA83000
unkown
page read and write
58D3000
heap
page read and write
C6F4000
unkown
page read and write
28FF000
unkown
page read and write
DF8000
system
page readonly
7B80000
unkown
page read and write
A37B000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
253D000
stack
page read and write
7FF5ED286000
unkown
page readonly
14B8000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
AD0000
trusted library allocation
page read and write
7FF5ED3EA000
unkown
page readonly
7DF4F3050000
unkown
page readonly
C6D8000
unkown
page read and write
56D9000
unkown
page read and write
7FF5ED735000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
4C60000
unkown
page read and write
C89C000
unkown
page read and write
3791000
unkown
page read and write
D540000
trusted library allocation
page execute and read and write
2F35000
trusted library allocation
page read and write
3F21000
trusted library allocation
page read and write
DE0000
unkown
page readonly
7FF5ED602000
unkown
page readonly
5A90000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
7FF5ED65C000
unkown
page readonly
7FF5ED71B000
unkown
page readonly
B629000
stack
page read and write
2A7F000
unkown
page read and write
7FF5ED660000
unkown
page readonly
82E000
stack
page read and write
59A0000
heap
page read and write
79FB000
unkown
page read and write
A491000
unkown
page read and write
CA7C000
unkown
page read and write
7FF5ED714000
unkown
page readonly
B8AB000
stack
page read and write
D51000
trusted library allocation
page execute and read and write
7FF5ED4E8000
unkown
page readonly
95DB000
stack
page read and write
3590000
unkown
page read and write
57D0000
trusted library allocation
page execute and read and write
C9C8000
unkown
page read and write
FA26000
unkown
page read and write
1419000
direct allocation
page execute and read and write
170E000
stack
page read and write
7884000
unkown
page read and write
634000
heap
page read and write
4C60000
unkown
page read and write
9869000
unkown
page read and write
CB62000
unkown
page read and write
5420000
trusted library allocation
page read and write
B523000
trusted library allocation
page read and write
12A0000
direct allocation
page execute and read and write
7FF5D1CD4000
unkown
page readonly
E90E000
stack
page read and write
7FF5ED942000
unkown
page readonly
5A40000
heap
page read and write
13ED000
trusted library allocation
page execute and read and write
C6BF000
unkown
page read and write
7FF5ED755000
unkown
page readonly
3748000
unkown
page read and write
C5AA000
unkown
page read and write
A19F000
stack
page read and write
7DF4F3040000
unkown
page readonly
7FF5ED793000
unkown
page readonly
CA8B000
unkown
page read and write
C49E000
stack
page read and write
370D000
unkown
page read and write
7FF5ED996000
unkown
page readonly
CA7C000
unkown
page read and write
A379000
unkown
page read and write
50CF000
stack
page read and write
978E000
unkown
page read and write
1490000
heap
page read and write
5CD0000
heap
page read and write
CB8C000
unkown
page read and write
149E000
heap
page read and write
79B1000
unkown
page read and write
7FF5ED64F000
unkown
page readonly
3114000
unkown
page read and write
A3C000
stack
page read and write
1510000
unkown
page readonly
A502000
unkown
page read and write
5010000
trusted library allocation
page read and write
3209000
stack
page read and write
7FF5ED625000
unkown
page readonly
EE2E000
stack
page read and write
EC0000
heap
page read and write
18A1000
unkown
page readonly
9877000
unkown
page read and write
C9D7000
unkown
page read and write
7FF5ED1CB000
unkown
page readonly
310E000
stack
page read and write
CA12000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
7867000
unkown
page read and write
4309000
trusted library allocation
page read and write
785D000
unkown
page read and write
3758000
unkown
page read and write
7DF4F3041000
unkown
page execute read
CB86000
unkown
page read and write
8730000
unkown
page read and write
32A4000
heap
page read and write
C964000
unkown
page read and write
9795000
unkown
page read and write
508E000
stack
page read and write
7978000
unkown
page read and write
4F28000
trusted library allocation
page read and write
A502000
unkown
page read and write
CB30000
unkown
page read and write
7E50000
unkown
page readonly
A4FC000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
A39B000
unkown
page read and write
7FF5ED818000
unkown
page readonly
97D4000
unkown
page read and write
14ED000
direct allocation
page execute and read and write
FA26000
unkown
page read and write
4BE1000
unkown
page read and write
C9F3000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
7FF5ED4B4000
unkown
page readonly
96DF000
unkown
page read and write
977A000
unkown
page read and write
C6C1000
unkown
page read and write
1210000
unkown
page readonly
D3E000
stack
page read and write
9869000
unkown
page read and write
7FF5ED864000
unkown
page readonly
AD0000
trusted library allocation
page read and write
B729000
stack
page read and write
7FF5ED7CF000
unkown
page readonly
A4AB000
unkown
page read and write
8DA0000
unkown
page read and write
634000
heap
page read and write
4CD1000
heap
page read and write
7FF5ED7DB000
unkown
page readonly
31C1000
trusted library allocation
page read and write
31AB000
trusted library allocation
page read and write
97C3000
unkown
page read and write
B10000
system
page execute and read and write
7FF5D1CCD000
unkown
page readonly
10FDF000
system
page read and write
7FF5ED5C1000
unkown
page readonly
986F000
unkown
page read and write
5780000
heap
page read and write
C811000
unkown
page read and write
10DDE000
stack
page read and write
5CD9000
heap
page read and write
7FF5ED68F000
unkown
page readonly
4BA6000
unkown
page read and write
C92D000
unkown
page read and write
3F6B000
trusted library allocation
page read and write
810E000
stack
page read and write
11F4000
heap
page read and write
7FF5ED8FF000
unkown
page readonly
7FF5ED670000
unkown
page readonly
7DF4F3071000
unkown
page execute read
7FF5ED62F000
unkown
page readonly
AD0000
trusted library allocation
page read and write
7FF5ED7C4000
unkown
page readonly
8108000
stack
page read and write
7FF5D1CCD000
unkown
page readonly
7FF5ED853000
unkown
page readonly
C10A000
stack
page read and write
C6F4000
unkown
page read and write
5010000
trusted library allocation
page read and write
CF0000
unclassified section
page execute and read and write
4CC0000
unkown
page read and write
88EE000
stack
page read and write
AB4E000
unkown
page read and write
36D5000
stack
page read and write
4BC9000
unkown
page read and write
CB02000
unkown
page read and write
634000
heap
page read and write
7FF5ED9C6000
unkown
page readonly
7FF5ED81B000
unkown
page readonly
AB4E000
unkown
page read and write
24D0000
heap
page read and write
C92D000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
7FF5ED9FF000
unkown
page readonly
7FF5ED519000
unkown
page readonly
7FF5ED8E7000
unkown
page readonly
7FF5ED59E000
unkown
page readonly
9893000
unkown
page read and write
79D3000
unkown
page read and write
37BD000
unkown
page read and write
A361000
unkown
page read and write
CA0A000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
C10A000
stack
page read and write
86F000
stack
page read and write
48AD000
direct allocation
page execute and read and write
5A3B000
stack
page read and write
EBCE000
stack
page read and write
7FF5ED7E9000
unkown
page readonly
13F3000
trusted library allocation
page read and write
36F0000
unkown
page readonly
434B000
trusted library allocation
page read and write
7FF5ED68F000
unkown
page readonly
7FF5EDA38000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
8BF0000
unkown
page readonly
7FF5ED418000
unkown
page readonly
7394000
heap
page read and write
906E000
stack
page read and write
9977000
unkown
page read and write
7FF5ED695000
unkown
page readonly
7DA1000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
CB05000
unkown
page read and write
A50B000
unkown
page read and write
C962000
unkown
page read and write
13D0000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
B8C0000
unkown
page readonly
7FF5ED9E1000
unkown
page readonly
5B10000
trusted library allocation
page read and write
37F9000
unkown
page read and write
9873000
unkown
page read and write
32A4000
heap
page read and write
7FF5ED46A000
unkown
page readonly
5410000
trusted library allocation
page read and write
7FF5ED534000
unkown
page readonly
CA20000
unkown
page read and write
213A000
stack
page read and write
14B0000
trusted library allocation
page execute and read and write
5010000
trusted library allocation
page read and write
E750000
system
page execute and read and write
C6F2000
unkown
page read and write
171D000
trusted library allocation
page execute and read and write
987B000
unkown
page read and write
CB8C000
unkown
page read and write
CB05000
unkown
page read and write
3210000
unkown
page read and write
3181000
unkown
page read and write
7FF5ED3CE000
unkown
page readonly
5640000
trusted library allocation
page execute and read and write
A4A1000
unkown
page read and write
4C4B000
unkown
page read and write
41F000
remote allocation
page execute and read and write
172D000
trusted library allocation
page execute and read and write
7FF5ED73D000
unkown
page readonly
7D00000
unkown
page readonly
8860000
unkown
page read and write
A37D000
unkown
page read and write
7FF5ED695000
unkown
page readonly
7953000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
5557000
stack
page read and write
A50B000
unkown
page read and write
34A0000
trusted library allocation
page read and write
4CD1000
heap
page read and write
E94E000
stack
page read and write
11BF000
stack
page read and write
C7C5000
unkown
page read and write
91B9000
stack
page read and write
1730000
trusted library allocation
page read and write
C6D8000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
7840000
heap
page read and write
7FF5EDA0B000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
8DA0000
unkown
page read and write
293E000
stack
page read and write
3210000
unkown
page read and write
AD0000
trusted library allocation
page read and write
7FF5ED40D000
unkown
page readonly
1440000
unkown
page read and write
310E000
stack
page read and write
5415000
trusted library allocation
page read and write
BC9B000
stack
page read and write
A502000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
32A4000
heap
page read and write
9660000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
4E21000
heap
page read and write
7C5E000
stack
page read and write
3290000
unkown
page read and write
896B000
stack
page read and write
9798000
unkown
page read and write
7AB5000
heap
page read and write
7FF5ED692000
unkown
page readonly
4B8B000
unkown
page read and write
2F00000
unclassified section
page execute and read and write
2FE0000
heap
page read and write
CA0000
heap
page read and write
6D6000
heap
page read and write
2E7E000
stack
page read and write
13E0000
trusted library allocation
page read and write
25E0000
heap
page read and write
7FF5ED265000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
F01000
system
page execute and read and write
7FF5ED886000
unkown
page readonly
C6C9000
unkown
page read and write
C89A000
unkown
page read and write
12A6000
direct allocation
page execute and read and write
343F000
unclassified section
page execute and read and write
FF03000
unkown
page read and write
15A1000
direct allocation
page execute and read and write
4563000
heap
page read and write
9815000
unkown
page read and write
1390000
unkown
page read and write
37A8000
unkown
page read and write
7FF5ED961000
unkown
page readonly
1090000
heap
page read and write
7FF5ED6BA000
unkown
page readonly
2F21000
trusted library allocation
page read and write
7FF5ED5EB000
unkown
page readonly
AD0000
trusted library allocation
page read and write
1417000
trusted library allocation
page execute and read and write
5010000
trusted library allocation
page read and write
CA0A000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
787C000
unkown
page read and write
3443000
unclassified section
page execute and read and write
5E70000
trusted library section
page read and write
7FF5ED872000
unkown
page readonly
8FB9000
stack
page read and write
18A0000
unkown
page readonly
4CE0000
unkown
page read and write
1010000
heap
page read and write
78A0000
unkown
page read and write
A32A000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
F92B000
unkown
page read and write
1490000
unkown
page read and write
141B000
trusted library allocation
page execute and read and write
7DA1000
unkown
page read and write
CB05000
unkown
page read and write
CB05000
unkown
page read and write
8EC6000
unkown
page read and write
7FF5ED847000
unkown
page readonly
9883000
unkown
page read and write
7FF5ED516000
unkown
page readonly
A4A1000
unkown
page read and write
7FF5ED743000
unkown
page readonly
7F80000
trusted library allocation
page execute and read and write
33B5000
heap
page read and write
A21E000
stack
page read and write
1360000
heap
page read and write
8208000
stack
page read and write
87BE000
stack
page read and write
F40E000
stack
page read and write
57C6000
trusted library allocation
page read and write
12F7000
stack
page read and write
6B8000
heap
page read and write
37F2000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
7FF5ED990000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
7FF5ED6DB000
unkown
page readonly
7FF5ED6DB000
unkown
page readonly
987D000
unkown
page read and write
F1CD000
stack
page read and write
C52000
system
page execute and read and write
AD0000
trusted library allocation
page read and write
89E0000
unkown
page read and write
4BA6000
unkown
page read and write
7FF5ED8B4000
unkown
page readonly
7869000
unkown
page read and write
BAF9000
stack
page read and write
AAFF000
unkown
page read and write
13E4000
trusted library allocation
page read and write
4301000
trusted library allocation
page read and write
7FF5ED5C5000
unkown
page readonly
8000000
unkown
page read and write
7FF5ED503000
unkown
page readonly
A479000
unkown
page read and write
7DF4F3031000
unkown
page execute read
BDC0000
unkown
page readonly
B140000
unkown
page readonly
6D1000
heap
page read and write
B8C0000
unkown
page readonly
33B7000
heap
page read and write
7FF5ED476000
unkown
page readonly
A49E000
unkown
page read and write
A494000
unkown
page read and write
C50A000
unkown
page read and write
A29E000
stack
page read and write
AFFD000
stack
page read and write
343C000
stack
page read and write
7FF5ED800000
unkown
page readonly
C516000
unkown
page read and write
C507000
unkown
page read and write
32A4000
heap
page read and write
C962000
unkown
page read and write
7FF5ED9CA000
unkown
page readonly
F97D000
stack
page read and write
C503000
unkown
page read and write
FA64000
unkown
page read and write
B530000
trusted library allocation
page read and write
7863000
unkown
page read and write
C846000
unkown
page read and write
785D000
unkown
page read and write
2F10000
heap
page execute and read and write
12E2000
direct allocation
page execute and read and write
C6C9000
unkown
page read and write
AF8D000
stack
page read and write
7FF5ED43D000
unkown
page readonly
AB57000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
5740000
trusted library allocation
page read and write
9877000
unkown
page read and write
7FF5ED495000
unkown
page readonly
A49E000
unkown
page read and write
1505000
heap
page read and write
4B56000
unkown
page read and write
14C6000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
1570000
unclassified section
page execute and read and write
7FCE000
stack
page read and write
7FF5ED743000
unkown
page readonly
9881000
unkown
page read and write
979C000
unkown
page read and write
3756000
unkown
page read and write
30D0000
trusted library allocation
page read and write
7FF5ED9BE000
unkown
page readonly
C9AE000
unkown
page read and write
7FF5ED676000
unkown
page readonly
3050000
unclassified section
page execute and read and write
6E0000
heap
page read and write
A364000
unkown
page read and write
2EED000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
7FF5ED9CA000
unkown
page readonly
C88B000
unkown
page read and write
FA2B000
unkown
page read and write
7FF5ED750000
unkown
page readonly
5CC0000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
73E6000
heap
page read and write
5CB0000
heap
page read and write
C6C9000
unkown
page read and write
9869000
unkown
page read and write
C893000
unkown
page read and write
7900000
unkown
page read and write
9EC000
stack
page read and write
C964000
unkown
page read and write
31BE000
trusted library allocation
page read and write
55A0000
trusted library allocation
page execute and read and write
923E000
stack
page read and write
FC20000
unkown
page execute and read and write
FF9000
stack
page read and write
7FF5ED42B000
unkown
page readonly
7FF5ED1D6000
unkown
page readonly
C6F4000
unkown
page read and write
B8B0000
unkown
page read and write
30C0000
trusted library allocation
page read and write
F8E4000
unkown
page read and write
73C6000
heap
page read and write
3022000
unclassified section
page execute and read and write
D9D000
trusted library allocation
page execute and read and write
A4A1000
unkown
page read and write
97A9000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
2A3E000
unkown
page read and write
7FF5ED956000
unkown
page readonly
B10D000
stack
page read and write
906E000
stack
page read and write
C7C5000
unkown
page read and write
88EE000
stack
page read and write
7FF5ED80C000
unkown
page readonly
724E000
stack
page read and write
3329000
unclassified section
page execute and read and write
7CD0000
unkown
page read and write
7FF5ED286000
unkown
page readonly
7857000
unkown
page read and write
32A4000
heap
page read and write
FED4000
unkown
page read and write
3758000
unkown
page read and write
16F0000
heap
page read and write
634000
heap
page read and write
7865000
unkown
page read and write
1638000
direct allocation
page execute and read and write
8710000
unkown
page readonly
5650000
heap
page read and write
7FF5ED64F000
unkown
page readonly
1390000
unkown
page read and write
7370000
heap
page read and write
7FF5ED409000
unkown
page readonly
B13D000
stack
page read and write
C6C1000
unkown
page read and write
1430000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
AAD1000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
3F29000
trusted library allocation
page read and write
128E000
stack
page read and write
DAE000
stack
page read and write
F08F000
stack
page read and write
7FF5ED8A4000
unkown
page readonly
AD0000
trusted library allocation
page read and write
1406000
trusted library allocation
page execute and read and write
AB5D000
unkown
page read and write
FEA0000
unkown
page read and write
9977000
unkown
page read and write
AD0000
trusted library allocation
page read and write
7FF5ED86B000
unkown
page readonly
7FF5EDA47000
unkown
page readonly
AB5D000
unkown
page read and write
3419000
unclassified section
page execute and read and write
E839000
system
page execute and read and write
31E0000
trusted library allocation
page read and write
CB9000
stack
page read and write
9D64000
unkown
page read and write
9F1E000
stack
page read and write
5990000
heap
page read and write
C6F2000
unkown
page read and write
7F70000
trusted library allocation
page read and write
A433000
unkown
page read and write
4BD000
stack
page read and write
E80E000
stack
page read and write
301D000
unclassified section
page execute and read and write
7470000
trusted library allocation
page execute and read and write
7CD0000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
A33E000
unkown
page read and write
7FF5EDA08000
unkown
page readonly
7FF5ED4F3000
unkown
page readonly
7FF5ED9F2000
unkown
page readonly
6D5000
heap
page read and write
C6BF000
unkown
page read and write
7F2E000
stack
page read and write
7D40000
unkown
page read and write
CFB000
stack
page read and write
4B93000
unkown
page read and write
3800000
unkown
page readonly
7FF5ED670000
unkown
page readonly
C964000
unkown
page read and write
1710000
trusted library allocation
page read and write
C544000
unkown
page read and write
A433000
unkown
page read and write
9875000
unkown
page read and write
7FF5ED810000
unkown
page readonly
BE8D000
stack
page read and write
36D3000
stack
page read and write
A433000
unkown
page read and write
13F0000
trusted library allocation
page read and write
A433000
unkown
page read and write
A4B8000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
11CA000
heap
page read and write
4567000
heap
page read and write
4ED0000
trusted library allocation
page execute and read and write
C6F2000
unkown
page read and write
C6C9000
unkown
page read and write
1402000
trusted library allocation
page read and write
7FF5ED418000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
7FFE000
stack
page read and write
BF8D000
stack
page read and write
5557000
stack
page read and write
58C0000
trusted library allocation
page execute and read and write
9B60000
unkown
page readonly
7FF5ED646000
unkown
page readonly
C57F000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
C5AA000
unkown
page read and write
37D2000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
784A000
unkown
page read and write
19EB000
trusted library allocation
page execute and read and write
7FF5ED735000
unkown
page readonly
A09C000
stack
page read and write
59F0000
heap
page execute and read and write
5D14000
heap
page read and write
C92D000
unkown
page read and write
B7AD000
stack
page read and write
E829000
system
page execute and read and write
147E000
stack
page read and write
B80000
heap
page read and write
3464000
unclassified section
page execute and read and write
9A5B000
unkown
page read and write
9815000
unkown
page read and write
8A0000
trusted library allocation
page read and write
308A000
stack
page read and write
7FF5ED928000
unkown
page readonly
7FF5ED337000
unkown
page readonly
7FF5ED449000
unkown
page readonly
F24000
system
page execute and read and write
10C0000
unkown
page readonly
4C1E000
unkown
page read and write
7A34000
unkown
page read and write
125E000
heap
page read and write
30F0000
heap
page execute and read and write
36F0000
unkown
page readonly
4C80000
unkown
page read and write
1227000
direct allocation
page execute and read and write
470D000
direct allocation
page execute and read and write
37A0000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
7847000
unkown
page read and write
FA7E000
stack
page read and write
C4D0000
unkown
page read and write
7FF5ED867000
unkown
page readonly
C6E3000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
7FF5ED433000
unkown
page readonly
7859000
unkown
page read and write
37AE000
unkown
page read and write
7CE0000
unkown
page read and write
F55E000
stack
page read and write
7FF5ED814000
unkown
page readonly
7FF5ED697000
unkown
page readonly
AD0000
trusted library allocation
page read and write
7FF5ED2A4000
unkown
page readonly
B82A000
stack
page read and write
B150000
unkown
page read and write
AAF2000
unkown
page read and write
7FF5ED476000
unkown
page readonly
3797000
unkown
page read and write
979C000
unkown
page read and write
106E000
stack
page read and write
283B000
heap
page read and write
7FF5ED74A000
unkown
page readonly
CA73000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
311E000
unkown
page read and write
7DF4F3041000
unkown
page execute read
CB1A000
unkown
page read and write
8A6E000
stack
page read and write
7FF5ED279000
unkown
page readonly
7FF5ED9F2000
unkown
page readonly
4C90000
unkown
page read and write
EE4000
system
page execute and read and write
141D000
direct allocation
page execute and read and write
37F6000
unkown
page read and write
3181000
unkown
page read and write
5641000
unkown
page read and write
C503000
unkown
page read and write
7695000
stack
page read and write
32A4000
heap
page read and write
4B93000
unkown
page read and write
7F30000
unkown
page read and write
9885000
unkown
page read and write
9B60000
unkown
page readonly
7FF5EDA0D000
unkown
page readonly
7FF5ED3D0000
unkown
page readonly
F69F000
stack
page read and write
818E000
stack
page read and write
738C000
heap
page read and write
1095000
heap
page read and write
A49E000
unkown
page read and write
7900000
unkown
page read and write
5573000
heap
page read and write
7DF4F3040000
unkown
page readonly
33C2000
heap
page read and write
7C70000
trusted library allocation
page execute and read and write
A4B8000
unkown
page read and write
4281000
heap
page read and write
8210000
unkown
page read and write
7C90000
unkown
page read and write
FEEA000
unkown
page read and write
C563000
unkown
page read and write
3795000
unkown
page read and write
A37D000
unkown
page read and write
7A20000
heap
page read and write
7FF5ED74A000
unkown
page readonly
634000
heap
page read and write
B190000
unkown
page read and write
C6F2000
unkown
page read and write
ED0000
system
page execute and read and write
2B7F000
stack
page read and write
B3B000
stack
page read and write
7F40000
unkown
page readonly
C88B000
unkown
page read and write
7FF5ED1B6000
unkown
page readonly
35A0000
unkown
page readonly
7FF5ED9B8000
unkown
page readonly
785F000
unkown
page read and write
634000
heap
page read and write
EFAC000
stack
page read and write
7FF5ED451000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
7FF5EDA2A000
unkown
page readonly
4CE0000
unkown
page read and write
B640000
unkown
page read and write
7FF5ED942000
unkown
page readonly
C857000
unkown
page read and write
C893000
unkown
page read and write
7FF5ED556000
unkown
page readonly
7FF5ED5C9000
unkown
page readonly
3572000
trusted library allocation
page read and write
32A4000
heap
page read and write
98E0000
unkown
page read and write
4280000
heap
page read and write
A494000
unkown
page read and write
7FF5ED937000
unkown
page readonly
7FF5ED937000
unkown
page readonly
7FF5ED8F9000
unkown
page readonly
13A0000
heap
page read and write
234D000
stack
page read and write
43AA000
heap
page read and write
11B0000
unkown
page readonly
2190000
heap
page read and write
8710000
unkown
page readonly
D6E000
stack
page read and write
7440000
trusted library allocation
page read and write
7FF5ED4BB000
unkown
page readonly
7FF5ED92C000
unkown
page readonly
9E0000
heap
page read and write
E4A0000
system
page execute and read and write
7FF5ED9D9000
unkown
page readonly
32A4000
heap
page read and write
7FF5ED7FD000
unkown
page readonly
5461000
direct allocation
page execute and read and write
7FF5ED850000
unkown
page readonly
8208000
stack
page read and write
5A50000
heap
page read and write
CA45000
unkown
page read and write
C4D0000
unkown
page read and write
2800000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
7FF5ED800000
unkown
page readonly
3424000
unclassified section
page execute and read and write
33C2000
heap
page read and write
7FF5ED26E000
unkown
page readonly
A4AB000
unkown
page read and write
3108000
trusted library allocation
page read and write
97B5000
unkown
page read and write
5B13000
trusted library allocation
page read and write
AB57000
unkown
page read and write
A4AE000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
7FF5ED586000
unkown
page readonly
C512000
unkown
page read and write
DEE000
system
page execute and read and write
E4A0000
unkown
page read and write
A491000
unkown
page read and write
7FF5ED586000
unkown
page readonly
79D3000
unkown
page read and write
A4AE000
unkown
page read and write
C84D000
unkown
page read and write
AD0000
trusted library allocation
page read and write
7950000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
C512000
unkown
page read and write
CB1A000
unkown
page read and write
8000000
unkown
page read and write
59E0000
trusted library section
page readonly
6DA000
heap
page read and write
343B000
unclassified section
page execute and read and write
3220000
unkown
page readonly
C9E000
stack
page read and write
FEA0000
unkown
page read and write
1723000
trusted library allocation
page read and write
7FF5ED674000
unkown
page readonly
F12E000
stack
page read and write
C54A000
unkown
page read and write
C962000
unkown
page read and write
1490000
unkown
page read and write
AB5D000
unkown
page read and write
5010000
trusted library allocation
page read and write
F9E3000
unkown
page read and write
EEAC000
stack
page read and write
379E000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
977A000
unkown
page read and write
AB5B000
unkown
page read and write
C846000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
1483000
heap
page read and write
785B000
unkown
page read and write
7852000
unkown
page read and write
A37B000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
7DF4F3071000
unkown
page execute read
AD0000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
8BE9000
stack
page read and write
FD68000
unkown
page execute and read and write
C811000
unkown
page read and write
37F6000
unkown
page read and write
814E000
stack
page read and write
B520000
trusted library allocation
page read and write
986B000
unkown
page read and write
7FF5ED5C9000
unkown
page readonly
C5E5000
unkown
page read and write
AADB000
unkown
page read and write
251F000
unkown
page read and write
C4A0000
unkown
page read and write
B5AE000
stack
page read and write
A49E000
unkown
page read and write
AB5D000
unkown
page read and write
AB5F000
unkown
page read and write
13FD000
trusted library allocation
page execute and read and write
7FF5ED9ED000
unkown
page readonly
7FF5EDA08000
unkown
page readonly
6D5000
heap
page read and write
9893000
unkown
page read and write
4B50000
unkown
page read and write
1700000
unclassified section
page execute and read and write
C9BF000
unkown
page read and write
E6CE000
stack
page read and write
31A0000
trusted library allocation
page read and write
A391000
unkown
page read and write
269A000
heap
page read and write
9879000
unkown
page read and write
F45E000
stack
page read and write
4B90000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
590E000
stack
page read and write
B170000
unkown
page readonly
B5AE000
stack
page read and write
786B000
unkown
page read and write
6DA000
heap
page read and write
3F4B000
trusted library allocation
page read and write
C89A000
unkown
page read and write
CA20000
unkown
page read and write
979C000
unkown
page read and write
7FF5ED781000
unkown
page readonly
A2C000
stack
page read and write
2ABE000
stack
page read and write
12F0000
direct allocation
page execute and read and write
AD000
stack
page read and write
33C2000
heap
page read and write
9795000
unkown
page read and write
C9C5000
unkown
page read and write
3459000
unclassified section
page execute and read and write
7FF5ED7D6000
unkown
page readonly
4B8B000
unkown
page read and write
58A0000
trusted library allocation
page read and write
7FF5ED1BC000
unkown
page readonly
3450000
unclassified section
page execute and read and write
9F1E000
stack
page read and write
34E8000
stack
page read and write
C08A000
stack
page read and write
7FF5ED1CF000
unkown
page readonly
58B0000
trusted library allocation
page read and write
C9DE000
unkown
page read and write
5590000
unkown
page write copy
4C1E000
unkown
page read and write
B6A0000
heap
page read and write
A310000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
11C0000
heap
page read and write
3580000
trusted library allocation
page read and write
BD4D000
stack
page read and write
34D0000
trusted library allocation
page read and write
F939000
unkown
page read and write
7FF5ED426000
unkown
page readonly
A379000
unkown
page read and write
E5EF000
system
page execute and read and write
AD0000
trusted library allocation
page read and write
A33E000
unkown
page read and write
A50B000
unkown
page read and write
5440000
trusted library allocation
page read and write
7FF5ED404000
unkown
page readonly
7FF5ED850000
unkown
page readonly
9885000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
7D20000
unkown
page readonly
10D0000
heap
page read and write
9792000
unkown
page read and write
DE9000
system
page execute and read and write
EA1000
system
page execute and read and write
C52C000
unkown
page read and write
C962000
unkown
page read and write
C857000
unkown
page read and write
2F9F000
stack
page read and write
AD0000
trusted library allocation
page read and write
7FF5ED818000
unkown
page readonly
A323000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
148E000
direct allocation
page execute and read and write
7FF5ED4B0000
unkown
page readonly
31CD000
trusted library allocation
page read and write
9873000
unkown
page read and write
EC0000
unkown
page readonly
B190000
unkown
page read and write
2F00000
trusted library allocation
page read and write
5C3E000
stack
page read and write
B22B000
stack
page read and write
31E5000
trusted library allocation
page read and write
5620000
heap
page read and write
CA6A000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
9881000
unkown
page read and write
7FF5ED534000
unkown
page readonly
4287000
heap
page read and write
C9AA000
unkown
page read and write
97C3000
unkown
page read and write
986B000
unkown
page read and write
C8E1000
unkown
page read and write
7865000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
1563000
heap
page read and write
634000
heap
page read and write
943C000
stack
page read and write
7FF5EDA70000
unkown
page readonly
37BD000
unkown
page read and write
7F40000
unkown
page readonly
CB02000
unkown
page read and write
3700000
unkown
page read and write
7FF5ED933000
unkown
page readonly
4E29000
heap
page read and write
7FF5ED793000
unkown
page readonly
7FF5ED9D6000
unkown
page readonly
7C80000
unkown
page read and write
4BE3000
unkown
page read and write
B22B000
stack
page read and write
33B7000
heap
page read and write
CA43000
unkown
page read and write
A491000
unkown
page read and write
7FF5ED412000
unkown
page readonly
CE0000
heap
page read and write
AD0000
trusted library allocation
page read and write
379E000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
AB4E000
unkown
page read and write
4C70000
unkown
page read and write
DF9000
system
page execute and read and write
F10000
system
page execute and read and write
5600000
trusted library section
page readonly
140A000
trusted library allocation
page execute and read and write
7D00000
unkown
page readonly
7FF5ED41C000
unkown
page readonly
7FF5ED847000
unkown
page readonly
45D8000
heap
page read and write
A4AE000
unkown
page read and write
FEE4000
unkown
page read and write
2690000
heap
page read and write
4E10000
heap
page read and write
9D64000
unkown
page read and write
7FFE000
stack
page read and write
184F000
stack
page read and write
76A0000
unkown
page read and write
6B0000
heap
page read and write
7DF4F3030000
unkown
page readonly
7953000
unkown
page read and write
C851000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
7FF5ED519000
unkown
page readonly
30C2000
trusted library allocation
page read and write
7FF5ED8C1000
unkown
page readonly
79B1000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
9871000
unkown
page read and write
35C8000
trusted library allocation
page read and write
EFF000
system
page execute and read and write
7DF4F3050000
unkown
page readonly
1349000
direct allocation
page execute and read and write
7FF5ED59C000
unkown
page readonly
7FF5ED660000
unkown
page readonly
16CE000
stack
page read and write
7FF5ED806000
unkown
page readonly
7FF5ED26E000
unkown
page readonly
965C000
stack
page read and write
6CF000
heap
page read and write
C6E3000
unkown
page read and write
FEE4000
unkown
page read and write
98A8000
unkown
page read and write
FED2000
unkown
page read and write
B150000
unkown
page read and write
FEEA000
unkown
page read and write
9A10000
unkown
page read and write
CA98000
unkown
page read and write
7FF5ED86B000
unkown
page readonly
A19F000
stack
page read and write
9A10000
unkown
page read and write
FA2B000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
7FF5ED996000
unkown
page readonly
7FF5ED9D2000
unkown
page readonly
9550000
unkown
page readonly
25F0000
heap
page read and write
7FF5ED806000
unkown
page readonly
C89A000
unkown
page read and write
5492000
trusted library allocation
page read and write
CB0000
unclassified section
page execute and read and write
4CB0000
unkown
page read and write
9798000
unkown
page read and write
7FF5ED886000
unkown
page readonly
A375000
unkown
page read and write
1480000
heap
page read and write
1350000
heap
page read and write
CA64000
unkown
page read and write
FED5000
unkown
page read and write
1435000
stack
page read and write
C4D000
system
page execute and read and write
6E0000
heap
page read and write
7CA0000
unkown
page read and write
A39B000
unkown
page read and write
EACE000
stack
page read and write
15BD000
direct allocation
page execute and read and write
9E6C000
stack
page read and write
B140000
unkown
page readonly
7CA0000
unkown
page read and write
2980000
heap
page read and write
B08D000
stack
page read and write
7A37000
heap
page read and write
C9C2000
unkown
page read and write
C544000
unkown
page read and write
A364000
unkown
page read and write
11B0000
unkown
page readonly
7D53000
unkown
page read and write
B6A0000
heap
page read and write
AF8D000
stack
page read and write
B640000
unkown
page read and write
C99C000
unkown
page read and write
4EE1000
trusted library allocation
page execute and read and write
7FF5ED295000
unkown
page readonly
FEEA000
unkown
page read and write
AB5A000
unkown
page read and write
9DED000
stack
page read and write
9885000
unkown
page read and write
7FF5ED342000
unkown
page readonly
9875000
unkown
page read and write
896B000
stack
page read and write
AAF2000
unkown
page read and write
8CEF000
stack
page read and write
7A34000
unkown
page read and write
3460000
unclassified section
page execute and read and write
CA75000
unkown
page read and write
36D5000
stack
page read and write
AD0000
trusted library allocation
page read and write
73CA000
heap
page read and write
978E000
unkown
page read and write
C557000
unkown
page read and write
7FF5ED679000
unkown
page readonly
7DF4F3061000
unkown
page execute read
298C000
heap
page read and write
1500000
heap
page read and write
7D40000
unkown
page read and write
4922000
direct allocation
page execute and read and write
4B78000
unkown
page read and write
C49E000
stack
page read and write
C6CF000
unkown
page read and write
7FF5ED980000
unkown
page readonly
785B000
unkown
page read and write
7480000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
7FF5ED933000
unkown
page readonly
2EDE000
trusted library allocation
page read and write
1210000
unkown
page readonly
F964000
unkown
page read and write
5104000
heap
page read and write
8FB9000
stack
page read and write
AD0000
trusted library allocation
page read and write
7FF5ED4BB000
unkown
page readonly
2830000
heap
page read and write
4C4B000
unkown
page read and write
EFB000
system
page execute and read and write
2F04000
trusted library allocation
page read and write
987D000
unkown
page read and write
257E000
stack
page read and write
7FF5ED669000
unkown
page readonly
37B0000
unkown
page read and write
5880000
trusted library allocation
page read and write
F03000
system
page execute and read and write
3700000
unkown
page read and write
76A0000
unkown
page read and write
C5E5000
unkown
page read and write
C893000
unkown
page read and write
F939000
unkown
page read and write
634000
heap
page read and write
FEDE000
unkown
page read and write
5CFE000
heap
page read and write
97A9000
unkown
page read and write
F922000
unkown
page read and write
F19000
system
page execute and read and write
C9FE000
unkown
page read and write
BDA0000
unkown
page readonly
BD98000
stack
page read and write
7FF5ED9ED000
unkown
page readonly
FED1000
unkown
page read and write
C6F8000
unkown
page read and write
4FDB000
heap
page read and write
C6CF000
unkown
page read and write
9881000
unkown
page read and write
680000
heap
page read and write
7FF5EDA31000
unkown
page readonly
7FF5ED505000
unkown
page readonly
7FF5ED9D9000
unkown
page readonly
C851000
unkown
page read and write
C561000
unkown
page read and write
7FF5ED409000
unkown
page readonly
CA12000
unkown
page read and write
7FF5ED3DA000
unkown
page readonly
30C0000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
7B5E000
stack
page read and write
7FF5ED714000
unkown
page readonly
FED1000
unkown
page read and write
7FF5ED844000
unkown
page readonly
2AFF000
stack
page read and write
14D0000
heap
page read and write
7FF5EDA38000
unkown
page readonly
56DF000
unclassified section
page read and write
89E0000
unkown
page read and write
A4FC000
unkown
page read and write
3220000
unkown
page readonly
7A4B000
heap
page read and write
7C80000
unkown
page read and write
26FD000
stack
page read and write
5400000
trusted library allocation
page read and write
7FF5EDA70000
unkown
page readonly
7FF5ED867000
unkown
page readonly
B00B000
stack
page read and write
C563000
unkown
page read and write
FEE4000
unkown
page read and write
10C0000
unkown
page readonly
7FF5ED4E8000
unkown
page readonly
7FF5ED755000
unkown
page readonly
7FF5ED9FF000
unkown
page readonly
AD0000
trusted library allocation
page read and write
9877000
unkown
page read and write
3130000
unkown
page read and write
C5A3000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
C700000
unkown
page read and write
97AD000
unkown
page read and write
784E000
heap
page read and write
545D000
direct allocation
page execute and read and write
7FF5ED42B000
unkown
page readonly
8BF0000
unkown
page readonly
CB52000
unkown
page read and write
7FF5ED644000
unkown
page readonly
E5B0000
system
page execute and read and write
7C60000
trusted library allocation
page read and write
4BDC000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
32A0000
heap
page read and write
C9A5000
unkown
page read and write
7FF5ED625000
unkown
page readonly
3521000
trusted library allocation
page read and write
CAF2000
unkown
page read and write
7FF5ED337000
unkown
page readonly
7FF5ED433000
unkown
page readonly
9879000
unkown
page read and write
7F30000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
B0FD000
stack
page read and write
C54A000
unkown
page read and write
634000
heap
page read and write
7FF5ED9C8000
unkown
page readonly
3590000
unkown
page read and write
4BDC000
unkown
page read and write
F31000
system
page execute and read and write
CA66000
unkown
page read and write
A479000
unkown
page read and write
3580000
unkown
page readonly
1280000
heap
page read and write
53FC000
stack
page read and write
7FF5ED471000
unkown
page readonly
7FF5ED781000
unkown
page readonly
45E0000
direct allocation
page execute and read and write
AD0000
trusted library allocation
page read and write
987D000
unkown
page read and write
AAF6000
unkown
page read and write
B00B000
stack
page read and write
C51E000
unkown
page read and write
C8E1000
unkown
page read and write
DC8000
heap
page read and write
5010000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
7861000
unkown
page read and write
F0EE000
stack
page read and write
7FF5ED3D6000
unkown
page readonly
5570000
heap
page read and write
C84D000
unkown
page read and write
9792000
unkown
page read and write
7FF5ED669000
unkown
page readonly
9A10000
unkown
page read and write
4C50000
unkown
page read and write
4B90000
unkown
page read and write
C08A000
stack
page read and write
7FF5ED779000
unkown
page readonly
C89A000
unkown
page read and write
7FF5ED28F000
unkown
page readonly
F92B000
unkown
page read and write
7FF5ED956000
unkown
page readonly
C700000
unkown
page read and write
F9A4000
unkown
page read and write
A21E000
stack
page read and write
6DA000
heap
page read and write
7DF4F3051000
unkown
page execute read
BDC0000
unkown
page readonly
BD1D000
stack
page read and write
9883000
unkown
page read and write
982D000
unkown
page read and write
A327000
unkown
page read and write
1498000
heap
page read and write
1480000
trusted library allocation
page read and write
7FF5ED4EF000
unkown
page readonly
7FF5ED928000
unkown
page readonly
BD98000
stack
page read and write
97AD000
unkown
page read and write
54D2000
direct allocation
page execute and read and write
1200000
unkown
page readonly
1505000
heap
page read and write
12CD000
trusted library allocation
page execute and read and write
5760000
heap
page execute and read and write
4C34000
unkown
page read and write
C52C000
unkown
page read and write
30E0000
trusted library allocation
page read and write
9798000
unkown
page read and write
7FF5ED803000
unkown
page readonly
AD0000
trusted library allocation
page read and write
2C10000
heap
page read and write
33C2000
heap
page read and write
7DF4F3051000
unkown
page execute read
C846000
unkown
page read and write
1220000
heap
page read and write
27F0000
heap
page read and write
54E6000
unclassified section
page read and write
7FF5ED77E000
unkown
page readonly
7ACD000
heap
page read and write
3140000
trusted library allocation
page read and write
97B5000
unkown
page read and write
10BF000
stack
page read and write
4CD0000
unkown
page read and write
1510000
unkown
page readonly
7FF5ED844000
unkown
page readonly
54A0000
trusted library allocation
page execute and read and write
F922000
unkown
page read and write
CA63000
unkown
page read and write
4F81000
trusted library allocation
page execute and read and write
4B59000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
37A8000
unkown
page read and write
B30000
system
page execute and read and write
4779000
trusted library allocation
page read and write
A391000
unkown
page read and write
883A000
heap
page read and write
BDD0000
unkown
page readonly
A3CD000
unkown
page read and write
89A0000
unkown
page read and write
4CC0000
unkown
page read and write
7FF5ED986000
unkown
page readonly
7FF5ED602000
unkown
page readonly
F8E4000
unkown
page read and write
1020000
heap
page read and write
9795000
unkown
page read and write
7FF5ED849000
unkown
page readonly
14B0000
unkown
page readonly
7FF5ED814000
unkown
page readonly
4BE3000
unkown
page read and write
12AB000
unclassified section
page execute and read and write
C6C1000
unkown
page read and write
5108000
heap
page read and write
7FF5ED9B8000
unkown
page readonly
982D000
unkown
page read and write
1500000
heap
page read and write
CA20000
unkown
page read and write
C6D8000
unkown
page read and write
7DF4F3030000
unkown
page readonly
7FF5ED849000
unkown
page readonly
C9AE000
unkown
page read and write
7FF5ED516000
unkown
page readonly
7F810000
trusted library allocation
page execute and read and write
965C000
stack
page read and write
FA64000
unkown
page read and write
7FF5ED9C6000
unkown
page readonly
7FF5EDA76000
unkown
page readonly
AD0000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
C5A0000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
F2E000
system
page execute and read and write
1240000
heap
page read and write
CA75000
unkown
page read and write
C6C1000
unkown
page read and write
153D000
heap
page read and write
758E000
stack
page read and write
5610000
heap
page read and write
CA7C000
unkown
page read and write
630000
heap
page read and write
C9C5000
unkown
page read and write
7FF5ED1CF000
unkown
page readonly
CA12000
unkown
page read and write
9873000
unkown
page read and write
47C000
stack
page read and write
3797000
unkown
page read and write
5010000
trusted library allocation
page read and write
9E6C000
stack
page read and write
EFED000
stack
page read and write
7FF5ED556000
unkown
page readonly
14E6000
direct allocation
page execute and read and write
7FF5ED779000
unkown
page readonly
7FF5ED265000
unkown
page readonly
7861000
unkown
page read and write
7DF4F3061000
unkown
page execute read
7FF5ED4FD000
unkown
page readonly
7FF5ED3F3000
unkown
page readonly
7FF5ED507000
unkown
page readonly
7FF5ED495000
unkown
page readonly
AAF9000
unkown
page read and write
14B0000
unkown
page readonly
7979000
unkown
page read and write
48B1000
direct allocation
page execute and read and write
CA9B000
unkown
page read and write
EF4000
system
page execute and read and write
C5A0000
unkown
page read and write
73A0000
heap
page read and write
15B6000
direct allocation
page execute and read and write
C92D000
unkown
page read and write
7EF000
stack
page read and write
C51E000
unkown
page read and write
4F70000
trusted library allocation
page execute and read and write
7FF5ED9AE000
unkown
page readonly
AA90000
unkown
page read and write
C6E3000
unkown
page read and write
986F000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
33C8000
heap
page read and write
AD0000
trusted library allocation
page read and write
7DF4F3031000
unkown
page execute read
14D1000
direct allocation
page execute and read and write
AF06000
stack
page read and write
25BF000
stack
page read and write
3398000
heap
page read and write
11CE000
heap
page read and write
FE4F000
unkown
page read and write
3390000
heap
page read and write
8860000
unkown
page read and write
1200000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
7FF5ED92C000
unkown
page readonly
A4FC000
unkown
page read and write
5604000
trusted library section
page readonly
13BF000
stack
page read and write
CA42000
unkown
page read and write
CA0A000
unkown
page read and write
CA86000
unkown
page read and write
5590000
unkown
page write copy
A11F000
stack
page read and write
CA7C000
unkown
page read and write
BAF9000
stack
page read and write
37F2000
unkown
page read and write
CA42000
unkown
page read and write
C50A000
unkown
page read and write
98E3000
unkown
page read and write
2579000
stack
page read and write
7FF5EDA14000
unkown
page readonly
37AC000
unkown
page read and write
F18E000
stack
page read and write
7FF5ED9BE000
unkown
page readonly
A4A1000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
32FE000
stack
page read and write
7FF5ED3EA000
unkown
page readonly
6CF000
heap
page read and write
C846000
unkown
page read and write
7E11000
unkown
page read and write
7FF5ED71B000
unkown
page readonly
3420000
unclassified section
page execute and read and write
B650000
unkown
page read and write
1732000
trusted library allocation
page read and write
7867000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
A310000
unkown
page read and write
9879000
unkown
page read and write
9871000
unkown
page read and write
BC9B000
stack
page read and write
A4FC000
unkown
page read and write
7D53000
unkown
page read and write
7FF5ED750000
unkown
page readonly
7FF5ED3A7000
unkown
page readonly
2EE6000
trusted library allocation
page read and write
C84D000
unkown
page read and write
15DF000
stack
page read and write
7FF5ED55F000
unkown
page readonly
C88B000
unkown
page read and write
346E000
unclassified section
page execute and read and write
7FF5ED404000
unkown
page readonly
7A7C000
heap
page read and write
1290000
unclassified section
page execute and read and write
35D0000
unkown
page read and write
7FF5EDA0D000
unkown
page readonly
7852000
unkown
page read and write
36D3000
stack
page read and write
7FF5EDA69000
unkown
page readonly
7380000
heap
page read and write
1412000
trusted library allocation
page read and write
1714000
trusted library allocation
page read and write
768F000
stack
page read and write
37AC000
unkown
page read and write
1230000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
A3BE000
unkown
page read and write
1095000
stack
page read and write
3520000
heap
page read and write
37D2000
unkown
page read and write
ED2D000
stack
page read and write
7FF5ED48A000
unkown
page readonly
D60000
heap
page read and write
78A0000
unkown
page read and write
7FF5ED68C000
unkown
page readonly
7FF5D1CD4000
unkown
page readonly
8830000
heap
page read and write
1451000
unkown
page readonly
80CF000
stack
page read and write
5190000
direct allocation
page execute and read and write
C57F000
unkown
page read and write
AD0000
trusted library allocation
page read and write
A3BE000
unkown
page read and write
7A31000
heap
page read and write
1246000
direct allocation
page execute and read and write
7A70000
heap
page read and write
7FF5ED63F000
unkown
page readonly
7FF5ED915000
unkown
page readonly
C84D000
unkown
page read and write
C857000
unkown
page read and write
7FF5ED939000
unkown
page readonly
1451000
unkown
page readonly
6DA000
heap
page read and write
7FF5ED52F000
unkown
page readonly
AB57000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
9B5B000
stack
page read and write
883A000
heap
page read and write
19E0000
trusted library allocation
page read and write
AAD1000
unkown
page read and write
9893000
unkown
page read and write
7B80000
unkown
page read and write
CB86000
unkown
page read and write
987F000
unkown
page read and write
67E000
stack
page read and write
32A4000
heap
page read and write
A29E000
stack
page read and write
7FF5ED97E000
unkown
page readonly
7FF5ED87D000
unkown
page readonly
D40000
trusted library allocation
page execute and read and write
7FF5ED1BC000
unkown
page readonly
7FF5ED2A4000
unkown
page readonly
B0E000
stack
page read and write
A502000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
31F0000
heap
page read and write
CAF2000
unkown
page read and write
4BE1000
unkown
page read and write
3240000
unkown
page read and write
95EE000
stack
page read and write
21DE000
unkown
page read and write
DC0000
heap
page read and write
7FF5ED93E000
unkown
page readonly
3434000
unclassified section
page execute and read and write
7FF5ED975000
unkown
page readonly
7884000
unkown
page read and write
2C20000
heap
page read and write
AADB000
unkown
page read and write
56C3000
unkown
page read and write
BDD0000
unkown
page readonly
97D4000
unkown
page read and write
10DE6000
system
page read and write
50BC000
stack
page read and write
FEDD000
unkown
page read and write
AB5A000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
2EE1000
trusted library allocation
page read and write
B82A000
stack
page read and write
C6CF000
unkown
page read and write
5010000
trusted library allocation
page read and write
7FF5ED1D6000
unkown
page readonly
7FF5ED71E000
unkown
page readonly
7FF5ED507000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
EA4D000
stack
page read and write
7FF5ED9E1000
unkown
page readonly
4CD1000
heap
page read and write
97B5000
unkown
page read and write
CA7C000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
332E000
unclassified section
page execute and read and write
9702000
unkown
page read and write
25F0000
heap
page read and write
7540000
trusted library allocation
page execute and read and write
56C3000
unkown
page read and write
CA98000
unkown
page read and write
C700000
unkown
page read and write
AD0000
trusted library allocation
page read and write
A4B8000
unkown
page read and write
10D0000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
7FF5ED85F000
unkown
page readonly
125A000
heap
page read and write
786B000
unkown
page read and write
A361000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
2F06000
trusted library allocation
page read and write
7FF5ED4C6000
unkown
page readonly
7FF5ED445000
unkown
page readonly
BE4D000
stack
page read and write
C516000
unkown
page read and write
477E000
direct allocation
page execute and read and write
13A0000
unkown
page read and write
8D69000
stack
page read and write
FF03000
unkown
page read and write
52B9000
direct allocation
page execute and read and write
DD0000
unkown
page readonly
CA63000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
5480000
heap
page read and write
7FF5ED449000
unkown
page readonly
23B0000
heap
page read and write
93E0000
trusted library allocation
page read and write
AB5A000
unkown
page read and write
70E0000
heap
page read and write
C6F8000
unkown
page read and write
9550000
unkown
page readonly
8720000
unkown
page readonly
12AF000
unclassified section
page execute and read and write
A494000
unkown
page read and write
33C2000
heap
page read and write
79FB000
unkown
page read and write
7386000
heap
page read and write
634000
heap
page read and write
C7C5000
unkown
page read and write
1480000
heap
page read and write
9871000
unkown
page read and write
C7C5000
unkown
page read and write
AD0000
trusted library allocation
page read and write
7863000
unkown
page read and write
5A70000
trusted library allocation
page execute and read and write
E68E000
stack
page read and write
797D000
unkown
page read and write
4C18000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
1720000
trusted library allocation
page read and write
33C2000
heap
page read and write
CA0A000
unkown
page read and write
78AD000
unkown
page read and write
C89C000
unkown
page read and write
143B000
stack
page read and write
58D0000
heap
page read and write
98A8000
unkown
page read and write
AC0000
heap
page read and write
7FF5ED990000
unkown
page readonly
C557000
unkown
page read and write
7FF5ED961000
unkown
page readonly
57B0000
heap
page read and write
3290000
unkown
page read and write
4CD0000
unkown
page read and write
AB5E000
unkown
page read and write
37F9000
unkown
page read and write
5010000
trusted library allocation
page read and write
818E000
stack
page read and write
8730000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
7EF0000
trusted library section
page read and write
C8E1000
unkown
page read and write
4C50000
unkown
page read and write
C41F000
stack
page read and write
AB5F000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
7FF5ED93E000
unkown
page readonly
3301000
trusted library allocation
page read and write
7FF5ED93B000
unkown
page readonly
C6F4000
unkown
page read and write
14D3000
heap
page read and write
8830000
heap
page read and write
F83B000
stack
page read and write
AD0000
trusted library allocation
page read and write
BC10000
heap
page read and write
8A6E000
stack
page read and write
5A80000
trusted library allocation
page read and write
7462000
trusted library allocation
page read and write
F93C000
stack
page read and write
5496000
trusted library allocation
page read and write
9DED000
stack
page read and write
C893000
unkown
page read and write
97A9000
unkown
page read and write
33B9000
stack
page read and write
C8E1000
unkown
page read and write
C89C000
unkown
page read and write
7FF5ED9AE000
unkown
page readonly
7FF5EDA2A000
unkown
page readonly
9138000
stack
page read and write
C6CF000
unkown
page read and write
6DA000
heap
page read and write
7FF5ED445000
unkown
page readonly
97AD000
unkown
page read and write
7CC0000
unkown
page readonly
9D0000
heap
page read and write
C41F000
stack
page read and write
7FF5ED5EB000
unkown
page readonly
B650000
unkown
page read and write
7FF5ED821000
unkown
page readonly
AF0A000
stack
page read and write
C811000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
987F000
unkown
page read and write
3020000
trusted library allocation
page read and write
4B56000
unkown
page read and write
7FF5ED9D2000
unkown
page readonly
9660000
unkown
page read and write
3146000
unkown
page read and write
5641000
unkown
page read and write
B23D000
stack
page read and write
7FF5ED6B8000
unkown
page readonly
27D0000
heap
page read and write
7FF5ED342000
unkown
page readonly
A327000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
7FF5ED349000
unkown
page readonly
4B78000
unkown
page read and write
DD0000
unkown
page readonly
7FF5ED4EF000
unkown
page readonly
4C34000
unkown
page read and write
57C2000
trusted library allocation
page read and write
37A0000
unkown
page read and write
C964000
unkown
page read and write
1240000
heap
page read and write
982D000
unkown
page read and write
5CB5000
heap
page read and write
EE0000
system
page execute and read and write
7857000
unkown
page read and write
4C18000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
C857000
unkown
page read and write
32A4000
heap
page read and write
739C000
heap
page read and write
CB46000
unkown
page read and write
C6F8000
unkown
page read and write
173A000
trusted library allocation
page execute and read and write
3580000
unkown
page readonly
7CC0000
unkown
page readonly
AA90000
unkown
page read and write
C811000
unkown
page read and write
1848000
unclassified section
page execute and read and write
B8AB000
stack
page read and write
32A4000
heap
page read and write
7FF5ED94A000
unkown
page readonly
7FF5ED9A1000
unkown
page readonly
7FF5ED3DA000
unkown
page readonly
C6BF000
unkown
page read and write
70EE000
heap
page read and write
E827000
system
page execute and read and write
3146000
unkown
page read and write
734E000
stack
page read and write
A491000
unkown
page read and write
35D0000
unkown
page read and write
97D4000
unkown
page read and write
C9F3000
unkown
page read and write
14C0000
trusted library allocation
page read and write
3738000
unkown
page read and write
550000
heap
page read and write
8EC6000
unkown
page read and write
3209000
stack
page read and write
331E000
stack
page read and write
A494000
unkown
page read and write
8210000
unkown
page read and write
33B9000
stack
page read and write
21E0000
heap
page read and write
C89C000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
787C000
unkown
page read and write
7E60000
unkown
page read and write
1440000
unkown
page read and write
33E1000
unclassified section
page execute and read and write
7FF5ED8F9000
unkown
page readonly
C6BF000
unkown
page read and write
F9E3000
unkown
page read and write
986B000
unkown
page read and write
7FF5ED503000
unkown
page readonly
A4AB000
unkown
page read and write
AAF9000
unkown
page read and write
785F000
unkown
page read and write
94EE000
stack
page read and write
9875000
unkown
page read and write
CCB000
unclassified section
page execute and read and write
30AB000
stack
page read and write
32A4000
heap
page read and write
118F000
stack
page read and write
AD0000
trusted library allocation
page read and write
7FF5ED803000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
A11F000
stack
page read and write
1736000
trusted library allocation
page execute and read and write
4CB0000
unkown
page read and write
A323000
unkown
page read and write
7FF5ED471000
unkown
page readonly
CA12000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
AD0000
trusted library allocation
page read and write
7FF5ED7C4000
unkown
page readonly
7FF5ED864000
unkown
page readonly
7859000
unkown
page read and write
C6D8000
unkown
page read and write
532E000
direct allocation
page execute and read and write
3471000
unclassified section
page execute and read and write
7FF5ED505000
unkown
page readonly
89C0000
unkown
page read and write
9A5B000
unkown
page read and write
9A5B000
unkown
page read and write
7F60000
trusted library allocation
page read and write
9701000
unkown
page read and write
F9A4000
unkown
page read and write
5760000
trusted library allocation
page read and write
11AD000
stack
page read and write
9883000
unkown
page read and write
7FF5ED975000
unkown
page readonly
1350000
unkown
page readonly
56D9000
unkown
page read and write
7FF5ED4A1000
unkown
page readonly
7E60000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
30B0000
trusted library allocation
page execute and read and write
7FF5ED9A6000
unkown
page readonly
A3D4000
unkown
page read and write
C4A0000
unkown
page read and write
14D7000
heap
page read and write
3791000
unkown
page read and write
F90000
heap
page read and write
16BF000
unclassified section
page execute and read and write
F22F000
stack
page read and write
7FF5ED295000
unkown
page readonly
7A89000
heap
page read and write
AB57000
unkown
page read and write
DC0000
heap
page read and write
3748000
unkown
page read and write
7847000
unkown
page read and write
950000
heap
page read and write
5010000
trusted library allocation
page read and write
89A0000
unkown
page read and write
8832000
heap
page read and write
987B000
unkown
page read and write
7FF5ED68C000
unkown
page readonly
F30E000
stack
page read and write
3800000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
306E000
stack
page read and write
DB7000
stack
page read and write
19E2000
trusted library allocation
page read and write
7A47000
heap
page read and write
987F000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
35A0000
unkown
page readonly
1220000
direct allocation
page execute and read and write
5490000
trusted library allocation
page read and write
7FF5EDA11000
unkown
page readonly
CA20000
unkown
page read and write
1343000
direct allocation
page execute and read and write
14A0000
heap
page read and write
97C000
stack
page read and write
13E3000
trusted library allocation
page execute and read and write
A375000
unkown
page read and write
2EBC000
stack
page read and write
997A000
unkown
page read and write
7695000
stack
page read and write
9ADD000
stack
page read and write
7FF5ED980000
unkown
page readonly
76C0000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
A4AE000
unkown
page read and write
C6F8000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
5980000
heap
page read and write
DC7000
heap
page read and write
19E7000
trusted library allocation
page execute and read and write
9792000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
978E000
unkown
page read and write
4B50000
unkown
page read and write
31C6000
trusted library allocation
page read and write
F964000
unkown
page read and write
4281000
heap
page read and write
7FF5ED412000
unkown
page readonly
1202000
heap
page read and write
AAFF000
unkown
page read and write
1220000
heap
page read and write
7FF5ED872000
unkown
page readonly
96DF000
unkown
page read and write
55FC000
stack
page read and write
7FF5ED9A1000
unkown
page readonly
5985000
heap
page read and write
7C90000
unkown
page read and write
A4AB000
unkown
page read and write
B8B0000
unkown
page read and write
AB4E000
unkown
page read and write
8B60000
unkown
page readonly
986F000
unkown
page read and write
8832000
heap
page read and write
1483000
heap
page read and write
7CE0000
unkown
page read and write
C507000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
DE0000
unkown
page readonly
1713000
trusted library allocation
page execute and read and write
7E11000
unkown
page read and write
C9FE000
unkown
page read and write
3795000
unkown
page read and write
443A000
heap
page read and write
7FF5EDA0B000
unkown
page readonly
A50B000
unkown
page read and write
F59E000
stack
page read and write
FEDD000
unkown
page read and write
1A07000
heap
page read and write
There are 1908 hidden memdumps, click here to show them.