IOC Report
setup.exe

loading gif

Files

File Path
Type
Category
Malicious
setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000030001\2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\wsjctfw
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000030001\2.exe
"C:\Users\user\AppData\Local\Temp\1000030001\2.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\wsjctfw
C:\Users\user\AppData\Roaming\wsjctfw
malicious

URLs

Name
IP
Malicious
http://nusdhj.ws/tmp/
malicious
http://185.215.113.16/Jo89Ku7d/index.php#
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpTemp
unknown
malicious
http://yosoborno.com/tmp/
malicious
http://wshcnsd.xyz/tmp/
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://wshcnsd.xyz/
unknown
malicious
http://nusdhj.ws/
unknown
malicious
https://word.office.comon
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://atlpvt.com/tmp/2.exe6mv
unknown
https://atlpvt.com/tmp/2.exe
58.65.168.132
https://atlpvt.com/
unknown
https://powerpoint.office.comcember
unknown
http://yosoborno.com:80/tmp/3
unknown
https://excel.office.com
unknown
http://schemas.micro
unknown
https://outlook.com
unknown
https://atlpvt.com/tmp/2.exe(mh
unknown
http://185.215.113.16/Jo89Ku7d/index.phpcoded
unknown
https://android.notify.windows.com/iOS
unknown
http://185.215.113.16/Jo89Ku7d/index.php?
unknown
http://nusdhj.ws:80/tmp//
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://api.msn.com/
unknown
http://crl.v
unknown
http://185.215.113.16/Jo89Ku7d/index.php/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
https://wns.windows.com/)s
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
wshcnsd.xyz
unknown
malicious
yosoborno.com
unknown
malicious
nusdhj.ws
unknown
malicious
atlpvt.com
58.65.168.132

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious
58.65.168.132
atlpvt.com
Pakistan

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 129 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
231000
unkown
page execute and read and write
malicious
761000
unkown
page execute and read and write
malicious
5120000
direct allocation
page read and write
malicious
41F1000
unclassified section
page read and write
malicious
46F0000
direct allocation
page read and write
malicious
231000
unkown
page execute and read and write
malicious
4FD0000
direct allocation
page read and write
malicious
4910000
direct allocation
page read and write
malicious
3FB1000
unclassified section
page read and write
malicious
3F90000
direct allocation
page read and write
malicious
4090000
direct allocation
page read and write
malicious
231000
unkown
page execute and read and write
malicious
7FF5D7700000
unkown
page readonly
7FF5D7722000
unkown
page readonly
7FF5D76DA000
unkown
page readonly
7B60000
unkown
page readonly
51D0000
direct allocation
page execute and read and write
8A00000
unkown
page read and write
1220000
unkown
page read and write
7460000
unkown
page read and write
8980000
unkown
page read and write
466E000
stack
page read and write
7FF5D75F2000
unkown
page readonly
11C0000
unkown
page read and write
1220000
unkown
page read and write
3170000
unkown
page read and write
1220000
unkown
page read and write
40B000
unkown
page execute read
4251000
heap
page read and write
E54000
heap
page read and write
F2B0000
unkown
page read and write
7FF5D72BD000
unkown
page readonly
4251000
heap
page read and write
1308000
heap
page read and write
E1A000
heap
page read and write
1270000
heap
page read and write
7FF5D75F9000
unkown
page readonly
11F0000
unkown
page read and write
4B31000
heap
page read and write
5181000
direct allocation
page read and write
8980000
unkown
page read and write
C663000
unkown
page read and write
2EB0000
unkown
page read and write
10449000
unkown
page read and write
94C000
unkown
page execute and read and write
7FF5D745B000
unkown
page readonly
11F0000
unkown
page read and write
4B31000
heap
page read and write
7FF5D706E000
unkown
page readonly
A2D7000
unkown
page read and write
A1AF000
stack
page read and write
9820000
unkown
page read and write
4251000
heap
page read and write
52A0000
direct allocation
page execute and read and write
C61B000
unkown
page read and write
46E0000
direct allocation
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
3C9E000
stack
page read and write
7FF5D717C000
unkown
page readonly
7C80000
unkown
page read and write
35DC000
unkown
page read and write
1210000
heap
page read and write
C73E000
unkown
page read and write
1274000
heap
page read and write
7FF5D7455000
unkown
page readonly
C625000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
479F000
stack
page read and write
4980000
unkown
page read and write
E7F000
heap
page read and write
3100000
unkown
page read and write
C63E000
unkown
page read and write
4B31000
heap
page read and write
F30E000
unkown
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
3DAE000
stack
page read and write
C642000
unkown
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
48C0000
direct allocation
page execute and read and write
51A0000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
1220000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
8980000
unkown
page read and write
247E000
heap
page read and write
4471000
heap
page read and write
7FF5D720A000
unkown
page readonly
4251000
heap
page read and write
2E90000
unkown
page read and write
AA0E000
unkown
page read and write
A264000
unkown
page read and write
11E0000
unkown
page read and write
46E0000
direct allocation
page read and write
11C0000
unkown
page read and write
4A70000
direct allocation
page execute and read and write
C7C6000
unkown
page read and write
11C0000
unkown
page read and write
1044000
heap
page read and write
4261000
heap
page read and write
6000000
heap
page read and write
1240000
unkown
page read and write
1030000
direct allocation
page read and write
AA12000
unkown
page read and write
9EB0000
unkown
page readonly
4A44000
unkown
page read and write
9820000
unkown
page read and write
3C2F000
stack
page read and write
4262000
heap
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
A28D000
unkown
page read and write
2EAE000
stack
page read and write
11F0000
unkown
page read and write
F2E4000
unkown
page read and write
423000
unkown
page write copy
53E000
unkown
page execute and write copy
4251000
heap
page read and write
11D0000
unkown
page read and write
1240000
unkown
page read and write
379E000
stack
page read and write
7FF5D7797000
unkown
page readonly
34AF000
stack
page read and write
8980000
unkown
page read and write
768E000
unkown
page read and write
108E000
stack
page read and write
336F000
stack
page read and write
C5F0000
unkown
page read and write
35B5000
unkown
page read and write
8980000
unkown
page read and write
4230000
heap
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
246E000
heap
page read and write
7FF5D771A000
unkown
page readonly
11C0000
unkown
page read and write
A416000
unkown
page read and write
7FF5D6BEF000
unkown
page readonly
8980000
unkown
page read and write
2FAE000
stack
page read and write
4B31000
heap
page read and write
43AF000
stack
page read and write
7FF5D762F000
unkown
page readonly
4251000
heap
page read and write
389F000
stack
page read and write
48B0000
trusted library allocation
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
5190000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
7FF5D7289000
unkown
page readonly
43DE000
stack
page read and write
8980000
unkown
page read and write
292000
unkown
page execute and read and write
9AB2000
unkown
page read and write
8980000
unkown
page read and write
1240000
unkown
page read and write
1274000
heap
page read and write
7FF5D7639000
unkown
page readonly
43E1000
heap
page read and write
A9DF000
unkown
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
3F90000
direct allocation
page read and write
9A9E000
unkown
page read and write
8980000
unkown
page read and write
2E2D000
heap
page read and write
F30F000
unkown
page read and write
843F000
stack
page read and write
9A80000
unkown
page read and write
2E90000
unkown
page read and write
28AF000
stack
page read and write
4FAC000
stack
page read and write
422F000
stack
page read and write
8980000
unkown
page read and write
53F000
unkown
page execute and write copy
C4C6000
unkown
page read and write
7DF4F2460000
unkown
page readonly
8980000
unkown
page read and write
7FF5D7360000
unkown
page readonly
35D5000
unkown
page read and write
E7F000
heap
page read and write
2E90000
unkown
page read and write
8980000
unkown
page read and write
B04000
heap
page read and write
4251000
heap
page read and write
1040000
heap
page read and write
299000
unkown
page write copy
104F4000
unkown
page read and write
C605000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
11D0000
unkown
page read and write
326E000
stack
page read and write
A0A8000
stack
page read and write
1220000
unkown
page read and write
6DD000
unkown
page execute and write copy
E2B000
heap
page read and write
8980000
unkown
page read and write
86D0000
unkown
page readonly
416E000
stack
page read and write
3200000
unkown
page read and write
318F000
stack
page read and write
482F000
stack
page read and write
640000
heap
page read and write
E68000
heap
page read and write
8980000
unkown
page read and write
7FF5D764F000
unkown
page readonly
4251000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
4470000
heap
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
11B0000
unkown
page read and write
AA0D000
unkown
page read and write
1220000
unkown
page read and write
7FF5D778A000
unkown
page readonly
11C0000
unkown
page read and write
8980000
unkown
page read and write
831C000
stack
page read and write
7FF5D7507000
unkown
page readonly
6DD000
unkown
page execute and write copy
7FF5D7394000
unkown
page readonly
3280000
unkown
page read and write
8980000
unkown
page read and write
F2E1000
unkown
page read and write
C605000
unkown
page read and write
32CF000
stack
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
11B0000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
7FF5D77CD000
unkown
page readonly
C61D000
unkown
page read and write
8980000
unkown
page read and write
5C50000
remote allocation
page read and write
96FE000
stack
page read and write
C0D000
unkown
page execute and write copy
11D0000
unkown
page read and write
7C70000
unkown
page readonly
1220000
unkown
page read and write
EF0000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
10432000
unkown
page read and write
7FF5D7546000
unkown
page readonly
4910000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
8FD9000
stack
page read and write
C0BA000
stack
page read and write
41D0000
heap
page read and write
7C9000
unkown
page read and write
3400000
unkown
page read and write
11E0000
unkown
page read and write
E7F000
heap
page read and write
B220000
unkown
page read and write
3FEF000
stack
page read and write
9820000
unkown
page read and write
4471000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
F2F8000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
2E90000
unkown
page read and write
4B31000
heap
page read and write
126E000
stack
page read and write
527000
unkown
page execute and read and write
4251000
heap
page read and write
3626000
unkown
page read and write
A233000
unkown
page read and write
11C0000
unkown
page read and write
3200000
unkown
page read and write
927A000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
9580000
unkown
page read and write
12F0000
direct allocation
page read and write
11C0000
unkown
page read and write
1240000
unkown
page read and write
CA08000
unkown
page read and write
4F6000
unkown
page execute and read and write
C62D000
unkown
page read and write
394E000
stack
page read and write
11C0000
unkown
page read and write
500B000
stack
page read and write
4251000
heap
page read and write
41F000
unkown
page readonly
4251000
heap
page read and write
230000
unkown
page readonly
8980000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
7FF5D76CD000
unkown
page readonly
8980000
unkown
page read and write
A2B5000
unkown
page read and write
7FDD000
stack
page read and write
7FF5CE343000
unkown
page readonly
11B0000
direct allocation
page read and write
11D0000
unkown
page read and write
8980000
unkown
page read and write
7FF5D7808000
unkown
page readonly
29B000
unkown
page execute and read and write
3310000
unkown
page read and write
8980000
unkown
page read and write
11F0000
unkown
page read and write
D9F000
stack
page read and write
35CF000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
7FF5D766E000
unkown
page readonly
11B0000
direct allocation
page read and write
1220000
unkown
page read and write
695000
heap
page read and write
B4E000
stack
page read and write
8980000
unkown
page read and write
94F4000
unkown
page read and write
11D0000
unkown
page read and write
4B00000
unkown
page read and write
4220000
heap
page read and write
1043B000
unkown
page read and write
11C0000
unkown
page read and write
35B5000
unkown
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
292000
unkown
page execute and read and write
4050000
heap
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
11B0000
direct allocation
page read and write
35C1000
unkown
page read and write
8980000
unkown
page read and write
3FEE000
stack
page read and write
7FF5D7534000
unkown
page readonly
1030000
direct allocation
page read and write
104BB000
unkown
page read and write
47DE000
stack
page read and write
9AA0000
unkown
page read and write
515E000
stack
page read and write
1250000
unkown
page read and write
1030000
direct allocation
page read and write
7FF5D7385000
unkown
page readonly
7FF5D779E000
unkown
page readonly
8980000
unkown
page read and write
35C3000
unkown
page read and write
11C0000
unkown
page read and write
400000
unkown
page execute and read and write
3EDF000
stack
page read and write
CA35000
unkown
page read and write
423000
unkown
page read and write
4B31000
heap
page read and write
465F000
stack
page read and write
4B31000
heap
page read and write
7FF5D748C000
unkown
page readonly
9A6A000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
A26000
unkown
page execute and read and write
8980000
unkown
page read and write
5DC0000
heap
page read and write
7FF5D772C000
unkown
page readonly
11F0000
unkown
page read and write
9D42000
unkown
page read and write
7FF5D7705000
unkown
page readonly
5140000
direct allocation
page execute and read and write
7435000
stack
page read and write
8980000
unkown
page read and write
7FF5D738E000
unkown
page readonly
4251000
heap
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
4860000
direct allocation
page execute and read and write
10534000
unkown
page read and write
7FF5D775C000
unkown
page readonly
11F0000
unkown
page read and write
4251000
heap
page read and write
9580000
unkown
page read and write
7FF5D71C8000
unkown
page readonly
8980000
unkown
page read and write
779E000
unkown
page read and write
35D5000
unkown
page read and write
4B31000
heap
page read and write
3140000
unkown
page read and write
C617000
unkown
page read and write
4AE0000
direct allocation
page execute and read and write
BDC0000
unkown
page read and write
7FF5D7055000
unkown
page readonly
247D000
heap
page execute and read and write
11C0000
heap
page read and write
11C0000
unkown
page read and write
40B000
unkown
page execute read
7FF5D770F000
unkown
page readonly
4251000
heap
page read and write
2F4E000
stack
page read and write
B04000
heap
page read and write
7631000
unkown
page read and write
C621000
unkown
page read and write
7FF5D7284000
unkown
page readonly
4251000
heap
page read and write
7FF5D720F000
unkown
page readonly
1220000
unkown
page read and write
4B30000
heap
page read and write
4460000
direct allocation
page read and write
1220000
unkown
page read and write
1240000
unkown
page read and write
1383000
heap
page read and write
3110000
unkown
page readonly
B0E0000
unkown
page readonly
AFBE000
stack
page read and write
E74000
heap
page read and write
1240000
unkown
page read and write
7FF5D76AF000
unkown
page readonly
3500000
stack
page read and write
4B31000
heap
page read and write
2F0F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
6DB000
unkown
page execute and read and write
29B000
unkown
page execute and read and write
1220000
unkown
page read and write
43EE000
stack
page read and write
1274000
heap
page read and write
2E6E000
stack
page read and write
12A9000
heap
page read and write
11C0000
unkown
page read and write
4251000
heap
page read and write
7DC0000
unkown
page readonly
1220000
unkown
page read and write
51E0000
direct allocation
page execute and read and write
8980000
unkown
page read and write
C5F0000
unkown
page read and write
11C0000
unkown
page read and write
41C000
unkown
page execute and read and write
1220000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
1220000
unkown
page read and write
441E000
stack
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
4AA0000
unkown
page read and write
7FF5D7691000
unkown
page readonly
11C0000
unkown
page read and write
11E0000
unkown
page read and write
1340000
unkown
page read and write
1240000
unkown
page read and write
4A1F000
stack
page read and write
11C0000
unkown
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
11D0000
unkown
page read and write
8980000
unkown
page read and write
CA29000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
2448000
unkown
page readonly
12F0000
direct allocation
page read and write
4A12000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
29B000
unkown
page execute and read and write
525F000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
C85F000
unkown
page read and write
53E1000
unkown
page read and write
4A1F000
stack
page read and write
B04000
heap
page read and write
9D9B000
unkown
page read and write
4460000
direct allocation
page read and write
11D0000
unkown
page read and write
8980000
unkown
page read and write
4F6000
unkown
page execute and read and write
B04000
heap
page read and write
E00000
heap
page read and write
4251000
heap
page read and write
7FF5D72D7000
unkown
page readonly
49EF000
stack
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
1274000
heap
page read and write
386F000
stack
page read and write
35EF000
stack
page read and write
FF0000
unkown
page readonly
7810000
unkown
page read and write
E8B000
heap
page read and write
8980000
unkown
page read and write
35C9000
unkown
page read and write
1030000
direct allocation
page read and write
C5FA000
unkown
page read and write
A6E000
unkown
page execute and read and write
AAA7000
unkown
page read and write
372E000
stack
page read and write
7FF5D7799000
unkown
page readonly
8980000
unkown
page read and write
8980000
unkown
page read and write
7FF5D783B000
unkown
page readonly
7FF5D7292000
unkown
page readonly
7FF5D6BE4000
unkown
page readonly
231000
unkown
page execute and write copy
8980000
unkown
page read and write
8980000
unkown
page read and write
7FF5D747F000
unkown
page readonly
7FF5D7784000
unkown
page readonly
A39F000
unkown
page read and write
8980000
unkown
page read and write
1274000
heap
page read and write
7FF5D77F7000
unkown
page readonly
4900000
direct allocation
page read and write
31CE000
stack
page read and write
2A0F000
stack
page read and write
48DF000
stack
page read and write
2460000
heap
page read and write
3520000
unkown
page readonly
1288000
heap
page read and write
30AF000
stack
page read and write
35B3000
unkown
page read and write
11B0000
unkown
page read and write
7FF5D7077000
unkown
page readonly
8980000
unkown
page read and write
AA92000
unkown
page read and write
4FC0000
direct allocation
page read and write
462F000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
85BE000
stack
page read and write
4900000
direct allocation
page read and write
7FF5D7215000
unkown
page readonly
11F0000
unkown
page read and write
1281000
unkown
page readonly
36CE000
stack
page read and write
9820000
unkown
page read and write
AA01000
unkown
page read and write
8980000
unkown
page read and write
3626000
unkown
page read and write
8980000
unkown
page read and write
B0BD000
stack
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
1240000
heap
page read and write
B85A000
stack
page read and write
7FF5D7376000
unkown
page readonly
4251000
heap
page read and write
4870000
direct allocation
page execute and read and write
7FF5CE33D000
unkown
page readonly
8980000
unkown
page read and write
2E90000
unkown
page read and write
8980000
unkown
page read and write
7FF5D774C000
unkown
page readonly
8980000
unkown
page read and write
7FF5D723F000
unkown
page readonly
1220000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
52FB000
stack
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
52F000
unkown
page execute and read and write
4251000
heap
page read and write
7FF5D7257000
unkown
page readonly
8980000
unkown
page read and write
11F0000
unkown
page read and write
4AC0000
unkown
page read and write
53E000
unkown
page execute and write copy
4251000
heap
page read and write
1240000
unkown
page read and write
1220000
unkown
page read and write
4251000
heap
page read and write
3C2E000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
1240000
unkown
page read and write
2E90000
unkown
page read and write
31EF000
stack
page read and write
52F0000
direct allocation
page execute and read and write
BE90000
unkown
page read and write
8980000
unkown
page read and write
11D0000
unkown
page read and write
11E0000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
C47F000
unkown
page read and write
8980000
unkown
page read and write
9820000
unkown
page read and write
2EA0000
unkown
page read and write
F2ED000
unkown
page read and write
9820000
unkown
page read and write
11C0000
unkown
page read and write
C5FD000
unkown
page read and write
4B31000
heap
page read and write
9ADB000
unkown
page read and write
1220000
unkown
page read and write
7DD0000
heap
page read and write
1220000
unkown
page read and write
8F4F000
stack
page read and write
7FF5D776D000
unkown
page readonly
1220000
unkown
page read and write
11D0000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
E1D000
heap
page read and write
11F0000
unkown
page read and write
1380000
heap
page read and write
7DF4F2480000
unkown
page readonly
8980000
unkown
page read and write
CA1B000
unkown
page read and write
7FF5D7485000
unkown
page readonly
C636000
unkown
page read and write
4B31000
heap
page read and write
75E0000
unkown
page read and write
4900000
direct allocation
page execute and read and write
86E0000
unkown
page readonly
7FF5D7523000
unkown
page readonly
4B31000
heap
page read and write
4251000
heap
page read and write
7FF5D7309000
unkown
page readonly
11C0000
unkown
page read and write
11F0000
unkown
page read and write
77DB000
unkown
page read and write
B04000
heap
page read and write
1210000
unkown
page read and write
35BD000
unkown
page read and write
4B31000
heap
page read and write
11F0000
unkown
page read and write
4460000
direct allocation
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
7FF5D749B000
unkown
page readonly
354F000
stack
page read and write
10473000
unkown
page read and write
4460000
direct allocation
page read and write
11F0000
unkown
page read and write
76F8000
unkown
page read and write
7FF5D743F000
unkown
page readonly
7611000
unkown
page read and write
4B31000
heap
page read and write
9820000
unkown
page read and write
40F0000
heap
page read and write
8980000
unkown
page read and write
12BE000
stack
page read and write
9820000
unkown
page read and write
11F0000
unkown
page read and write
761E000
unkown
page read and write
52B0000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
339F000
stack
page read and write
7FF5D77C2000
unkown
page readonly
230000
unkown
page read and write
5150000
direct allocation
page execute and read and write
426F000
stack
page read and write
48EE000
stack
page read and write
4B00000
direct allocation
page execute and read and write
52E0000
direct allocation
page execute and read and write
7FF5D7694000
unkown
page readonly
CA3B000
unkown
page read and write
9679000
stack
page read and write
8980000
unkown
page read and write
35F4000
unkown
page read and write
C48B000
unkown
page read and write
1030000
direct allocation
page read and write
4B31000
heap
page read and write
4251000
heap
page read and write
39AE000
stack
page read and write
35DC000
unkown
page read and write
7FF5D7604000
unkown
page readonly
4B31000
heap
page read and write
64C2000
heap
page read and write
1020000
heap
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
230000
unkown
page readonly
3626000
unkown
page read and write
4870000
direct allocation
page execute and read and write
4B31000
heap
page read and write
48E0000
direct allocation
page execute and read and write
BAB000
heap
page read and write
2F7E000
stack
page read and write
8980000
unkown
page read and write
E1A000
heap
page read and write
E00000
unkown
page readonly
7FF5D7558000
unkown
page readonly
E03000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
C615000
unkown
page read and write
E54000
heap
page read and write
E91000
heap
page read and write
1210000
unkown
page read and write
8980000
unkown
page read and write
F311000
unkown
page read and write
1220000
unkown
page read and write
11C0000
unkown
page read and write
51F0000
direct allocation
page execute and read and write
12E0000
heap
page read and write
7FF5D77E0000
unkown
page readonly
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
7693000
unkown
page read and write
11C0000
unkown
page read and write
C973000
unkown
page read and write
7FF5D77F0000
unkown
page readonly
6270000
heap
page read and write
11D0000
unkown
page read and write
12E5000
heap
page read and write
12F0000
direct allocation
page read and write
CA39000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
27AF000
stack
page read and write
4A5D000
stack
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
28CF000
stack
page read and write
8980000
unkown
page read and write
2F00000
direct allocation
page read and write
4A5E000
stack
page read and write
2DFE000
stack
page read and write
C7CB000
unkown
page read and write
11D0000
unkown
page read and write
9820000
unkown
page read and write
D1C000
stack
page read and write
7FF5D7202000
unkown
page readonly
35DC000
unkown
page read and write
5C50000
remote allocation
page read and write
5479000
unkown
page read and write
3B8F000
stack
page read and write
7FF5D76F5000
unkown
page readonly
11C0000
unkown
page read and write
6490000
heap
page read and write
12B0000
unkown
page read and write
5FDF000
stack
page read and write
7CB0000
unkown
page readonly
7FF5D7648000
unkown
page readonly
580F000
stack
page read and write
11C0000
unkown
page read and write
4A90000
unkown
page read and write
11C0000
unkown
page read and write
11A0000
heap
page read and write
1220000
unkown
page read and write
A3C3000
unkown
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
7FF5D6ABD000
unkown
page readonly
8980000
unkown
page read and write
11C0000
unkown
page read and write
25C0000
direct allocation
page execute and read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
5EAE000
stack
page read and write
4251000
heap
page read and write
9B0B000
unkown
page read and write
4460000
direct allocation
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
6360000
heap
page read and write
E68000
heap
page read and write
11B0000
unkown
page read and write
4F70000
trusted library allocation
page read and write
1220000
unkown
page read and write
9AA8000
unkown
page read and write
299000
unkown
page write copy
8980000
unkown
page read and write
11B0000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
1390000
heap
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
4A0E000
unkown
page read and write
7FF5D7404000
unkown
page readonly
AE1D000
stack
page read and write
DB9000
heap
page read and write
11C0000
unkown
page read and write
7FF5D7745000
unkown
page readonly
1220000
unkown
page read and write
8980000
unkown
page read and write
322F000
stack
page read and write
29AF000
stack
page read and write
6360000
heap
page read and write
2D2E000
stack
page read and write
8980000
unkown
page read and write
35E4000
unkown
page read and write
11D0000
unkown
page read and write
4B31000
heap
page read and write
7FF5D7820000
unkown
page readonly
4B31000
heap
page read and write
11C0000
unkown
page read and write
130E000
heap
page read and write
A3AA000
unkown
page read and write
4B31000
heap
page read and write
11C0000
unkown
page read and write
3200000
unkown
page read and write
7FF5D7073000
unkown
page readonly
4870000
direct allocation
page execute and read and write
34AE000
stack
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
1240000
unkown
page read and write
7FF5D7792000
unkown
page readonly
7691000
unkown
page read and write
1240000
unkown
page read and write
4A90000
direct allocation
page execute and read and write
11B0000
direct allocation
page read and write
F0C000
heap
page read and write
8980000
unkown
page read and write
A273000
unkown
page read and write
8980000
unkown
page read and write
F2EE000
unkown
page read and write
8980000
unkown
page read and write
4460000
direct allocation
page read and write
5320000
direct allocation
page execute and read and write
494E000
stack
page read and write
1030000
direct allocation
page read and write
11E0000
unkown
page read and write
71B000
stack
page read and write
35C3000
unkown
page read and write
11B0000
direct allocation
page read and write
7FF5D758D000
unkown
page readonly
4B31000
heap
page read and write
4880000
direct allocation
page execute and read and write
445F000
stack
page read and write
1220000
unkown
page read and write
11F0000
unkown
page read and write
11F0000
heap
page read and write
292000
unkown
page execute and read and write
8980000
unkown
page read and write
4460000
direct allocation
page read and write
AA97000
unkown
page read and write
35B3000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
C5FD000
unkown
page read and write
332F000
stack
page read and write
9820000
unkown
page read and write
3FAF000
stack
page read and write
5330000
unkown
page write copy
9820000
unkown
page read and write
11E0000
unkown
page read and write
12F0000
direct allocation
page read and write
9580000
unkown
page read and write
49BB000
unkown
page read and write
F2F6000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
3D0E000
stack
page read and write
11C0000
unkown
page read and write
11D0000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D7589000
unkown
page readonly
7FF5D76E8000
unkown
page readonly
8980000
unkown
page read and write
8980000
unkown
page read and write
33C0000
unkown
page read and write
368F000
stack
page read and write
E68000
heap
page read and write
51B0000
direct allocation
page execute and read and write
4251000
heap
page read and write
2E27000
heap
page read and write
2470000
heap
page read and write
11F0000
unkown
page read and write
7FF5D71EA000
unkown
page readonly
8980000
unkown
page read and write
52A0000
direct allocation
page execute and read and write
8980000
unkown
page read and write
A33F000
unkown
page read and write
11C0000
unkown
page read and write
527000
unkown
page execute and read and write
9820000
unkown
page read and write
11C0000
unkown
page read and write
11F0000
unkown
page read and write
7FF5D77A8000
unkown
page readonly
4B31000
heap
page read and write
7FF5D7398000
unkown
page readonly
8980000
unkown
page read and write
760F000
unkown
page read and write
DF7000
heap
page read and write
4B5F000
stack
page read and write
362D000
unkown
page read and write
40EF000
stack
page read and write
1220000
unkown
page read and write
46CE000
stack
page read and write
41CF000
stack
page read and write
C62D000
unkown
page read and write
8980000
unkown
page read and write
C1CC000
stack
page read and write
E6A000
heap
page read and write
344E000
stack
page read and write
35B0000
unkown
page read and write
1274000
heap
page read and write
11D0000
unkown
page read and write
4251000
heap
page read and write
BBC000
heap
page read and write
25D4000
heap
page read and write
4AB0000
unkown
page read and write
8980000
unkown
page read and write
11F0000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
1274000
heap
page read and write
E8B000
heap
page read and write
F2FA000
unkown
page read and write
DF0000
heap
page read and write
C617000
unkown
page read and write
7FF5D6A4B000
unkown
page readonly
8980000
unkown
page read and write
12F0000
direct allocation
page read and write
9A94000
unkown
page read and write
9C000
stack
page read and write
7FF5D72DF000
unkown
page readonly
8980000
unkown
page read and write
C899000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
4FA000
stack
page read and write
3230000
unkown
page read and write
C908000
unkown
page read and write
1030000
direct allocation
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
A9FD000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
C908000
unkown
page read and write
7FF5D7669000
unkown
page readonly
9A84000
unkown
page read and write
7609000
unkown
page read and write
4AB0000
direct allocation
page execute and read and write
55BE000
stack
page read and write
1256000
heap
page read and write
11C0000
unkown
page read and write
1240000
unkown
page read and write
8C39000
stack
page read and write
7FF5D723C000
unkown
page readonly
455E000
stack
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
2E90000
unkown
page read and write
690000
heap
page read and write
401000
unkown
page execute read
4251000
heap
page read and write
46E0000
direct allocation
page read and write
2F10000
heap
page read and write
4251000
heap
page read and write
42AE000
stack
page read and write
11C0000
unkown
page read and write
2E90000
unkown
page read and write
9820000
unkown
page read and write
B330000
unkown
page read and write
12F0000
direct allocation
page read and write
8980000
unkown
page read and write
1097000
heap
page read and write
3C5F000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
1220000
unkown
page read and write
80DF000
stack
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
4A90000
direct allocation
page execute and read and write
E00000
heap
page read and write
4A71000
unkown
page read and write
4251000
heap
page read and write
11C0000
unkown
page read and write
4CA1000
heap
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
1240000
unkown
page read and write
1220000
unkown
page read and write
C9D0000
unkown
page read and write
3B1F000
stack
page read and write
41F000
unkown
page readonly
8980000
unkown
page read and write
7FF5D765F000
unkown
page readonly
4850000
direct allocation
page execute and read and write
2680000
heap
page read and write
C653000
unkown
page read and write
361F000
stack
page read and write
8980000
unkown
page read and write
4460000
direct allocation
page read and write
3D9F000
stack
page read and write
8980000
unkown
page read and write
7FF5D6BDB000
unkown
page readonly
4251000
heap
page read and write
35CD000
unkown
page read and write
7AF1000
unkown
page read and write
DAA000
heap
page read and write
312F000
stack
page read and write
3F8E000
stack
page read and write
11C0000
unkown
page read and write
11B0000
direct allocation
page read and write
8980000
unkown
page read and write
308E000
stack
page read and write
415F000
stack
page read and write
8A46000
unkown
page read and write
BC6000
heap
page read and write
7C9000
unkown
page write copy
11F0000
unkown
page read and write
7FF5D7760000
unkown
page readonly
7FF5D710B000
unkown
page readonly
F2F8000
unkown
page read and write
4870000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
362A000
unkown
page read and write
4A40000
unkown
page read and write
3530000
unkown
page read and write
7FF5D75C1000
unkown
page readonly
4251000
heap
page read and write
7E60000
unkown
page read and write
4090000
direct allocation
page read and write
547E000
stack
page read and write
11F0000
unkown
page read and write
CA33000
unkown
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
4250000
heap
page read and write
4251000
heap
page read and write
4B31000
heap
page read and write
5BFE000
stack
page read and write
11C0000
unkown
page read and write
9B41000
unkown
page read and write
3630000
unkown
page readonly
7FF5D774A000
unkown
page readonly
35C1000
unkown
page read and write
2E2F000
stack
page read and write
8980000
unkown
page read and write
75E000
stack
page read and write
5ED0000
heap
page read and write
330E000
stack
page read and write
4CA0000
heap
page read and write
99B0000
unkown
page read and write
16CF000
stack
page read and write
C5F4000
unkown
page read and write
3B2E000
stack
page read and write
5130000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
35B3000
unkown
page read and write
4AC0000
direct allocation
page execute and read and write
9820000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
372F000
stack
page read and write
305F000
unkown
page read and write
8980000
unkown
page read and write
9580000
unkown
page read and write
8980000
unkown
page read and write
3331000
unkown
page read and write
263F000
stack
page read and write
41C000
unkown
page execute and read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
346F000
stack
page read and write
35BD000
unkown
page read and write
1220000
unkown
page read and write
11C0000
unkown
page read and write
C973000
unkown
page read and write
35F4000
unkown
page read and write
11C0000
unkown
page read and write
231000
unkown
page execute and write copy
A12F000
stack
page read and write
35D3000
unkown
page read and write
E7F000
heap
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
13A0000
unkown
page readonly
A6F000
unkown
page execute and write copy
11F0000
unkown
page read and write
2E90000
unkown
page read and write
35B0000
unkown
page read and write
4251000
heap
page read and write
33B0000
unkown
page readonly
7DF4F2491000
unkown
page execute read
11C0000
unkown
page read and write
E75000
heap
page read and write
4870000
direct allocation
page execute and read and write
400000
unkown
page readonly
6DB000
unkown
page execute and read and write
8980000
unkown
page read and write
7FF5D729E000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
E80000
heap
page read and write
299000
unkown
page read and write
4251000
heap
page read and write
2FFC000
stack
page read and write
11E0000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
7FF5D7482000
unkown
page readonly
1220000
unkown
page read and write
3AEF000
stack
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
53E000
unkown
page execute and read and write
11C0000
unkown
page read and write
1220000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
7FF5D7075000
unkown
page readonly
2E00000
heap
page read and write
7D3E000
stack
page read and write
4B31000
heap
page read and write
4251000
heap
page read and write
4F6000
unkown
page execute and read and write
11C0000
unkown
page read and write
91F0000
unkown
page readonly
8980000
unkown
page read and write
104B6000
unkown
page read and write
89C2000
heap
page read and write
8980000
unkown
page read and write
9A72000
unkown
page read and write
7AB0000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
42DE000
stack
page read and write
601E000
stack
page read and write
FDE000
stack
page read and write
5ED5000
heap
page read and write
7B80000
unkown
page readonly
F2FA000
unkown
page read and write
2492000
heap
page read and write
B8E000
stack
page read and write
49D6000
unkown
page read and write
2E90000
unkown
page read and write
4B31000
heap
page read and write
247A000
heap
page read and write
7B00000
unkown
page readonly
8980000
unkown
page read and write
12F0000
direct allocation
page read and write
4251000
heap
page read and write
7FF5D7230000
unkown
page readonly
27CE000
stack
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
3BCE000
stack
page read and write
11C0000
unkown
page read and write
769A000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
4251000
heap
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
35BD000
unkown
page read and write
4B31000
heap
page read and write
4971000
direct allocation
page read and write
3F1E000
stack
page read and write
7FF5D75D9000
unkown
page readonly
11C0000
unkown
page read and write
8980000
unkown
page read and write
527000
unkown
page execute and read and write
101E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
8980000
unkown
page read and write
7FF5D770A000
unkown
page readonly
5120000
direct allocation
page execute and read and write
4A16000
unkown
page read and write
1220000
unkown
page read and write
435E000
stack
page read and write
4B9E000
stack
page read and write
2E90000
unkown
page read and write
B4BF000
stack
page read and write
11C0000
unkown
page read and write
11F0000
unkown
page read and write
9E2D000
stack
page read and write
1CC000
stack
page read and write
4251000
heap
page read and write
3FE0000
heap
page read and write
C5F8000
unkown
page read and write
11B0000
unkown
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
4B31000
heap
page read and write
C0B000
unkown
page execute and read and write
4251000
heap
page read and write
2E90000
unkown
page read and write
35EE000
stack
page read and write
11C0000
unkown
page read and write
7FF5D74FA000
unkown
page readonly
11E0000
unkown
page read and write
53E000
unkown
page execute and write copy
33F0000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D7391000
unkown
page readonly
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
760D000
unkown
page read and write
4B31000
heap
page read and write
11C0000
unkown
page read and write
7B10000
unkown
page read and write
E7C000
heap
page read and write
4C9F000
stack
page read and write
8980000
unkown
page read and write
3200000
unkown
page read and write
11F0000
unkown
page read and write
35C3000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
7FF5D776F000
unkown
page readonly
9820000
unkown
page read and write
2CCE000
stack
page read and write
7FF5D7065000
unkown
page readonly
4A90000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
3A8D000
stack
page read and write
8980000
unkown
page read and write
1240000
unkown
page read and write
35E4000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
5150000
direct allocation
page execute and read and write
3A4F000
stack
page read and write
4B31000
heap
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
11F0000
unkown
page read and write
5160000
direct allocation
page execute and read and write
8980000
unkown
page read and write
5150000
direct allocation
page execute and read and write
4B20000
direct allocation
page execute and read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
7637000
unkown
page read and write
7FF5D769E000
unkown
page readonly
1220000
unkown
page read and write
4B31000
heap
page read and write
7FF5D705D000
unkown
page readonly
4251000
heap
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
A251000
unkown
page read and write
7FF5D7452000
unkown
page readonly
230000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
2E90000
unkown
page read and write
35FA000
unkown
page read and write
27CE000
stack
page read and write
35B5000
unkown
page read and write
7FF5D7438000
unkown
page readonly
7FF5D72D3000
unkown
page readonly
451F000
stack
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
7FF5D719C000
unkown
page readonly
5D8F000
stack
page read and write
11C0000
unkown
page read and write
299000
unkown
page read and write
8980000
unkown
page read and write
7FF5D7425000
unkown
page readonly
3FA0000
unclassified section
page read and write
67CC000
stack
page read and write
48A0000
direct allocation
page execute and read and write
9AAC000
unkown
page read and write
5ED6000
heap
page read and write
8980000
unkown
page read and write
A391000
unkown
page read and write
C625000
unkown
page read and write
7FF5D732D000
unkown
page readonly
9B2C000
unkown
page read and write
1160000
unkown
page read and write
30EE000
stack
page read and write
41C000
unkown
page execute and read and write
8980000
unkown
page read and write
11F0000
unkown
page read and write
7FF5D751F000
unkown
page readonly
11C0000
unkown
page read and write
4B31000
heap
page read and write
39EE000
stack
page read and write
7FF5D75F6000
unkown
page readonly
11F0000
unkown
page read and write
8980000
unkown
page read and write
7FF5D75B3000
unkown
page readonly
11C0000
unkown
page read and write
BE49000
stack
page read and write
B8DB000
stack
page read and write
7440000
unkown
page read and write
9AF9000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
382F000
stack
page read and write
431000
unkown
page read and write
121B000
heap
page read and write
7C2000
unkown
page execute and read and write
7C90000
unkown
page read and write
4460000
direct allocation
page read and write
7FF5D77E3000
unkown
page readonly
400000
unkown
page execute and read and write
1731000
unkown
page readonly
2F17000
heap
page read and write
4251000
heap
page read and write
400000
unkown
page readonly
4B31000
heap
page read and write
8980000
unkown
page read and write
C5F8000
unkown
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
5270000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
44EF000
stack
page read and write
7FF5D744E000
unkown
page readonly
41F000
unkown
page readonly
8980000
unkown
page read and write
B04000
heap
page read and write
25D0000
heap
page read and write
40C0000
heap
page read and write
8980000
unkown
page read and write
4471000
heap
page read and write
4B5E000
stack
page read and write
7FF5D781A000
unkown
page readonly
BEA0000
unkown
page readonly
246A000
heap
page read and write
35C9000
unkown
page read and write
2DCF000
stack
page read and write
6590000
heap
page read and write
8980000
unkown
page read and write
75F8000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
F2E1000
unkown
page read and write
C609000
unkown
page read and write
431F000
stack
page read and write
35D3000
unkown
page read and write
11D0000
unkown
page read and write
A384000
unkown
page read and write
4B31000
heap
page read and write
2493000
heap
page read and write
11E0000
unkown
page read and write
9820000
unkown
page read and write
1350000
unkown
page readonly
E75000
heap
page read and write
4251000
heap
page read and write
4900000
direct allocation
page read and write
1240000
unkown
page read and write
4251000
heap
page read and write
1030000
direct allocation
page read and write
8980000
unkown
page read and write
120B000
stack
page read and write
AA1A000
unkown
page read and write
7DBD000
stack
page read and write
66CB000
stack
page read and write
4B31000
heap
page read and write
35CF000
unkown
page read and write
103F4000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
4460000
direct allocation
page read and write
C951000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
595E000
stack
page read and write
9820000
unkown
page read and write
33DE000
stack
page read and write
348B000
stack
page read and write
7FF5D75FF000
unkown
page readonly
8980000
unkown
page read and write
AA40000
unkown
page read and write
8980000
unkown
page read and write
2E90000
unkown
page read and write
11C0000
unkown
page read and write
11B0000
unkown
page read and write
8980000
unkown
page read and write
476F000
stack
page read and write
8980000
unkown
page read and write
4690000
trusted library allocation
page read and write
1220000
unkown
page read and write
9820000
unkown
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
27AF000
stack
page read and write
3230000
unkown
page read and write
9ABD000
unkown
page read and write
4251000
heap
page read and write
7FF5D7462000
unkown
page readonly
8980000
unkown
page read and write
11D0000
unkown
page read and write
362D000
unkown
page read and write
7FF5D7267000
unkown
page readonly
8980000
unkown
page read and write
2B4F000
stack
page read and write
7FF5D72CE000
unkown
page readonly
C81C000
unkown
page read and write
11C0000
unkown
page read and write
4B31000
heap
page read and write
49FA000
unkown
page read and write
E8B000
heap
page read and write
7FF5D7764000
unkown
page readonly
11C0000
unkown
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
C908000
unkown
page read and write
7DF5F46ED000
unkown
page readonly
E23000
heap
page read and write
8B77000
unkown
page read and write
8980000
unkown
page read and write
33AE000
stack
page read and write
E10000
unkown
page readonly
7FF5D75BF000
unkown
page readonly
8980000
unkown
page read and write
1220000
unkown
page read and write
412F000
stack
page read and write
761000
unkown
page execute and write copy
12F0000
direct allocation
page read and write
C669000
unkown
page read and write
365E000
stack
page read and write
11C0000
unkown
page read and write
7C31000
unkown
page read and write
469E000
stack
page read and write
7FF5D7450000
unkown
page readonly
510F000
stack
page read and write
39DF000
stack
page read and write
8980000
unkown
page read and write
7FF5D7336000
unkown
page readonly
2AAF000
stack
page read and write
7B20000
unkown
page read and write
230000
unkown
page read and write
2F00000
direct allocation
page read and write
E91000
heap
page read and write
8980000
unkown
page read and write
A02E000
stack
page read and write
1030000
direct allocation
page read and write
7654000
unkown
page read and write
231000
unkown
page execute and write copy
278F000
stack
page read and write
11B0000
direct allocation
page read and write
322E000
stack
page read and write
E54000
heap
page read and write
4B31000
heap
page read and write
11B0000
direct allocation
page read and write
278E000
stack
page read and write
7FF5D7244000
unkown
page readonly
7FF5D7837000
unkown
page readonly
2460000
heap
page read and write
329E000
stack
page read and write
AA1A000
unkown
page read and write
290E000
stack
page read and write
7FF5D75B8000
unkown
page readonly
8980000
unkown
page read and write
8980000
unkown
page read and write
9A8C000
unkown
page read and write
C483000
unkown
page read and write
11C0000
unkown
page read and write
BA0000
heap
page read and write
7FF5D71DA000
unkown
page readonly
9AAA000
unkown
page read and write
376E000
stack
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
4986000
unkown
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D748A000
unkown
page readonly
11C0000
unkown
page read and write
11C0000
unkown
page read and write
2E90000
unkown
page read and write
4B31000
heap
page read and write
543F000
stack
page read and write
A6E000
unkown
page execute and write copy
1030000
direct allocation
page read and write
9820000
unkown
page read and write
BB10000
heap
page read and write
354B000
unkown
page read and write
A2A2000
unkown
page read and write
2E2B000
heap
page read and write
35CD000
unkown
page read and write
8880000
unkown
page readonly
4B31000
heap
page read and write
CA1F000
unkown
page read and write
B04000
heap
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
7989000
stack
page read and write
1220000
unkown
page read and write
C460000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
49FD000
unkown
page read and write
9C000
stack
page read and write
760000
unkown
page readonly
1220000
unkown
page read and write
119E000
stack
page read and write
35D3000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
2F00000
direct allocation
page read and write
8980000
unkown
page read and write
7FF5D7488000
unkown
page readonly
1240000
unkown
page read and write
1240000
unkown
page read and write
5170000
direct allocation
page execute and read and write
7FF5D74F2000
unkown
page readonly
4251000
heap
page read and write
429F000
stack
page read and write
2E90000
unkown
page read and write
4CA1000
heap
page read and write
570E000
stack
page read and write
4251000
heap
page read and write
4751000
direct allocation
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
768C000
unkown
page read and write
401000
unkown
page execute read
11C0000
unkown
page read and write
D80000
heap
page read and write
4251000
heap
page read and write
35F4000
unkown
page read and write
11F0000
unkown
page read and write
472E000
stack
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
84BB000
stack
page read and write
5330000
direct allocation
page execute and read and write
8980000
unkown
page read and write
C78A000
unkown
page read and write
4A2E000
stack
page read and write
11B0000
unkown
page read and write
B04000
heap
page read and write
41F000
unkown
page readonly
8980000
unkown
page read and write
1360000
unkown
page readonly
533E000
stack
page read and write
B04000
heap
page read and write
35D1000
unkown
page read and write
1220000
unkown
page read and write
599D000
stack
page read and write
11F0000
unkown
page read and write
4251000
heap
page read and write
11B0000
direct allocation
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
1274000
heap
page read and write
7FF5D777A000
unkown
page readonly
4251000
heap
page read and write
7FF5D7407000
unkown
page readonly
5463000
unkown
page read and write
8980000
unkown
page read and write
12F0000
direct allocation
page read and write
11F0000
unkown
page read and write
1220000
unkown
page read and write
4890000
direct allocation
page execute and read and write
7AC0000
unkown
page read and write
8980000
unkown
page read and write
362A000
unkown
page read and write
38AE000
stack
page read and write
C61D000
unkown
page read and write
7FF5D7280000
unkown
page readonly
4B31000
heap
page read and write
5031000
direct allocation
page read and write
3AEE000
stack
page read and write
2F6F000
stack
page read and write
3EEE000
stack
page read and write
2E90000
unkown
page read and write
1240000
unkown
page read and write
F311000
unkown
page read and write
8ECB000
stack
page read and write
4B31000
heap
page read and write
11B0000
direct allocation
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
C46F000
unkown
page read and write
4251000
heap
page read and write
3200000
unkown
page read and write
3D6E000
stack
page read and write
7FF5D7442000
unkown
page readonly
8980000
unkown
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
7DF4F2461000
unkown
page execute read
4251000
heap
page read and write
4251000
heap
page read and write
B04000
heap
page read and write
3F4F000
stack
page read and write
7E58000
stack
page read and write
1220000
unkown
page read and write
53F000
unkown
page execute and write copy
5150000
direct allocation
page execute and read and write
1220000
unkown
page read and write
A220000
unkown
page read and write
11F0000
unkown
page read and write
4251000
heap
page read and write
4251000
heap
page read and write
C496000
unkown
page read and write
6491000
heap
page read and write
380E000
stack
page read and write
7FF5D71BF000
unkown
page readonly
C65E000
unkown
page read and write
6DB000
unkown
page execute and read and write
35D5000
unkown
page read and write
11B0000
direct allocation
page read and write
A9E9000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
2E90000
unkown
page read and write
3E4E000
stack
page read and write
11C0000
unkown
page read and write
29B000
unkown
page execute and read and write
2560000
heap
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
1240000
unkown
page read and write
268E000
stack
page read and write
4FC0000
direct allocation
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
E1B000
heap
page read and write
8980000
unkown
page read and write
396F000
stack
page read and write
6DE000
stack
page read and write
8980000
unkown
page read and write
3CCF000
stack
page read and write
4B31000
heap
page read and write
1220000
unkown
page read and write
4B40000
heap
page read and write
2E90000
unkown
page read and write
2E90000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
4B31000
heap
page read and write
4251000
heap
page read and write
40CE000
stack
page read and write
4B31000
heap
page read and write
11C0000
unkown
page read and write
7FF5D728E000
unkown
page readonly
4B31000
heap
page read and write
6350000
heap
page read and write
5180000
direct allocation
page execute and read and write
7FF5D77EB000
unkown
page readonly
C7BE000
unkown
page read and write
2E20000
heap
page read and write
7CB000
unkown
page execute and read and write
1090000
heap
page read and write
7FF5D75D6000
unkown
page readonly
50E0000
trusted library allocation
page read and write
8980000
unkown
page read and write
2E90000
unkown
page read and write
11C0000
unkown
page read and write
340F000
stack
page read and write
1220000
unkown
page read and write
9AC3000
unkown
page read and write
11C0000
unkown
page read and write
315E000
stack
page read and write
24A2000
heap
page read and write
9FAF000
stack
page read and write
C615000
unkown
page read and write
9580000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
C5F4000
unkown
page read and write
4B31000
heap
page read and write
F2ED000
unkown
page read and write
2E90000
unkown
page read and write
8980000
unkown
page read and write
2F2F000
stack
page read and write
35D1000
unkown
page read and write
A3AC000
unkown
page read and write
4B31000
heap
page read and write
1274000
heap
page read and write
4B10000
direct allocation
page execute and read and write
7FF5D77FD000
unkown
page readonly
1220000
unkown
page read and write
4251000
heap
page read and write
F30E000
unkown
page read and write
7605000
unkown
page read and write
11D0000
unkown
page read and write
7FF5D7458000
unkown
page readonly
11F0000
unkown
page read and write
1030000
direct allocation
page read and write
423000
unkown
page write copy
C5FA000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
43E0000
heap
page read and write
12A5000
heap
page read and write
7DD000
stack
page read and write
4B31000
heap
page read and write
5150000
direct allocation
page execute and read and write
B04000
heap
page read and write
3200000
unkown
page read and write
358E000
stack
page read and write
8890000
unkown
page readonly
7FF5D72C8000
unkown
page readonly
7FF5D66E3000
unkown
page readonly
7FF5D7703000
unkown
page readonly
108C000
stack
page read and write
3553000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
DA0000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
B03B000
stack
page read and write
8980000
unkown
page read and write
7FF5D76C8000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
3200000
unkown
page read and write
11F0000
unkown
page read and write
A237000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
2C8F000
stack
page read and write
19D000
stack
page read and write
A39C000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
BFB8000
stack
page read and write
52A0000
direct allocation
page execute and read and write
9A92000
unkown
page read and write
1220000
unkown
page read and write
4AF0000
direct allocation
page execute and read and write
11F0000
unkown
page read and write
9820000
unkown
page read and write
B950000
unkown
page readonly
8980000
unkown
page read and write
5280000
direct allocation
page execute and read and write
36EF000
stack
page read and write
8980000
unkown
page read and write
5AFE000
stack
page read and write
4251000
heap
page read and write
126E000
heap
page read and write
1030000
direct allocation
page read and write
5300000
direct allocation
page execute and read and write
1220000
unkown
page read and write
7FF5D7593000
unkown
page readonly
4B31000
heap
page read and write
9A8E000
unkown
page read and write
3BEF000
stack
page read and write
11F0000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
2640000
heap
page read and write
E17000
heap
page read and write
7FF5D71F9000
unkown
page readonly
7FF5D71C4000
unkown
page readonly
5290000
direct allocation
page execute and read and write
35CD000
unkown
page read and write
11C0000
unkown
page read and write
9820000
unkown
page read and write
9820000
unkown
page read and write
11C0000
unkown
page read and write
A9A0000
unkown
page read and write
89CA000
heap
page read and write
8980000
unkown
page read and write
37CF000
stack
page read and write
10FD000
stack
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
7FF5D7591000
unkown
page readonly
C61B000
unkown
page read and write
611F000
stack
page read and write
48D0000
direct allocation
page execute and read and write
8980000
unkown
page read and write
3D6F000
stack
page read and write
2E90000
unkown
page read and write
11C5000
heap
page read and write
BE70000
unkown
page readonly
7AE0000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D7396000
unkown
page readonly
9820000
unkown
page read and write
11C0000
unkown
page read and write
362A000
unkown
page read and write
362D000
unkown
page read and write
11C0000
unkown
page read and write
1254000
heap
page read and write
7FF5D72BF000
unkown
page readonly
557F000
stack
page read and write
2E90000
unkown
page read and write
52C0000
direct allocation
page execute and read and write
47AE000
stack
page read and write
4A90000
direct allocation
page execute and read and write
1395000
heap
page read and write
3EAF000
stack
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
B559000
stack
page read and write
2E90000
unkown
page read and write
2E90000
unkown
page read and write
3531000
unkown
page read and write
35C1000
unkown
page read and write
11C0000
unkown
page read and write
1274000
heap
page read and write
8980000
unkown
page read and write
9579000
stack
page read and write
11E0000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
1220000
unkown
page read and write
C973000
unkown
page read and write
11C0000
unkown
page read and write
4840000
direct allocation
page execute and read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
A408000
unkown
page read and write
11C0000
unkown
page read and write
4460000
direct allocation
page read and write
C4BD000
unkown
page read and write
4B31000
heap
page read and write
99C0000
unkown
page read and write
1220000
unkown
page read and write
1270000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
12F0000
direct allocation
page read and write
7E0000
heap
page read and write
8980000
unkown
page read and write
8A70000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
11B0000
direct allocation
page read and write
1200000
heap
page read and write
11E0000
unkown
page read and write
E7F000
heap
page read and write
7FF5D77E9000
unkown
page readonly
11C0000
unkown
page read and write
8980000
unkown
page read and write
7FF5D7641000
unkown
page readonly
7FF5D7272000
unkown
page readonly
2CEF000
stack
page read and write
1030000
direct allocation
page read and write
7FF5D752F000
unkown
page readonly
C44F000
stack
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
1FB000
stack
page read and write
4251000
heap
page read and write
2BAF000
stack
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
9A98000
unkown
page read and write
8980000
unkown
page read and write
625F000
stack
page read and write
7FF5D77DD000
unkown
page readonly
A57000
unkown
page execute and read and write
8980000
unkown
page read and write
760000
unkown
page read and write
8980000
unkown
page read and write
F30E000
unkown
page read and write
3DDE000
stack
page read and write
11F0000
unkown
page read and write
C035000
stack
page read and write
8980000
unkown
page read and write
4460000
direct allocation
page read and write
11C0000
unkown
page read and write
4B31000
heap
page read and write
64A4000
heap
page read and write
8980000
unkown
page read and write
11B0000
direct allocation
page read and write
4251000
heap
page read and write
11F0000
unkown
page read and write
B04000
heap
page read and write
4251000
heap
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
F13000
heap
page read and write
9820000
unkown
page read and write
52F000
unkown
page execute and read and write
1220000
unkown
page read and write
C800000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
C973000
unkown
page read and write
11E0000
unkown
page read and write
585E000
stack
page read and write
35C9000
unkown
page read and write
CA01000
unkown
page read and write
3230000
unkown
page read and write
E6D000
heap
page read and write
4CA1000
heap
page read and write
7FF5D77A4000
unkown
page readonly
8980000
unkown
page read and write
C806000
unkown
page read and write
E7B000
heap
page read and write
6351000
heap
page read and write
2448000
unkown
page readonly
12F0000
direct allocation
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
AA9B000
unkown
page read and write
11C0000
unkown
page read and write
3200000
unkown
page read and write
421E000
stack
page read and write
40F1000
heap
page read and write
56BF000
stack
page read and write
2EC0000
unkown
page readonly
3544000
unkown
page read and write
1D4000
heap
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
AA04000
unkown
page read and write
11B0000
unkown
page read and write
35FA000
unkown
page read and write
402E000
stack
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
39AF000
stack
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
9820000
unkown
page read and write
C450000
unkown
page read and write
8980000
unkown
page read and write
7FF5D75DF000
unkown
page readonly
4280000
heap
page read and write
1220000
unkown
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
2DBE000
stack
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
375F000
stack
page read and write
11C0000
unkown
page read and write
351E000
stack
page read and write
4B31000
heap
page read and write
11C0000
unkown
page read and write
B4D0000
unkown
page readonly
1220000
unkown
page read and write
8980000
unkown
page read and write
130A000
heap
page read and write
7FF5D75E9000
unkown
page readonly
2B8E000
stack
page read and write
53E000
unkown
page execute and read and write
7FF5D7643000
unkown
page readonly
AA40000
unkown
page read and write
A23A000
unkown
page read and write
40A0000
unclassified section
page read and write
4251000
heap
page read and write
E17000
heap
page read and write
11C0000
unkown
page read and write
1210000
unkown
page read and write
9AB4000
unkown
page read and write
8980000
unkown
page read and write
1240000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
7DF4F2470000
unkown
page readonly
760B000
unkown
page read and write
19D000
stack
page read and write
7FF5D71D7000
unkown
page readonly
8980000
unkown
page read and write
11C0000
unkown
page read and write
2BEE000
stack
page read and write
2448000
unkown
page readonly
11D0000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D716B000
unkown
page readonly
48B0000
direct allocation
page execute and read and write
8980000
unkown
page read and write
3D2F000
stack
page read and write
7FF5D7682000
unkown
page readonly
11C0000
unkown
page read and write
5310000
direct allocation
page execute and read and write
1240000
unkown
page read and write
7FF5D76D7000
unkown
page readonly
4251000
heap
page read and write
A3B9000
unkown
page read and write
8980000
unkown
page read and write
52F000
unkown
page execute and read and write
4251000
heap
page read and write
7DF4F2481000
unkown
page execute read
95C0000
unkown
page read and write
11C0000
unkown
page read and write
401F000
stack
page read and write
431000
unkown
page read and write
11C0000
unkown
page read and write
98FD000
stack
page read and write
1274000
heap
page read and write
304F000
stack
page read and write
7FF5D75CB000
unkown
page readonly
5A9C000
stack
page read and write
C9A7000
unkown
page read and write
7FF5D7429000
unkown
page readonly
4B31000
heap
page read and write
15CF000
stack
page read and write
C892000
unkown
page read and write
491E000
stack
page read and write
28CF000
stack
page read and write
2EEE000
stack
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
11C0000
unkown
page read and write
336E000
stack
page read and write
E01000
heap
page read and write
5150000
direct allocation
page execute and read and write
415F000
stack
page read and write
CA3D000
unkown
page read and write
615E000
stack
page read and write
3E6F000
stack
page read and write
35E4000
unkown
page read and write
560000
heap
page read and write
390F000
stack
page read and write
11B0000
direct allocation
page read and write
2A4E000
stack
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
8870000
unkown
page readonly
8980000
unkown
page read and write
3200000
unkown
page read and write
8980000
unkown
page read and write
4B50000
heap
page read and write
7DF4F2471000
unkown
page execute read
11C0000
unkown
page read and write
11C0000
unkown
page read and write
118D000
stack
page read and write
C513000
unkown
page read and write
9820000
unkown
page read and write
5C50000
remote allocation
page read and write
49A8000
unkown
page read and write
34EE000
stack
page read and write
48F0000
direct allocation
page execute and read and write
B00000
heap
page read and write
11C0000
unkown
page read and write
9A96000
unkown
page read and write
230000
unkown
page readonly
4251000
heap
page read and write
AE0000
heap
page read and write
B980000
unkown
page readonly
B04000
heap
page read and write
8980000
unkown
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
52A0000
direct allocation
page execute and read and write
C472000
unkown
page read and write
8360000
unkown
page read and write
3200000
unkown
page read and write
35CF000
unkown
page read and write
8980000
unkown
page read and write
C4DC000
unkown
page read and write
3A1E000
stack
page read and write
8980000
unkown
page read and write
4B31000
heap
page read and write
3B5E000
stack
page read and write
7FF5D71E6000
unkown
page readonly
A286000
unkown
page read and write
419E000
stack
page read and write
9A90000
unkown
page read and write
4A80000
direct allocation
page execute and read and write
1220000
unkown
page read and write
3120000
unkown
page read and write
12F0000
direct allocation
page read and write
3C6E000
stack
page read and write
408F000
stack
page read and write
8980000
unkown
page read and write
E8B000
heap
page read and write
4870000
direct allocation
page execute and read and write
8980000
unkown
page read and write
9820000
unkown
page read and write
4251000
heap
page read and write
5C8E000
stack
page read and write
7FF5D71A6000
unkown
page readonly
4B2F000
stack
page read and write
1274000
heap
page read and write
2687000
heap
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
1274000
heap
page read and write
11C9000
unkown
page read and write
6593000
heap
page read and write
53E000
unkown
page execute and read and write
4B31000
heap
page read and write
12E2000
heap
page read and write
4FC0000
direct allocation
page read and write
48AF000
stack
page read and write
C86B000
unkown
page read and write
302F000
stack
page read and write
129E000
heap
page read and write
8980000
unkown
page read and write
9820000
unkown
page read and write
405E000
stack
page read and write
75FD000
unkown
page read and write
40E0000
heap
page read and write
7FF5D71CC000
unkown
page readonly
8980000
unkown
page read and write
11C0000
unkown
page read and write
423000
unkown
page read and write
AA9B000
unkown
page read and write
7FF5D75A6000
unkown
page readonly
7AA0000
unkown
page read and write
1F0000
heap
page read and write
11D0000
unkown
page read and write
4251000
heap
page read and write
F2F8000
unkown
page read and write
821C000
stack
page read and write
7FF5D77C7000
unkown
page readonly
4A4F000
stack
page read and write
A313000
unkown
page read and write
E58000
heap
page read and write
3F8E000
stack
page read and write
301F000
stack
page read and write
11C0000
unkown
page read and write
325F000
stack
page read and write
1259000
heap
page read and write
2E0E000
stack
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
9580000
unkown
page read and write
7618000
unkown
page read and write
38DE000
stack
page read and write
7FF5D6AB6000
unkown
page readonly
4460000
direct allocation
page read and write
53F000
unkown
page execute and write copy
CA37000
unkown
page read and write
9820000
unkown
page read and write
11C0000
unkown
page read and write
1000000
heap
page read and write
52D0000
direct allocation
page execute and read and write
7FF5D71AF000
unkown
page readonly
1240000
unkown
page read and write
E91000
heap
page read and write
7FF5D7795000
unkown
page readonly
4251000
heap
page read and write
11C0000
unkown
page read and write
1240000
unkown
page read and write
7FF5D7236000
unkown
page readonly
11C0000
unkown
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
A3B6000
unkown
page read and write
B04000
heap
page read and write
8980000
unkown
page read and write
4AD0000
direct allocation
page execute and read and write
2448000
unkown
page readonly
1240000
unkown
page read and write
1220000
unkown
page read and write
F2F6000
unkown
page read and write
7686000
unkown
page read and write
7FF5D760B000
unkown
page readonly
8980000
unkown
page read and write
311F000
stack
page read and write
35AF000
stack
page read and write
8980000
unkown
page read and write
51C0000
direct allocation
page execute and read and write
F2F6000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
4B31000
heap
page read and write
9820000
unkown
page read and write
4251000
heap
page read and write
35B0000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
2E90000
unkown
page read and write
635E000
heap
page read and write
11C0000
unkown
page read and write
12F0000
direct allocation
page read and write
1030000
direct allocation
page read and write
11C0000
unkown
page read and write
1274000
heap
page read and write
9A76000
unkown
page read and write
8980000
unkown
page read and write
C621000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
4B31000
heap
page read and write
12D0000
unkown
page readonly
AAA7000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
B04000
heap
page read and write
35FA000
unkown
page read and write
299000
unkown
page write copy
412E000
stack
page read and write
8980000
unkown
page read and write
52A0000
direct allocation
page execute and read and write
299000
unkown
page read and write
F2FA000
unkown
page read and write
4251000
heap
page read and write
1220000
unkown
page read and write
1240000
unkown
page read and write
4251000
heap
page read and write
9D67000
unkown
page read and write
C609000
unkown
page read and write
8980000
unkown
page read and write
25AE000
stack
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
52A0000
direct allocation
page execute and read and write
4460000
direct allocation
page read and write
1220000
unkown
page read and write
8980000
unkown
page read and write
9820000
unkown
page read and write
7FF5D7740000
unkown
page readonly
35D1000
unkown
page read and write
3EAE000
stack
page read and write
8980000
unkown
page read and write
1274000
heap
page read and write
4B31000
heap
page read and write
8980000
unkown
page read and write
248D000
heap
page execute and read and write
4B46000
heap
page read and write
89C0000
heap
page read and write
34DF000
stack
page read and write
7FF5D74B8000
unkown
page readonly
7FF5D768B000
unkown
page readonly
A40E000
unkown
page read and write
7FF5D7752000
unkown
page readonly
6DD000
unkown
page execute and write copy
8980000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
4251000
heap
page read and write
1300000
heap
page read and write
1220000
unkown
page read and write
E75000
heap
page read and write
8980000
unkown
page read and write
11C0000
unkown
page read and write
7FF5D75AF000
unkown
page readonly
8980000
unkown
page read and write
4B31000
heap
page read and write
12F0000
direct allocation
page read and write
997C000
stack
page read and write
11D0000
unkown
page read and write
8CB8000
stack
page read and write
11E0000
unkown
page read and write
4A90000
direct allocation
page execute and read and write
C24E000
stack
page read and write
452E000
stack
page read and write
11F0000
unkown
page read and write
3160000
unkown
page read and write
3E0F000
stack
page read and write
BF3E000
stack
page read and write
8980000
unkown
page read and write
EB5000
stack
page read and write
1D0000
heap
page read and write
7FF5D71EF000
unkown
page readonly
4251000
heap
page read and write
386E000
stack
page read and write
11F0000
unkown
page read and write
3AAF000
stack
page read and write
A5F000
unkown
page execute and read and write
267E000
stack
page read and write
11C0000
unkown
page read and write
4080000
direct allocation
page execute and read and write
4251000
heap
page read and write
7FF5D74A6000
unkown
page readonly
7FF5D7262000
unkown
page readonly
4251000
heap
page read and write
11C0000
unkown
page read and write
8980000
unkown
page read and write
8980000
unkown
page read and write
F9F000
stack
page read and write
4251000
heap
page read and write
E68000
heap
page read and write
11B0000
unkown
page read and write
8980000
unkown
page read and write
362E000
stack
page read and write
49C2000
unkown
page read and write
8980000
unkown
page read and write
There are 2297 hidden memdumps, click here to show them.