IOC Report
Bankcerticate223pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Bankcerticate223pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bankcerticate223pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp8D97.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\cvRSCwXQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\cvRSCwXQ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cvRSCwXQ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0caxruox.skh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_abu4iwsx.evb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aiyd0en2.sqh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_apmely4u.yzi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brrn4jqa.q2k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ptixplv1.uv0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rxjqrb3d.qvx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ut1gaemg.1xf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9DE3.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Bankcerticate223pdf.exe
"C:\Users\user\Desktop\Bankcerticate223pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bankcerticate223pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\cvRSCwXQ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cvRSCwXQ" /XML "C:\Users\user\AppData\Local\Temp\tmp8D97.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\cvRSCwXQ.exe
C:\Users\user\AppData\Roaming\cvRSCwXQ.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cvRSCwXQ" /XML "C:\Users\user\AppData\Local\Temp\tmp9DE3.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\SysWOW64\wscript.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.harepoint.legal/a02d/www.amsexgirls.website
unknown
https://aka.ms/odirmr
unknown
http://www.ruck-driver-jobs-86708.bond
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://www.ammamiaitalia.net/a02d/www.idzev.shop
unknown
http://www.strange.store/a02d/
unknown
http://www.nfluencer-marketing-41832.bondReferer:
unknown
http://www.strange.store/a02d/www.coplus.market
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.fontbureau.com/designers
unknown
https://excel.office.com
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.8435.pizzaReferer:
unknown
http://www.estionprojetsccpm.online/a02d/
unknown
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.yhbvc.xyz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://www.8435.pizza/a02d/
unknown
http://www.strange.storeReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.amsexgirls.websiteReferer:
unknown
http://www.nalyzator.fun
unknown
http://www.urwpp.deDPlease
unknown
http://www.coplus.market
unknown
http://www.zhongyicts.com.cn
unknown
http://www.coplus.market/a02d/www.omptables.xyz
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
www.8435.pizza/a02d/
http://www.coplus.marketReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://wns.windows.com/L
unknown
https://word.office.com
unknown
http://www.ruck-driver-jobs-86708.bond/a02d/www.eat-pumps-31610.bond
unknown
http://www.nalyzator.funReferer:
unknown
http://www.eat-pumps-31610.bondReferer:
unknown
http://www.idzev.shopReferer:
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
http://www.estionprojetsccpm.onlineReferer:
unknown
http://www.8435.pizza
unknown
http://www.eat-pumps-31610.bond
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
http://www.rh799295w.vipReferer:
unknown
http://www.amsexgirls.website/a02d/www.ammamiaitalia.net
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.rh799295w.vip
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://www.4cw.latReferer:
unknown
http://www.carterandcone.coml
unknown
http://www.4cw.lat/a02d/
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.ruck-driver-jobs-86708.bondReferer:
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
http://www.eat-pumps-31610.bond/a02d/
unknown
https://android.notify.windows.com/iOS
unknown
http://www.idzev.shop
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
http://www.omptables.xyz/a02d/
unknown
http://www.ruck-driver-jobs-86708.bond/a02d/
unknown
https://outlook.com_
unknown
http://www.amsexgirls.website
unknown
http://www.amsexgirls.website/a02d/
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://www.fontbureau.com/designersG
unknown
http://www.ammamiaitalia.net/a02d/
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://powerpoint.office.comcember
unknown
http://www.idzev.shop/a02d/
unknown
http://www.tiro.com
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
http://www.goodfont.co.kr
unknown
http://schemas.micro
unknown
http://www.rh799295w.vip/a02d/www.4cw.lat
unknown
http://www.ammamiaitalia.netReferer:
unknown
http://www.harepoint.legalReferer:
unknown
http://www.omptables.xyz/a02d/www.nalyzator.fun
unknown
http://www.yhbvc.xyzReferer:
unknown
http://www.typography.netD
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.yhbvc.xyz/a02d/www.ruck-driver-jobs-86708.bond
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.estionprojetsccpm.online/a02d/www.8435.pizza
unknown
http://www.omptables.xyzReferer:
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/q
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
http://www.sakkal.com
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.ammamiaitalia.net
unknown
malicious
www.ruck-driver-jobs-86708.bond
unknown
malicious
www.omptables.xyz
unknown
malicious
www.amsexgirls.website
unknown
malicious
www.nalyzator.fun
unknown
malicious
www.eat-pumps-31610.bond
unknown
malicious
www.strange.store
unknown
malicious
www.nfluencer-marketing-41832.bond
unknown
malicious
www.idzev.shop
unknown
malicious
www.harepoint.legal
unknown
malicious
www.coplus.market
unknown
malicious
There are 1 hidden domains, click here to show them.

Registry

Path
Value
Malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
@explorerframe.dll,-13137
malicious
unknown
@explorerframe.dll,-13138
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Unpacker
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
Classes
malicious
unknown
~reserved~
malicious
unknown
CheckSetting
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
TaskbarStateLastRun
malicious
unknown
Implementing
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
WMP11.AssocFile.3G2
malicious
unknown
WMP11.AssocFile.3GP
malicious
unknown
WMP11.AssocFile.ADTS
malicious
unknown
WMP11.AssocFile.AIFF
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.AU
malicious
unknown
AutoIt3Script
malicious
unknown
WMP11.AssocFile.AVI
malicious
unknown
Paint.Picture
malicious
unknown
CABFolder
malicious
unknown
Microsoft.PowerShellCmdletDefinitionXML.1
malicious
unknown
CSSfile
malicious
unknown
Excel.CSV
malicious
unknown
ddsfile
malicious
unknown
dllfile
malicious
unknown
Word.Document.8
malicious
unknown
Word.DocumentMacroEnabled.12
malicious
unknown
Word.Document.12
malicious
unknown
Word.Template.8
malicious
unknown
Word.TemplateMacroEnabled.12
malicious
unknown
Word.Template.12
malicious
unknown
emffile
malicious
unknown
exefile
malicious
unknown
WMP11.AssocFile.FLAC
malicious
unknown
fonfile
malicious
unknown
giffile
malicious
unknown
htmlfile
malicious
unknown
icofile
malicious
unknown
inffile
malicious
unknown
inifile
malicious
unknown
pjpegfile
malicious
unknown
jpegfile
malicious
unknown
wdpfile
malicious
unknown
lnkfile
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.m3u
malicious
unknown
WMP11.AssocFile.M4A
malicious
unknown
WMP11.AssocFile.MP4
malicious
unknown
mhtmlfile
malicious
unknown
WMP11.AssocFile.MIDI
malicious
unknown
WMP11.AssocFile.MK3D
malicious
unknown
WMP11.AssocFile.MKA
malicious
unknown
WMP11.AssocFile.MKV
malicious
unknown
WMP11.AssocFile.MPEG
malicious
unknown
WMP11.AssocFile.MOV
malicious
unknown
WMP11.AssocFile.MP3
malicious
unknown
Outlook.File.msg.15
malicious
unknown
WMP11.AssocFile.M2TS
malicious
unknown
ocxfile
malicious
unknown
PowerPoint.OpenDocumentPresentation.12
malicious
unknown
Excel.OpenDocumentSpreadsheet.12
malicious
unknown
Word.OpenDocumentText.12
malicious
unknown
otffile
malicious
unknown
pngfile
malicious
unknown
PowerPoint.Template.8
malicious
unknown
PowerPoint.TemplateMacroEnabled.12
malicious
unknown
PowerPoint.Template.12
malicious
unknown
PowerPoint.Addin.12
malicious
unknown
PowerPoint.SlideShowMacroEnabled.12
malicious
unknown
PowerPoint.SlideShow.12
malicious
unknown
PowerPoint.Show.8
malicious
unknown
PowerPoint.ShowMacroEnabled.12
malicious
unknown
PowerPoint.Show.12
malicious
unknown
Microsoft.PowerShellScript.1
malicious
unknown
Microsoft.PowerShellXMLData.1
malicious
unknown
Microsoft.PowerShellData.1
malicious
unknown
Microsoft.PowerShellModule.1
malicious
unknown
Microsoft.PowerShellSessionConfiguration.1
malicious
unknown
rlefile
malicious
unknown
Word.RTF.8
malicious
unknown
SHCmdFile
malicious
unknown
SearchFolder
malicious
unknown
shtmlfile
malicious
unknown
PowerPoint.SlideMacroEnabled.12
malicious
unknown
PowerPoint.Slide.12
malicious
unknown
sysfile
malicious
unknown
TIFImage.Document
malicious
unknown
WMP11.AssocFile.TTS
malicious
unknown
ttcfile
malicious
unknown
ttffile
malicious
unknown
txtfile
malicious
unknown
bootstrap.vsto.1
malicious
unknown
WMP11.AssocFile.WAV
malicious
unknown
WMP11.AssocFile.WAX
malicious
unknown
WMP11.AssocFile.ASF
malicious
unknown
WMP11.AssocFile.WMA
malicious
unknown
wmffile
malicious
unknown
WMP11.AssocFile.WMV
malicious
unknown
WMP11.AssocFile.ASX
malicious
unknown
WMP11.AssocFile.WPL
malicious
unknown
WMP11.AssocFile.WVX
malicious
unknown
Excel.AddInMacroEnabled
malicious
unknown
Excel.Sheet.8
malicious
unknown
Excel.SheetBinaryMacroEnabled.12
malicious
unknown
Excel.SheetMacroEnabled.12
malicious
unknown
Excel.Sheet.12
malicious
unknown
Excel.Template.8
malicious
unknown
Excel.TemplateMacroEnabled
malicious
unknown
Excel.Template
malicious
unknown
xmlfile
malicious
unknown
xslfile
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
LastUpdate
malicious
unknown
SlowContextMenuEntries
malicious
unknown
LastUpdate
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
There are 178 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FD0000
unclassified section
page execute and read and write
malicious
27D0000
system
page execute and read and write
malicious
3000000
trusted library allocation
page read and write
malicious
47BF000
trusted library allocation
page read and write
malicious
9D0000
system
page execute and read and write
malicious
4D1E000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4AE4000
trusted library allocation
page read and write
malicious
DE0000
unkown
page readonly
2CE4000
heap
page read and write
7FF5EDA0B000
unkown
page readonly
E42000
trusted library allocation
page read and write
8CED000
stack
page read and write
4F9D000
direct allocation
page execute and read and write
7AF0000
trusted library allocation
page execute and read and write
2B24000
heap
page read and write
7FF5ED670000
unkown
page readonly
7FF5EDA2A000
unkown
page readonly
14FF000
stack
page read and write
2CDB000
heap
page read and write
B10D000
stack
page read and write
4B90000
unkown
page read and write
9136000
stack
page read and write
7FF5ED8E7000
unkown
page readonly
52B0000
trusted library allocation
page read and write
56CE000
stack
page read and write
E4B000
trusted library allocation
page execute and read and write
5590000
unkown
page write copy
10D0000
heap
page read and write
5F70000
trusted library allocation
page read and write
82D9000
heap
page read and write
A4B8000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
7D00000
unkown
page readonly
3153000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
7FF5ED4DF000
unkown
page readonly
98E3000
unkown
page read and write
9815000
unkown
page read and write
37F2000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
3290000
trusted library allocation
page read and write
DB4000
heap
page read and write
AB52000
unkown
page read and write
7FF5ED495000
unkown
page readonly
2C20000
trusted library allocation
page read and write
7FF5ED55F000
unkown
page readonly
982D000
unkown
page read and write
CA63000
unkown
page read and write
4C34000
unkown
page read and write
7FF5ED853000
unkown
page readonly
3209000
stack
page read and write
C8E1000
unkown
page read and write
97A9000
unkown
page read and write
3748000
unkown
page read and write
FAD5000
unkown
page read and write
7869000
unkown
page read and write
7E50000
unkown
page readonly
7AD0000
trusted library section
page readonly
977A000
unkown
page read and write
7EE0000
trusted library section
page read and write
7FF5ED800000
unkown
page readonly
3758000
unkown
page read and write
3150000
trusted library allocation
page execute and read and write
7FF5ED404000
unkown
page readonly
C08A000
stack
page read and write
2C20000
trusted library allocation
page read and write
7FF5ED3D0000
unkown
page readonly
35D0000
unkown
page read and write
217A000
stack
page read and write
3402000
heap
page read and write
CA16000
unkown
page read and write
7E11000
unkown
page read and write
7FF5ED849000
unkown
page readonly
9640000
trusted library allocation
page read and write
7FF5ED8E7000
unkown
page readonly
9873000
unkown
page read and write
41F000
remote allocation
page execute and read and write
C54A000
unkown
page read and write
991E000
unkown
page read and write
10CB000
unclassified section
page execute and read and write
9DED000
stack
page read and write
7FF5ED8FF000
unkown
page readonly
341C000
unkown
page read and write
4C90000
unkown
page read and write
C893000
unkown
page read and write
2F51000
trusted library allocation
page read and write
4C18000
unkown
page read and write
7FF5D1CCD000
unkown
page readonly
BDA0000
unkown
page readonly
9792000
unkown
page read and write
7FF5ED4BB000
unkown
page readonly
7FF5ED74A000
unkown
page readonly
7FF5ED8FF000
unkown
page readonly
C10A000
stack
page read and write
CA12000
unkown
page read and write
3290000
unkown
page read and write
7FF5ED342000
unkown
page readonly
21F0000
heap
page read and write
7FF5ED975000
unkown
page readonly
9550000
unkown
page readonly
1080000
direct allocation
page execute and read and write
7FF5ED692000
unkown
page readonly
F1F000
stack
page read and write
7FF5ED412000
unkown
page readonly
7FF5ED1CC000
unkown
page readonly
8208000
stack
page read and write
C89C000
unkown
page read and write
9E6C000
stack
page read and write
11A0000
heap
page read and write
1363000
trusted library allocation
page execute and read and write
785D000
unkown
page read and write
C51E000
unkown
page read and write
C89A000
unkown
page read and write
3690000
trusted library allocation
page read and write
1350000
unkown
page readonly
C96F000
unkown
page read and write
CB8E000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
979C000
unkown
page read and write
87D5000
heap
page read and write
7CD0000
unkown
page read and write
1331000
direct allocation
page execute and read and write
1228F000
stack
page read and write
1640000
trusted library allocation
page execute and read and write
354E000
direct allocation
page execute and read and write
A50B000
unkown
page read and write
1390000
unkown
page read and write
1208D000
stack
page read and write
7A86000
trusted library allocation
page read and write
7D1B000
stack
page read and write
FAD2000
unkown
page read and write
82F3000
heap
page read and write
37AC000
unkown
page read and write
9875000
unkown
page read and write
787C000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
CAB7000
unkown
page read and write
C4A0000
unkown
page read and write
3290000
trusted library allocation
page read and write
7FF5ED849000
unkown
page readonly
2B24000
heap
page read and write
8DA0000
unkown
page read and write
7FF5EDA31000
unkown
page readonly
7FF5ED990000
unkown
page readonly
7FF5ED7C4000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
1AE1000
unclassified section
page execute and read and write
C54A000
unkown
page read and write
A327000
unkown
page read and write
339E000
heap
page read and write
21AD000
stack
page read and write
7FF5EDA38000
unkown
page readonly
10D0000
heap
page read and write
CAD0000
unkown
page read and write
7DF4F3051000
unkown
page execute read
7C80000
unkown
page read and write
7FF5ED885000
unkown
page readonly
97D4000
unkown
page read and write
FAE8000
unkown
page read and write
1230000
unkown
page read and write
7FF5ED286000
unkown
page readonly
87BE000
stack
page read and write
2A9F000
stack
page read and write
C84D000
unkown
page read and write
B5B000
unclassified section
page execute and read and write
3130000
trusted library allocation
page read and write
139B000
trusted library allocation
page execute and read and write
7FF5ED1BC000
unkown
page readonly
797D000
unkown
page read and write
1390000
trusted library allocation
page read and write
CA12000
unkown
page read and write
C516000
unkown
page read and write
9976000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
7FF5ED65C000
unkown
page readonly
1200000
unkown
page readonly
7FF5EDA76000
unkown
page readonly
E0BD000
stack
page read and write
4B50000
unkown
page read and write
2CD9000
heap
page read and write
1490000
unkown
page read and write
7AA0000
trusted library allocation
page execute and read and write
2C20000
trusted library allocation
page read and write
9883000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
BFD000
trusted library allocation
page execute and read and write
A4FC000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
138A000
trusted library allocation
page execute and read and write
785B000
unkown
page read and write
7859000
unkown
page read and write
CA8E000
unkown
page read and write
3008000
heap
page read and write
C5A0000
unkown
page read and write
CBA6000
unkown
page read and write
9A10000
unkown
page read and write
1137000
stack
page read and write
7FF5ED5A8000
unkown
page readonly
4BDC000
unkown
page read and write
15FE000
stack
page read and write
7FF5ED644000
unkown
page readonly
3020000
heap
page read and write
A33E000
unkown
page read and write
3050000
heap
page read and write
7FF5ED602000
unkown
page readonly
E1D000
trusted library allocation
page execute and read and write
2B24000
heap
page read and write
7FF5ED713000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
1483000
heap
page read and write
E14000
trusted library allocation
page read and write
275E000
stack
page read and write
7FF5ED793000
unkown
page readonly
7FF5ED806000
unkown
page readonly
7852000
unkown
page read and write
36F0000
unkown
page readonly
1360000
trusted library allocation
page read and write
7FFD000
stack
page read and write
7FF5ED814000
unkown
page readonly
CAFD000
unkown
page read and write
9893000
unkown
page read and write
CB5D000
unkown
page read and write
CAF4000
unkown
page read and write
2C20000
trusted library allocation
page read and write
7FF5ED4FD000
unkown
page readonly
8EC6000
unkown
page read and write
C9DC000
unkown
page read and write
7FF5ED9B8000
unkown
page readonly
C964000
unkown
page read and write
C6CF000
unkown
page read and write
7FF5ED7C4000
unkown
page readonly
C512000
unkown
page read and write
1440000
unkown
page read and write
7FF5ED956000
unkown
page readonly
303F000
stack
page read and write
7CE0000
unkown
page read and write
1204E000
stack
page read and write
B22B000
stack
page read and write
89C0000
unkown
page read and write
98A8000
unkown
page read and write
5F70000
trusted library allocation
page read and write
BD98000
stack
page read and write
7FF5ED92C000
unkown
page readonly
3210000
unkown
page read and write
34E9000
stack
page read and write
7DF4F3040000
unkown
page readonly
2C20000
trusted library allocation
page read and write
2CDF000
heap
page read and write
79D3000
unkown
page read and write
4584000
trusted library allocation
page read and write
7A6B000
trusted library allocation
page read and write
9877000
unkown
page read and write
7FF5ED697000
unkown
page readonly
C5AA000
unkown
page read and write
A19F000
stack
page read and write
7FF5EDA47000
unkown
page readonly
2450000
heap
page read and write
97C3000
unkown
page read and write
A479000
unkown
page read and write
786B000
unkown
page read and write
F633000
unkown
page read and write
182D000
direct allocation
page execute and read and write
4BE1000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
7FF5ED3D6000
unkown
page readonly
1386000
trusted library allocation
page execute and read and write
33B9000
stack
page read and write
C846000
unkown
page read and write
A310000
unkown
page read and write
1505000
heap
page read and write
979C000
unkown
page read and write
2C20000
trusted library allocation
page read and write
10C0000
heap
page read and write
797D000
unkown
page read and write
C52C000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
2510000
heap
page read and write
A361000
unkown
page read and write
28E0000
heap
page read and write
CC0000
unkown
page readonly
7FF5ED660000
unkown
page readonly
7FF5EDA0D000
unkown
page readonly
A4FC000
unkown
page read and write
CB5A000
unkown
page read and write
9792000
unkown
page read and write
9D0000
heap
page read and write
B22B000
stack
page read and write
1195E000
stack
page read and write
7FF5ED534000
unkown
page readonly
130E000
stack
page read and write
24EF000
unkown
page read and write
7900000
unkown
page read and write
11F0F000
stack
page read and write
2C20000
trusted library allocation
page read and write
C846000
unkown
page read and write
A323000
unkown
page read and write
7A34000
unkown
page read and write
2CD9000
heap
page read and write
C811000
unkown
page read and write
8000000
unkown
page read and write
A11F000
stack
page read and write
1412000
heap
page read and write
3290000
trusted library allocation
page read and write
332D000
heap
page read and write
1248E000
stack
page read and write
E1F000
stack
page read and write
7FF5ED4F3000
unkown
page readonly
7FF5ED94A000
unkown
page readonly
7DF4F3030000
unkown
page readonly
7FF5ED40D000
unkown
page readonly
2B24000
heap
page read and write
881D000
heap
page read and write
7FF5ED449000
unkown
page readonly
3200000
heap
page read and write
C811000
unkown
page read and write
C4D0000
unkown
page read and write
1117E000
stack
page read and write
78A0000
unkown
page read and write
26E000
system
page execute and read and write
CA7C000
unkown
page read and write
3748000
unkown
page read and write
CAFD000
unkown
page read and write
7FF5ED9B8000
unkown
page readonly
8210000
unkown
page read and write
28A000
system
page execute and read and write
CB5A000
unkown
page read and write
7FF5ED915000
unkown
page readonly
2C20000
trusted library allocation
page read and write
2CE0000
heap
page read and write
9B5B000
stack
page read and write
7950000
unkown
page read and write
C9AE000
unkown
page read and write
7FF5ED625000
unkown
page readonly
CA42000
unkown
page read and write
9815000
unkown
page read and write
7FF5ED660000
unkown
page readonly
7FF5ED71E000
unkown
page readonly
18EE000
unclassified section
page execute and read and write
21E0000
heap
page read and write
C964000
unkown
page read and write
785B000
unkown
page read and write
3280000
heap
page execute and read and write
7FF5ED65C000
unkown
page readonly
2AA0000
heap
page read and write
7FF5ED5CE000
unkown
page readonly
324C000
stack
page read and write
3290000
trusted library allocation
page read and write
7FF5ED86B000
unkown
page readonly
DFE000
stack
page read and write
7FF5ED9D6000
unkown
page readonly
2510000
heap
page read and write
978E000
unkown
page read and write
134D000
direct allocation
page execute and read and write
8830000
heap
page read and write
7FF5ED94A000
unkown
page readonly
37F2000
unkown
page read and write
2C20000
trusted library allocation
page read and write
87FB000
heap
page read and write
4C80000
unkown
page read and write
7FF5ED449000
unkown
page readonly
C8E1000
unkown
page read and write
113FE000
stack
page read and write
2AFC000
stack
page read and write
986F000
unkown
page read and write
56C3000
unkown
page read and write
A50B000
unkown
page read and write
18A0000
unkown
page readonly
7FF5ED4B4000
unkown
page readonly
15E6000
direct allocation
page execute and read and write
2C0E000
stack
page read and write
38FF000
unclassified section
page read and write
7FF5ED471000
unkown
page readonly
CB5D000
unkown
page read and write
7E80000
heap
page read and write
7FF5ED800000
unkown
page readonly
3305000
trusted library allocation
page read and write
7FF5ED5C9000
unkown
page readonly
C92D000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
1163D000
stack
page read and write
7FF5ED9E1000
unkown
page readonly
784A000
unkown
page read and write
37A8000
unkown
page read and write
7C90000
unkown
page read and write
1095000
stack
page read and write
C08A000
stack
page read and write
7FF5ED928000
unkown
page readonly
5F70000
trusted library allocation
page read and write
CAE6000
unkown
page read and write
112BE000
stack
page read and write
BCC000
stack
page read and write
1622000
direct allocation
page execute and read and write
7FF5ED8AC000
unkown
page readonly
CB7D000
unkown
page read and write
B150000
unkown
page read and write
4535000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
7FF5ED853000
unkown
page readonly
11ADB000
stack
page read and write
7FF5ED7E9000
unkown
page readonly
1020000
unclassified section
page execute and read and write
9883000
unkown
page read and write
8860000
unkown
page read and write
3590000
unkown
page read and write
310E000
stack
page read and write
4BC9000
unkown
page read and write
7FF5ED986000
unkown
page readonly
A37B000
unkown
page read and write
C857000
unkown
page read and write
906E000
stack
page read and write
A4CE000
stack
page read and write
7FF5ED7D6000
unkown
page readonly
8FB9000
stack
page read and write
7FF5ED97A000
unkown
page readonly
7FF5ED695000
unkown
page readonly
24F0000
heap
page read and write
4B78000
unkown
page read and write
DB4000
heap
page read and write
A37D000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
A33E000
unkown
page read and write
4B93000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
7FF5ED942000
unkown
page readonly
3360000
trusted library allocation
page read and write
AAFF000
unkown
page read and write
A327000
unkown
page read and write
3797000
unkown
page read and write
CAD0000
unkown
page read and write
8720000
unkown
page readonly
FAE4000
unkown
page read and write
F730000
system
page execute and read and write
F957000
system
page execute and read and write
7FF5ED669000
unkown
page readonly
7FF5ED8C1000
unkown
page readonly
7FF5ED8B4000
unkown
page readonly
C96C000
unkown
page read and write
C5A3000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
7FF5ED7FD000
unkown
page readonly
30ED000
stack
page read and write
1122000
trusted library allocation
page read and write
7FF5D1CCD000
unkown
page readonly
881F000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
1340000
trusted library allocation
page read and write
7C80000
unkown
page read and write
9A5B000
unkown
page read and write
C503000
unkown
page read and write
A502000
unkown
page read and write
9873000
unkown
page read and write
A01B000
stack
page read and write
7FF5ED7FD000
unkown
page readonly
52D3000
heap
page read and write
121E000
direct allocation
page execute and read and write
10B5F000
system
page read and write
7FF5ED97E000
unkown
page readonly
7FF5ED503000
unkown
page readonly
5E0000
heap
page read and write
A4AE000
unkown
page read and write
15E0000
direct allocation
page execute and read and write
DB4000
heap
page read and write
1200000
unkown
page readonly
CAE000
stack
page read and write
3020000
heap
page read and write
89E0000
unkown
page read and write
A21E000
stack
page read and write
97AD000
unkown
page read and write
AADB000
unkown
page read and write
CA8A000
unkown
page read and write
1185E000
stack
page read and write
8CEB000
stack
page read and write
CB7B000
unkown
page read and write
CB0000
heap
page read and write
EFB000
stack
page read and write
4B56000
unkown
page read and write
11B5000
heap
page read and write
7A9E000
stack
page read and write
86BE000
stack
page read and write
56D9000
unkown
page read and write
12CE000
stack
page read and write
A32A000
unkown
page read and write
7FF5ED5EB000
unkown
page readonly
A09C000
stack
page read and write
1380000
trusted library allocation
page read and write
8330000
heap
page read and write
C9DF000
unkown
page read and write
2B24000
heap
page read and write
5280000
trusted library allocation
page read and write
785F000
unkown
page read and write
A375000
unkown
page read and write
2B24000
heap
page read and write
299F000
unkown
page read and write
7CE0000
unkown
page read and write
2B24000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
154D000
trusted library allocation
page execute and read and write
A3BE000
unkown
page read and write
96C0000
trusted library allocation
page read and write
7FF5ED556000
unkown
page readonly
818E000
stack
page read and write
7DF4F3071000
unkown
page execute read
1190000
heap
page read and write
26D0000
heap
page read and write
1346000
direct allocation
page execute and read and write
7FF5ED850000
unkown
page readonly
7C90000
unkown
page read and write
E00000
trusted library allocation
page read and write
C89C000
unkown
page read and write
FAAC000
unkown
page read and write
DB4000
heap
page read and write
110E000
heap
page read and write
7FF5ED97E000
unkown
page readonly
CB49000
unkown
page read and write
1451000
unkown
page readonly
CB91000
unkown
page read and write
97C3000
unkown
page read and write
7FF5ED4A1000
unkown
page readonly
C544000
unkown
page read and write
A4B8000
unkown
page read and write
7FF5ED676000
unkown
page readonly
21D000
stack
page read and write
E9F000
heap
page read and write
28E000
system
page execute and read and write
AF0000
heap
page read and write
7FF5ED872000
unkown
page readonly
79B1000
unkown
page read and write
B8C0000
unkown
page readonly
CB7B000
unkown
page read and write
E13000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
87BE000
stack
page read and write
7861000
unkown
page read and write
97AD000
unkown
page read and write
250E000
unkown
page read and write
1397000
trusted library allocation
page execute and read and write
7660000
trusted library allocation
page execute and read and write
9A00000
trusted library allocation
page read and write
9871000
unkown
page read and write
13D4000
heap
page read and write
7FF5ED91A000
unkown
page readonly
FAA0000
unkown
page read and write
5290000
trusted library allocation
page read and write
C544000
unkown
page read and write
2CDB000
heap
page read and write
1440000
unkown
page read and write
4BE3000
unkown
page read and write
8BF0000
unkown
page readonly
2B24000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
8EC6000
unkown
page read and write
8000000
trusted library allocation
page read and write
3020000
heap
page read and write
C6E3000
unkown
page read and write
E32000
trusted library allocation
page read and write
B08D000
stack
page read and write
7FF5ED279000
unkown
page readonly
4CC0000
unkown
page read and write
BD98000
stack
page read and write
B40000
unclassified section
page execute and read and write
7FF5ED793000
unkown
page readonly
7FF5ED6DB000
unkown
page readonly
B00F000
unkown
page read and write
7FF5ED337000
unkown
page readonly
C893000
unkown
page read and write
8108000
stack
page read and write
5590000
unkown
page write copy
AAF6000
unkown
page read and write
FAD1000
unkown
page read and write
C89A000
unkown
page read and write
C89A000
unkown
page read and write
E80000
heap
page read and write
3171000
unkown
page read and write
4CC0000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
7F30000
heap
page read and write
35D0000
unkown
page read and write
9670000
trusted library allocation
page execute and read and write
7FF5ED33F000
unkown
page readonly
513D000
direct allocation
page execute and read and write
99C000
stack
page read and write
11C7000
heap
page read and write
A49E000
unkown
page read and write
C507000
unkown
page read and write
8000000
unkown
page read and write
2810000
heap
page read and write
7978000
unkown
page read and write
7FF5ED928000
unkown
page readonly
7FF5ED7F1000
unkown
page readonly
7FF5ED743000
unkown
page readonly
8710000
unkown
page readonly
C6F8000
unkown
page read and write
9645000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
C92D000
unkown
page read and write
7FF5ED505000
unkown
page readonly
2B24000
heap
page read and write
317C000
heap
page read and write
7FF5ED980000
unkown
page readonly
2C20000
trusted library allocation
page read and write
7FF5ED40D000
unkown
page readonly
2B24000
heap
page read and write
3026000
heap
page read and write
10A0000
heap
page read and write
987F000
unkown
page read and write
2B24000
heap
page read and write
A4FC000
unkown
page read and write
279C000
stack
page read and write
9879000
unkown
page read and write
7FF5ED74A000
unkown
page readonly
9F1E000
stack
page read and write
2B24000
heap
page read and write
7950000
unkown
page read and write
A4A1000
unkown
page read and write
4B00000
heap
page read and write
AAF9000
unkown
page read and write
4291000
trusted library allocation
page read and write
997A000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
CB5D000
unkown
page read and write
1153D000
stack
page read and write
7FF5ED939000
unkown
page readonly
7FF5EDA38000
unkown
page readonly
8210000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
1480000
heap
page read and write
1370000
trusted library allocation
page read and write
9A7000
stack
page read and write
34E9000
stack
page read and write
7FF5ED418000
unkown
page readonly
CB7D000
unkown
page read and write
C6BF000
unkown
page read and write
A37D000
unkown
page read and write
3040000
heap
page read and write
C52C000
unkown
page read and write
A491000
unkown
page read and write
7FF5ED68C000
unkown
page readonly
4CE0000
unkown
page read and write
7FF5ED495000
unkown
page readonly
76C0000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
2B24000
heap
page read and write
31F0000
trusted library allocation
page execute and read and write
8A9000
stack
page read and write
3051000
heap
page read and write
7D20000
unkown
page readonly
7FF5ED867000
unkown
page readonly
1510000
unkown
page readonly
A39B000
unkown
page read and write
CB46000
unkown
page read and write
37D2000
unkown
page read and write
7FF5ED9AE000
unkown
page readonly
F967000
system
page execute and read and write
7FF5ED9ED000
unkown
page readonly
C92D000
unkown
page read and write
37F9000
unkown
page read and write
AF0A000
stack
page read and write
7FF5ED821000
unkown
page readonly
7FF5ED697000
unkown
page readonly
C5A0000
unkown
page read and write
C20000
heap
page read and write
7857000
unkown
page read and write
14B0000
unkown
page readonly
7FF5ED6A5000
unkown
page readonly
36D5000
stack
page read and write
2C20000
trusted library allocation
page read and write
7FF5ED8E2000
unkown
page readonly
109E000
stack
page read and write
977A000
unkown
page read and write
4BDC000
unkown
page read and write
7FF5ED810000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
7FF5ED534000
unkown
page readonly
C10A000
stack
page read and write
9869000
unkown
page read and write
2B24000
heap
page read and write
9875000
unkown
page read and write
EC4B000
stack
page read and write
2CA0000
heap
page read and write
1210000
unkown
page readonly
B140000
unkown
page readonly
7861000
unkown
page read and write
2D2F000
stack
page read and write
7FF5ED50A000
unkown
page readonly
C964000
unkown
page read and write
3290000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
4DE4000
heap
page read and write
1826000
direct allocation
page execute and read and write
AAF6000
unkown
page read and write
3020000
heap
page read and write
C6E3000
unkown
page read and write
51B2000
direct allocation
page execute and read and write
8317000
heap
page read and write
99E0000
trusted library allocation
page execute and read and write
1392000
trusted library allocation
page read and write
C8E1000
unkown
page read and write
CAD0000
unkown
page read and write
2B24000
heap
page read and write
7FF5ED1D0000
unkown
page readonly
3795000
unkown
page read and write
24A0000
heap
page read and write
A494000
unkown
page read and write
190E000
unclassified section
page execute and read and write
1382000
trusted library allocation
page read and write
7FF5EDA31000
unkown
page readonly
818E000
stack
page read and write
A310000
unkown
page read and write
2CD0000
heap
page read and write
1100000
heap
page read and write
7FF5ED3EA000
unkown
page readonly
DB4000
heap
page read and write
1087000
direct allocation
page execute and read and write
2C20000
trusted library allocation
page read and write
C89C000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
E10000
system
page execute and read and write
7CA0000
unkown
page read and write
1364000
trusted library allocation
page read and write
9875000
unkown
page read and write
2B24000
heap
page read and write
2B24000
heap
page read and write
7FF5ED64F000
unkown
page readonly
83D0000
heap
page read and write
7FF5ED433000
unkown
page readonly
DCD000
stack
page read and write
7FF5ED4B0000
unkown
page readonly
7FF5ED9FF000
unkown
page readonly
7FF5ED755000
unkown
page readonly
9702000
unkown
page read and write
7FF5ED867000
unkown
page readonly
10E0000
trusted library allocation
page execute and read and write
4BE1000
unkown
page read and write
9D64000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
2C20000
trusted library allocation
page read and write
7A40000
heap
page read and write
7FF5ED4A1000
unkown
page readonly
9A42000
trusted library allocation
page read and write
7FF5ED50A000
unkown
page readonly
E8E000
heap
page read and write
7FF5ED644000
unkown
page readonly
CAE6000
unkown
page read and write
F3F000
heap
page read and write
7FF5ED451000
unkown
page readonly
7F30000
unkown
page read and write
7FF5ED81B000
unkown
page readonly
7DF4F3061000
unkown
page execute read
7FF5ED519000
unkown
page readonly
FAD1000
unkown
page read and write
2780000
heap
page read and write
56C3000
unkown
page read and write
7FF5ED412000
unkown
page readonly
8328000
heap
page read and write
E2D000
trusted library allocation
page execute and read and write
11B0000
unkown
page readonly
7FF5ED62F000
unkown
page readonly
7FF5ED750000
unkown
page readonly
CB7B000
unkown
page read and write
3020000
heap
page read and write
2C20000
trusted library allocation
page read and write
C97A000
unkown
page read and write
E20000
trusted library allocation
page read and write
99F0000
trusted library allocation
page execute and read and write
CB7B000
unkown
page read and write
470C000
trusted library allocation
page read and write
C6F8000
unkown
page read and write
C88B000
unkown
page read and write
FAA0000
unkown
page read and write
B650000
unkown
page read and write
267E000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
7FF5ED409000
unkown
page readonly
9B10000
trusted library allocation
page execute and read and write
7FF5ED996000
unkown
page readonly
2F10000
trusted library allocation
page read and write
32FF000
stack
page read and write
1120000
trusted library allocation
page read and write
7FF5ED2A9000
unkown
page readonly
A29E000
stack
page read and write
A4AB000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
7FFE000
stack
page read and write
FAE4000
unkown
page read and write
4CD0000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
2BCE000
stack
page read and write
2B24000
heap
page read and write
9A10000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
BDC0000
unkown
page readonly
2CEA000
heap
page read and write
47F0000
trusted library allocation
page read and write
7FF5ED8E2000
unkown
page readonly
56D3000
heap
page read and write
7FF5ED933000
unkown
page readonly
1180000
trusted library allocation
page read and write
37F9000
unkown
page read and write
FADE000
unkown
page read and write
E7C0000
unkown
page execute and read and write
9885000
unkown
page read and write
36D3000
stack
page read and write
7FF5EDA11000
unkown
page readonly
F676000
unkown
page read and write
2FD0000
trusted library allocation
page read and write
7FF5ED6B9000
unkown
page readonly
3015000
heap
page read and write
943E000
stack
page read and write
9929000
unkown
page read and write
AAD1000
unkown
page read and write
7FF5ED426000
unkown
page readonly
7F40000
unkown
page readonly
7FC0000
trusted library allocation
page read and write
7FF5ED3F3000
unkown
page readonly
251A000
heap
page read and write
45A3000
trusted library allocation
page read and write
3290000
unkown
page read and write
96DF000
unkown
page read and write
C9D3000
unkown
page read and write
88EE000
stack
page read and write
2C20000
trusted library allocation
page read and write
37AC000
unkown
page read and write
F6B4000
unkown
page read and write
3015000
heap
page read and write
7FF5ED516000
unkown
page readonly
340A000
heap
page read and write
97AD000
unkown
page read and write
2C20000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
7859000
unkown
page read and write
4C4B000
unkown
page read and write
A433000
unkown
page read and write
9F1E000
stack
page read and write
5641000
unkown
page read and write
11DDF000
stack
page read and write
7DF4F3051000
unkown
page execute read
A494000
unkown
page read and write
82ED000
heap
page read and write
7FF5ED7F1000
unkown
page readonly
7FF5ED93E000
unkown
page readonly
A11F000
stack
page read and write
3020000
heap
page read and write
331E000
stack
page read and write
7FF5ED9CA000
unkown
page readonly
7FF5ED3A7000
unkown
page readonly
7DF4F3050000
unkown
page readonly
13AE000
heap
page read and write
C84D000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
C57F000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
370D000
unkown
page read and write
7FF5ED844000
unkown
page readonly
7DF4F3050000
unkown
page readonly
E823000
unkown
page execute and read and write
7869000
unkown
page read and write
15B0000
trusted library allocation
page read and write
896B000
stack
page read and write
C88B000
unkown
page read and write
34DD000
direct allocation
page execute and read and write
A39B000
unkown
page read and write
E47000
trusted library allocation
page execute and read and write
CB8E000
unkown
page read and write
7EDE000
stack
page read and write
3402000
heap
page read and write
2B24000
heap
page read and write
3795000
unkown
page read and write
8A6E000
stack
page read and write
2C16000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4A95000
trusted library allocation
page read and write
986F000
unkown
page read and write
BDC0000
unkown
page readonly
213D000
stack
page read and write
965C000
stack
page read and write
31FF000
stack
page read and write
37B0000
unkown
page read and write
88D0000
heap
page read and write
3797000
unkown
page read and write
10C0000
unkown
page readonly
CB15000
unkown
page read and write
11A1000
trusted library allocation
page read and write
8FB000
stack
page read and write
CA6B000
unkown
page read and write
991E000
unkown
page read and write
B5AE000
stack
page read and write
2B24000
heap
page read and write
AA90000
unkown
page read and write
314E000
stack
page read and write
C89A000
unkown
page read and write
7FF5ED1D7000
unkown
page readonly
88EE000
stack
page read and write
C4D0000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
4C90000
unkown
page read and write
11BDC000
stack
page read and write
9D64000
unkown
page read and write
76C0000
unkown
page read and write
A3D4000
unkown
page read and write
14B0000
unkown
page readonly
8BF0000
unkown
page readonly
2B24000
heap
page read and write
A040000
trusted library allocation
page read and write
4CB0000
unkown
page read and write
7FF5ED8F9000
unkown
page readonly
190A000
unclassified section
page execute and read and write
978E000
unkown
page read and write
10CF000
unclassified section
page execute and read and write
7FF5ED4E8000
unkown
page readonly
7FF5ED39B000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
2B24000
heap
page read and write
11F4E000
stack
page read and write
7867000
unkown
page read and write
F676000
unkown
page read and write
240000
system
page execute and read and write
8BE9000
stack
page read and write
9879000
unkown
page read and write
CB49000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
3260000
trusted library allocation
page read and write
C5AA000
unkown
page read and write
7FF5ED9D2000
unkown
page readonly
331C000
stack
page read and write
4E70000
direct allocation
page execute and read and write
310E000
stack
page read and write
7FF5ED349000
unkown
page readonly
2B24000
heap
page read and write
1218D000
stack
page read and write
3580000
unkown
page readonly
3090000
trusted library allocation
page read and write
98A8000
unkown
page read and write
3026000
heap
page read and write
C851000
unkown
page read and write
7FF5ED586000
unkown
page readonly
CB7B000
unkown
page read and write
3209000
stack
page read and write
97B5000
unkown
page read and write
987B000
unkown
page read and write
2C20000
trusted library allocation
page read and write
7FF5ED295000
unkown
page readonly
3400000
heap
page read and write
7FF5ED64F000
unkown
page readonly
3738000
unkown
page read and write
CA00000
unkown
page read and write
500E000
direct allocation
page execute and read and write
7884000
unkown
page read and write
7AE0000
heap
page read and write
C6C1000
unkown
page read and write
4679000
trusted library allocation
page read and write
A50B000
unkown
page read and write
D30000
heap
page read and write
DB4000
heap
page read and write
83C0000
heap
page read and write
C857000
unkown
page read and write
2C20000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
7FF5ED818000
unkown
page readonly
2B20000
heap
page read and write
7FF5EDA47000
unkown
page readonly
7FF5ED781000
unkown
page readonly
9795000
unkown
page read and write
AB4E000
unkown
page read and write
10BE000
stack
page read and write
7FF5ED8A4000
unkown
page readonly
7FF5ED3F3000
unkown
page readonly
76E0000
trusted library allocation
page read and write
1490000
unkown
page read and write
986B000
unkown
page read and write
8730000
unkown
page read and write
C6D8000
unkown
page read and write
7FF5EDA0D000
unkown
page readonly
7FF5ED755000
unkown
page readonly
9A09000
trusted library allocation
page read and write
8A6E000
stack
page read and write
CA7C000
unkown
page read and write
8720000
unkown
page readonly
1240000
heap
page read and write
9881000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
7A34000
unkown
page read and write
7B1A000
trusted library allocation
page read and write
7FF5ED9A1000
unkown
page readonly
FAE4000
unkown
page read and write
7FF5ED939000
unkown
page readonly
7FF5ED337000
unkown
page readonly
C27000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
4C34000
unkown
page read and write
239C000
stack
page read and write
2C20000
trusted library allocation
page read and write
CA45000
unkown
page read and write
B8AB000
stack
page read and write
3400000
heap
page read and write
C6C9000
unkown
page read and write
B640000
unkown
page read and write
2C20000
trusted library allocation
page read and write
7DF4F3061000
unkown
page execute read
C6D8000
unkown
page read and write
7847000
unkown
page read and write
7847000
unkown
page read and write
4B50000
unkown
page read and write
C893000
unkown
page read and write
B10D000
stack
page read and write
2C20000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
F831000
system
page execute and read and write
11AD000
trusted library allocation
page read and write
B640000
unkown
page read and write
C999000
unkown
page read and write
B82A000
stack
page read and write
2CEA000
heap
page read and write
AF8D000
stack
page read and write
4539000
trusted library allocation
page read and write
C92D000
unkown
page read and write
CA13000
unkown
page read and write
7A64000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
CB3C000
unkown
page read and write
B7AD000
stack
page read and write
2C20000
trusted library allocation
page read and write
CAF4000
unkown
page read and write
7FF5ED986000
unkown
page readonly
56D0000
heap
page read and write
DB4000
heap
page read and write
37B0000
unkown
page read and write
23E0000
heap
page read and write
7F00000
trusted library section
page readonly
87E1000
heap
page read and write
21EA000
stack
page read and write
7FF5ED3CE000
unkown
page readonly
CA41000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
7FF5ED3DA000
unkown
page readonly
7A7E000
trusted library allocation
page read and write
7FF5ED8C6000
unkown
page readonly
9660000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
7FF5ED1F5000
unkown
page readonly
37AE000
unkown
page read and write
E51C000
stack
page read and write
254B000
heap
page read and write
3171000
unkown
page read and write
4C60000
unkown
page read and write
CB7B000
unkown
page read and write
986B000
unkown
page read and write
7FF5ED1CC000
unkown
page readonly
FAE8000
unkown
page read and write
27A0000
heap
page read and write
11B0000
unkown
page readonly
7F3B0000
trusted library allocation
page execute and read and write
10966000
system
page read and write
89C0000
unkown
page read and write
C857000
unkown
page read and write
13C8000
direct allocation
page execute and read and write
7FF5ED695000
unkown
page readonly
8710000
unkown
page readonly
A32A000
unkown
page read and write
4C50000
unkown
page read and write
8860000
unkown
page read and write
2B24000
heap
page read and write
1680000
trusted library allocation
page read and write
7FF5ED81B000
unkown
page readonly
AB4E000
unkown
page read and write
7D20000
unkown
page readonly
7FF5ED507000
unkown
page readonly
7695000
stack
page read and write
4BA6000
unkown
page read and write
7FF5ED4DF000
unkown
page readonly
2540000
heap
page read and write
7DF4F3031000
unkown
page execute read
7FF5ED4C6000
unkown
page readonly
5557000
stack
page read and write
C507000
unkown
page read and write
E30000
trusted library allocation
page read and write
7FF5ED864000
unkown
page readonly
7FA50000
trusted library allocation
page execute and read and write
11B0000
heap
page read and write
7FF5ED409000
unkown
page readonly
E8A000
heap
page read and write
7FF5ED779000
unkown
page readonly
CB99000
unkown
page read and write
7FF5ED433000
unkown
page readonly
B150000
unkown
page read and write
9795000
unkown
page read and write
9871000
unkown
page read and write
9926000
unkown
page read and write
7695000
stack
page read and write
C89C000
unkown
page read and write
11A9000
direct allocation
page execute and read and write
4CD0000
unkown
page read and write
4B01000
heap
page read and write
7FF5ED342000
unkown
page readonly
A3CD000
unkown
page read and write
2B24000
heap
page read and write
7C00000
trusted library allocation
page read and write
F6F4000
unkown
page read and write
C962000
unkown
page read and write
13FE000
stack
page read and write
784A000
unkown
page read and write
DB4000
heap
page read and write
787C000
unkown
page read and write
C6F4000
unkown
page read and write
7FF5ED713000
unkown
page readonly
9885000
unkown
page read and write
DB0000
heap
page read and write
4BE3000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
7FF5EDA14000
unkown
page readonly
7AC0000
heap
page read and write
37F6000
unkown
page read and write
4B8B000
unkown
page read and write
3800000
unkown
page readonly
9A5B000
unkown
page read and write
B8B0000
unkown
page read and write
7F35000
heap
page read and write
87F7000
heap
page read and write
B3E000
stack
page read and write
C563000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
2CE5000
heap
page read and write
CB7D000
unkown
page read and write
1258E000
stack
page read and write
9977000
unkown
page read and write
7FF5ED404000
unkown
page readonly
7FF5ED9C8000
unkown
page readonly
7FF5ED743000
unkown
page readonly
4CBB000
heap
page read and write
9795000
unkown
page read and write
8DA0000
unkown
page read and write
136D000
trusted library allocation
page execute and read and write
E36000
trusted library allocation
page execute and read and write
3659000
stack
page read and write
4699000
trusted library allocation
page read and write
7A8D000
trusted library allocation
page read and write
113BE000
stack
page read and write
DD0000
unkown
page readonly
273E000
stack
page read and write
135A000
heap
page read and write
7FF5ED3A7000
unkown
page readonly
56D9000
unkown
page read and write
1390000
unkown
page read and write
7E60000
unkown
page read and write
5285000
trusted library allocation
page read and write
2B24000
heap
page read and write
330D000
stack
page read and write
FB3000
unclassified section
page execute and read and write
7DF4F3040000
unkown
page readonly
987D000
unkown
page read and write
4A99000
trusted library allocation
page read and write
C6F2000
unkown
page read and write
7857000
unkown
page read and write
117E000
stack
page read and write
CB7D000
unkown
page read and write
3059000
heap
page read and write
30A0000
heap
page read and write
8B60000
unkown
page readonly
4C32000
heap
page read and write
2B24000
heap
page read and write
7D30000
heap
page execute and read and write
7FF5ED915000
unkown
page readonly
9869000
unkown
page read and write
C962000
unkown
page read and write
FAD4000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
A4AE000
unkown
page read and write
2B24000
heap
page read and write
97A9000
unkown
page read and write
7FF5ED445000
unkown
page readonly
2B24000
heap
page read and write
890E000
heap
page read and write
A391000
unkown
page read and write
9885000
unkown
page read and write
B8B0000
unkown
page read and write
36F0000
unkown
page readonly
B80E000
heap
page read and write
4B90000
unkown
page read and write
8FB9000
stack
page read and write
E60000
trusted library allocation
page read and write
C700000
unkown
page read and write
BD1D000
stack
page read and write
3220000
unkown
page readonly
36D5000
stack
page read and write
896B000
stack
page read and write
78AD000
unkown
page read and write
CB5000
heap
page read and write
7FF5ED882000
unkown
page readonly
3706000
unclassified section
page read and write
CB9D000
unkown
page read and write
7E50000
unkown
page readonly
831B000
heap
page read and write
9ADB000
stack
page read and write
4C80000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
33B0000
direct allocation
page execute and read and write
C88B000
unkown
page read and write
1660000
trusted library allocation
page read and write
CB7D000
unkown
page read and write
1127E000
stack
page read and write
82BE000
stack
page read and write
7FF5ED77C000
unkown
page readonly
987F000
unkown
page read and write
9873000
unkown
page read and write
3700000
unkown
page read and write
7FF5EDA53000
unkown
page readonly
4B8B000
unkown
page read and write
36F2000
direct allocation
page execute and read and write
4C1E000
unkown
page read and write
C6BF000
unkown
page read and write
7979000
unkown
page read and write
97D4000
unkown
page read and write
97B5000
unkown
page read and write
7FF5ED975000
unkown
page readonly
37A8000
unkown
page read and write
979C000
unkown
page read and write
7FF5ED980000
unkown
page readonly
7FF5D1CD4000
unkown
page readonly
7FF5ED476000
unkown
page readonly
9B20000
trusted library allocation
page read and write
7FF5ED5EB000
unkown
page readonly
7E60000
unkown
page read and write
7FF5ED80C000
unkown
page readonly
37A0000
unkown
page read and write
7F40000
unkown
page readonly
127DD000
stack
page read and write
4C50000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
C512000
unkown
page read and write
7865000
unkown
page read and write
12290000
heap
page read and write
23F0000
heap
page read and write
C51E000
unkown
page read and write
D7E000
stack
page read and write
7FF5ED7DB000
unkown
page readonly
A49E000
unkown
page read and write
BAF9000
stack
page read and write
C9B1000
unkown
page read and write
4B56000
unkown
page read and write
2C20000
trusted library allocation
page read and write
C10000
heap
page read and write
128DE000
stack
page read and write
A379000
unkown
page read and write
2B24000
heap
page read and write
3700000
unkown
page read and write
CACF000
unkown
page read and write
79B1000
unkown
page read and write
7863000
unkown
page read and write
CB96000
unkown
page read and write
7FF5ED810000
unkown
page readonly
CFC000
stack
page read and write
7FF5ED5C5000
unkown
page readonly
CA20000
unkown
page read and write
1108000
heap
page read and write
7D40000
unkown
page read and write
7FF5ED882000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
9871000
unkown
page read and write
7CC0000
unkown
page readonly
7DF4F3031000
unkown
page execute read
A502000
unkown
page read and write
98E0000
unkown
page read and write
7FF5ED3DA000
unkown
page readonly
7FF5ED4B4000
unkown
page readonly
7FF5ED961000
unkown
page readonly
4B93000
unkown
page read and write
7FF5ED956000
unkown
page readonly
7DD9000
stack
page read and write
7FF5ED295000
unkown
page readonly
7FF5ED847000
unkown
page readonly
C516000
unkown
page read and write
2C20000
trusted library allocation
page read and write
105E000
stack
page read and write
1689000
direct allocation
page execute and read and write
95CE000
heap
page read and write
C88B000
unkown
page read and write
C7C5000
unkown
page read and write
F6F4000
unkown
page read and write
C503000
unkown
page read and write
95DA000
stack
page read and write
5270000
trusted library allocation
page read and write
785D000
unkown
page read and write
2B24000
heap
page read and write
7FF5ED5CE000
unkown
page readonly
A433000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
9540000
heap
page read and write
7FF5ED41C000
unkown
page readonly
7FF5ED4EF000
unkown
page readonly
4C70000
unkown
page read and write
7FF5ED885000
unkown
page readonly
EC2000
heap
page read and write
7FF5ED71B000
unkown
page readonly
B6A0000
heap
page read and write
464C000
trusted library allocation
page read and write
2CE4000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
2CDD000
heap
page read and write
1451000
unkown
page readonly
7FF5ED5A8000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
B08D000
stack
page read and write
A391000
unkown
page read and write
7FF5ED850000
unkown
page readonly
11660000
heap
page read and write
7FF5ED93B000
unkown
page readonly
F50000
unclassified section
page execute and read and write
2DFE000
trusted library allocation
page read and write
114FF000
stack
page read and write
4C4B000
unkown
page read and write
4E59000
heap
page read and write
7FF5ED7E9000
unkown
page readonly
341C000
unkown
page read and write
5F70000
trusted library allocation
page read and write
7FF5ED8A4000
unkown
page readonly
13E1000
heap
page read and write
B650000
unkown
page read and write
78AD000
unkown
page read and write
A494000
unkown
page read and write
78A0000
trusted library allocation
page read and write
F67B000
unkown
page read and write
CB7D000
unkown
page read and write
7FF5ED418000
unkown
page readonly
7FF5ED77E000
unkown
page readonly
7953000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
4CB0000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
B140000
unkown
page readonly
4CE0000
unkown
page read and write
89A0000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
8208000
stack
page read and write
7FF5ED844000
unkown
page readonly
906E000
stack
page read and write
88C0000
heap
page read and write
7F2E000
stack
page read and write
9893000
unkown
page read and write
C20000
heap
page read and write
7AE0000
heap
page read and write
7FF5ED93E000
unkown
page readonly
277F000
stack
page read and write
7AC0000
heap
page read and write
7FF5ED55F000
unkown
page readonly
D80000
heap
page read and write
BDA0000
unkown
page readonly
27AC000
heap
page read and write
7A81000
trusted library allocation
page read and write
CB7E000
unkown
page read and write
7FF5ED4BB000
unkown
page readonly
4BA6000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
7B10000
trusted library allocation
page read and write
CBAD000
unkown
page read and write
9B29000
trusted library allocation
page read and write
B3AD000
stack
page read and write
C6F4000
unkown
page read and write
379E000
unkown
page read and write
9B60000
unkown
page readonly
CA67000
unkown
page read and write
9792000
unkown
page read and write
7FF5ED445000
unkown
page readonly
7FF5ED73D000
unkown
page readonly
76B0000
trusted library allocation
page execute and read and write
7FF5ED779000
unkown
page readonly
7863000
unkown
page read and write
CA7C000
unkown
page read and write
987D000
unkown
page read and write
9E20000
heap
page read and write
76F0000
trusted library allocation
page read and write
37D2000
unkown
page read and write
107E000
stack
page read and write
F40000
heap
page read and write
FB02000
unkown
page read and write
2B24000
heap
page read and write
7FF5ED68C000
unkown
page readonly
7FF5ED9D2000
unkown
page readonly
7FF5ED76D000
unkown
page readonly
26BE000
stack
page read and write
C563000
unkown
page read and write
7852000
unkown
page read and write
C6CF000
unkown
page read and write
7FF5ED28F000
unkown
page readonly
CB15000
unkown
page read and write
7A60000
trusted library allocation
page read and write
3051000
heap
page read and write
C9AE000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
7FF5ED286000
unkown
page readonly
7AD4000
trusted library section
page readonly
EC50000
trusted library section
page read and write
A4AB000
unkown
page read and write
79FB000
unkown
page read and write
C97A000
unkown
page read and write
97B5000
unkown
page read and write
CB46000
unkown
page read and write
143A000
stack
page read and write
7FF5ED7CF000
unkown
page readonly
97A9000
unkown
page read and write
7FF5ED507000
unkown
page readonly
7FF5ED814000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
A21E000
stack
page read and write
7FF5ED2A9000
unkown
page readonly
B190000
unkown
page read and write
36D3000
stack
page read and write
7FF5ED818000
unkown
page readonly
2B24000
heap
page read and write
4BC9000
unkown
page read and write
EC0E000
stack
page read and write
3800000
unkown
page readonly
7FF5ED5F7000
unkown
page readonly
AAF9000
unkown
page read and write
7FF5ED735000
unkown
page readonly
9DED000
stack
page read and write
7FF5ED77C000
unkown
page readonly
271E000
unkown
page read and write
45CE000
stack
page read and write
35A0000
unkown
page readonly
7FF5ED265000
unkown
page readonly
7D00000
unkown
page readonly
CBC9000
unkown
page read and write
9B5B000
stack
page read and write
3240000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
7FF5ED43A000
unkown
page readonly
F633000
unkown
page read and write
AAF2000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
91B9000
stack
page read and write
2C20000
trusted library allocation
page read and write
A4AB000
unkown
page read and write
E3A000
trusted library allocation
page execute and read and write
18C0000
unclassified section
page execute and read and write
7FF5ED5C9000
unkown
page readonly
CA75000
unkown
page read and write
F67B000
unkown
page read and write
10B0000
unclassified section
page execute and read and write
1240000
heap
page read and write
4E2C000
stack
page read and write
7FF5ED9C6000
unkown
page readonly
7FF5ED71E000
unkown
page readonly
AAF2000
unkown
page read and write
C857000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
7FF5EDA70000
unkown
page readonly
7FF5ED1D7000
unkown
page readonly
B8AB000
stack
page read and write
DE0000
unkown
page readonly
4B01000
heap
page read and write
BDD0000
unkown
page readonly
C50A000
unkown
page read and write
7FF5ED471000
unkown
page readonly
163C000
stack
page read and write
7FF5ED9C6000
unkown
page readonly
3791000
unkown
page read and write
1483000
heap
page read and write
89E0000
unkown
page read and write
B190000
unkown
page read and write
913A000
stack
page read and write
FB02000
unkown
page read and write
367D000
direct allocation
page execute and read and write
3580000
unkown
page readonly
5F70000
trusted library allocation
page read and write
C962000
unkown
page read and write
C8E1000
unkown
page read and write
4C60000
unkown
page read and write
103A000
stack
page read and write
7FF5ED4E8000
unkown
page readonly
2CF8000
heap
page read and write
7FF5ED9D9000
unkown
page readonly
A491000
unkown
page read and write
7B80000
unkown
page read and write
5141000
direct allocation
page execute and read and write
DB4000
heap
page read and write
CB89000
unkown
page read and write
2B24000
heap
page read and write
9925000
unkown
page read and write
C41F000
stack
page read and write
A37B000
unkown
page read and write
1210000
unkown
page readonly
A29E000
stack
page read and write
8730000
unkown
page read and write
A19F000
stack
page read and write
2B24000
heap
page read and write
F890000
system
page execute and read and write
7FF5EDA08000
unkown
page readonly
146D000
heap
page read and write
A323000
unkown
page read and write
F40000
heap
page read and write
C7C5000
unkown
page read and write
3329000
heap
page read and write
2CE4000
heap
page read and write
2C20000
trusted library allocation
page read and write
9A10000
unkown
page read and write
12CE000
stack
page read and write
96DF000
unkown
page read and write
986F000
unkown
page read and write
2C20000
trusted library allocation
page read and write
7690000
heap
page read and write
7FF5ED1D0000
unkown
page readonly
9879000
unkown
page read and write
11C0000
heap
page read and write
7F20000
trusted library allocation
page execute and read and write
A491000
unkown
page read and write
110B000
stack
page read and write
CA7C000
unkown
page read and write
379E000
unkown
page read and write
7FF5ED503000
unkown
page readonly
1500000
heap
page read and write
7F10000
heap
page read and write
7FF5ED942000
unkown
page readonly
7FF5ED7E0000
unkown
page readonly
2B24000
heap
page read and write
159E000
stack
page read and write
9869000
unkown
page read and write
1130000
heap
page read and write
7FF5ED9F2000
unkown
page readonly
11CDE000
stack
page read and write
4C70000
unkown
page read and write
1095000
stack
page read and write
7F2E000
stack
page read and write
8D65000
stack
page read and write
CB7D000
unkown
page read and write
7FF5ED864000
unkown
page readonly
7FF5ED9AE000
unkown
page readonly
CBBE000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
10C0000
unkown
page readonly
C557000
unkown
page read and write
249E000
unkown
page read and write
179E000
stack
page read and write
CB9D000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
C962000
unkown
page read and write
7DF4F3071000
unkown
page execute read
835D000
heap
page read and write
C964000
unkown
page read and write
C5A3000
unkown
page read and write
C561000
unkown
page read and write
76A0000
heap
page read and write
9660000
unkown
page read and write
1500000
heap
page read and write
A364000
unkown
page read and write
A361000
unkown
page read and write
B728000
stack
page read and write
7FF5ED990000
unkown
page readonly
7CA0000
unkown
page read and write
CA75000
unkown
page read and write
7FF5ED602000
unkown
page readonly
37F6000
unkown
page read and write
C557000
unkown
page read and write
2CE4000
heap
page read and write
7884000
unkown
page read and write
477E000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
2B40000
heap
page read and write
7FF5ED42B000
unkown
page readonly
7FF5ED937000
unkown
page readonly
2B24000
heap
page read and write
AB4E000
unkown
page read and write
3017000
heap
page read and write
7F30000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
9881000
unkown
page read and write
8B60000
unkown
page readonly
9A20000
trusted library allocation
page read and write
7DF4F3041000
unkown
page execute read
89A0000
unkown
page read and write
7FF5ED670000
unkown
page readonly
7D40000
unkown
page read and write
34B1000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
4563000
trusted library allocation
page read and write
340A000
heap
page read and write
987F000
unkown
page read and write
9893000
unkown
page read and write
9929000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
B7FF000
heap
page read and write
7D20000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
9877000
unkown
page read and write
FAE8000
unkown
page read and write
A4A1000
unkown
page read and write
8830000
heap
page read and write
1230000
unkown
page read and write
19D0000
heap
page read and write
F30000
heap
page read and write
EF4000
heap
page read and write
7CC0000
unkown
page readonly
7FF5ED519000
unkown
page readonly
AB06000
unkown
page read and write
7FF5ED847000
unkown
page readonly
C6C9000
unkown
page read and write
137D000
trusted library allocation
page execute and read and write
7FF5EDA53000
unkown
page readonly
1510000
unkown
page readonly
9550000
unkown
page readonly
7FF5ED9A6000
unkown
page readonly
E70000
trusted library allocation
page execute and read and write
11E0E000
stack
page read and write
2C20000
heap
page execute and read and write
B6A0000
heap
page read and write
B82A000
stack
page read and write
3085000
trusted library allocation
page read and write
7FF5ED86B000
unkown
page readonly
C57F000
unkown
page read and write
461E000
trusted library allocation
page read and write
2C14000
trusted library allocation
page read and write
B7E0000
heap
page read and write
7FF5ED9A1000
unkown
page readonly
76A0000
unkown
page read and write
307E000
stack
page read and write
7FF5EDA08000
unkown
page readonly
3350000
heap
page read and write
C41F000
stack
page read and write
FADD000
unkown
page read and write
C50A000
unkown
page read and write
C6E000
stack
page read and write
4F99000
direct allocation
page execute and read and write
CA16000
unkown
page read and write
C6C1000
unkown
page read and write
4B78000
unkown
page read and write
C700000
unkown
page read and write
82C0000
heap
page read and write
7FF5ED505000
unkown
page readonly
7FF5ED7DB000
unkown
page readonly
1428000
heap
page read and write
3210000
unkown
page read and write
CA20000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
19E0000
unclassified section
page execute and read and write
A502000
unkown
page read and write
118B000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
7BED000
stack
page read and write
3681000
direct allocation
page execute and read and write
9701000
unkown
page read and write
4C1E000
unkown
page read and write
7FF5ED669000
unkown
page readonly
C561000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
7FF5ED937000
unkown
page readonly
1650000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
7FF5ED3CE000
unkown
page readonly
DD0000
unkown
page readonly
AB4E000
unkown
page read and write
3220000
unkown
page readonly
7DF4F3030000
unkown
page readonly
34D9000
direct allocation
page execute and read and write
7FF5ED43D000
unkown
page readonly
C4A0000
unkown
page read and write
CA63000
unkown
page read and write
A479000
unkown
page read and write
37A0000
unkown
page read and write
7DF4F3041000
unkown
page execute read
2B24000
heap
page read and write
A4A1000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
3756000
unkown
page read and write
AADB000
unkown
page read and write
37BD000
unkown
page read and write
987D000
unkown
page read and write
A375000
unkown
page read and write
C6F2000
unkown
page read and write
1277C000
stack
page read and write
2B24000
heap
page read and write
7FF5ED71B000
unkown
page readonly
2B24000
heap
page read and write
1480000
heap
page read and write
7FF5ED806000
unkown
page readonly
AAD1000
unkown
page read and write
87C0000
heap
page read and write
526F000
stack
page read and write
CAD0000
unkown
page read and write
C99C000
unkown
page read and write
BC9B000
stack
page read and write
7E11000
unkown
page read and write
7B30000
trusted library allocation
page read and write
A433000
unkown
page read and write
79FB000
unkown
page read and write
119E000
trusted library allocation
page read and write
1505000
heap
page read and write
BAF9000
stack
page read and write
10960000
unkown
page read and write
DB4000
heap
page read and write
52D0000
heap
page read and write
308A000
stack
page read and write
7FF5ED1D9000
unkown
page readonly
7FF5ED265000
unkown
page readonly
7900000
unkown
page read and write
7AE5000
heap
page read and write
93BE000
stack
page read and write
26FE000
stack
page read and write
C893000
unkown
page read and write
A4AE000
unkown
page read and write
2C5E000
stack
page read and write
A479000
unkown
page read and write
7FF5ED803000
unkown
page readonly
E07D000
stack
page read and write
987B000
unkown
page read and write
CC2000
unkown
page readonly
A49E000
unkown
page read and write
3240000
unkown
page read and write
7FF5ED556000
unkown
page readonly
A3BE000
unkown
page read and write
A4B8000
unkown
page read and write
C49E000
stack
page read and write
7FF5ED4EF000
unkown
page readonly
7FF5ED451000
unkown
page readonly
82D0000
heap
page read and write
7953000
unkown
page read and write
BDD0000
unkown
page readonly
9B60000
unkown
page readonly
7FF5ED679000
unkown
page readonly
7FF5ED933000
unkown
page readonly
7FF5ED87D000
unkown
page readonly
7FF5ED692000
unkown
page readonly
C49E000
stack
page read and write
987B000
unkown
page read and write
301C000
heap
page read and write
AA90000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
33B9000
stack
page read and write
2ECF000
stack
page read and write
1350000
heap
page read and write
3590000
unkown
page read and write
9E6C000
stack
page read and write
4DE8000
heap
page read and write
2B24000
heap
page read and write
7867000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
FADD000
unkown
page read and write
4C18000
unkown
page read and write
5641000
unkown
page read and write
1560000
direct allocation
page execute and read and write
7FF5ED586000
unkown
page readonly
7B80000
unkown
page read and write
5D0000
heap
page read and write
B5AE000
stack
page read and write
7FF5ED476000
unkown
page readonly
76DA000
trusted library allocation
page read and write
7FF5ED9C8000
unkown
page readonly
35A0000
unkown
page readonly
F6B4000
unkown
page read and write
13C7000
heap
page read and write
AB52000
unkown
page read and write
7865000
unkown
page read and write
3153000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
7FF5ED1D9000
unkown
page readonly
1690000
heap
page read and write
13CF000
stack
page read and write
7FF5ED42B000
unkown
page readonly
7FF5ED781000
unkown
page readonly
986B000
unkown
page read and write
9A5B000
unkown
page read and write
7FF5ED961000
unkown
page readonly
CB2E000
unkown
page read and write
7D53000
unkown
page read and write
3000000
heap
page read and write
11DCF000
stack
page read and write
7FF5ED92C000
unkown
page readonly
7FF5ED803000
unkown
page readonly
10A6000
direct allocation
page execute and read and write
7FF5ED750000
unkown
page readonly
7FF5EDA0B000
unkown
page readonly
B170000
unkown
page readonly
2B24000
heap
page read and write
9815000
unkown
page read and write
7D53000
unkown
page read and write
2B24000
heap
page read and write
CB2E000
unkown
page read and write
76A0000
unkown
page read and write
7FF5ED872000
unkown
page readonly
2B24000
heap
page read and write
BC9B000
stack
page read and write
2C10000
trusted library allocation
page read and write
56C000
stack
page read and write
7FF5ED349000
unkown
page readonly
B8C0000
unkown
page readonly
7CD0000
unkown
page read and write
7BF0000
trusted library allocation
page execute and read and write
9877000
unkown
page read and write
EA7000
heap
page read and write
978E000
unkown
page read and write
982D000
unkown
page read and write
97C3000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
1683000
direct allocation
page execute and read and write
1110000
trusted library allocation
page read and write
7FF5ED8B4000
unkown
page readonly
7FF5ED674000
unkown
page readonly
AF8D000
stack
page read and write
C851000
unkown
page read and write
2C20000
trusted library allocation
page read and write
7FF5EDA2A000
unkown
page readonly
11A6000
trusted library allocation
page read and write
A379000
unkown
page read and write
982D000
unkown
page read and write
13A8000
heap
page read and write
BD1D000
stack
page read and write
B629000
stack
page read and write
3080000
trusted library allocation
page read and write
7FF5ED8F9000
unkown
page readonly
3758000
unkown
page read and write
7A3B000
stack
page read and write
3791000
unkown
page read and write
9881000
unkown
page read and write
7FF5ED426000
unkown
page readonly
1811000
direct allocation
page execute and read and write
78B0000
heap
page execute and read and write
786B000
unkown
page read and write
CB7B000
unkown
page read and write
BEE000
stack
page read and write
11AD000
direct allocation
page execute and read and write
18A1000
unkown
page readonly
7FF5ED516000
unkown
page readonly
78A0000
unkown
page read and write
CBCD000
unkown
page read and write
C9DF000
unkown
page read and write
3756000
unkown
page read and write
8913000
heap
page read and write
3051000
heap
page read and write
7FF5ED1BC000
unkown
page readonly
7FF5ED821000
unkown
page readonly
2CDF000
heap
page read and write
37AE000
unkown
page read and write
99C0000
trusted library allocation
page read and write
7FF5ED735000
unkown
page readonly
97D4000
unkown
page read and write
785F000
unkown
page read and write
A364000
unkown
page read and write
79D3000
unkown
page read and write
37BD000
unkown
page read and write
965C000
stack
page read and write
1200000
heap
page read and write
9883000
unkown
page read and write
923E000
stack
page read and write
7FF5ED996000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
7FF5ED85F000
unkown
page readonly
2C20000
trusted library allocation
page read and write
4B0F000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
7FF5EDA76000
unkown
page readonly
There are 1841 hidden memdumps, click here to show them.