IOC Report
FreeFileSync_12.5_Windows_Setup.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps1,00010010Label

Files

File Path
Type
Category
Malicious
Download
FreeFileSync_12.5_Windows_Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files\FreeFileSync\Bin\FreeFileSync_Win32.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\FreeFileSync_x64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\RealTimeSync_Win32.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\RealTimeSync_x64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\is-8U2E9.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\is-CDT5E.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\is-GFHHC.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Bin\is-LIK33.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Changelog.txt (copy)
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Program Files\FreeFileSync\FreeFileSync.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Install.dat (copy)
data
dropped
C:\Program Files\FreeFileSync\Install.dat.1dfe.tmp
data
dropped
C:\Program Files\FreeFileSync\Install.dat.88e3.tmp
data
dropped
C:\Program Files\FreeFileSync\License.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files\FreeFileSync\RealTimeSync.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Resources\Animal.dat
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "", progressive, precision 8, 640x338, components 3
dropped
C:\Program Files\FreeFileSync\Resources\Icons.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files\FreeFileSync\Resources\Languages.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files\FreeFileSync\Resources\bell.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\bell2.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\cacert.pem (copy)
Unicode text, UTF-8 text
dropped
C:\Program Files\FreeFileSync\Resources\ding.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\fail.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\fail2.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 24000 Hz
dropped
C:\Program Files\FreeFileSync\Resources\gong.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\harp.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-1OFO0.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-91RG2.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 24000 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-EVQBS.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-GE6FV.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-GQ4OL.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-JFKPM.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 24000 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-MRQNC.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files\FreeFileSync\Resources\is-NVRQ9.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-SOD14.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Program Files\FreeFileSync\Resources\is-TLOPS.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-TU1LO.tmp
Unicode text, UTF-8 text
dropped
C:\Program Files\FreeFileSync\Resources\is-VG36L.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\is-VNSPP.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\notify.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\notify2.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Program Files\FreeFileSync\Resources\remind.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 24000 Hz
dropped
C:\Program Files\FreeFileSync\Uninstall\is-0H8IG.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Uninstall\unins000.dat
InnoSetup Log \001\342\200\214F\342\200\214r\342\200\214e\342\200\214e\342\200\214F\342\200\214i\342\200\214l\342\200\214e\342\200\214S\342\200\214y\342\200\214n\342\200\214c, version 0x418, 57633 bytes, 899552\37\user\3, C:\Program Files\FreeFileSync\376\377\377\
dropped
C:\Program Files\FreeFileSync\Uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\Uninstall\unins000.msg
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
dropped
C:\Program Files\FreeFileSync\User Manual.pdf (copy)
PDF document, version 1.4, 0 pages
dropped
C:\Program Files\FreeFileSync\is-2FTJM.tmp
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Program Files\FreeFileSync\is-402ER.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\is-AETUR.tmp
PDF document, version 1.4, 0 pages
dropped
C:\Program Files\FreeFileSync\is-PJRGV.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\FreeFileSync\is-RACKB.tmp
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FreeFileSync.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sat Sep 9 01:54:50 2023, mtime=Sat Sep 9 01:54:55 2023, atime=Fri Jul 21 12:24:38 2023, length=694024, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RealTimeSync.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sat Sep 9 01:54:50 2023, mtime=Sat Sep 9 01:54:55 2023, atime=Fri Jul 21 12:24:30 2023, length=409864, window=hide
dropped
C:\Users\Public\Desktop\FreeFileSync.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sat Sep 9 01:54:50 2023, mtime=Sat Sep 9 01:54:50 2023, atime=Fri Jul 21 12:24:38 2023, length=694024, window=hide
dropped
C:\Users\Public\Desktop\RealTimeSync.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Sat Sep 9 01:54:50 2023, mtime=Sat Sep 9 01:54:50 2023, atime=Fri Jul 21 12:24:30 2023, length=409864, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fol5mco.mbo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5wn1btdb.q5o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aoqbcddj.e4a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzzu3wte.ku3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\FreeFileSync.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\img_8.bmp
PC bitmap, Windows 3.x format, 640 x 338 x 24, resolution 2835 x 2835 px/m, cbSize 649014, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\img_8.jpg
JPEG image data, JFIF standard 1.02, resolution (DPI), density 72x72, segment length 16, comment: "", progressive, precision 8, 640x338, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-K4S5Q.tmp\FreeFileSync_12.5_Windows_Setup.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\FreeFileSync\Logs\2023-09-09 063955.149.html
HTML document, Unicode text, UTF-8 text
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\FreeFileSync.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Sat Sep 9 01:54:50 2023, mtime=Sat Sep 9 01:54:55 2023, atime=Fri Jul 21 12:24:38 2023, length=694024, window=hide
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\sync.ffs_db (copy)
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\sync.ffs_db.fe2f.ffs_tmp
data
dropped
C:\Users\user\Desktop\ZGGKNSUKOP\sync.ffs_lock
data
dropped
C:\Users\user\Documents\KLIZUSIQEN\sync.ffs_db (copy)
data
dropped
C:\Users\user\Documents\KLIZUSIQEN\sync.ffs_db.6e3f.ffs_tmp
data
dropped
C:\Users\user\Documents\KLIZUSIQEN\sync.ffs_lock
data
dropped
There are 65 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FreeFileSync_12.5_Windows_Setup.exe
C:\Users\user\Desktop\FreeFileSync_12.5_Windows_Setup.exe
C:\Users\user\AppData\Local\Temp\is-K4S5Q.tmp\FreeFileSync_12.5_Windows_Setup.tmp
"C:\Users\user\AppData\Local\Temp\is-K4S5Q.tmp\FreeFileSync_12.5_Windows_Setup.tmp" /SL5="$20316,18958813,900608,C:\Users\user\Desktop\FreeFileSync_12.5_Windows_Setup.exe"
C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\FreeFileSync.exe
C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\FreeFileSync.exe" ffs_setup_convert_jpg_to_bmp "C:\Users\user\AppData\Local\Temp\is-21LIO.tmp\img_8.jpg
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe" -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionProcess 'C:\Program Files\FreeFileSync\Bin\*'
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\FreeFileSync\FreeFileSync.exe
"C:\Program Files\FreeFileSync\FreeFileSync.exe" ffs_setup_finalize
C:\Program Files\FreeFileSync\Bin\FreeFileSync_x64.exe
"C:\Program Files\FreeFileSync\Bin\FreeFileSync_x64.exe" ffs_setup_finalize
C:\Program Files\FreeFileSync\FreeFileSync.exe
"C:\Program Files\FreeFileSync\FreeFileSync.exe"
C:\Program Files\FreeFileSync\Bin\FreeFileSync_x64.exe
"C:\Program Files\FreeFileSync\Bin\FreeFileSync_x64.exe"

URLs

Name
IP
Malicious
http://ns.adobe.hotosh
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://freefilesync.org/faq.php#donation-editionLocalAutomatic
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://ns.adobe.c.0/ti
unknown
http://ns.photo/
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
http://ns.a.0/sTy
unknown
https://freefilesync.org/manual.php?topic=synchronization-settingsMove
unknown
https://api.freefilesync.org/activate_installationOKServer
unknown
https://api.freefilesync.org/latest_changes?since:
unknown
https://freefilesync.org/images/log/msg-warning.png
unknown
https://freefilesync.org/images/log/clock.png
unknown
https://freefilesync.org/donateCalendarCtrlGet
unknown
https://api.freefilesync.org/
unknown
https://drive.google.com/drive/folders/GdriveFileSystem::authenticateAccessgdriveAddUsergdriveRemove
unknown
https://curl.se/docs/hsts.html
unknown
https://freefilesync.org/manual.php?topic=external-applicationsDescriptionFile
unknown
http://www.wxwidgets.org
unknown
https://api.freefilesync.org/new_installationX.I9
unknown
https://api.freefilesync.org/auto_updaterReceived
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://subca.ocsp-certum.com05
unknown
https://www.remobjects.com/ps
unknown
https://github.com/keymanapp/keyman/issues/1723The
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
https://freefilesync.org/get_latest.phpZZzzBetaFreeUnknownDonationos_archffs_langdip_scalecountrylan
unknown
https://www.innosetup.com/
unknown
https://freefilesync.org/activate-installation.php?Incorrect
unknown
https://freefilesync.org/manual.php?topic=exclude-filesHandle
unknown
https://freefilesync.org/manual.php?topic=versioning&Permanent&VersioningTime
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://FreeFileSync.org/manual.php
unknown
https://freefilesync.org/thank-you.php?Cannot
unknown
http://www.certum.pl/CPS0
unknown
https://freefilesync.org/images/log/
unknown
https://accounts.google.com/o/oauth2/v2/auth?
unknown
https://freefilesync.org/images/log/file.png
unknown
https://freefilesync.org/donate
unknown
https://freefilesync.org/manual.php?topic=daylight-saving-timewxSpinCtrlPerformance
unknown
http://ns.adoraw-se
unknown
http://repository.certum.pl/ctnca.cer09
unknown
https://freefilesync.org/manual.php?topic=ftp-setupSFTP
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
https://api.freefilesync.org/_/O8
unknown
https://freefilesync.org/images/log/msg-error.png
unknown
https://freefilesync.org/manual.php?topic=schedule-a-batch-jobHow
unknown
https://freefilesync.org/manual.php?topic=performanceShow
unknown
https://www.apache.org/licenses/
unknown
http://127.0.0.1:listenresponse_typebind0getaddrinfo:
unknown
https://freefilesync.org/manual.php?topic=freefilesyncC:
unknown
https://FreeFileSync.org/manual.php)
unknown
https://curl.se/docs/alt-svc.html
unknown
https://www.certum.pl/CPS0
unknown
https://api.freefilesync.org/latest_version
104.21.2.160
https://freefilesync.org/manual.php?topic=comparison-settingsInclude
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
http://cscasha2.ocsp-certum.com04
unknown
http://www.dk-soft.org/
unknown
http://127.0.0.1:
unknown
http://subca.oc
unknown
https://freefilesync.org/images/log/log.png
unknown
https://freefilesync.org/forumTemporary
unknown
https://api.freefilesync.org/latest_changes?
unknown
https://api.freefilesync.org/email_notifyXL
unknown
https://api.freefilesync.org/new_installationar
unknown
https://api.freefilesync.org/new_installation
172.67.129.95
https://FreeFileSync.orgFhttps://FreeFileSync.org/manual.php
unknown
https://freefilesync.org/activate-installation.php?
unknown
https://freefilesync.org/thank-you.php?
unknown
https://freefilesync.org/images/FreeFileSync.png
unknown
http://fsf.org/
unknown
https://freefilesync.org/images/log/os-windows.png
unknown
https://www.google.com/Multiple
unknown
There are 66 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.freefilesync.org
172.67.129.95

IPs

IP
Domain
Country
Malicious
104.21.2.160
unknown
United States
172.67.129.95
api.freefilesync.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FreeFileSync
InstallDir
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_gui
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_gui
Content Type
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_gui.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_gui.1\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_gui.1\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_gui.1\shell\edit
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_gui.1\shell\edit
Icon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_gui.1\shell\edit\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_batch
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_batch
Content Type
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_batch.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_batch.1\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_batch.1\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_batch.1\shell\edit
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_batch.1\shell\edit
Icon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_batch.1\shell\edit\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_db
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_db.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_db.1
NoOpen
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FreeFileSync.ffs_db.1\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_real
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ffs_real
Content Type
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\RealTimeSync.ffs_real.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\RealTimeSync.ffs_real.1\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\RealTimeSync.ffs_real.1\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\FreeFileSync.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\FreeFileSync.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\RealTimeSync.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\RealTimeSync.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\FreeFileSync_Win32.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\FreeFileSync_Win32.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\RealTimeSync_Win32.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\LocalDumps\RealTimeSync_Win32.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\FreeFileSync_x64.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\FreeFileSync_x64.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\RealTimeSync_x64.exe
DumpFolder
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\RealTimeSync_x64.exe
DumpType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: Setup Type
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: Selected Components
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: Deselected Components
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FreeFileSync_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
2
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\Shell
SniffedFolderType
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByDirection
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
ProperTreeModuleInner
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2
0
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2\0
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2\0
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\Shell
SniffedFolderType
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
3
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\3
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\Shell
SniffedFolderType
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2\1
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\Shell
SniffedFolderType
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\ffs_gui
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\ffs_batch
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByDirection
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.18114.19418.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d4de1cd83fe18f\55e3c056
LanguageList
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.Windows.Photos_2019.18114.19418.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d4de1cd83fe18f\55e3c056
@{microsoft.windows.photos_2019.18114.19418.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.windows.photos/files/assets/photoslogoextensions.png}
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.ZuneMusic_10.18111.17311.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d4de1c863a8cbb\55e3c056
LanguageList
HKEY_CURRENT_USER_Classes\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.ZuneMusic_10.18111.17311.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d4de1c863a8cbb\55e3c056
@{microsoft.zunemusic_10.18111.17311.0_x64__8wekyb3d8bbwe?ms-resource://microsoft.zunemusic/files/assets/fileextension.png}
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\a\52C64B7E
@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-123
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\a\52C64B7E
@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-101
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\docx
0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\docx
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
2
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\20\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\22\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\21\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}
FFlags
There are 161 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
14AFA233000
heap
page read and write
25B92A41000
heap
page read and write
1C610EE0000
heap
page read and write
14AFA3B9000
heap
page read and write
25B92A6D000
heap
page read and write
25B92AEE000
heap
page read and write
14AF6A1D000
heap
page read and write
14AFA58A000
heap
page read and write
14AFA2EA000
heap
page read and write
7FE16000
direct allocation
page read and write
25B92ADB000
heap
page read and write
25B92AF7000
heap
page read and write
14AF6F7B000
heap
page read and write
23FDF8F8000
heap
page read and write
14AF4720000
heap
page read and write
1C610DFB000
heap
page read and write
25B9365C000
heap
page read and write
58C1000
heap
page read and write
12D9000
heap
page read and write
14AFA21F000
heap
page read and write
23FDF8BA000
heap
page read and write
25B92A71000
heap
page read and write
1C610BE4000
heap
page read and write
14AFA2F4000
heap
page read and write
14AFA41E000
heap
page read and write
22EF000
direct allocation
page read and write
1C60EDAF000
heap
page read and write
3788000
direct allocation
page read and write
7458A7F000
stack
page read and write
14AFA35B000
heap
page read and write
14AFA49E000
heap
page read and write
14AFA235000
heap
page read and write
14AFA43F000
heap
page read and write
23C31C6C000
heap
page read and write
14AF671C000
heap
page read and write
65F0FF000
stack
page read and write
2592000
direct allocation
page read and write
14AFA40D000
heap
page read and write
9AE54FE000
stack
page read and write
14AFA22E000
heap
page read and write
14AFA270000
heap
page read and write
14AFA1A0000
trusted library allocation
page read and write
59B9BFB000
stack
page read and write
14AF6F9C000
heap
page read and write
14AF6A5C000
heap
page read and write
23FE3AC0000
trusted library allocation
page read and write
2328000
direct allocation
page read and write
14AFA261000
heap
page read and write
23FE3B70000
trusted library allocation
page read and write
23FE3AA8000
trusted library allocation
page read and write
25B935F0000
heap
page read and write
8E2000
unkown
page read and write
9F0000
heap
page read and write
14AFA29B000
heap
page read and write
1C610C31000
heap
page read and write
7FB30000
direct allocation
page read and write
23FDF902000
heap
page read and write
14AFA2F2000
heap
page read and write
CD0000
heap
page read and write
25B93644000
heap
page read and write
14AF69EF000
heap
page read and write
14AFA2FC000
heap
page read and write
7458D7E000
stack
page read and write
14AFA3D3000
heap
page read and write
14AFA2FC000
heap
page read and write
14AF6D4D000
heap
page read and write
2F09000
heap
page read and write
9EF000
stack
page read and write
1C60ED6D000
heap
page read and write
14AF6714000
heap
page read and write
7FF62CF11000
unkown
page readonly
14AF6F9C000
heap
page read and write
23FDE270000
heap
page read and write
C7BD57E000
stack
page read and write
9AE4FFD000
stack
page read and write
58B9000
heap
page read and write
58BC000
heap
page read and write
14AFA413000
heap
page read and write
C7BD97E000
stack
page read and write
14AE000
stack
page read and write
14AFA51E000
heap
page read and write
14AF6CCE000
heap
page read and write
3300000
heap
page read and write
1C610F01000
heap
page read and write
1390000
heap
page read and write
B14000
heap
page read and write
322F000
heap
page read and write
23C31A20000
heap
page read and write
9C000
stack
page read and write
65EDFE000
stack
page read and write
7FF62CF8A000
unkown
page readonly
14AFA50A000
heap
page read and write
14AFA451000
heap
page read and write
2570000
direct allocation
page read and write
25B933C4000
heap
page read and write
14AF6725000
heap
page read and write
7FF62C9A1000
unkown
page execute read
324B000
heap
page read and write
1C610EF4000
heap
page read and write
14AFA1F0000
heap
page read and write
14AFA208000
heap
page read and write
1A37728E000
heap
page read and write
1A377318000
heap
page read and write
7FF62CEFF000
unkown
page read and write
25B92AF5000
heap
page read and write
1C610EFF000
heap
page read and write
14AFA5AB000
heap
page read and write
AAC000
heap
page read and write
677847E000
stack
page read and write
14AF6781000
heap
page read and write
25B92B09000
heap
page read and write
14AFA54B000
heap
page read and write
3100000
heap
page read and write
14AF67FA000
heap
page read and write
25B92ACB000
heap
page read and write
9AE53FE000
stack
page read and write
25B92AB5000
heap
page read and write
C7BDB7F000
stack
page read and write
2861000
direct allocation
page read and write
AC0000
heap
page read and write
14AFA3C0000
heap
page read and write
14AF9E40000
trusted library allocation
page read and write
14AF6880000
heap
page read and write
4B7000
unkown
page write copy
23FDF460000
trusted library section
page readonly
14AFA34F000
heap
page read and write
14AFA2D0000
heap
page read and write
65EEFF000
stack
page read and write
14AFA345000
heap
page read and write
23FDF854000
heap
page read and write
14AFA5C3000
heap
page read and write
59B9EFF000
stack
page read and write
1A37726F000
heap
page read and write
C7BD17E000
stack
page read and write
14AFA4F2000
heap
page read and write
A86000
heap
page read and write
9AE52FE000
stack
page read and write
1C610C25000
heap
page read and write
1C611520000
trusted library allocation
page read and write
14AFA219000
heap
page read and write
14AFA346000
heap
page read and write
23FE3C00000
trusted library allocation
page read and write
150D000
stack
page read and write
14AF6A19000
heap
page read and write
14AF6D92000
heap
page read and write
1C610F40000
heap
page read and write
25B92AA1000
heap
page read and write
25B92AAC000
heap
page read and write
14AFA5EE000
heap
page read and write
23FDF8FF000
heap
page read and write
677877D000
stack
page read and write
23FE3AE4000
trusted library allocation
page read and write
14AFA4F3000
heap
page read and write
23FDED02000
heap
page read and write
14AFA42C000
heap
page read and write
14AFA3D9000
heap
page read and write
14AF6D60000
heap
page read and write
14AFA35E000
heap
page read and write
1A377243000
heap
page read and write
3780000
direct allocation
page read and write
7FF62CEF7000
unkown
page read and write
25B92AD6000
heap
page read and write
25B9364B000
heap
page read and write
65FEFD000
stack
page read and write
14AFA4A0000
heap
page read and write
23FE3BD0000
trusted library allocation
page read and write
14AF6CEE000
heap
page read and write
14AFA4B2000
heap
page read and write
23FDEC15000
heap
page read and write
14AF6879000
heap
page read and write
7FDB0000
direct allocation
page read and write
23FDF87D000
heap
page read and write
14AFA2BA000
heap
page read and write
14AFA5C1000
heap
page read and write
23FE3AD7000
trusted library allocation
page read and write
2E50000
heap
page read and write
1C610BB0000
heap
page read and write
25B92AE2000
heap
page read and write
1A3771F0000
trusted library allocation
page read and write
14AFA3E0000
heap
page read and write
58C2000
heap
page read and write
1C61115C000
heap
page read and write
14AFA275000
heap
page read and write
A9F000
heap
page read and write
14AFA516000
heap
page read and write
14AFA262000
heap
page read and write
12D9000
heap
page read and write
14AF4649000
heap
page read and write
14AFA2C6000
heap
page read and write
14AFA324000
heap
page read and write
14AF691C000
heap
page read and write
14AF6F70000
heap
page read and write
25B92A87000
heap
page read and write
14AFA632000
heap
page read and write
14AFA3D3000
heap
page read and write
23FDE422000
heap
page read and write
23FDE3E0000
trusted library allocation
page read and write
1C610C05000
heap
page read and write
1A377213000
heap
page read and write
14AF6789000
heap
page read and write
14AF6D9E000
heap
page read and write
14AF6A8C000
heap
page read and write
3200000
heap
page read and write
14AFA222000
heap
page read and write
14AFA4A5000
heap
page read and write
DF0000
heap
page read and write
14AF46E4000
heap
page read and write
14AFA327000
heap
page read and write
14AFA60F000
heap
page read and write
14AFA474000
heap
page read and write
14AFA290000
heap
page read and write
14AF6DA4000
heap
page read and write
23FDF8F1000
heap
page read and write
23FDE400000
heap
page read and write
14AFA3AC000
heap
page read and write
7FF62BFA0000
unkown
page readonly
23FDE47B000
heap
page read and write
C7BDA7B000
stack
page read and write
14AF6D3F000
heap
page read and write
20000
heap
page read and write
65FDFC000
stack
page read and write
AB0000
heap
page read and write
25B92AC5000
heap
page read and write
14AF6D2D000
heap
page read and write
14AFA67B000
heap
page read and write
14AF6F87000
heap
page read and write
25B92ACC000
heap
page read and write
25B933C3000
heap
page read and write
14AFA2B7000
heap
page read and write
59BA0FE000
stack
page read and write
2F00000
heap
page read and write
230C000
direct allocation
page read and write
23C31C7F000
heap
page read and write
14AFA22B000
heap
page read and write
14AFA090000
trusted library allocation
page read and write
3740000
direct allocation
page read and write
AED000
heap
page read and write
14AFA409000
heap
page read and write
23FDE48F000
heap
page read and write
1C610C65000
heap
page read and write
67784FB000
stack
page read and write
14AFA35C000
heap
page read and write
1C610C55000
heap
page read and write
1C611147000
heap
page read and write
AF7000
heap
page read and write
23FE3AE0000
trusted library allocation
page read and write
367E000
direct allocation
page read and write
14AFA288000
heap
page read and write
14AF6F90000
heap
page read and write
65FBF7000
stack
page read and write
14AF9E5F000
trusted library allocation
page read and write
A6C000
heap
page read and write
1C611040000
heap
page read and write
C7BD07F000
stack
page read and write
25B93661000
heap
page read and write
14AFA29D000
heap
page read and write
14AF6D99000
heap
page read and write
1C610BE9000
heap
page read and write
25B92AA1000
heap
page read and write
7458DFB000
stack
page read and write
1C610C07000
heap
page read and write
14AFA4F6000
heap
page read and write
14AF6D8D000
heap
page read and write
14AFA28A000
heap
page read and write
27FA000
direct allocation
page read and write
A9C000
heap
page read and write
14AF681F000
heap
page read and write
14AFA358000
heap
page read and write
678000
heap
page read and write
14AFA1B0000
trusted library allocation
page read and write
A40000
heap
page read and write
14AFA287000
heap
page read and write
14AF6DBB000
heap
page read and write
14AFA3C4000
heap
page read and write
25B8000
direct allocation
page read and write
14AFA467000
heap
page read and write
AE0000
heap
page read and write
4C4000
unkown
page readonly
25B92AAE000
heap
page read and write
25B92AB9000
heap
page read and write
2584000
direct allocation
page read and write
14AF6D21000
heap
page read and write
5070000
direct allocation
page read and write
65FAF8000
stack
page read and write
25B92AF5000
heap
page read and write
3201000
heap
page read and write
2871000
direct allocation
page read and write
5B0E000
stack
page read and write
14AF6D6C000
heap
page read and write
1C6113B0000
heap
page read and write
12DB000
heap
page read and write
192E000
stack
page read and write
14AFA57F000
heap
page read and write
25B92AE5000
heap
page read and write
22E8000
direct allocation
page read and write
8C9000
unkown
page readonly
23C31A80000
heap
page read and write
14AFA42A000
heap
page read and write
172E000
stack
page read and write
25B92AB1000
heap
page read and write
14AFA3B5000
heap
page read and write
14AFA3AC000
heap
page read and write
AAC000
heap
page read and write
14AFA451000
heap
page read and write
8E6000
heap
page read and write
14AF6D66000
heap
page read and write
7FF62BFA1000
unkown
page execute read
65F4F8000
stack
page read and write
25B92A95000
heap
page read and write
23FDFA00000
trusted library allocation
page read and write
14AFA390000
heap
page read and write
14AF6726000
heap
page read and write
7458B7B000
stack
page read and write
14AFA3F6000
heap
page read and write
2850000
heap
page read and write
23FDE45E000
heap
page read and write
1C610D76000
heap
page read and write
14AFA480000
heap
page read and write
14AFA353000
heap
page read and write
1C610EC2000
heap
page read and write
1C610C03000
heap
page read and write
14AFA1D0000
trusted library allocation
page read and write
25B92AFD000
heap
page read and write
C7BCBFE000
stack
page read and write
14AFA346000
heap
page read and write
1A377A02000
trusted library allocation
page read and write
25B933D0000
heap
page read and write
1C60EDAB000
heap
page read and write
25B93640000
heap
page read and write
14AF675E000
heap
page read and write
25B933C3000
heap
page read and write
25B92A9B000
heap
page read and write
14AF6C68000
heap
page read and write
25D4000
direct allocation
page read and write
C7BD4FB000
stack
page read and write
23FDF8EA000
heap
page read and write
1C611153000
heap
page read and write
14AF6DBB000
heap
page read and write
1C610C2F000
heap
page read and write
A9F000
heap
page read and write
14AFA617000
heap
page read and write
1C611525000
trusted library allocation
page read and write
14AF6D8A000
heap
page read and write
65FFFA000
stack
page read and write
25B92AA1000
heap
page read and write
14AFA246000
heap
page read and write
5870000
heap
page read and write
23FDEC02000
heap
page read and write
2820000
direct allocation
page read and write
14AFA62A000
heap
page read and write
74588FF000
stack
page read and write
14AFA54B000
heap
page read and write
14AFA27A000
heap
page read and write
14AF6D92000
heap
page read and write
86F000
stack
page read and write
14AF6D63000
heap
page read and write
ABC000
heap
page read and write
25B92A34000
heap
page read and write
14AF45B0000
heap
page read and write
1C60ED9E000
heap
page read and write
23FE3B13000
trusted library allocation
page read and write
326B000
heap
page read and write
7458FFF000
stack
page read and write
14AFA286000
heap
page read and write
14AFA63D000
heap
page read and write
1C61115B000
heap
page read and write
23FE3B32000
trusted library allocation
page read and write
25B93645000
heap
page read and write
14AF6767000
heap
page read and write
23C31CD9000
heap
page read and write
1C60EE55000
heap
page read and write
23FDE4A5000
heap
page read and write
25B92A88000
heap
page read and write
381C000
direct allocation
page read and write
116C000
stack
page read and write
14AFA27D000
heap
page read and write
14AF6882000
heap
page read and write
14AF67BA000
heap
page read and write
14AFA31C000
heap
page read and write
587E000
heap
page read and write
14AFA3E1000
heap
page read and write
25B933DA000
heap
page read and write
11E0000
heap
page read and write
14AFA465000
heap
page read and write
14AFA150000
trusted library allocation
page read and write
14AFA316000
heap
page read and write
14AFA615000
heap
page read and write
14AFA2CA000
heap
page read and write
12B7000
heap
page read and write
23C32402000
heap
page read and write
1C610EB1000
heap
page read and write
6C7000
unkown
page read and write
14AFA3F6000
heap
page read and write
14AFA38C000
heap
page read and write
14AFA2F2000
heap
page read and write
14AFA617000
heap
page read and write
14AFA46A000
heap
page read and write
14AF6D36000
heap
page read and write
25B92AAA000
heap
page read and write
3839000
direct allocation
page read and write
14AFA2F4000
heap
page read and write
14AF465C000
heap
page read and write
14AFA25B000
heap
page read and write
11F0000
heap
page read and write
25B92AA1000
heap
page read and write
7FF62CA83000
unkown
page readonly
23FDF8CE000
heap
page read and write
3692000
direct allocation
page read and write
1C610F7E000
heap
page read and write
14AFA3E3000
heap
page read and write
65F8FA000
stack
page read and write
2844000
direct allocation
page read and write
14AF69C0000
heap
page read and write
B1E000
heap
page read and write
1C610FC0000
heap
page read and write
14AFA2CA000
heap
page read and write
14AFA60B000
heap
page read and write
25B92A32000
heap
page read and write
C7BD77E000
stack
page read and write
258B000
direct allocation
page read and write
12B0000
heap
page read and write
133C000
stack
page read and write
14AF6B5C000
heap
page read and write
C7BD87E000
stack
page read and write
14AFA35C000
heap
page read and write
25B933BB000
heap
page read and write
5870000
remote allocation
page read and write
22FD000
direct allocation
page read and write
14AF6C64000
heap
page read and write
23FE3A00000
trusted library allocation
page read and write
65F6FF000
stack
page read and write
14AFA329000
heap
page read and write
14AFA3C5000
heap
page read and write
1C610D04000
heap
page read and write
1C610D86000
heap
page read and write
1C610BF1000
heap
page read and write
14AFA232000
heap
page read and write
9AE56FE000
stack
page read and write
14AFA358000
heap
page read and write
23FDF8CB000
heap
page read and write
14AF6931000
heap
page read and write
14AF6CDD000
heap
page read and write
14AFA49E000
heap
page read and write
14AFA635000
heap
page read and write
14AFA020000
trusted library section
page read and write
23C32532000
heap
page read and write
C7BCEFC000
stack
page read and write
1C610C6E000
heap
page read and write
7FF62CE72000
unkown
page read and write
25B92AF5000
heap
page read and write
1C610EB4000
heap
page read and write
256D000
direct allocation
page read and write
14AF6729000
heap
page read and write
14AFA2A9000
heap
page read and write
A71000
heap
page read and write
14AFA358000
heap
page read and write
1C610C32000
heap
page read and write
25B9365E000
heap
page read and write
5870000
remote allocation
page read and write
14AF6D7F000
heap
page read and write
14AF6914000
heap
page read and write
14AFA1F3000
heap
page read and write
23FE3A80000
trusted library allocation
page read and write
37A7000
direct allocation
page read and write
C7BC7AD000
stack
page read and write
65F5FE000
stack
page read and write
25B92A5C000
heap
page read and write
B07000
heap
page read and write
14AFA624000
heap
page read and write
14AF6D12000
heap
page read and write
36B6000
direct allocation
page read and write
14AFA2F2000
heap
page read and write
65EFFF000
stack
page read and write
14AFA430000
heap
page read and write
14AFA3FE000
heap
page read and write
14AFA31F000
heap
page read and write
25B92AE5000
heap
page read and write
14AFA2E5000
heap
page read and write
265A000
direct allocation
page read and write
ACB000
heap
page read and write
130B000
heap
page read and write
8DD000
unkown
page read and write
C64000
unkown
page readonly
890000
unkown
page readonly
3D6E000
stack
page read and write
23C32500000
heap
page read and write
14AF6829000
heap
page read and write
14AFA22E000
heap
page read and write
25B9364A000
heap
page read and write
1C610EB0000
heap
page read and write
14AFA553000
heap
page read and write
A77000
heap
page read and write
ABE000
heap
page read and write
14AFA254000
heap
page read and write
14AFA2A3000
heap
page read and write
1C610C68000
heap
page read and write
39000
heap
page read and write
14AF6785000
heap
page read and write
8E0000
heap
page read and write
25B92AA9000
heap
page read and write
14AF6D02000
heap
page read and write
14AFA34C000
heap
page read and write
1C610D59000
heap
page read and write
B03000
heap
page read and write
14AF4706000
heap
page read and write
14AFA48B000
heap
page read and write
23FDED59000
heap
page read and write
25B933CC000
heap
page read and write
3667000
direct allocation
page execute and read and write
14AF6FEA000
heap
page read and write
22F6000
direct allocation
page read and write
25B92AC6000
heap
page read and write
7FF62CA83000
unkown
page readonly
A72000
heap
page read and write
A78000
heap
page read and write
14AFA28E000
heap
page read and write
A42000
heap
page read and write
35AE000
direct allocation
page read and write
14AF6789000
heap
page read and write
25B92A95000
heap
page read and write
123D000
stack
page read and write
3252000
heap
page read and write
14AFA27A000
heap
page read and write
25B92A2F000
heap
page read and write
65F1FF000
stack
page read and write
67786FE000
stack
page read and write
A50000
heap
page read and write
14AFA502000
heap
page read and write
14AFA2B0000
heap
page read and write
14AFA23D000
heap
page read and write
6CE000
unkown
page read and write
59B9D7B000
stack
page read and write
65FCF8000
stack
page read and write
16AE000
stack
page read and write
8DD000
unkown
page write copy
B19000
heap
page read and write
14AFA58E000
heap
page read and write
A56000
heap
page read and write
25B92AF8000
heap
page read and write
65E79F000
stack
page read and write
14AFA2C1000
heap
page read and write
25B933C5000
heap
page read and write
14AF6799000
heap
page read and write
14AFA244000
heap
page read and write
14AFA260000
heap
page read and write
14AFA358000
heap
page read and write
14AF6F96000
heap
page read and write
23FDED19000
heap
page read and write
25B92B02000
heap
page read and write
1C610ED2000
heap
page read and write
14AFA2E2000
heap
page read and write
14AFA327000
heap
page read and write
14AFA3C4000
heap
page read and write
14AFA516000
heap
page read and write
AE6000
heap
page read and write
1C610EFD000
heap
page read and write
14AF4711000
heap
page read and write
23FDEC00000
heap
page read and write
3685000
direct allocation
page read and write
3580000
heap
page read and write
14AFA2C1000
heap
page read and write
21F0000
direct allocation
page read and write
14AFA280000
heap
page read and write
14AF4724000
heap
page read and write
14AF6767000
heap
page read and write
1C60ED91000
heap
page read and write
14AF9E5D000
trusted library allocation
page read and write
25B92AD4000
heap
page read and write
14AF6765000
heap
page read and write
59B9CFC000
stack
page read and write
C7BCFFB000
stack
page read and write
14AFA62E000
heap
page read and write
1C610D6B000
heap
page read and write
1227000
heap
page read and write
14AFA45D000
heap
page read and write
401000
unkown
page execute read
14AF675B000
heap
page read and write
1C61103E000
heap
page read and write
DBE000
stack
page read and write
3696000
direct allocation
page read and write
14AFA26F000
heap
page read and write
23FDE47F000
heap
page read and write
A28000
heap
page read and write
1C611151000
heap
page read and write
23FE3AA0000
trusted library allocation
page read and write
1C610F9B000
heap
page read and write
23C31C94000
heap
page read and write
1C610F01000
heap
page read and write
14AFA406000
heap
page read and write
2521000
direct allocation
page read and write
14AF6D8B000
heap
page read and write
25B92AA6000
heap
page read and write
23FE3B1B000
trusted library allocation
page read and write
14AFA524000
heap
page read and write
65F7FD000
stack
page read and write
182E000
stack
page read and write
14AF6D50000
heap
page read and write
25B92A38000
heap
page read and write
14AFA52E000
heap
page read and write
14AF6735000
heap
page read and write
23C31C13000
heap
page read and write
14AFA3F6000
heap
page read and write
14AFA397000
heap
page read and write
14AFA5C1000
heap
page read and write
A7D000
heap
page read and write
1A377229000
heap
page read and write
520000
heap
page read and write
23FE3A10000
trusted library allocation
page read and write
1C60EC90000
heap
page read and write
25B933B9000
heap
page read and write
36BD000
direct allocation
page read and write
6F4000
unkown
page readonly
14AFA4D2000
heap
page read and write
2549000
direct allocation
page read and write
14AFA2DA000
heap
page read and write
23FDE4F0000
heap
page read and write
1C610FA0000
heap
page read and write
25B92A95000
heap
page read and write
12E1000
heap
page read and write
1A377200000
heap
page read and write
25B92C05000
heap
page read and write
14AFA445000
heap
page read and write
23FDF85E000
heap
page read and write
23FE3B70000
trusted library allocation
page read and write
7FF62CEF7000
unkown
page read and write
6DE000
unkown
page readonly
14AF4721000
heap
page read and write
5E6D000
stack
page read and write
A66000
heap
page read and write
14AFA46A000
heap
page read and write
23FE3B59000
trusted library allocation
page read and write
1300000
heap
page read and write
2853000
direct allocation
page read and write
23FDE4C0000
heap
page read and write
14AFA4F2000
heap
page read and write
25B92A18000
heap
page read and write
3570000
direct allocation
page read and write
14AFA21F000
heap
page read and write
14AF4540000
heap
page read and write
14AFA208000
heap
page read and write
14AFA5CC000
heap
page read and write
14AFA21D000
heap
page read and write
23FDE493000
heap
page read and write
14AFA2CA000
heap
page read and write
1C60ED94000
heap
page read and write
3201000
heap
page read and write
14AF6FEA000
heap
page read and write
1306000
heap
page read and write
23FDF8C6000
heap
page read and write
25B92B02000
heap
page read and write
25B92AFD000
heap
page read and write
14AFA5EB000
heap
page read and write
3570000
direct allocation
page read and write
14AFA351000
heap
page read and write
22B1000
direct allocation
page read and write
9AE55FE000
stack
page read and write
14AF6DA0000
heap
page read and write
14AF6CF2000
heap
page read and write
255F000
direct allocation
page read and write
A5D000
heap
page read and write
32D7000
heap
page read and write
25B92AAA000
heap
page read and write
14AFA5F3000
heap
page read and write
65EBFE000
stack
page read and write
23FDF913000
heap
page read and write
154E000
stack
page read and write
AA4000
heap
page read and write
14AFA426000
heap
page read and write
C5D000
unkown
page write copy
3301000
heap
page read and write
1A37720B000
heap
page read and write
14AF6D8F000
heap
page read and write
14AF6FA7000
heap
page read and write
23FE4000000
heap
page read and write
14AFA56B000
heap
page read and write
25B92AF2000
heap
page read and write
6778137000
stack
page read and write
6E0000
unkown
page readonly
14AF66FF000
heap
page read and write
14AF6D3C000
heap
page read and write
C1F000
stack
page read and write
6C7000
unkown
page write copy
1C6113D2000
heap
page read and write
8AE000
stack
page read and write
14AFA3A7000
heap
page read and write
745897B000
stack
page read and write
1C610CB1000
heap
page read and write
7FF62CF0C000
unkown
page read and write
14AFA346000
heap
page read and write
1C610D5B000
heap
page read and write
2FD0000
heap
page read and write
3D2D000
stack
page read and write
14AFA24A000
heap
page read and write
25B92AC8000
heap
page read and write
1C60EC50000
heap
page read and write
C7BD67B000
stack
page read and write
25B933CB000
heap
page read and write
25B93647000
heap
page read and write
1C610CFF000
heap
page read and write
1C60ED01000
heap
page read and write
23FDF8C4000
heap
page read and write
23C31CF7000
heap
page read and write
14AF8B70000
trusted library allocation
page read and write
A52000
heap
page read and write
B14000
heap
page read and write
14AFA3D3000
heap
page read and write
14AFA4BE000
heap
page read and write
14AFA100000
trusted library allocation
page read and write
14AF6D0C000
heap
page read and write
14AFA4A8000
heap
page read and write
2868000
direct allocation
page read and write
14AFA360000
heap
page read and write
25B92A4F000
heap
page read and write
14AFA431000
heap
page read and write
1C610F85000
heap
page read and write
23FDE513000
heap
page read and write
7FF62CF0C000
unkown
page read and write
28E0000
heap
page read and write
25B92AD2000
heap
page read and write
14AF671A000
heap
page read and write
23C31B80000
trusted library allocation
page read and write
C46000
unkown
page readonly
3847000
direct allocation
page read and write
14AF6D3A000
heap
page read and write
322F000
heap
page read and write
2886000
direct allocation
page read and write
1344000
heap
page read and write
23FE3AEC000
trusted library allocation
page read and write
1C60EE50000
heap
page read and write
14AFA354000
heap
page read and write
8E2000
unkown
page read and write
C10000
unkown
page readonly
AFE000
heap
page read and write
14AF687C000
heap
page read and write
14AFA38C000
heap
page read and write
14AF6F90000
heap
page read and write
1A377300000
heap
page read and write
2304000
direct allocation
page read and write
14AFA46A000
heap
page read and write
DFD000
stack
page read and write
23FDED00000
heap
page read and write
23FDE502000
heap
page read and write
C7BCDFC000
stack
page read and write
B1A000
heap
page read and write
14AFA216000
heap
page read and write
6D9000
unkown
page write copy
1C60EC30000
heap
page read and write
14AFA573000
heap
page read and write
14AF6D56000
heap
page read and write
14AF6720000
heap
page read and write
14AF68A7000
heap
page read and write
22D8000
direct allocation
page read and write
59B987B000
stack
page read and write
14AF6725000
heap
page read and write
65F3F8000
stack
page read and write
365B000
direct allocation
page read and write
12D6000
heap
page read and write
C46000
unkown
page readonly
14AF6F9A000
heap
page read and write
14AFA329000
heap
page read and write
14AF6D36000
heap
page read and write
231A000
direct allocation
page read and write
23FDF90C000
heap
page read and write
23FDED5A000
heap
page read and write
14AF6FB1000
heap
page read and write
23FDE3F0000
trusted library section
page read and write
14AF6F8E000
heap
page read and write
1C610CB8000
heap
page read and write
23FDF380000
trusted library allocation
page read and write
67781BE000
stack
page read and write
8BE000
stack
page read and write
23FDF8EE000
heap
page read and write
1C610C12000
heap
page read and write
12DF000
heap
page read and write
23C31CD4000
heap
page read and write
284C000
direct allocation
page read and write
30F0000
heap
page read and write
14AFA35F000
heap
page read and write
1C610EC7000
heap
page read and write
8D6000
unkown
page readonly
322A000
heap
page read and write
25B92AFB000
heap
page read and write
25B929F0000
heap
page read and write
23FDED5A000
heap
page read and write
AF9000
heap
page read and write
14AF6F9C000
heap
page read and write
14AFA47C000
heap
page read and write
14AF6742000
heap
page read and write
1C610C79000
heap
page read and write
10000
heap
page read and write
14AFA46A000
heap
page read and write
14AFA48E000
heap
page read and write
130F000
heap
page read and write
25B93642000
heap
page read and write
14AF6CCB000
heap
page read and write
14AFA5E6000
heap
page read and write
14AF6D09000
heap
page read and write
14AFA5B0000
heap
page read and write
14AFA294000
heap
page read and write
A86000
heap
page read and write
14AF67CF000
heap
page read and write
6D6000
unkown
page read and write
1C61102D000
heap
page read and write
14AF6DBB000
heap
page read and write
23FE3AA0000
trusted library allocation
page read and write
14AF6A8A000
heap
page read and write
14AFA43F000
heap
page read and write
14AF6CD7000
heap
page read and write
14AFA560000
heap
page read and write
14AFA47E000
heap
page read and write
24C0000
direct allocation
page read and write
321B000
heap
page read and write
25B92A51000
heap
page read and write
14AF6D9C000
heap
page read and write
1C610D2F000
heap
page read and write
14CE000
stack
page read and write
25B92B10000
heap
page read and write
14AF6D7C000
heap
page read and write
1C610C72000
heap
page read and write
23C32512000
heap
page read and write
22CA000
direct allocation
page read and write
94000
stack
page read and write
3252000
heap
page read and write
2550000
direct allocation
page read and write
14AF9E40000
trusted library allocation
page read and write
65EAFD000
stack
page read and write
C7BD3FF000
stack
page read and write
14AFA235000
heap
page read and write
1305000
heap
page read and write
14AFA4B8000
heap
page read and write
23FDF910000
heap
page read and write
14AFA526000
heap
page read and write
23FDE498000
heap
page read and write
14AFA22A000
heap
page read and write
670000
heap
page read and write
1C610C2F000
heap
page read and write
7FF62CE7B000
unkown
page read and write
14AF4700000
heap
page read and write
25B93657000
heap
page read and write
14AFA202000
heap
page read and write
25B92B02000
heap
page read and write
25B92A10000
heap
page read and write
AE4000
heap
page read and write
287F000
direct allocation
page read and write
14AFA212000
heap
page read and write
D1F000
stack
page read and write
AB0000
heap
page read and write
14AFA261000
heap
page read and write
14AFA5AB000
heap
page read and write
14AF6DB4000
heap
page read and write
14AF9230000
trusted library allocation
page read and write
1345000
heap
page read and write
7FF62CE72000
unkown
page write copy
14AFA272000
heap
page read and write
25B9365B000
heap
page read and write
8DD000
unkown
page read and write
19C000
stack
page read and write
12D6000
heap
page read and write
3231000
heap
page read and write
14AFA42D000
heap
page read and write
1C610C6E000
heap
page read and write
32D8000
heap
page read and write
14AFA474000
heap
page read and write
14AFA521000
heap
page read and write
14AF8B70000
trusted library allocation
page read and write
22D1000
direct allocation
page read and write
25B933BD000
heap
page read and write
9AE51FF000
stack
page read and write
14AFA5FC000
heap
page read and write
14AFA48E000
heap
page read and write
14AFA44E000
heap
page read and write
14AFA090000
trusted library allocation
page read and write
4C0000
unkown
page read and write
14AFA206000
heap
page read and write
20000
heap
page read and write
C62000
unkown
page read and write
FB0000
heap
page read and write
14AFA506000
heap
page read and write
25B92AE9000
heap
page read and write
3840000
direct allocation
page read and write
14AFA577000
heap
page read and write
1C60ED8E000
heap
page read and write
14AFA30C000
heap
page read and write
14AF67D2000
heap
page read and write
87E000
stack
page read and write
1C610EED000
heap
page read and write
14AFCF90000
heap
page read and write
3225000
heap
page read and write
23FE3AB1000
trusted library allocation
page read and write
25B933B0000
heap
page read and write
35FB000
direct allocation
page read and write
1C610C68000
heap
page read and write
1C610BF9000
heap
page read and write
14AFA50D000
heap
page read and write
1C610C16000
heap
page read and write
14AFA3C0000
heap
page read and write
14AFAE80000
remote allocation
page read and write
14AFA4A6000
heap
page read and write
14AF46F8000
heap
page read and write
14AF6D04000
heap
page read and write
23FDE2E0000
heap
page read and write
3248000
heap
page read and write
3666000
direct allocation
page read and write
14AF6F96000
heap
page read and write
25B92AE5000
heap
page read and write
14AFA23A000
heap
page read and write
3580000
direct allocation
page read and write
14AF6DB5000
heap
page read and write
23FDF140000
trusted library allocation
page read and write
A71000
heap
page read and write
37AF000
direct allocation
page read and write
14AFA28C000
heap
page read and write
25B92AD6000
heap
page read and write
12F5000
heap
page read and write
14AFA22B000
heap
page read and write
14AFA3FC000
heap
page read and write
322A000
heap
page read and write
23FDF858000
heap
page read and write
23FE3BE0000
trusted library allocation
page read and write
14AFA3BC000
heap
page read and write
25B92AF1000
heap
page read and write
14AF6D45000
heap
page read and write
14AFA516000
heap
page read and write
23C31C8A000
heap
page read and write
14AFA55B000
heap
page read and write
1C60EAF0000
heap
page read and write
14AFA44F000
heap
page read and write
14AFA4F2000
heap
page read and write
25B92ADB000
heap
page read and write
14AF9E5A000
trusted library allocation
page read and write
AB6000
heap
page read and write
65F2FB000
stack
page read and write
1C610EA8000
heap
page read and write
1C610C00000
heap
page read and write
25B92C00000
heap
page read and write
1348000
heap
page read and write
A00000
direct allocation
page execute and read and write
14AFA3EC000
heap
page read and write
14AF6DB1000
heap
page read and write
1C610DF3000
heap
page read and write
14AFA299000
heap
page read and write
14AFA44D000
heap
page read and write
1C60ECD0000
heap
page read and write
2313000
direct allocation
page read and write
14AFA4D2000
heap
page read and write
23FE3B80000
trusted library allocation
page read and write
1C610C2B000
heap
page read and write
AFF000
heap
page read and write
23C31C7D000
heap
page read and write
2293000
direct allocation
page read and write
14AFA5AB000
heap
page read and write
14AFA5BF000
heap
page read and write
A61000
heap
page read and write
23FDF8D8000
heap
page read and write
1C610F0C000
heap
page read and write
14AFA095000
trusted library allocation
page read and write
130A000
heap
page read and write
5880000
heap
page read and write
23C31C2B000
heap
page read and write
14AFA2D0000
heap
page read and write
A80000
heap
page read and write
1A37725A000
heap
page read and write
14AF6FA4000
heap
page read and write
14AF6F8E000
heap
page read and write
384E000
direct allocation
page read and write
1A377302000
heap
page read and write
106C000
stack
page read and write
400000
unkown
page readonly
14AF471E000
heap
page read and write
25B92ADB000
heap
page read and write
1C610C72000
heap
page read and write
4C2000
unkown
page write copy
8D1000
unkown
page readonly
7FF62CE72000
unkown
page read and write
14AF6D95000
heap
page read and write
8C6000
unkown
page readonly
58BC000
heap
page read and write
14AFA2A2000
heap
page read and write
12F0000
heap
page read and write
1A377313000
heap
page read and write
A3F000
heap
page read and write
AF2000
heap
page read and write
5ACF000
stack
page read and write
C7BD37F000
stack
page read and write
36CA000
direct allocation
page read and write
14AF6D3C000
heap
page read and write
14AFA3DC000
heap
page read and write
23C31D00000
heap
page read and write
23FDE476000
heap
page read and write
14AFA4B2000
heap
page read and write
67785FB000
stack
page read and write
14AFA42C000
heap
page read and write
1C610C65000
heap
page read and write
14AFAE80000
remote allocation
page read and write
A81000
heap
page read and write
5C0E000
stack
page read and write
23FDE528000
heap
page read and write
14AFA3EC000
heap
page read and write
25B92ABB000
heap
page read and write
745877C000
stack
page read and write
1C610C79000
heap
page read and write
C7BD2FE000
stack
page read and write
14AF6FEA000
heap
page read and write
63E000
stack
page read and write
14AF6A1D000
heap
page read and write
14AF6D99000
heap
page read and write
25B92A8D000
heap
page read and write
14AFA61B000
heap
page read and write
25B92AC8000
heap
page read and write
C7BC6AB000
stack
page read and write
1C61115A000
heap
page read and write
1C610C28000
heap
page read and write
14AFA336000
heap
page read and write
14AFA3E5000
heap
page read and write
400000
unkown
page readonly
12FC000
heap
page read and write
36B6000
direct allocation
page read and write
25B92A97000
heap
page read and write
14AF692C000
heap
page read and write
2812000
direct allocation
page read and write
14AF6706000
heap
page read and write
14AFA46E000
heap
page read and write
1C610C1A000
heap
page read and write
14AFA5EB000
heap
page read and write
14AF6A11000
heap
page read and write
14AFA2D2000
heap
page read and write
25B933B9000
heap
page read and write
25B92AB5000
heap
page read and write
23FDE526000
heap
page read and write
4B9000
unkown
page read and write
4C6000
unkown
page readonly
259A000
direct allocation
page read and write
2878000
direct allocation
page read and write
14AFA150000
trusted library allocation
page read and write
14AF6ADC000
heap
page read and write
3580000
direct allocation
page read and write
23FDE491000
heap
page read and write
8C6000
unkown
page readonly
1C611147000
heap
page read and write
83E000
stack
page read and write
A7A000
heap
page read and write
10000
heap
page read and write
14AFA3B2000
heap
page read and write
14AFA587000
heap
page read and write
14AFA5B0000
heap
page read and write
14AFA2F6000
heap
page read and write
14AFA1F1000
heap
page read and write
7FF62CED3000
unkown
page read and write
1C61104E000
heap
page read and write
14AFA4DF000
heap
page read and write
14AFA45F000
heap
page read and write
14AFA3DC000
heap
page read and write
23C31D02000
heap
page read and write
14AF45D0000
heap
page read and write
23FDE413000
heap
page read and write
14AFA461000
heap
page read and write
AAD000
heap
page read and write
14AF4990000
heap
page read and write
14AFA3AF000
heap
page read and write
CC0000
heap
page read and write
14AFA30E000
heap
page read and write
23C31C00000
heap
page read and write
7FF62CA83000
unkown
page readonly
1C60ED8B000
heap
page read and write
14AFA2DB000
heap
page read and write
23FDF865000
heap
page read and write
14AFA2D0000
heap
page read and write
14AF6DAB000
heap
page read and write
25B92AAE000
heap
page read and write
12F9000
heap
page read and write
36A5000
direct allocation
page read and write
14AFA254000
heap
page read and write
C11000
unkown
page execute read
2828000
direct allocation
page read and write
5870000
remote allocation
page read and write
25B92AAA000
heap
page read and write
9AE4EF9000
stack
page read and write
14AF6D43000
heap
page read and write
14AFA3CF000
heap
page read and write
25B92A8B000
heap
page read and write
1550000
heap
page read and write
14AFA626000
heap
page read and write
255C000
direct allocation
page read and write
25B93659000
heap
page read and write
14AFA48E000
heap
page read and write
C7BCAF8000
stack
page read and write
1C610C07000
heap
page read and write
14AFA5FB000
heap
page read and write
677867E000
stack
page read and write
1C610C2D000
heap
page read and write
1C60EDAF000
heap
page read and write
14AF6D99000
heap
page read and write
14AFA354000
heap
page read and write
14AFA603000
heap
page read and write
25B92A4F000
heap
page read and write
AE9000
heap
page read and write
7FF62CED3000
unkown
page read and write
25B9364A000
heap
page read and write
1C610DF7000
heap
page read and write
14AF6D72000
heap
page read and write
14AF4702000
heap
page read and write
366D000
direct allocation
page read and write
14AFA501000
heap
page read and write
14AF6D5F000
heap
page read and write
14AFA366000
heap
page read and write
123E000
stack
page read and write
14AF4709000
heap
page read and write
30C0000
heap
page read and write
65ECFE000
stack
page read and write
1C610CE4000
heap
page read and write
23C3251D000
heap
page read and write
1C610E10000
heap
page read and write
3674000
direct allocation
page read and write
1A3771C0000
heap
page read and write
14AFA3CF000
heap
page read and write
12DD000
heap
page read and write
A20000
heap
page read and write
14AF688B000
heap
page read and write
25B92AD0000
heap
page read and write
14AFA2F4000
heap
page read and write
10FC000
stack
page read and write
14AFA62A000
heap
page read and write
14AF48F0000
heap
page read and write
25B92AF1000
heap
page read and write
C5D000
unkown
page read and write
AA2000
heap
page read and write
14AFA080000
heap
page read and write
25B928D0000
heap
page read and write
1C610C31000
heap
page read and write
7458EFA000
stack
page read and write
1C61115A000
heap
page read and write
23FDE4D0000
heap
page read and write
282F000
direct allocation
page read and write
14AF4721000
heap
page read and write
14AF675A000
heap
page read and write
14AFA336000
heap
page read and write
14AF670F000
heap
page read and write
14AFA44E000
heap
page read and write
3832000
direct allocation
page read and write
25B92AB7000
heap
page read and write
14AF6D15000
heap
page read and write
25B92AAE000
heap
page read and write
14AFA518000
heap
page read and write
2566000
direct allocation
page read and write
7458C7B000
stack
page read and write
37FF000
direct allocation
page read and write
14AFA27A000
heap
page read and write
745830B000
stack
page read and write
23FDE280000
heap
page read and write
14AF6D7C000
heap
page read and write
14AFA46A000
heap
page read and write
380E000
direct allocation
page read and write
14AFA30E000
heap
page read and write
14AFA26E000
heap
page read and write
23C31CC8000
heap
page read and write
23FDF847000
heap
page read and write
23C32584000
heap
page read and write
14AFA4A2000
heap
page read and write
14AF6F87000
heap
page read and write
1C60ED6B000
heap
page read and write
1C61101D000
heap
page read and write
14AFA265000
heap
page read and write
25B93664000
heap
page read and write
14AF6F9A000
heap
page read and write
1C60ECEB000
heap
page read and write
1C60EC93000
heap
page read and write
14AF6A7F000
heap
page read and write
2836000
direct allocation
page read and write
369E000
direct allocation
page read and write
25B9364A000
heap
page read and write
3798000
direct allocation
page read and write
3C2E000
stack
page read and write
14AF6781000
heap
page read and write
23FDEE01000
trusted library allocation
page read and write
23FDE4A3000
heap
page read and write
1301000
heap
page read and write
14AF66C0000
heap
page read and write
35000
heap
page read and write
14AFA2CD000
heap
page read and write
2570000
direct allocation
page read and write
14AFA2D8000
heap
page read and write
C7BD0FE000
stack
page read and write
25B92ACE000
heap
page read and write
14AFA3AC000
heap
page read and write
1C610CD0000
heap
page read and write
3815000
direct allocation
page read and write
1C60ED90000
heap
page read and write
14AFA3D3000
heap
page read and write
3280000
heap
page read and write
14AF673D000
heap
page read and write
14AFA3B3000
heap
page read and write
59CE000
stack
page read and write
23C31C3F000
heap
page read and write
7FF62CE81000
unkown
page read and write
28E3000
heap
page read and write
14AFA275000
heap
page read and write
B0A000
heap
page read and write
FC0000
heap
page read and write
14AFA2DE000
heap
page read and write
14AFA2DC000
heap
page read and write
1C610C19000
heap
page read and write
14AF6896000
heap
page read and write
14AF673A000
heap
page read and write
500000
heap
page read and write
25B9364E000
heap
page read and write
14AF6CD4000
heap
page read and write
2819000
direct allocation
page read and write
1C60ED42000
heap
page read and write
2D70000
trusted library allocation
page read and write
14AFA38C000
heap
page read and write
1C610C25000
heap
page read and write
AE9000
heap
page read and write
1C60EDC5000
heap
page read and write
401000
unkown
page execute read
25B92A6D000
heap
page read and write
14AFA21A000
heap
page read and write
25B92AB2000
heap
page read and write
14AFA4A0000
heap
page read and write
14AF6EB3000
heap
page read and write
14AF46E2000
heap
page read and write
1C610CC9000
heap
page read and write
14AFA35F000
heap
page read and write
23C31D13000
heap
page read and write
58C1000
heap
page read and write
14AFA2D0000
heap
page read and write
1C61103E000
heap
page read and write
1C610F63000
heap
page read and write
14AFA5E3000
heap
page read and write
1C61115C000
heap
page read and write
14AFA323000
heap
page read and write
15AE000
stack
page read and write
14AFA4A9000
heap
page read and write
14AFA34E000
heap
page read and write
1C610C0C000
heap
page read and write
14AF6740000
heap
page read and write
23FDE4E2000
heap
page read and write
14AFA470000
heap
page read and write
14AFA292000
heap
page read and write
14AF6F96000
heap
page read and write
14AFA34C000
heap
page read and write
14AFA485000
heap
page read and write
14AFA3E7000
heap
page read and write
C7BD1FF000
stack
page read and write
1C61115C000
heap
page read and write
A49000
heap
page read and write
14AF9C70000
heap
page read and write
1C611522000
heap
page read and write
AD0000
heap
page read and write
14AFA413000
heap
page read and write
25B92AF7000
heap
page read and write
2321000
direct allocation
page read and write
AFD000
heap
page read and write
382A000
direct allocation
page read and write
1C611520000
trusted library allocation
page read and write
1C610D53000
heap
page read and write
1C610EA8000
heap
page read and write
14AFA344000
heap
page read and write
14AFA474000
heap
page read and write
6C9000
unkown
page read and write
23FDE42B000
heap
page read and write
283D000
direct allocation
page read and write
14AFA3E3000
heap
page read and write
14AFA519000
heap
page read and write
1C610E0C000
heap
page read and write
23FE3AB4000
trusted library allocation
page read and write
14AFA49E000
heap
page read and write
14AFA3F6000
heap
page read and write
25B92AD6000
heap
page read and write
1C60ECD7000
heap
page read and write
14AFA226000
heap
page read and write
14AFA5E4000
heap
page read and write
14AF6917000
heap
page read and write
14AFA465000
heap
page read and write
14AFA20C000
heap
page read and write
1C610BEC000
heap
page read and write
14AF6F78000
heap
page read and write
25B92A85000
heap
page read and write
14AFA29E000
heap
page read and write
14AFA32E000
heap
page read and write
369E000
direct allocation
page read and write
23FDED13000
heap
page read and write
14AF684F000
heap
page read and write
7FF62CE7F000
unkown
page read and write
14AF6717000
heap
page read and write
7FF62CE77000
unkown
page read and write
14AFA63D000
heap
page read and write
6D1000
unkown
page read and write
1C60ED70000
heap
page read and write
14AFAE80000
remote allocation
page read and write
25B92A79000
heap
page read and write
14AF6D0F000
heap
page read and write
23FE3AA1000
trusted library allocation
page read and write
25B92A8C000
heap
page read and write
25B93643000
heap
page read and write
1C610BEA000
heap
page read and write
1A377150000
heap
page read and write
7FF62CEFF000
unkown
page read and write
30000
heap
page read and write
1C610C0F000
heap
page read and write
23FE3BF0000
trusted library allocation
page read and write
25B93647000
heap
page read and write
23C31A10000
heap
page read and write
14AFA336000
heap
page read and write
D4C000
stack
page read and write
14AFA507000
heap
page read and write
285A000
direct allocation
page read and write
14AFA57B000
heap
page read and write
14AFA50D000
heap
page read and write
65F9FF000
stack
page read and write
1A377160000
heap
page read and write
23FDEBD1000
trusted library allocation
page read and write
C7BC72D000
stack
page read and write
25B92A8C000
heap
page read and write
324D000
heap
page read and write
1C611021000
heap
page read and write
1C610BE1000
heap
page read and write
14AFA3D3000
heap
page read and write
23FDE444000
heap
page read and write
14AF4995000
heap
page read and write
A5D000
heap
page read and write
A73000
heap
page read and write
132D000
heap
page read and write
C7BCCFE000
stack
page read and write
21F3000
direct allocation
page read and write
14AFA254000
heap
page read and write
8C6000
unkown
page readonly
25B92AB2000
heap
page read and write
891000
unkown
page execute read
9AE50FE000
stack
page read and write
59B9DFF000
stack
page read and write
A9D000
heap
page read and write
14AFA47C000
heap
page read and write
DE0000
heap
page read and write
1C610C0A000
heap
page read and write
14AFA49E000
heap
page read and write
14AFA275000
heap
page read and write
1397000
heap
page read and write
1220000
heap
page read and write
1C610D5F000
heap
page read and write
14AF6D81000
heap
page read and write
AE3000
heap
page read and write
14AFA310000
heap
page read and write
14AF6D31000
heap
page read and write
14AF696F000
heap
page read and write
23FDF8A8000
heap
page read and write
4B7000
unkown
page read and write
14AF67E0000
heap
page read and write
14AFA3D3000
heap
page read and write
14AFA3D9000
heap
page read and write
59B9FFC000
stack
page read and write
1C60EDB5000
heap
page read and write
14AFA504000
heap
page read and write
25B93650000
heap
page read and write
14AFA51D000
heap
page read and write
AA5000
heap
page read and write
25B92A2A000
heap
page read and write
AA2000
heap
page read and write
14AF6D63000
heap
page read and write
1C610E57000
heap
page read and write
677857E000
stack
page read and write
14AF48E3000
heap
page read and write
14AFA5DA000
heap
page read and write
AFB000
heap
page read and write
25B92B09000
heap
page read and write
25B93666000
heap
page read and write
23FDED19000
heap
page read and write
3220000
heap
page read and write
14AFA615000
heap
page read and write
9AF000
stack
page read and write
14AF48E0000
heap
page read and write
23FDF862000
heap
page read and write
23FDF800000
heap
page read and write
37F0000
direct allocation
page read and write
14AF4640000
heap
page read and write
14AF6D42000
heap
page read and write
18D000
stack
page read and write
There are 1366 hidden memdumps, click here to show them.