IOC Report
4.exe

loading gif

Files

File Path
Type
Category
Malicious
4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\HJJJECFIECBG\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\HJJJECFIECBG\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\HJJJECFIECBG\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\HJJJECFIECBG\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqls[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9EDA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\F441.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\kat796E.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\sdveeeu
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\sdveeeu:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\HJJJECFIECBG\AKECBF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJJJECFIECBG\BFCFBF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\HJJJECFIECBG\CBKJJE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJJJECFIECBG\EBGCFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\HJJJECFIECBG\EHDGCG
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HJJJECFIECBG\GIEHJD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJJJECFIECBG\GIEHJD-shm
data
dropped
C:\ProgramData\HJJJECFIECBG\HCFIII
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\HJJJECFIECBG\IDHIDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJJJECFIECBG\JKEGDH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HJJJECFIECBG\JKEGDH-shm
data
dropped
C:\ProgramData\HJJJECFIECBG\KKEHIE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HJJJECFIECBG\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\HJJJECFIECBG\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_F441.exe_d344ba73f4609dd422b4db8860abf6e38825755_836b94ca_b374aa5a-abc7-4013-9dc4-d7a423473300\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93BD.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 26 08:23:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94B8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94E8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199689717899[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3063), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4.exe
"C:\Users\user\Desktop\4.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\sdveeeu
C:\Users\user\AppData\Roaming\sdveeeu
malicious
C:\Users\user\AppData\Local\Temp\F441.exe
C:\Users\user\AppData\Local\Temp\F441.exe
malicious
C:\Users\user\AppData\Local\Temp\9EDA.exe
C:\Users\user\AppData\Local\Temp\9EDA.exe
malicious
C:\Users\user\AppData\Local\Temp\kat796E.tmp
C:\Users\user\AppData\Local\Temp\kat796E.tmp
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 1640
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\AppData\Local\Temp\kat796E.tmp" & rd /s /q "C:\ProgramData\HJJJECFIECBG" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
whispedwoodmoodsksl.shop
malicious
http://guteyr.cc/tmp/index.php
malicious
http://45.129.96.86/file/update.exe
45.129.96.86
malicious
https://steamcommunity.com/profiles/76561199689717899
104.102.42.29
malicious
holicisticscrarws.shop
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://65.109.242.59/nss3.dll
65.109.242.59
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://65.109.242.59/f
unknown
https://s.ytimg.com;
unknown
https://t.me/copterwin
unknown
https://65.109.242.59/t
unknown
https://65.109.242.59/x
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://65.109.242.59/v
unknown
https://wns.windows.com/L
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://65.109.242.59/D
unknown
https://65.109.242.59/B
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://65.109.242.59/A
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://t.me/copterwinr0isMozilla/5.0
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://65.109.242.59/kX
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://65.109.242.59/T
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://65.109.242.59/freebl3.dll
65.109.242.59
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://65.109.242.59/U
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://whispedwoodmoodsksl.shop/l
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://community.clo
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://outlook.com_
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://whispedwoodmoodsksl.shop/aFX
unknown
https://65.109.242.59/vcruntime140.dll/
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://whispedwoodmoodsksl.shop/B9E
unknown
https://65.109.242.59/mozglue.dll
65.109.242.59
https://65.109.242.59/vcruntime140.dll
65.109.242.59
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
http://schemas.micro
unknown
https://recaptcha.net/recaptcha/;
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199689717899/badges
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://store.steampowered.com/legal/
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://65.109.242.59
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://65.109.242.59/NX
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
http://rpi.net.au/~ajohnson/resourcehacker
unknown
https://store.steampowered.com/
unknown
http://127.0.0.1:27060
unknown
https://steamcommunity.com/profiles/76561199689717899tS
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whispedwoodmoodsksl.shop
188.114.96.3
malicious
steamcommunity.com
104.102.42.29
malicious
dbfhns.in
190.28.110.209
malicious

IPs

IP
Domain
Country
Malicious
23.145.40.124
unknown
Reserved
malicious
104.102.42.29
steamcommunity.com
United States
malicious
188.114.96.3
whispedwoodmoodsksl.shop
European Union
malicious
185.18.245.58
unknown
Azerbaijan
malicious
91.202.233.231
unknown
Russian Federation
malicious
190.28.110.209
dbfhns.in
Colombia
malicious
45.129.96.86
unknown
Estonia
malicious
185.235.137.54
unknown
Iran (ISLAMIC Republic Of)
65.109.242.59
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
There are 206 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E41000
unclassified section
page read and write
malicious
2DE0000
direct allocation
page read and write
malicious
2E20000
direct allocation
page read and write
malicious
44D0000
direct allocation
page read and write
malicious
4490000
direct allocation
page execute and read and write
malicious
2E51000
unclassified section
page read and write
malicious
4190000
direct allocation
page execute and read and write
malicious
4299000
direct allocation
page execute and read and write
malicious
8D5000
heap
page read and write
48E000
unkown
page readonly
3180000
unkown
page read and write
3180000
unkown
page read and write
8C70000
unkown
page read and write
87E0000
unkown
page read and write
3460000
unkown
page read and write
ACB000
heap
page read and write
B8AB000
stack
page read and write
7FF5ED81B000
unkown
page readonly
3160000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
3160000
unkown
page read and write
956000
heap
page read and write
8C70000
unkown
page read and write
2D15000
trusted library allocation
page read and write
7FF5EDA53000
unkown
page readonly
18A0000
unkown
page readonly
1F0000
heap
page read and write
3160000
unkown
page read and write
48D0000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
7D80000
unkown
page read and write
3800000
unkown
page readonly
933000
heap
page read and write
4B4000
unkown
page readonly
8EF0000
unkown
page read and write
3430000
unkown
page read and write
87E0000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
87E0000
unkown
page read and write
947000
heap
page read and write
87E0000
unkown
page read and write
434000
remote allocation
page execute and read and write
8AA000
heap
page read and write
76C0000
unkown
page read and write
418000
unkown
page write copy
418000
unkown
page write copy
2CBC000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
1221F000
stack
page read and write
A502000
unkown
page read and write
9C0000
heap
page read and write
8BD000
heap
page read and write
3430000
unkown
page read and write
BAF9000
stack
page read and write
2CB9000
trusted library allocation
page read and write
C5AA000
unkown
page read and write
7FF5ED9D2000
unkown
page readonly
7C7000
heap
page read and write
8F20000
unkown
page read and write
2EF2000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
969000
heap
page read and write
1C07C000
stack
page read and write
2D65000
trusted library allocation
page read and write
2E2A000
trusted library allocation
page read and write
3430000
unkown
page read and write
37F2000
unkown
page read and write
956000
heap
page read and write
8C70000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
7FF5ED9AE000
unkown
page readonly
7FF5ED3A7000
unkown
page readonly
79E000
stack
page read and write
2D70000
heap
page read and write
2D43000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
87E0000
unkown
page read and write
8740000
unkown
page read and write
2B7E000
stack
page read and write
A21E000
stack
page read and write
9A5B000
unkown
page read and write
8A2000
heap
page read and write
87E0000
unkown
page read and write
19004000
heap
page read and write
2A3E000
stack
page read and write
2D12000
trusted library allocation
page read and write
90D000
heap
page read and write
8C70000
unkown
page read and write
87E0000
unkown
page read and write
8E0000
heap
page read and write
19000000
heap
page read and write
2C89000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
3160000
unkown
page read and write
7FF5ED1D6000
unkown
page readonly
8EF0000
unkown
page read and write
87E0000
unkown
page read and write
B4E0000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED9A6000
unkown
page readonly
92A000
heap
page read and write
7D80000
unkown
page read and write
87B000
heap
page read and write
4C11000
heap
page read and write
87E0000
unkown
page read and write
3160000
unkown
page read and write
8BD000
heap
page read and write
2ED0000
heap
page read and write
2D43000
trusted library allocation
page read and write
3430000
unkown
page read and write
1B886000
direct allocation
page execute read
7FF5ED80C000
unkown
page readonly
3430000
unkown
page read and write
573000
heap
page read and write
FA86000
unkown
page read and write
FCEC000
unkown
page read and write
7FF5ED3D0000
unkown
page readonly
8F5000
heap
page read and write
400000
unkown
page readonly
3080000
unkown
page read and write
C49E000
stack
page read and write
2D0E000
stack
page read and write
8740000
unkown
page read and write
8BE000
heap
page read and write
7FF5EDA0B000
unkown
page readonly
8EF0000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
5C0000
heap
page read and write
9883000
unkown
page read and write
8CC000
heap
page read and write
1DCAC000
heap
page read and write
95C000
heap
page read and write
7D99000
unkown
page read and write
7FF5ED3CE000
unkown
page readonly
87E0000
unkown
page read and write
3180000
unkown
page read and write
3030000
unkown
page read and write
7CA0000
unkown
page read and write
8EF0000
unkown
page read and write
2C93000
trusted library allocation
page read and write
3430000
unkown
page read and write
2EB9000
trusted library allocation
page read and write
3180000
unkown
page read and write
8EF0000
unkown
page read and write
3180000
unkown
page read and write
87E0000
unkown
page read and write
8C4000
heap
page read and write
6F90D000
unkown
page readonly
800000
heap
page read and write
8C70000
unkown
page read and write
C516000
unkown
page read and write
C964000
unkown
page read and write
7DF4F3030000
unkown
page readonly
FD9F000
stack
page read and write
7FF5EDA31000
unkown
page readonly
A50B000
unkown
page read and write
87E0000
unkown
page read and write
8A4000
heap
page read and write
1907B000
heap
page read and write
8EF0000
unkown
page read and write
3180000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED975000
unkown
page readonly
3080000
unkown
page read and write
3430000
unkown
page read and write
8740000
unkown
page read and write
37F6000
unkown
page read and write
1DCCA000
heap
page read and write
2D0D000
trusted library allocation
page read and write
8BF0000
unkown
page readonly
9F20000
unkown
page read and write
3010000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
7FF5ED1CF000
unkown
page readonly
3020000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
3180000
unkown
page read and write
977A000
unkown
page read and write
CB4E000
unkown
page read and write
87E0000
unkown
page read and write
8E3000
heap
page read and write
3180000
unkown
page read and write
BC9B000
stack
page read and write
1B92D000
direct allocation
page execute read
2DA2000
trusted library allocation
page read and write
3430000
unkown
page read and write
7FF5ED5F7000
unkown
page readonly
949000
heap
page read and write
951000
heap
page read and write
A19F000
stack
page read and write
3180000
unkown
page read and write
3060000
unkown
page read and write
3160000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED743000
unkown
page readonly
7FF5ED412000
unkown
page readonly
2D45000
trusted library allocation
page read and write
412000
unkown
page readonly
87E0000
unkown
page read and write
2FFA000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
3180000
unkown
page read and write
3430000
unkown
page read and write
2DE0000
direct allocation
page read and write
3430000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
8E6000
heap
page read and write
87E0000
unkown
page read and write
8A2000
heap
page read and write
97C3000
unkown
page read and write
2D81000
heap
page read and write
909000
heap
page read and write
4CE0000
unkown
page read and write
3430000
unkown
page read and write
9C8000
heap
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
7F2E000
stack
page read and write
8F5000
heap
page read and write
97B000
heap
page read and write
3430000
unkown
page read and write
964000
heap
page read and write
7DD0000
unkown
page read and write
7DD0000
unkown
page read and write
87E0000
unkown
page read and write
2D13000
trusted library allocation
page read and write
80F000
stack
page read and write
5175000
heap
page read and write
8D5F000
stack
page read and write
93B000
heap
page read and write
3430000
unkown
page read and write
7D20000
unkown
page readonly
AADB000
unkown
page read and write
2C8C000
unkown
page readonly
3795000
unkown
page read and write
2D70000
trusted library allocation
page read and write
7FF5ED4F3000
unkown
page readonly
146DC000
stack
page read and write
7DD0000
unkown
page read and write
7FF5ED4BB000
unkown
page readonly
B4E0000
unkown
page read and write
2D70000
trusted library allocation
page read and write
C962000
unkown
page read and write
3430000
unkown
page read and write
E5BA000
unkown
page read and write
8EF0000
unkown
page read and write
8BD000
heap
page read and write
8740000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
8F9000
heap
page read and write
2CFC000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
8D5000
heap
page read and write
B629000
stack
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
785F000
unkown
page read and write
CA04000
unkown
page read and write
2D36000
trusted library allocation
page read and write
3020000
unkown
page read and write
8FD000
heap
page read and write
87E0000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
4C4B000
unkown
page read and write
2C9A000
trusted library allocation
page read and write
7D80000
unkown
page read and write
3070000
unkown
page read and write
2D25000
trusted library allocation
page read and write
79B1000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED342000
unkown
page readonly
8EF0000
unkown
page read and write
8C70000
unkown
page read and write
C6F8000
unkown
page read and write
938000
heap
page read and write
87E0000
unkown
page read and write
56C3000
unkown
page read and write
7D80000
unkown
page read and write
87E0000
unkown
page read and write
3020000
unkown
page read and write
8C70000
unkown
page read and write
F9D9000
unkown
page read and write
7FF5ED755000
unkown
page readonly
6D115000
unkown
page readonly
3180000
unkown
page read and write
2D63000
trusted library allocation
page read and write
1480000
heap
page read and write
FA04000
unkown
page read and write
8BD000
heap
page read and write
7FF5ED68C000
unkown
page readonly
3430000
unkown
page read and write
97D4000
unkown
page read and write
A61000
heap
page read and write
2E81000
trusted library allocation
page read and write
C6BF000
unkown
page read and write
87E0000
unkown
page read and write
7D80000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
3080000
unkown
page read and write
3460000
unkown
page read and write
3070000
unkown
page read and write
7FF5ED76D000
unkown
page readonly
3430000
unkown
page read and write
7FF5ED849000
unkown
page readonly
8EF0000
unkown
page read and write
308A000
stack
page read and write
7F30000
unkown
page read and write
3180000
unkown
page read and write
3430000
unkown
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
3430000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
2283000
heap
page read and write
867000
heap
page read and write
3460000
unkown
page read and write
8E0000
heap
page read and write
8CC000
heap
page read and write
8FD000
heap
page read and write
965000
heap
page read and write
35A0000
unkown
page readonly
4B8B000
unkown
page read and write
7861000
unkown
page read and write
BD98000
stack
page read and write
B8C0000
unkown
page readonly
3430000
unkown
page read and write
4040000
direct allocation
page execute and read and write
3160000
unkown
page read and write
7FF5ED915000
unkown
page readonly
2D15000
trusted library allocation
page read and write
3160000
unkown
page read and write
9DC000
heap
page read and write
8B7000
heap
page read and write
7FF5EDA11000
unkown
page readonly
2C99000
trusted library allocation
page read and write
FCFF000
unkown
page read and write
8C70000
unkown
page read and write
8B2000
heap
page read and write
1914C000
stack
page read and write
9DB000
heap
page read and write
87E0000
unkown
page read and write
3659000
stack
page read and write
87E0000
unkown
page read and write
8CC000
heap
page read and write
3160000
unkown
page read and write
3180000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED644000
unkown
page readonly
8C70000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
2C8C000
unkown
page readonly
7FF5ED697000
unkown
page readonly
7FF5ED48A000
unkown
page readonly
3430000
unkown
page read and write
3180000
unkown
page read and write
E5B2000
unkown
page read and write
8D5000
heap
page read and write
7D80000
unkown
page read and write
94E000
heap
page read and write
FD05000
unkown
page read and write
94C000
heap
page read and write
FB04000
unkown
page read and write
3160000
unkown
page read and write
AA90000
unkown
page read and write
3160000
unkown
page read and write
87E0000
unkown
page read and write
96DF000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
3430000
unkown
page read and write
3180000
unkown
page read and write
7FF5ED990000
unkown
page readonly
16B70000
remote allocation
page read and write
87E0000
unkown
page read and write
52A000
heap
page read and write
89E000
heap
page read and write
7FF5ED853000
unkown
page readonly
2FFE000
heap
page read and write
3180000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
965C000
stack
page read and write
87E0000
unkown
page read and write
9F9D000
stack
page read and write
97A9000
unkown
page read and write
7FF5ED844000
unkown
page readonly
8F20000
unkown
page read and write
A33E000
unkown
page read and write
2D71000
trusted library allocation
page read and write
7FF5D1CD4000
unkown
page readonly
87E0000
unkown
page read and write
3430000
unkown
page read and write
97B5000
unkown
page read and write
740000
heap
page read and write
7FF5ED7E9000
unkown
page readonly
3430000
unkown
page read and write
2D0B000
trusted library allocation
page read and write
3430000
unkown
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
1350000
unkown
page readonly
B22B000
stack
page read and write
956000
heap
page read and write
1DD73000
heap
page read and write
2C81000
trusted library allocation
page read and write
7FF5ED71B000
unkown
page readonly
18FEF000
stack
page read and write
2D65000
trusted library allocation
page read and write
93BE000
stack
page read and write
E5BA000
unkown
page read and write
3460000
unkown
page read and write
1B621000
heap
page read and write
637000
heap
page read and write
2140000
direct allocation
page read and write
3180000
unkown
page read and write
9873000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
3180000
unkown
page read and write
943F000
stack
page read and write
7D80000
unkown
page read and write
3430000
unkown
page read and write
94A000
heap
page read and write
87E0000
unkown
page read and write
7CD0000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
19C000
stack
page read and write
7859000
unkown
page read and write
7FF5ED41C000
unkown
page readonly
7D80000
unkown
page read and write
37D2000
unkown
page read and write
572000
remote allocation
page execute and read and write
7FF5ED39B000
unkown
page readonly
87E0000
unkown
page read and write
87E0000
unkown
page read and write
9885000
unkown
page read and write
964000
heap
page read and write
2CDD000
trusted library allocation
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
8CC000
heap
page read and write
8B2000
heap
page read and write
9660000
unkown
page read and write
87E0000
unkown
page read and write
9871000
unkown
page read and write
19C000
stack
page read and write
3180000
unkown
page read and write
5641000
unkown
page read and write
C7C5000
unkown
page read and write
8740000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
3160000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
BDD0000
unkown
page readonly
9F20000
unkown
page read and write
95DC000
stack
page read and write
7FF5ECED2000
unkown
page readonly
2E0F000
stack
page read and write
298C000
stack
page read and write
7FF5ED602000
unkown
page readonly
87E0000
unkown
page read and write
93D000
heap
page read and write
3209000
stack
page read and write
2CB7000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
3180000
unkown
page read and write
87E0000
unkown
page read and write
977000
heap
page read and write
7FF5ED409000
unkown
page readonly
3430000
unkown
page read and write
4C8A000
unkown
page read and write
AB6C000
unkown
page read and write
3020000
unkown
page read and write
400000
unkown
page readonly
37A8000
unkown
page read and write
2D45000
trusted library allocation
page read and write
3180000
unkown
page read and write
1B720000
direct allocation
page execute and read and write
C50A000
unkown
page read and write
7FF5ED279000
unkown
page readonly
401000
unkown
page execute read
3020000
heap
page read and write
1B721000
direct allocation
page execute read
FAC4000
unkown
page read and write
3180000
unkown
page read and write
B170000
unkown
page readonly
3180000
unkown
page read and write
87E0000
unkown
page read and write
9893000
unkown
page read and write
7FF5ED65C000
unkown
page readonly
3160000
unkown
page read and write
979C000
unkown
page read and write
88B000
heap
page read and write
3430000
unkown
page read and write
3460000
unkown
page read and write
3180000
unkown
page read and write
5BE000
heap
page read and write
14B0000
unkown
page readonly
8D5000
heap
page read and write
87E0000
unkown
page read and write
3180000
unkown
page read and write
2D6E000
trusted library allocation
page read and write
87E0000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
986B000
unkown
page read and write
8C70000
unkown
page read and write
950000
heap
page read and write
2E40000
unclassified section
page read and write
8EF0000
unkown
page read and write
8C70000
unkown
page read and write
87E0000
unkown
page read and write
6F91E000
unkown
page read and write
2D36000
trusted library allocation
page read and write
418000
unkown
page write copy
3180000
unkown
page read and write
87E0000
unkown
page read and write
A37B000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
7DD0000
unkown
page read and write
2C8C000
trusted library allocation
page read and write
959000
heap
page read and write
52E000
remote allocation
page execute and read and write
8D5000
heap
page read and write
7DD0000
unkown
page read and write
87E0000
unkown
page read and write
37A0000
unkown
page read and write
87E0000
unkown
page read and write
3220000
unkown
page readonly
7FF5EDA47000
unkown
page readonly
4C18000
unkown
page read and write
3070000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
495000
unkown
page read and write
89E0000
unkown
page read and write
3430000
unkown
page read and write
8BD000
heap
page read and write
7FF5ED810000
unkown
page readonly
9CA000
heap
page read and write
FCA0000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
2D71000
trusted library allocation
page read and write
8CE000
heap
page read and write
8CA0000
unkown
page read and write
5590000
unkown
page write copy
3080000
unkown
page read and write
794F000
unkown
page read and write
2D64000
trusted library allocation
page read and write
4CC0000
unkown
page read and write
901000
heap
page read and write
2CCE000
trusted library allocation
page read and write
3020000
stack
page read and write
90F000
heap
page read and write
B640000
unkown
page read and write
3010000
unkown
page read and write
7C90000
unkown
page read and write
AF8D000
stack
page read and write
2D36000
trusted library allocation
page read and write
C700000
unkown
page read and write
C6C1000
unkown
page read and write
3180000
unkown
page read and write
8FD000
heap
page read and write
2D25000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
7E50000
unkown
page readonly
7A0000
heap
page read and write
91B9000
stack
page read and write
8EF0000
unkown
page read and write
9C1000
heap
page read and write
49B000
unkown
page readonly
40B000
unkown
page execute read
87E0000
unkown
page read and write
7FF5ED942000
unkown
page readonly
2CCE000
trusted library allocation
page read and write
C92D000
unkown
page read and write
78AD000
unkown
page read and write
79FB000
unkown
page read and write
9E6C000
stack
page read and write
1B92F000
direct allocation
page readonly
7D80000
unkown
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
2C84000
trusted library allocation
page read and write
7FF5ED8A4000
unkown
page readonly
2C9F000
trusted library allocation
page read and write
3160000
unkown
page read and write
2E5A000
trusted library allocation
page read and write
2F00000
heap
page read and write
8C70000
unkown
page read and write
89E000
heap
page read and write
3060000
unkown
page read and write
7FF5EDA38000
unkown
page readonly
899000
heap
page read and write
3180000
unkown
page read and write
965000
heap
page read and write
946000
heap
page read and write
1BABE000
stack
page read and write
9B5C000
stack
page read and write
C503000
unkown
page read and write
6F890000
unkown
page readonly
B4E0000
unkown
page read and write
8EF0000
unkown
page read and write
8C70000
unkown
page read and write
C811000
unkown
page read and write
8C70000
unkown
page read and write
2C86000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
7B80000
unkown
page read and write
7FF5ED1F0000
unkown
page readonly
8C70000
unkown
page read and write
1095000
stack
page read and write
1BDB0000
heap
page read and write
87E0000
unkown
page read and write
7DF4F3041000
unkown
page execute read
87E0000
unkown
page read and write
233E000
stack
page read and write
8740000
unkown
page read and write
A327000
unkown
page read and write
8AB000
heap
page read and write
979000
heap
page read and write
8AD000
heap
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
3430000
unkown
page read and write
7FF5EDA2A000
unkown
page readonly
2D6C000
trusted library allocation
page read and write
87E0000
unkown
page read and write
982000
heap
page read and write
4C50000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
7FF5ED1F6000
unkown
page readonly
2DF4000
heap
page read and write
87E0000
unkown
page read and write
557000
heap
page read and write
3160000
unkown
page read and write
2CE3000
trusted library allocation
page read and write
2C88000
trusted library allocation
page read and write
8C8000
heap
page read and write
A4AB000
unkown
page read and write
8EF0000
unkown
page read and write
87E0000
unkown
page read and write
7DF4F3050000
unkown
page readonly
8AA000
heap
page read and write
787C000
unkown
page read and write
A09E000
stack
page read and write
1240000
heap
page read and write
8C70000
unkown
page read and write
37F9000
unkown
page read and write
2D70000
heap
page read and write
87E0000
unkown
page read and write
3070000
unkown
page read and write
33CE000
trusted library allocation
page read and write
48C000
unkown
page read and write
8C70000
unkown
page read and write
2D65000
trusted library allocation
page read and write
8740000
unkown
page read and write
1483000
heap
page read and write
3738000
unkown
page read and write
3590000
unkown
page read and write
8C70000
unkown
page read and write
3430000
unkown
page read and write
2D45000
trusted library allocation
page read and write
3160000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
543000
heap
page read and write
2C9F000
trusted library allocation
page read and write
9F20000
stack
page read and write
7FF5ED68F000
unkown
page readonly
2E10000
direct allocation
page execute and read and write
87E0000
unkown
page read and write
1505000
heap
page read and write
3180000
unkown
page read and write
969000
heap
page read and write
8740000
unkown
page read and write
7D80000
unkown
page read and write
7FF5ED265000
unkown
page readonly
FE90000
heap
page read and write
2FF0000
heap
page read and write
909000
heap
page read and write
8CC000
heap
page read and write
AF0C000
stack
page read and write
8EF0000
unkown
page read and write
2D25000
trusted library allocation
page read and write
50BE000
stack
page read and write
7FF5ED52F000
unkown
page readonly
8EF0000
unkown
page read and write
257F000
stack
page read and write
410000
unkown
page readonly
A310000
unkown
page read and write
87E0000
unkown
page read and write
43C000
remote allocation
page execute and read and write
401000
unkown
page execute read
8C70000
unkown
page read and write
2CE5000
trusted library allocation
page read and write
3180000
unkown
page read and write
1C03C000
stack
page read and write
8EC6000
unkown
page read and write
8EF0000
unkown
page read and write
3180000
unkown
page read and write
7FF5ED800000
unkown
page readonly
492000
unkown
page read and write
3430000
unkown
page read and write
9977000
unkown
page read and write
7FF5ED86B000
unkown
page readonly
7FF5ED7D6000
unkown
page readonly
2C8F000
trusted library allocation
page read and write
7D80000
unkown
page read and write
8EF0000
unkown
page read and write
1469E000
stack
page read and write
B4E0000
unkown
page read and write
87E0000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
4B93000
unkown
page read and write
7DF4F3040000
unkown
page readonly
CB3F000
unkown
page read and write
2EDE000
heap
page read and write
9DED000
stack
page read and write
959000
heap
page read and write
8ED000
heap
page read and write
952000
heap
page read and write
3070000
unkown
page read and write
3430000
unkown
page read and write
3180000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
16BAE000
stack
page read and write
7FF5ED85F000
unkown
page readonly
2D19000
trusted library allocation
page read and write
3160000
unkown
page read and write
8AA000
heap
page read and write
8EF0000
unkown
page read and write
8AD000
heap
page read and write
306FB000
stack
page read and write
932000
heap
page read and write
2D25000
trusted library allocation
page read and write
3430000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
959000
heap
page read and write
7FF5ED507000
unkown
page readonly
87E0000
unkown
page read and write
87E0000
unkown
page read and write
7DD0000
unkown
page read and write
4BE3000
unkown
page read and write
2C87000
trusted library allocation
page read and write
8C70000
unkown
page read and write
6D10E000
unkown
page read and write
7FF5ED1BC000
unkown
page readonly
507F000
stack
page read and write
2E3E000
stack
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
8E1000
heap
page read and write
3010000
stack
page read and write
2C82000
trusted library allocation
page read and write
4EA000
heap
page read and write
400000
unkown
page execute and read and write
3080000
unkown
page read and write
8CC000
heap
page read and write
3430000
unkown
page read and write
94C000
heap
page read and write
3180000
unkown
page read and write
955000
heap
page read and write
C89C000
unkown
page read and write
8C70000
unkown
page read and write
8EF0000
unkown
page read and write
901000
heap
page read and write
9D3000
heap
page read and write
2CFC000
trusted library allocation
page read and write
7D80000
unkown
page read and write
AAD1000
unkown
page read and write
7FF5ED692000
unkown
page readonly
3430000
unkown
page read and write
3430000
unkown
page read and write
8BD000
heap
page read and write
7FF5ED4DF000
unkown
page readonly
87E0000
unkown
page read and write
2150000
remote allocation
page read and write
1B728000
direct allocation
page execute read
959000
heap
page read and write
9E7000
heap
page read and write
8AA000
heap
page read and write
8B2000
heap
page read and write
3430000
unkown
page read and write
2C88000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
3430000
unkown
page read and write
2E84000
heap
page read and write
7D80000
unkown
page read and write
87BE000
stack
page read and write
3180000
unkown
page read and write
7FF5ED864000
unkown
page readonly
7D80000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
3460000
unkown
page read and write
2CB7000
trusted library allocation
page read and write
379E000
unkown
page read and write
3160000
unkown
page read and write
A433000
unkown
page read and write
780000
heap
page read and write
CA63000
unkown
page read and write
7FF5ED1CB000
unkown
page readonly
3070000
unkown
page read and write
8BD000
heap
page read and write
5B9000
heap
page read and write
18E000
stack
page read and write
935000
heap
page read and write
B4E0000
unkown
page read and write
2D39000
trusted library allocation
page read and write
895000
heap
page read and write
8B2000
heap
page read and write
A01B000
stack
page read and write
2D45000
trusted library allocation
page read and write
7FF5ED9D9000
unkown
page readonly
7C5000
heap
page read and write
884000
heap
page read and write
8EF0000
unkown
page read and write
4B56000
unkown
page read and write
8740000
unkown
page read and write
2D64000
trusted library allocation
page read and write
3030000
unkown
page read and write
87E0000
unkown
page read and write
52B000
remote allocation
page execute and read and write
90A000
heap
page read and write
961000
heap
page read and write
3160000
unkown
page read and write
7D80000
unkown
page read and write
2D5A000
trusted library allocation
page read and write
87E0000
unkown
page read and write
2B3F000
stack
page read and write
2CE3000
trusted library allocation
page read and write
7FF5ED8AC000
unkown
page readonly
78A0000
unkown
page read and write
3460000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
3180000
unkown
page read and write
2C9F000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
7FF5ED519000
unkown
page readonly
B4D0000
heap
page read and write
87E0000
unkown
page read and write
1BDA3000
heap
page read and write
7FF5ED867000
unkown
page readonly
37B0000
unkown
page read and write
C6CF000
unkown
page read and write
8C70000
unkown
page read and write
5557000
stack
page read and write
3160000
unkown
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
42D000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
2D14000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
3430000
unkown
page read and write
2C82000
trusted library allocation
page read and write
899000
heap
page read and write
C563000
unkown
page read and write
3080000
unkown
page read and write
87E0000
unkown
page read and write
56D9000
unkown
page read and write
2D71000
trusted library allocation
page read and write
3430000
unkown
page read and write
A32A000
unkown
page read and write
1BAC0000
trusted library allocation
page read and write
8CF000
heap
page read and write
786B000
unkown
page read and write
87E0000
unkown
page read and write
8C70000
unkown
page read and write
3160000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED586000
unkown
page readonly
2280000
heap
page read and write
A29E000
stack
page read and write
3070000
unkown
page read and write
7DF4F3031000
unkown
page execute read
A391000
unkown
page read and write
87E0000
unkown
page read and write
8740000
unkown
page read and write
8000000
unkown
page read and write
955000
heap
page read and write
E5BA000
unkown
page read and write
2150000
remote allocation
page read and write
C857000
unkown
page read and write
3430000
unkown
page read and write
2D0D000
trusted library allocation
page read and write
3180000
unkown
page read and write
8C70000
unkown
page read and write
87E0000
unkown
page read and write
331E000
stack
page read and write
955000
heap
page read and write
76E000
stack
page read and write
2C9F000
trusted library allocation
page read and write
7D80000
unkown
page read and write
2D15000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
910000
heap
page read and write
896B000
stack
page read and write
8EB000
heap
page read and write
451000
unkown
page execute and read and write
8EF0000
unkown
page read and write
8710000
unkown
page readonly
422000
remote allocation
page execute and read and write
2D6E000
trusted library allocation
page read and write
2F8F000
stack
page read and write
94B000
heap
page read and write
8C70000
unkown
page read and write
8B60000
unkown
page readonly
3080000
unkown
page read and write
818E000
stack
page read and write
8BD000
heap
page read and write
3430000
unkown
page read and write
7D80000
unkown
page read and write
87E0000
unkown
page read and write
BDA0000
unkown
page readonly
2C81000
trusted library allocation
page read and write
FE92000
heap
page read and write
2C9C000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
87E0000
unkown
page read and write
198000
stack
page read and write
7FF5ED471000
unkown
page readonly
7C7000
heap
page read and write
3180000
unkown
page read and write
2D71000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
2D71000
trusted library allocation
page read and write
4EE000
heap
page read and write
34E9000
stack
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
720000
heap
page read and write
8B1000
heap
page read and write
8C4000
heap
page read and write
8EF0000
unkown
page read and write
90A000
heap
page read and write
8C8000
heap
page read and write
2CDE000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
3430000
unkown
page read and write
3010000
unkown
page read and write
7847000
unkown
page read and write
1BAEA000
heap
page read and write
3430000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
3060000
unkown
page read and write
8AF000
stack
page read and write
7FF5ED5EB000
unkown
page readonly
7DF4F3061000
unkown
page execute read
2EEB000
heap
page execute and read and write
87E0000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
87E0000
unkown
page read and write
30CF000
stack
page read and write
3160000
unkown
page read and write
247E000
stack
page read and write
1BDB8000
heap
page read and write
7FF5ED847000
unkown
page readonly
7FF5ED46E000
unkown
page readonly
87E0000
unkown
page read and write
496F000
stack
page read and write
87E0000
unkown
page read and write
4A50000
heap
page read and write
8EF0000
unkown
page read and write
2D65000
trusted library allocation
page read and write
80E000
heap
page read and write
F9C2000
unkown
page read and write
B4DF000
stack
page read and write
8C70000
unkown
page read and write
D91F000
stack
page read and write
8C8000
heap
page read and write
C6D8000
unkown
page read and write
CB58000
unkown
page read and write
8EF0000
unkown
page read and write
8C1000
heap
page read and write
3430000
unkown
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
C544000
unkown
page read and write
2D0B000
trusted library allocation
page read and write
910000
heap
page read and write
C88B000
unkown
page read and write
7884000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
190000
stack
page read and write
3180000
unkown
page read and write
35D0000
unkown
page read and write
932000
heap
page read and write
7FF5ED534000
unkown
page readonly
2D71000
trusted library allocation
page read and write
E5BA000
unkown
page read and write
8CA0000
unkown
page read and write
7857000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED669000
unkown
page readonly
2D16000
trusted library allocation
page read and write
87E0000
unkown
page read and write
2D0D000
trusted library allocation
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
7D80000
unkown
page read and write
8C70000
unkown
page read and write
79D3000
unkown
page read and write
8A8000
heap
page read and write
8860000
unkown
page read and write
3180000
unkown
page read and write
2D89000
trusted library allocation
page read and write
3430000
unkown
page read and write
3460000
unkown
page read and write
8EF0000
unkown
page read and write
7DD0000
unkown
page read and write
8740000
unkown
page read and write
7CE0000
unkown
page read and write
8EF0000
unkown
page read and write
9139000
stack
page read and write
3240000
unkown
page read and write
3160000
unkown
page read and write
3180000
unkown
page read and write
8EF0000
unkown
page read and write
3C3A000
trusted library allocation
page read and write
3160000
unkown
page read and write
7FF5ED495000
unkown
page readonly
960000
heap
page read and write
962000
heap
page read and write
2CB4000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
2E81000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
940000
heap
page read and write
193000
stack
page read and write
3430000
unkown
page read and write
8C70000
unkown
page read and write
87E0000
unkown
page read and write
4C9A000
unkown
page read and write
8C70000
unkown
page read and write
A39B000
unkown
page read and write
3430000
unkown
page read and write
3070000
unkown
page read and write
8EF0000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED625000
unkown
page readonly
8740000
unkown
page read and write
8740000
unkown
page read and write
93D000
heap
page read and write
2CCE000
trusted library allocation
page read and write
3180000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
90A000
heap
page read and write
8EF0000
unkown
page read and write
2D0D000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
3210000
unkown
page read and write
87E0000
unkown
page read and write
3080000
unkown
page read and write
2E88000
trusted library allocation
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
98A000
heap
page read and write
3430000
unkown
page read and write
4BC9000
unkown
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
3180000
unkown
page read and write
3430000
unkown
page read and write
A4FC000
unkown
page read and write
2DF0000
heap
page read and write
8E1000
heap
page read and write
7FF5ED850000
unkown
page readonly
2E80000
trusted library allocation
page read and write
3180000
unkown
page read and write
7978000
unkown
page read and write
A375000
unkown
page read and write
8EF0000
unkown
page read and write
2D65000
trusted library allocation
page read and write
3180000
unkown
page read and write
2D65000
trusted library allocation
page read and write
7FF5ED980000
unkown
page readonly
2C8C000
trusted library allocation
page read and write
9D3000
heap
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
9C3000
heap
page read and write
8C70000
unkown
page read and write
B150000
unkown
page read and write
3430000
unkown
page read and write
3180000
unkown
page read and write
2D37000
trusted library allocation
page read and write
7FF5ED39E000
unkown
page readonly
3180000
unkown
page read and write
2C94000
trusted library allocation
page read and write
87E0000
unkown
page read and write
3180000
unkown
page read and write
87E0000
unkown
page read and write
8AB000
heap
page read and write
2D14000
trusted library allocation
page read and write
8D0000
heap
page read and write
7FF5ED42B000
unkown
page readonly
7FF5ED9B8000
unkown
page readonly
3180000
unkown
page read and write
87E0000
unkown
page read and write
7A0000
heap
page read and write
87E0000
unkown
page read and write
2E2BC000
stack
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
8780000
unkown
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
3010000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
7FF5ED885000
unkown
page readonly
2D6C000
trusted library allocation
page read and write
36D5000
stack
page read and write
2CFC000
trusted library allocation
page read and write
953000
heap
page read and write
3290000
unkown
page read and write
3430000
unkown
page read and write
8BD000
heap
page read and write
7FF5ED793000
unkown
page readonly
3430000
unkown
page read and write
FCD1000
unkown
page read and write
2EE7000
heap
page read and write
7DF4F3051000
unkown
page execute read
8A4000
heap
page read and write
C507000
unkown
page read and write
2D26000
trusted library allocation
page read and write
29F0000
heap
page read and write
400000
unkown
page execute and read and write
8EF0000
unkown
page read and write
7FF5ED9C6000
unkown
page readonly
8EF0000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
8C70000
unkown
page read and write
48E000
unkown
page readonly
923E000
stack
page read and write
2EC0000
heap
page read and write
8E0000
direct allocation
page execute and read and write
D95E000
stack
page read and write
8EF0000
unkown
page read and write
932000
heap
page read and write
3430000
unkown
page read and write
7DD0000
unkown
page read and write
7FF5ED939000
unkown
page readonly
87E0000
unkown
page read and write
90F000
heap
page read and write
3180000
unkown
page read and write
400000
unkown
page readonly
2D80000
heap
page read and write
3430000
unkown
page read and write
8C70000
unkown
page read and write
8EF0000
unkown
page read and write
89C000
heap
page read and write
8EF0000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
2D6C000
trusted library allocation
page read and write
7FF5ED5C5000
unkown
page readonly
8B0000
heap
page read and write
C57F000
unkown
page read and write
7FF5ED803000
unkown
page readonly
8EF0000
unkown
page read and write
8C70000
unkown
page read and write
910000
heap
page read and write
143B000
stack
page read and write
7FF5ED821000
unkown
page readonly
9869000
unkown
page read and write
93B000
heap
page read and write
7D80000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
3180000
unkown
page read and write
7D40000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
3180000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
4BA6000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
AB09000
unkown
page read and write
3430000
unkown
page read and write
13A0000
unkown
page read and write
87F000
heap
page read and write
8210000
unkown
page read and write
4B20000
heap
page read and write
16B70000
remote allocation
page read and write
9C000
stack
page read and write
87E0000
unkown
page read and write
496000
unkown
page write copy
42E000
remote allocation
page execute and read and write
9798000
unkown
page read and write
933000
heap
page read and write
3460000
unkown
page read and write
3070000
unkown
page read and write
93A000
heap
page read and write
7FF5ED674000
unkown
page readonly
7FF5ED28E000
unkown
page readonly
3430000
unkown
page read and write
8C70000
unkown
page read and write
7FF5ED433000
unkown
page readonly
2CB3000
trusted library allocation
page read and write
87E0000
unkown
page read and write
2D14000
trusted library allocation
page read and write
1B610000
heap
page read and write
2CCE000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
2E81000
trusted library allocation
page read and write
3060000
unkown
page read and write
9C000
stack
page read and write
5CB000
heap
page read and write
3460000
unkown
page read and write
B5AE000
stack
page read and write
3430000
unkown
page read and write
971000
heap
page read and write
9881000
unkown
page read and write
87E0000
unkown
page read and write
7D80000
unkown
page read and write
7FF5ED505000
unkown
page readonly
8EB000
heap
page read and write
7FF5ED735000
unkown
page readonly
4AF000
unkown
page write copy
2C8F000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
2D6E000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
8740000
unkown
page read and write
87E0000
unkown
page read and write
2D3E000
trusted library allocation
page read and write
87E0000
unkown
page read and write
8DA0000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
7FF5EDA08000
unkown
page readonly
7FF5ED4EF000
unkown
page readonly
8B2000
heap
page read and write
3060000
unkown
page read and write
A361000
unkown
page read and write
8C70000
unkown
page read and write
4B31000
heap
page read and write
3430000
unkown
page read and write
438000
remote allocation
page execute and read and write
1500000
heap
page read and write
8C1000
heap
page read and write
88EE000
stack
page read and write
7FF5ED806000
unkown
page readonly
2E9E000
trusted library allocation
page read and write
80A000
heap
page read and write
31CF000
stack
page read and write
895000
heap
page read and write
1B962000
direct allocation
page read and write
7D80000
unkown
page read and write
C6E3000
unkown
page read and write
94F000
stack
page read and write
87E0000
unkown
page read and write
7FF5ED5C9000
unkown
page readonly
87E0000
unkown
page read and write
2C9F000
trusted library allocation
page read and write
3180000
unkown
page read and write
8FB9000
stack
page read and write
951000
heap
page read and write
2EE0000
heap
page read and write
3180000
unkown
page read and write
87E0000
unkown
page read and write
920000
heap
page read and write
3180000
unkown
page read and write
3430000
unkown
page read and write
2CCA000
trusted library allocation
page read and write
8F20000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
2CAC000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
3430000
unkown
page read and write
2C9F000
trusted library allocation
page read and write
37AC000
unkown
page read and write
3080000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
A5A000
heap
page read and write
7D80000
unkown
page read and write
8A8000
heap
page read and write
965000
heap
page read and write
50FE000
stack
page read and write
2D65000
trusted library allocation
page read and write
87E0000
unkown
page read and write
9AB2000
stack
page read and write
2DD0000
direct allocation
page execute and read and write
1510000
unkown
page readonly
7FF5ED62F000
unkown
page readonly
8EF0000
unkown
page read and write
2D12000
trusted library allocation
page read and write
4C60000
unkown
page read and write
2D09000
trusted library allocation
page read and write
8A2000
heap
page read and write
A364000
unkown
page read and write
8108000
stack
page read and write
7DD0000
unkown
page read and write
7863000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
3430000
unkown
page read and write
9F60000
stack
page read and write
3430000
unkown
page read and write
3160000
unkown
page read and write
89C000
heap
page read and write
3430000
unkown
page read and write
C846000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED872000
unkown
page readonly
7FF5ED4A1000
unkown
page readonly
4C34000
unkown
page read and write
CA42000
unkown
page read and write
8EF0000
unkown
page read and write
95A000
heap
page read and write
8EF0000
unkown
page read and write
2CC8000
trusted library allocation
page read and write
8D5000
heap
page read and write
3180000
unkown
page read and write
A49E000
unkown
page read and write
8C70000
unkown
page read and write
2D36000
trusted library allocation
page read and write
40B000
unkown
page execute read
8E0000
heap
page read and write
401000
unkown
page execute read
2CCE000
trusted library allocation
page read and write
72E000
stack
page read and write
CBA6000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
2D5A000
trusted library allocation
page read and write
7FF5ED94A000
unkown
page readonly
3430000
unkown
page read and write
8F20000
unkown
page read and write
410000
unkown
page readonly
1B96D000
direct allocation
page readonly
961000
heap
page read and write
8B2000
heap
page read and write
3430000
unkown
page read and write
3180000
unkown
page read and write
FCE6000
unkown
page read and write
401000
unkown
page execute read
8A4000
heap
page read and write
2C7E000
stack
page read and write
2CCE000
trusted library allocation
page read and write
2C88000
trusted library allocation
page read and write
10C0000
unkown
page readonly
90F000
heap
page read and write
7FF5ED451000
unkown
page readonly
2CB4000
trusted library allocation
page read and write
7C80000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
2D6C000
trusted library allocation
page read and write
896000
heap
page read and write
F9CB000
unkown
page read and write
92E000
heap
page read and write
2D14000
trusted library allocation
page read and write
B08D000
stack
page read and write
7FF5ED404000
unkown
page readonly
1200000
unkown
page readonly
B10D000
stack
page read and write
FA43000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
2CCE000
trusted library allocation
page read and write
3160000
unkown
page read and write
3430000
unkown
page read and write
87E0000
unkown
page read and write
95E000
heap
page read and write
22A0000
heap
page read and write
3070000
unkown
page read and write
7DD0000
unkown
page read and write
7E11000
unkown
page read and write
87E0000
unkown
page read and write
3180000
unkown
page read and write
4A0000
heap
page read and write
8EF0000
unkown
page read and write
9A10000
unkown
page read and write
8740000
unkown
page read and write
87E0000
unkown
page read and write
2C88000
trusted library allocation
page read and write
3430000
unkown
page read and write
2D45000
trusted library allocation
page read and write
8C8000
heap
page read and write
8720000
unkown
page readonly
87E0000
unkown
page read and write
2D65000
trusted library allocation
page read and write
8740000
unkown
page read and write
97D000
heap
page read and write
3180000
unkown
page read and write
7D80000
unkown
page read and write
8EF0000
unkown
page read and write
982D000
unkown
page read and write
3430000
unkown
page read and write
1370000
unkown
page read and write
2C89000
unkown
page read and write
C89A000
unkown
page read and write
3460000
unkown
page read and write
C561000
unkown
page read and write
32B1000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
8F20000
unkown
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
3180000
unkown
page read and write
9F1E000
stack
page read and write
1440000
unkown
page read and write
513E000
stack
page read and write
B650000
unkown
page read and write
2D44000
trusted library allocation
page read and write
2E0E000
stack
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
2CCD000
trusted library allocation
page read and write
6D110000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
5BF000
heap
page read and write
986F000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
2CCE000
trusted library allocation
page read and write
7FF5ED4C6000
unkown
page readonly
2D14000
trusted library allocation
page read and write
87E0000
unkown
page read and write
2D50000
heap
page read and write
9550000
unkown
page readonly
6D10F000
unkown
page write copy
8C1000
heap
page read and write
3070000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
4CD0000
unkown
page read and write
4C1E000
unkown
page read and write
8C70000
unkown
page read and write
2CC8000
trusted library allocation
page read and write
7FF5ED426000
unkown
page readonly
2D6C000
trusted library allocation
page read and write
9875000
unkown
page read and write
3430000
unkown
page read and write
8EF0000
unkown
page read and write
2D71000
trusted library allocation
page read and write
7FF5D1CCD000
unkown
page readonly
314F000
unkown
page read and write
2D71000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
9792000
unkown
page read and write
2D69000
trusted library allocation
page read and write
3460000
unkown
page read and write
7D71000
unkown
page read and write
3430000
unkown
page read and write
A3BE000
unkown
page read and write
3430000
unkown
page read and write
8EF0000
unkown
page read and write
2C93000
trusted library allocation
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
3060000
unkown
page read and write
3070000
unkown
page read and write
3180000
unkown
page read and write
8780000
unkown
page read and write
8B7000
heap
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
26BF000
stack
page read and write
2C95000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
8F5000
heap
page read and write
3080000
unkown
page read and write
8EF0000
unkown
page read and write
3756000
unkown
page read and write
2D5E000
trusted library allocation
page read and write
3180000
unkown
page read and write
7FF5ED449000
unkown
page readonly
2D70000
trusted library allocation
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
1451000
unkown
page readonly
87E0000
unkown
page read and write
7FF5ED956000
unkown
page readonly
2D45000
trusted library allocation
page read and write
E5BA000
unkown
page read and write
945000
heap
page read and write
3180000
unkown
page read and write
E5BA000
unkown
page read and write
9A61000
stack
page read and write
8EF0000
unkown
page read and write
3060000
unkown
page read and write
8EF0000
unkown
page read and write
8C70000
unkown
page read and write
7D53000
unkown
page read and write
3030000
unkown
page read and write
C5A0000
unkown
page read and write
97AD000
unkown
page read and write
2D71000
trusted library allocation
page read and write
991C000
unkown
page read and write
2D45000
trusted library allocation
page read and write
22FD000
stack
page read and write
2E20000
direct allocation
page read and write
8EF0000
unkown
page read and write
E5BA000
unkown
page read and write
5C5000
heap
page read and write
7E60000
unkown
page read and write
C54A000
unkown
page read and write
7FF5ED418000
unkown
page readonly
972000
heap
page read and write
1B5C0000
trusted library allocation
page read and write
7FF5ED97E000
unkown
page readonly
C52C000
unkown
page read and write
A4B8000
unkown
page read and write
2D5A000
trusted library allocation
page read and write
3724000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
8C1000
heap
page read and write
7FF5ED516000
unkown
page readonly
7F40000
unkown
page readonly
87E0000
unkown
page read and write
5170000
heap
page read and write
8C8000
heap
page read and write
90A000
heap
page read and write
910000
heap
page read and write
C4A0000
unkown
page read and write
87E0000
unkown
page read and write
9815000
unkown
page read and write
8A2000
heap
page read and write
8EF0000
unkown
page read and write
7FF5ED660000
unkown
page readonly
7D80000
unkown
page read and write
8FB000
heap
page read and write
7DF4F3071000
unkown
page execute read
E5BA000
unkown
page read and write
7FF5ED556000
unkown
page readonly
7FF5ED93B000
unkown
page readonly
8EF0000
unkown
page read and write
1BAE0000
heap
page read and write
410000
unkown
page readonly
8EF0000
unkown
page read and write
3080000
unkown
page read and write
1DB65000
heap
page read and write
8C4000
heap
page read and write
2D70000
trusted library allocation
page read and write
19C000
stack
page read and write
3430000
unkown
page read and write
3460000
unkown
page read and write
3430000
unkown
page read and write
21FD000
stack
page read and write
909000
heap
page read and write
987F000
unkown
page read and write
8D5000
heap
page read and write
97B000
heap
page read and write
3430000
unkown
page read and write
400000
unkown
page execute and read and write
400000
unkown
page readonly
7FF5ED3DA000
unkown
page readonly
3430000
unkown
page read and write
1B981000
heap
page read and write
87E0000
unkown
page read and write
8D5000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
8C70000
unkown
page read and write
635000
heap
page read and write
3700000
unkown
page read and write
7D80000
unkown
page read and write
7852000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
8F8000
heap
page read and write
8CA0000
unkown
page read and write
2D4F000
stack
page read and write
95E000
heap
page read and write
961000
heap
page read and write
2D14000
trusted library allocation
page read and write
8C70000
unkown
page read and write
A379000
unkown
page read and write
1B620000
heap
page read and write
2D12000
trusted library allocation
page read and write
3180000
unkown
page read and write
8E0000
heap
page read and write
87E0000
unkown
page read and write
1BDAB000
heap
page read and write
2D0E000
trusted library allocation
page read and write
310E000
stack
page read and write
3080000
unkown
page read and write
C10A000
stack
page read and write
978000
heap
page read and write
87E0000
unkown
page read and write
2D5A000
trusted library allocation
page read and write
3180000
unkown
page read and write
2CB7000
trusted library allocation
page read and write
3180000
unkown
page read and write
4CB0000
unkown
page read and write
8EF0000
unkown
page read and write
2E99000
trusted library allocation
page read and write
2E80000
heap
page read and write
7FF5ED349000
unkown
page readonly
243D000
stack
page read and write
1B96F000
direct allocation
page readonly
8EF0000
unkown
page read and write
2C85000
trusted library allocation
page read and write
3430000
unkown
page read and write
8EF0000
unkown
page read and write
3180000
unkown
page read and write
8B6000
heap
page read and write
8EF0000
unkown
page read and write
2DBE000
stack
page read and write
3180000
unkown
page read and write
4FE000
heap
page execute and read and write
8C70000
unkown
page read and write
2CC6000
trusted library allocation
page read and write
956000
heap
page read and write
2DBE000
stack
page read and write
8C70000
unkown
page read and write
B190000
unkown
page read and write
CA7C000
unkown
page read and write
9795000
unkown
page read and write
956000
heap
page read and write
97B000
heap
page read and write
3430000
unkown
page read and write
8EC000
heap
page read and write
7FF5ED3D6000
unkown
page readonly
A37D000
unkown
page read and write
4BE1000
unkown
page read and write
8EF0000
unkown
page read and write
A491000
unkown
page read and write
E5BA000
unkown
page read and write
8C70000
unkown
page read and write
8A2000
heap
page read and write
7D80000
unkown
page read and write
8D6B000
stack
page read and write
987B000
unkown
page read and write
410000
unkown
page readonly
2D65000
trusted library allocation
page read and write
8B7000
heap
page read and write
7DD0000
unkown
page read and write
3430000
unkown
page read and write
6D0CF000
unkown
page readonly
7FF5ED50A000
unkown
page readonly
7FF5ED9C8000
unkown
page readonly
7DD0000
unkown
page read and write
E5B3000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
8C70000
unkown
page read and write
8C8000
heap
page read and write
5B9000
heap
page read and write
2D65000
trusted library allocation
page read and write
2D80000
heap
page read and write
986000
heap
page read and write
948000
heap
page read and write
87E0000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED337000
unkown
page readonly
1BDB1000
heap
page read and write
7FF5EDA70000
unkown
page readonly
8CA0000
unkown
page read and write
401000
unkown
page execute read
7FF5ED8E2000
unkown
page readonly
7FF5ED64F000
unkown
page readonly
553000
remote allocation
page execute and read and write
9B60000
unkown
page readonly
2CE5000
trusted library allocation
page read and write
3180000
unkown
page read and write
2C85000
trusted library allocation
page read and write
8A2000
heap
page read and write
8B2000
heap
page read and write
992000
heap
page read and write
3160000
unkown
page read and write
785D000
unkown
page read and write
2D5A000
trusted library allocation
page read and write
1DB6C000
heap
page read and write
2D26000
trusted library allocation
page read and write
8C70000
stack
page read and write
3430000
unkown
page read and write
A4AE000
unkown
page read and write
2D65000
trusted library allocation
page read and write
87E0000
unkown
page read and write
4B90000
unkown
page read and write
2CB4000
trusted library allocation
page read and write
969000
heap
page read and write
7FF5ED8C6000
unkown
page readonly
7FF5ED503000
unkown
page readonly
2D04000
trusted library allocation
page read and write
874000
heap
page read and write
8EF0000
unkown
page read and write
7695000
stack
page read and write
2D36000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
8A8000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
A11F000
stack
page read and write
8AB000
heap
page read and write
90C000
heap
page read and write
63F000
remote allocation
page execute and read and write
4C10000
heap
page read and write
2D5E000
trusted library allocation
page read and write
8C70000
unkown
page read and write
294C000
stack
page read and write
89C0000
unkown
page read and write
87E0000
unkown
page read and write
55A000
heap
page read and write
2D6C000
trusted library allocation
page read and write
3050000
unkown
page read and write
933000
heap
page read and write
C5A3000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
8780000
unkown
page read and write
DE0000
unkown
page readonly
2CC4000
trusted library allocation
page read and write
FDDE000
stack
page read and write
7D00000
unkown
page readonly
3180000
unkown
page read and write
10D0000
heap
page read and write
8740000
unkown
page read and write
9B000
stack
page read and write
3180000
unkown
page read and write
7D80000
unkown
page read and write
8EF0000
unkown
page read and write
B4E0000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED996000
unkown
page readonly
8E3000
heap
page read and write
2D65000
trusted library allocation
page read and write
7D80000
unkown
page read and write
C6F2000
unkown
page read and write
2C95000
trusted library allocation
page read and write
AAF9000
unkown
page read and write
797D000
unkown
page read and write
C6F4000
unkown
page read and write
37AE000
unkown
page read and write
3430000
unkown
page read and write
784A000
unkown
page read and write
8EF0000
unkown
page read and write
3180000
unkown
page read and write
87E0000
unkown
page read and write
2CC8000
trusted library allocation
page read and write
1B938000
direct allocation
page readonly
3430000
unkown
page read and write
913000
heap
page read and write
300B000
heap
page execute and read and write
86F000
heap
page read and write
4C7A000
unkown
page read and write
3180000
unkown
page read and write
2C81000
trusted library allocation
page read and write
8E0000
heap
page read and write
4C0000
heap
page read and write
8E0000
heap
page read and write
3430000
unkown
page read and write
E5BA000
unkown
page read and write
8F8000
heap
page read and write
7D80000
unkown
page read and write
400000
unkown
page readonly
9DA000
heap
page read and write
87E0000
unkown
page read and write
A479000
unkown
page read and write
7D80000
unkown
page read and write
3180000
unkown
page read and write
8730000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED7C4000
unkown
page readonly
CA0E000
unkown
page read and write
2CA4000
trusted library allocation
page read and write
969000
heap
page read and write
2CEF000
trusted library allocation
page read and write
7C0000
heap
page read and write
2C8D000
trusted library allocation
page read and write
3430000
unkown
page read and write
6F891000
unkown
page execute read
3160000
unkown
page read and write
7FF5ED750000
unkown
page readonly
8EF0000
unkown
page read and write
C51E000
unkown
page read and write
76A0000
unkown
page read and write
932000
heap
page read and write
2CCE000
trusted library allocation
page read and write
3180000
unkown
page read and write
9C000
stack
page read and write
8C70000
unkown
page read and write
7869000
unkown
page read and write
3430000
unkown
page read and write
3180000
unkown
page read and write
FCE2000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
8208000
stack
page read and write
1F0000
heap
page read and write
7865000
unkown
page read and write
7FF5EDA14000
unkown
page readonly
3430000
unkown
page read and write
534000
remote allocation
page execute and read and write
2C89000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED695000
unkown
page readonly
418000
unkown
page write copy
7FF5ED814000
unkown
page readonly
8AE000
heap
page read and write
61E000
stack
page read and write
8CED000
stack
page read and write
7FF5ED9D6000
unkown
page readonly
E5B3000
unkown
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
B8B0000
unkown
page read and write
89C000
heap
page read and write
3070000
unkown
page read and write
2C8C000
unkown
page readonly
8CC000
heap
page read and write
36F0000
unkown
page readonly
3180000
unkown
page read and write
7D80000
unkown
page read and write
8F8000
heap
page read and write
8740000
unkown
page read and write
7DD0000
unkown
page read and write
3430000
unkown
page read and write
9D64000
unkown
page read and write
87E0000
unkown
page read and write
7FF5ED4B0000
unkown
page readonly
B140000
unkown
page readonly
7DD0000
unkown
page read and write
7D80000
unkown
page read and write
3748000
unkown
page read and write
8EF0000
unkown
page read and write
7D80000
unkown
page read and write
87E0000
unkown
page read and write
5CC000
heap
page read and write
C8E1000
unkown
page read and write
98A8000
unkown
page read and write
1210000
unkown
page readonly
1225E000
stack
page read and write
8E0000
heap
page read and write
7FF5ED6B9000
unkown
page readonly
22B0000
direct allocation
page read and write
3180000
unkown
page read and write
BDC0000
unkown
page readonly
7FF5ED8C1000
unkown
page readonly
936000
heap
page read and write
7D80000
unkown
page read and write
2CB7000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
8C70000
unkown
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
8EF0000
unkown
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
2C91000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
9ED000
heap
page read and write
8740000
unkown
page read and write
4B78000
unkown
page read and write
E5BA000
unkown
page read and write
7FF5ED714000
unkown
page readonly
2D25000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
8C70000
unkown
page read and write
8C70000
unkown
page read and write
93F000
heap
page read and write
B82A000
stack
page read and write
7FF5EDA0D000
unkown
page readonly
8D7000
heap
page read and write
1C2DF000
heap
page read and write
CA1E000
unkown
page read and write
FE9A000
heap
page read and write
901000
heap
page read and write
36D3000
stack
page read and write
3180000
unkown
page read and write
87E0000
unkown
page read and write
7D80000
unkown
page read and write
3430000
unkown
page read and write
C6C9000
unkown
page read and write
2E30000
unclassified section
page read and write
7FF5ED3EA000
unkown
page readonly
492000
unkown
page write copy
8C70000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
2D14000
trusted library allocation
page read and write
7D80000
unkown
page read and write
19079000
heap
page read and write
2CCE000
trusted library allocation
page read and write
1F0000
heap
page read and write
6CF31000
unkown
page execute read
978E000
unkown
page read and write
87E0000
unkown
page read and write
2E60000
heap
page read and write
21B0000
heap
page read and write
7FF5ED74A000
unkown
page readonly
785B000
unkown
page read and write
8A4000
heap
page read and write
2E62000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
FA8B000
unkown
page read and write
3430000
unkown
page read and write
B6A0000
heap
page read and write
8C70000
unkown
page read and write
37BD000
unkown
page read and write
9E1000
heap
page read and write
910000
heap
page read and write
A4A1000
unkown
page read and write
1230000
unkown
page read and write
8EF0000
unkown
page read and write
2C8A000
trusted library allocation
page read and write
94C000
heap
page read and write
8EF0000
unkown
page read and write
996000
heap
page read and write
7DD0000
unkown
page read and write
C4D0000
unkown
page read and write
2D6C000
trusted library allocation
page read and write
7FF5ED933000
unkown
page readonly
7D80000
unkown
page read and write
3180000
unkown
page read and write
1F0000
heap
page read and write
419000
unkown
page write copy
7FF5ED779000
unkown
page readonly
2D63000
trusted library allocation
page read and write
33B9000
stack
page read and write
7FF5ED937000
unkown
page readonly
7FF5ED781000
unkown
page readonly
A323000
unkown
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
AAF2000
unkown
page read and write
8B0000
heap
page read and write
2EDA000
heap
page read and write
3160000
unkown
page read and write
19D000
stack
page read and write
2D65000
trusted library allocation
page read and write
C41F000
stack
page read and write
1B58A000
stack
page read and write
2D43000
trusted library allocation
page read and write
2D6C000
trusted library allocation
page read and write
8E3000
heap
page read and write
6CF30000
unkown
page readonly
8AD000
heap
page read and write
7FF5ED4E8000
unkown
page readonly
2D6C000
trusted library allocation
page read and write
87E0000
unkown
page read and write
534000
heap
page read and write
3180000
unkown
page read and write
8F5000
heap
page read and write
8CC000
heap
page read and write
87E0000
unkown
page read and write
7867000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED445000
unkown
page readonly
969000
heap
page read and write
8EF0000
unkown
page read and write
25F0F000
stack
page read and write
3430000
unkown
page read and write
959000
heap
page read and write
8C70000
unkown
page read and write
8EF0000
unkown
page read and write
2D5A000
trusted library allocation
page read and write
16B1C000
stack
page read and write
3580000
unkown
page readonly
3430000
unkown
page read and write
20F0000
direct allocation
page execute and read and write
8CC000
heap
page read and write
C512000
unkown
page read and write
2C82000
trusted library allocation
page read and write
87E0000
unkown
page read and write
7FFE000
stack
page read and write
8EF0000
unkown
page read and write
8AD000
heap
page read and write
2DCE000
stack
page read and write
8A2000
heap
page read and write
A494000
unkown
page read and write
11B0000
unkown
page readonly
3439000
stack
page read and write
1B96A000
direct allocation
page readonly
3430000
unkown
page read and write
9ADB000
stack
page read and write
8A6E000
stack
page read and write
8FD000
heap
page read and write
25BE000
stack
page read and write
2C8D000
trusted library allocation
page read and write
89E000
heap
page read and write
87E0000
unkown
page read and write
87E0000
unkown
page read and write
894000
heap
page read and write
3791000
unkown
page read and write
3180000
unkown
page read and write
3070000
unkown
page read and write
C893000
unkown
page read and write
2D14000
trusted library allocation
page read and write
7900000
unkown
page read and write
E5BA000
unkown
page read and write
2CB7000
trusted library allocation
page read and write
3180000
unkown
page read and write
3430000
unkown
page read and write
3180000
unkown
page read and write
987D000
unkown
page read and write
7D80000
unkown
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
8EF0000
unkown
page read and write
8E4000
heap
page read and write
7FF5ED295000
unkown
page readonly
7FF5ED670000
unkown
page readonly
5B7000
heap
page read and write
2CD8000
trusted library allocation
page read and write
87E0000
unkown
page read and write
7A34000
unkown
page read and write
2D6E000
trusted library allocation
page read and write
3460000
unkown
page read and write
3430000
unkown
page read and write
2C9A000
trusted library allocation
page read and write
1F0000
heap
page read and write
87E0000
unkown
page read and write
9879000
unkown
page read and write
C08A000
stack
page read and write
93B000
heap
page read and write
8C4000
heap
page read and write
3758000
unkown
page read and write
C557000
unkown
page read and write
AB90000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
4B50000
unkown
page read and write
9687000
unkown
page read and write
3160000
unkown
page read and write
97000
stack
page read and write
2C9F000
trusted library allocation
page read and write
8C70000
unkown
page read and write
3180000
unkown
page read and write
3180000
unkown
page read and write
89A0000
unkown
page read and write
7FF5EDA76000
unkown
page readonly
7D80000
unkown
page read and write
1B621000
heap
page read and write
89D000
heap
page read and write
2C85000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
906E000
stack
page read and write
3430000
unkown
page read and write
630000
heap
page read and write
2D36000
trusted library allocation
page read and write
42D000
unkown
page read and write
97B000
heap
page read and write
16B70000
remote allocation
page read and write
3430000
unkown
page read and write
3430000
unkown
page read and write
910000
heap
page read and write
2170000
heap
page read and write
30CE000
stack
page read and write
3430000
unkown
page read and write
4AC000
unkown
page write copy
4B30000
heap
page read and write
3430000
unkown
page read and write
C84D000
unkown
page read and write
3430000
unkown
page read and write
B729000
stack
page read and write
3430000
unkown
page read and write
7FF5ED92C000
unkown
page readonly
3430000
unkown
page read and write
2D71000
trusted library allocation
page read and write
8F5000
heap
page read and write
B4E0000
unkown
page read and write
8780000
unkown
page read and write
BD1D000
stack
page read and write
24AF000
stack
page read and write
2E52000
trusted library allocation
page read and write
2D83000
trusted library allocation
page read and write
8C70000
unkown
page read and write
7CC0000
unkown
page readonly
9877000
unkown
page read and write
7FF5ED818000
unkown
page readonly
2D65000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
60B000
remote allocation
page execute and read and write
1908A000
heap
page read and write
2CCD000
trusted library allocation
page read and write
8740000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
8E0000
heap
page read and write
7D80000
unkown
page read and write
3060000
unkown
page read and write
3010000
unkown
page read and write
901000
heap
page read and write
87E0000
unkown
page read and write
3430000
unkown
page read and write
7FF5ED59E000
unkown
page readonly
84E000
stack
page read and write
2C92000
trusted library allocation
page read and write
6F922000
unkown
page readonly
7FF5ED476000
unkown
page readonly
498F000
stack
page read and write
8C70000
unkown
page read and write
8EF0000
unkown
page read and write
2150000
remote allocation
page read and write
2CB7000
trusted library allocation
page read and write
955000
heap
page read and write
87E0000
unkown
page read and write
7FF5ED91A000
unkown
page readonly
2C8C000
unkown
page readonly
1490000
unkown
page read and write
8BE9000
stack
page read and write
8C70000
unkown
page read and write
9D5000
heap
page read and write
7FF5ED961000
unkown
page readonly
8C70000
unkown
page read and write
FCDD000
unkown
page read and write
2D43000
trusted library allocation
page read and write
1DD71000
heap
page read and write
2D45000
trusted library allocation
page read and write
7FF5ED6DB000
unkown
page readonly
8EF0000
unkown
page read and write
7FF5ED8F9000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
8D5000
heap
page read and write
2CAD000
trusted library allocation
page read and write
3080000
unkown
page read and write
89C000
heap
page read and write
7DD0000
unkown
page read and write
7FF5ED986000
unkown
page readonly
3210000
heap
page read and write
93A000
heap
page read and write
8B7000
heap
page read and write
88B000
heap
page read and write
6E0000
heap
page read and write
7FF5ED9CA000
unkown
page readonly
3430000
unkown
page read and write
3430000
unkown
page read and write
3070000
unkown
page read and write
3020000
unkown
page read and write
AAF6000
unkown
page read and write
2E9A000
trusted library allocation
page read and write
4BDC000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
3180000
unkown
page read and write
DD0000
unkown
page readonly
8EF0000
unkown
page read and write
4E0000
heap
page read and write
7FF5ED286000
unkown
page readonly
87E0000
unkown
page read and write
3797000
unkown
page read and write
There are 2135 hidden memdumps, click here to show them.