IOC Report
2.exe

loading gif

Files

File Path
Type
Category
Malicious
2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\FIEGCBKEGCFC\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FIEGCBKEGCFC\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FIEGCBKEGCFC\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FIEGCBKEGCFC\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqls[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\38F9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D818.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\katB4C0.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jssrvvh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jssrvvh:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\FIEGCBKEGCFC\AAAAKJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIEGCBKEGCFC\AAAAKJ-shm
data
dropped
C:\ProgramData\FIEGCBKEGCFC\BAKEBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIEGCBKEGCFC\DAEBKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIEGCBKEGCFC\DAKJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FIEGCBKEGCFC\DHDHCG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIEGCBKEGCFC\DHDHCG-shm
data
dropped
C:\ProgramData\FIEGCBKEGCFC\DHIEHI
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\FIEGCBKEGCFC\FIIEHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\FIEGCBKEGCFC\IDBAFH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIEGCBKEGCFC\JKEGHD
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIEGCBKEGCFC\KEGCBF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\FIEGCBKEGCFC\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\FIEGCBKEGCFC\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_38F9.exe_9760284121905b7cc7fc96d1e94df0d47c5f1575_d1f02302_561e1d39-5d97-4da1-9982-57118b66ff65\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER936D.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 26 08:28:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9459.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9488.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199689717899[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3063), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2.exe
"C:\Users\user\Desktop\2.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\jssrvvh
C:\Users\user\AppData\Roaming\jssrvvh
malicious
C:\Users\user\AppData\Local\Temp\38F9.exe
C:\Users\user\AppData\Local\Temp\38F9.exe
malicious
C:\Users\user\AppData\Local\Temp\D818.exe
C:\Users\user\AppData\Local\Temp\D818.exe
malicious
C:\Users\user\AppData\Local\Temp\katB4C0.tmp
C:\Users\user\AppData\Local\Temp\katB4C0.tmp
malicious
C:\Users\user\AppData\Roaming\jssrvvh
C:\Users\user\AppData\Roaming\jssrvvh
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7932 -s 1512
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\AppData\Local\Temp\katB4C0.tmp" & rd /s /q "C:\ProgramData\FIEGCBKEGCFC" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
whispedwoodmoodsksl.shop
malicious
http://guteyr.cc/tmp/index.php
malicious
http://45.129.96.86/file/update.exe
45.129.96.86
malicious
https://steamcommunity.com/profiles/76561199689717899
23.199.218.33
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://65.109.242.59/~
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://65.109.242.59/Z
unknown
https://65.109.242.59/nss3.dll
65.109.242.59
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://65.109.242.59/c
unknown
https://65.109.242.59AKEH
unknown
https://65.109.242.59/h
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://65.109.242.59/g
unknown
https://s.ytimg.com;
unknown
https://t.me/copterwin
unknown
https://65.109.242.59/s
unknown
https://65.109.242.59/q
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://65.109.242.59/u
unknown
https://wns.windows.com/L
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://65.109.242.59/C
unknown
https://65.109.242.59/B
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://65.109.242.59/A
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://t.me/copterwinr0isMozilla/5.0
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://65.109.242.59/F
unknown
https://65.109.242.59/E
unknown
https://65.109.242.59/L
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://whispedwoodmoodsksl.shop/apicC
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://65.109.242.59/M
unknown
https://65.109.242.59/T
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://65.109.242.59/freebl3.dll
65.109.242.59
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://65.109.242.59/V
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://65.109.242.59/(
unknown
https://www.google.com/recaptcha/
unknown
https://65.109.242.59/&
unknown
https://checkout.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://outlook.com_
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://65.109.242.59/-
unknown
https://whispedwoodmoodsksl.shop/y
unknown
https://65.109.242.59/4
unknown
https://65.109.242.59GDHJ
unknown
https://65.109.242.59/2
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://65.109.242.59/09.242.59/
unknown
https://65.109.242.59/mozglue.dll
65.109.242.59
https://65.109.242.59/vcruntime140.dll
65.109.242.59
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
http://schemas.micro
unknown
https://recaptcha.net/recaptcha/;
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199689717899/badges
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://store.steampowered.com/legal/
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://65.109.242.59
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whispedwoodmoodsksl.shop
188.114.96.3
malicious
steamcommunity.com
23.199.218.33
malicious
dbfhns.in
185.18.245.58
malicious

IPs

IP
Domain
Country
Malicious
23.199.218.33
steamcommunity.com
United States
malicious
23.145.40.124
unknown
Reserved
malicious
188.114.96.3
whispedwoodmoodsksl.shop
European Union
malicious
185.18.245.58
dbfhns.in
Azerbaijan
malicious
91.202.233.231
unknown
Russian Federation
malicious
31.176.197.47
unknown
Bosnia and Herzegowina
malicious
45.129.96.86
unknown
Estonia
malicious
185.235.137.54
unknown
Iran (ISLAMIC Republic Of)
65.109.242.59
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
There are 197 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4379000
direct allocation
page execute and read and write
malicious
4270000
direct allocation
page execute and read and write
malicious
48F1000
unclassified section
page read and write
malicious
49F1000
unclassified section
page read and write
malicious
2D80000
direct allocation
page read and write
malicious
4570000
direct allocation
page read and write
malicious
2560000
direct allocation
page execute and read and write
malicious
2DF0000
direct allocation
page read and write
malicious
2E51000
unclassified section
page read and write
malicious
48D0000
direct allocation
page read and write
malicious
7FF5EDA08000
unkown
page readonly
314D000
trusted library allocation
page read and write
1DE0F000
direct allocation
page readonly
235D000
stack
page read and write
515F000
stack
page read and write
3410000
unkown
page read and write
C6BF000
unkown
page read and write
2C97000
trusted library allocation
page read and write
97AD000
unkown
page read and write
9C6000
heap
page read and write
1370000
unkown
page read and write
1B4FB000
heap
page read and write
8810000
unkown
page read and write
3290000
unkown
page read and write
143B000
stack
page read and write
1360000
unkown
page read and write
93C0000
unkown
page read and write
9B3000
heap
page read and write
B140000
unkown
page readonly
7FF5ED961000
unkown
page readonly
8EF0000
unkown
page read and write
1390000
unkown
page read and write
1340000
unkown
page read and write
98E000
heap
page read and write
87D0000
unkown
page read and write
33D0000
unkown
page readonly
C9F5000
unkown
page read and write
7FF5ED8A4000
unkown
page readonly
A099000
stack
page read and write
2C75000
trusted library allocation
page read and write
6D0E2000
unkown
page readonly
9BF000
heap
page read and write
87D0000
unkown
page read and write
2C73000
trusted library allocation
page read and write
492000
unkown
page read and write
7FF5EDA11000
unkown
page readonly
1360000
unkown
page read and write
3410000
unkown
page read and write
98D000
heap
page read and write
1370000
unkown
page read and write
A55000
heap
page read and write
2CE8000
trusted library allocation
page read and write
2FFC000
stack
page read and write
418000
unkown
page write copy
35D0000
unkown
page read and write
1340000
unkown
page read and write
2D08000
trusted library allocation
page read and write
48E0000
unclassified section
page read and write
93C0000
unkown
page read and write
400000
unkown
page readonly
1370000
unkown
page read and write
2CDF000
trusted library allocation
page read and write
1370000
unkown
page read and write
1350000
unkown
page read and write
1350000
unkown
page read and write
8810000
unkown
page read and write
3410000
unkown
page read and write
7FF5ED7E9000
unkown
page readonly
8108000
stack
page read and write
8EA000
heap
page read and write
4C60000
unkown
page read and write
7865000
unkown
page read and write
1340000
unkown
page read and write
93C0000
unkown
page read and write
A40000
heap
page read and write
2CCB000
trusted library allocation
page read and write
A4E000
heap
page read and write
9C000
stack
page read and write
550000
heap
page read and write
FDFF000
unkown
page read and write
A2B000
heap
page read and write
3020000
unkown
page read and write
1095000
stack
page read and write
8F10000
unkown
page read and write
7AE000
stack
page read and write
3410000
unkown
page read and write
7FF5ED265000
unkown
page readonly
2C8D000
trusted library allocation
page read and write
87D0000
unkown
page read and write
93C0000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
2D0C000
trusted library allocation
page read and write
7FF5ED9B8000
unkown
page readonly
451000
unkown
page execute and read and write
C41F000
stack
page read and write
7FF5ED3EA000
unkown
page readonly
7FF5ED86B000
unkown
page readonly
7FF5ED556000
unkown
page readonly
A4AE000
unkown
page read and write
1370000
unkown
page read and write
1340000
unkown
page read and write
1370000
unkown
page read and write
401000
unkown
page execute read
87D0000
unkown
page read and write
2C85000
trusted library allocation
page read and write
7C90000
unkown
page read and write
93C0000
unkown
page read and write
1451000
unkown
page readonly
2C97000
trusted library allocation
page read and write
87D0000
unkown
page read and write
3020000
unkown
page read and write
2CB5000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
A57000
heap
page read and write
2DEE000
stack
page read and write
7FF5ED76D000
unkown
page readonly
1350000
unkown
page read and write
93C0000
unkown
page read and write
121FF000
stack
page read and write
2D90000
unclassified section
page read and write
2CB9000
trusted library allocation
page read and write
7FF5ED505000
unkown
page readonly
8EF0000
unkown
page read and write
7FF5ED286000
unkown
page readonly
9A5000
heap
page read and write
D8FF000
stack
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
7FF5ED996000
unkown
page readonly
C89C000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
7FF5ED97E000
unkown
page readonly
8D50000
unkown
page read and write
1360000
unkown
page read and write
6BA000
heap
page read and write
87D0000
unkown
page read and write
7FFE000
stack
page read and write
9B3000
heap
page read and write
93C0000
unkown
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
A4B8000
unkown
page read and write
3027000
heap
page read and write
93C0000
unkown
page read and write
93BE000
stack
page read and write
3020000
unkown
page read and write
36D3000
stack
page read and write
2C71000
trusted library allocation
page read and write
93C0000
unkown
page read and write
1E27A000
heap
page read and write
2D35000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
324E000
stack
page read and write
3410000
unkown
page read and write
785F000
unkown
page read and write
379E000
unkown
page read and write
87D0000
unkown
page read and write
2C91000
trusted library allocation
page read and write
37B0000
unkown
page read and write
790000
heap
page read and write
97C3000
unkown
page read and write
91C0000
unkown
page read and write
1350000
unkown
page read and write
A34000
heap
page read and write
1340000
unkown
page read and write
87D0000
unkown
page read and write
6B6000
heap
page read and write
A2B000
heap
page read and write
87D0000
unkown
page read and write
7FF5ED844000
unkown
page readonly
B19000
heap
page read and write
9FA000
heap
page read and write
87D0000
unkown
page read and write
A27000
heap
page read and write
6D0CD000
unkown
page readonly
A3E000
heap
page read and write
42D000
unkown
page read and write
6BA000
heap
page read and write
C50A000
unkown
page read and write
9A9000
heap
page read and write
87D0000
unkown
page read and write
7B80000
unkown
page read and write
CA20000
unkown
page read and write
3020000
unkown
page read and write
1370000
unkown
page read and write
37D2000
unkown
page read and write
87D0000
unkown
page read and write
93C0000
unkown
page read and write
1350000
unkown
page read and write
6B6000
heap
page read and write
87D0000
unkown
page read and write
C6C9000
unkown
page read and write
AAF2000
unkown
page read and write
7FF5ED519000
unkown
page readonly
2CA4000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
7FF5ED81B000
unkown
page readonly
2C89000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
A4C000
heap
page read and write
1350000
unkown
page read and write
7E70000
unkown
page read and write
37BD000
unkown
page read and write
8EF0000
unkown
page read and write
8D60000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
557000
heap
page read and write
3410000
unkown
page read and write
9977000
unkown
page read and write
958000
heap
page read and write
7FF5ED64F000
unkown
page readonly
CB82000
unkown
page read and write
2C7C000
trusted library allocation
page read and write
1350000
unkown
page read and write
7FF5ED409000
unkown
page readonly
8810000
unkown
page read and write
2E3E000
heap
page read and write
9F3000
heap
page read and write
13BC000
stack
page read and write
FDD1000
unkown
page read and write
1350000
unkown
page read and write
2D75000
trusted library allocation
page read and write
2F8F000
stack
page read and write
64B000
heap
page read and write
78AD000
unkown
page read and write
2D05000
trusted library allocation
page read and write
7FF5ED433000
unkown
page readonly
7FF5ED695000
unkown
page readonly
2CA8000
trusted library allocation
page read and write
93C0000
unkown
page read and write
B04000
heap
page read and write
2D25000
trusted library allocation
page read and write
98D000
heap
page read and write
3020000
unkown
page read and write
1340000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
87D0000
unkown
page read and write
4120000
direct allocation
page execute and read and write
2DA4000
heap
page read and write
3410000
unkown
page read and write
7FF5ED6A5000
unkown
page readonly
3791000
unkown
page read and write
6BE000
heap
page read and write
2CF0000
heap
page read and write
2CCC000
trusted library allocation
page read and write
97D000
heap
page read and write
557000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
3410000
unkown
page read and write
2CA2000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
1350000
unkown
page read and write
401000
unkown
page execute read
1360000
unkown
page read and write
2270000
direct allocation
page execute and read and write
2D08000
trusted library allocation
page read and write
9883000
unkown
page read and write
FDEA000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED337000
unkown
page readonly
88F000
stack
page read and write
20152000
heap
page read and write
1500000
heap
page read and write
32B0000
heap
page read and write
1370000
unkown
page read and write
93C0000
unkown
page read and write
3410000
unkown
page read and write
1390000
unkown
page read and write
7FF5ED476000
unkown
page readonly
7FF5ED65C000
unkown
page readonly
2E30000
heap
page read and write
2CD7000
trusted library allocation
page read and write
1B480000
heap
page read and write
1370000
unkown
page read and write
A52000
heap
page read and write
2C95000
trusted library allocation
page read and write
7FF5ED48A000
unkown
page readonly
8EF0000
unkown
page read and write
7CC0000
unkown
page readonly
5CA000
heap
page read and write
941A000
heap
page read and write
7FF5ED1D6000
unkown
page readonly
16B0D000
stack
page read and write
7CD0000
unkown
page read and write
99E000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
1370000
unkown
page read and write
1340000
stack
page read and write
2C80000
trusted library allocation
page read and write
A4FC000
unkown
page read and write
8810000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
56C3000
unkown
page read and write
2C94000
trusted library allocation
page read and write
2130000
heap
page read and write
1350000
unkown
page read and write
1DBC0000
direct allocation
page execute and read and write
97D000
heap
page read and write
1370000
unkown
page read and write
557000
heap
page read and write
9AE0000
unkown
page read and write
3020000
unkown
page read and write
9412000
heap
page read and write
7FF5ED52F000
unkown
page readonly
87D0000
unkown
page read and write
C811000
unkown
page read and write
A59000
heap
page read and write
2CCC000
trusted library allocation
page read and write
7FF5ED937000
unkown
page readonly
1370000
unkown
page read and write
9FB000
heap
page read and write
1370000
unkown
page read and write
A433000
unkown
page read and write
3410000
unkown
page read and write
87D0000
unkown
page read and write
60B000
remote allocation
page execute and read and write
989000
heap
page read and write
A4E000
heap
page read and write
1350000
unkown
page read and write
555000
heap
page read and write
97D000
heap
page read and write
2CCD000
trusted library allocation
page read and write
401000
unkown
page execute read
87D0000
unkown
page read and write
310E000
stack
page read and write
8810000
unkown
page read and write
1370000
unkown
page read and write
1360000
unkown
page read and write
1340000
unkown
page read and write
93C0000
unkown
page read and write
2C7C000
trusted library allocation
page read and write
A4D000
heap
page read and write
2C9E000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
93C0000
unkown
page read and write
3410000
unkown
page read and write
3410000
unkown
page read and write
9A9000
heap
page read and write
87D0000
unkown
page read and write
7FF5ED6B9000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
2CCD000
trusted library allocation
page read and write
7FF5ED669000
unkown
page readonly
720000
heap
page read and write
93C0000
unkown
page read and write
2C75000
trusted library allocation
page read and write
20170000
heap
page read and write
6B1000
heap
page read and write
F633000
unkown
page read and write
A33000
heap
page read and write
3020000
unkown
page read and write
1370000
unkown
page read and write
400000
unkown
page readonly
3020000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
48D0000
direct allocation
page read and write
A21000
heap
page read and write
1370000
unkown
page read and write
989000
heap
page read and write
7FF5ED793000
unkown
page readonly
1340000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED864000
unkown
page readonly
400000
unkown
page execute and read and write
6B5000
heap
page read and write
8EF0000
unkown
page read and write
A2B000
heap
page read and write
3050000
unkown
page read and write
B170000
unkown
page readonly
1380000
unkown
page read and write
C6CF000
unkown
page read and write
4BDC000
unkown
page read and write
418000
unkown
page write copy
9871000
unkown
page read and write
2C91000
trusted library allocation
page read and write
87D0000
unkown
page read and write
1370000
unkown
page read and write
E76A000
unkown
page read and write
7FF5ED342000
unkown
page readonly
7FF5ED9C6000
unkown
page readonly
7FF5ED750000
unkown
page readonly
9F7000
heap
page read and write
A361000
unkown
page read and write
1DA40000
trusted library allocation
page read and write
3020000
unkown
page read and write
BDA0000
unkown
page readonly
87D0000
unkown
page read and write
87D0000
unkown
page read and write
AAD1000
unkown
page read and write
87D0000
unkown
page read and write
6BB000
heap
page read and write
1340000
unkown
page read and write
1350000
unkown
page read and write
7C0000
heap
page read and write
1360000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
87D0000
unkown
page read and write
2C8C000
trusted library allocation
page read and write
1360000
unkown
page read and write
3050000
unkown
page read and write
B6A0000
heap
page read and write
87D0000
unkown
page read and write
1370000
unkown
page read and write
3410000
unkown
page read and write
993000
heap
page read and write
896B000
stack
page read and write
48F0000
heap
page read and write
2130000
direct allocation
page read and write
8EF0000
unkown
page read and write
87D0000
unkown
page read and write
212F000
stack
page read and write
7FF5ED534000
unkown
page readonly
7FF5ED4BB000
unkown
page readonly
7FF5ED928000
unkown
page readonly
A63000
heap
page read and write
9D64000
unkown
page read and write
7FF5ED5A8000
unkown
page readonly
3410000
unkown
page read and write
8810000
unkown
page read and write
9879000
unkown
page read and write
A56000
heap
page read and write
7FF5EDA47000
unkown
page readonly
401000
unkown
page execute read
1380000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
1350000
unkown
page read and write
13B0000
unkown
page read and write
1370000
unkown
page read and write
A502000
unkown
page read and write
1350000
unkown
page read and write
971000
heap
page read and write
87D0000
unkown
page read and write
4C18000
unkown
page read and write
42D000
unkown
page read and write
2C8C000
trusted library allocation
page read and write
9B40000
heap
page read and write
8FB9000
stack
page read and write
8EF0000
unkown
page read and write
2CA5000
trusted library allocation
page read and write
3020000
unkown
page read and write
2C94000
trusted library allocation
page read and write
9E5000
heap
page read and write
2D70000
direct allocation
page execute and read and write
7FF5ED3D6000
unkown
page readonly
1DBC1000
direct allocation
page execute read
400000
unkown
page readonly
1DAC1000
heap
page read and write
93C0000
unkown
page read and write
93C0000
unkown
page read and write
97A9000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
3410000
unkown
page read and write
1350000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
2C80000
trusted library allocation
page read and write
C5A0000
unkown
page read and write
2CD5000
trusted library allocation
page read and write
3410000
unkown
page read and write
8810000
unkown
page read and write
4B4000
unkown
page readonly
3410000
unkown
page read and write
2D26000
trusted library allocation
page read and write
1370000
unkown
page read and write
3020000
unkown
page read and write
6BC000
heap
page read and write
4C1E000
unkown
page read and write
983000
heap
page read and write
1350000
unkown
page read and write
2C91000
trusted library allocation
page read and write
3020000
unkown
page read and write
1380000
unkown
page read and write
3758000
unkown
page read and write
1370000
unkown
page read and write
1340000
unkown
page read and write
A4A000
heap
page read and write
8810000
unkown
page read and write
A51000
heap
page read and write
2C94000
trusted library allocation
page read and write
A3E000
heap
page read and write
93C0000
unkown
page read and write
AF0C000
stack
page read and write
2E4B000
heap
page execute and read and write
245D000
stack
page read and write
7FF5ED77E000
unkown
page readonly
93C0000
unkown
page read and write
2CA7000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
9BE000
heap
page read and write
1480000
heap
page read and write
5641000
unkown
page read and write
3410000
unkown
page read and write
1350000
unkown
page read and write
49B000
unkown
page readonly
8EF0000
unkown
page read and write
48C000
unkown
page read and write
93C0000
unkown
page read and write
7FF5ED660000
unkown
page readonly
E76A000
unkown
page read and write
7FF5ED779000
unkown
page readonly
492000
unkown
page write copy
2C8E000
trusted library allocation
page read and write
87D0000
unkown
page read and write
1F0000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
3020000
unkown
page read and write
3410000
unkown
page read and write
2B1F000
stack
page read and write
2CB7000
trusted library allocation
page read and write
91C0000
unkown
page read and write
412000
unkown
page readonly
8D60000
unkown
page read and write
4940000
heap
page read and write
3340000
heap
page read and write
1350000
unkown
page read and write
A51000
heap
page read and write
3020000
unkown
page read and write
4CB0000
unkown
page read and write
89E0000
unkown
page read and write
1350000
unkown
page read and write
1350000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
1390000
unkown
page read and write
8A6E000
stack
page read and write
1B484000
heap
page read and write
2C8D000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
A479000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
79FB000
unkown
page read and write
1350000
unkown
page read and write
3410000
unkown
page read and write
4C50000
unkown
page read and write
E76A000
unkown
page read and write
87D0000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
2C80000
trusted library allocation
page read and write
7FF5ED503000
unkown
page readonly
37A0000
unkown
page read and write
2CA8000
trusted library allocation
page read and write
C6C1000
unkown
page read and write
A41000
heap
page read and write
3410000
unkown
page read and write
4C34000
unkown
page read and write
3410000
unkown
page read and write
2C81000
trusted library allocation
page read and write
1350000
unkown
page read and write
1340000
unkown
page read and write
2CAC000
trusted library allocation
page read and write
4B31000
heap
page read and write
3410000
unkown
page read and write
3020000
unkown
page read and write
E76A000
unkown
page read and write
9C0000
heap
page read and write
9FA000
heap
page read and write
3020000
unkown
page read and write
9BE000
heap
page read and write
982D000
unkown
page read and write
B8C0000
unkown
page readonly
198000
stack
page read and write
4B50000
unkown
page read and write
9A5000
heap
page read and write
4B93000
unkown
page read and write
7695000
stack
page read and write
6CA90000
unkown
page readonly
7F5000
heap
page read and write
B8B0000
unkown
page read and write
1360000
unkown
page read and write
93C0000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
87D0000
unkown
page read and write
1390000
unkown
page read and write
1350000
unkown
page read and write
649000
heap
page read and write
FDBE000
stack
page read and write
A323000
unkown
page read and write
192000
stack
page read and write
977A000
unkown
page read and write
1350000
unkown
page read and write
2C94000
trusted library allocation
page read and write
76A0000
unkown
page read and write
3050000
unkown
page read and write
7FF5ED670000
unkown
page readonly
1360000
unkown
page read and write
7FF5ED714000
unkown
page readonly
2C80000
trusted library allocation
page read and write
1340000
unkown
page read and write
2CF4000
heap
page read and write
9ADB000
stack
page read and write
9F1E000
stack
page read and write
1350000
unkown
page read and write
7FF5ED445000
unkown
page readonly
1340000
unkown
page read and write
1468C000
stack
page read and write
410000
unkown
page readonly
1350000
unkown
page read and write
8EF0000
unkown
page read and write
A58000
heap
page read and write
2C9C000
trusted library allocation
page read and write
93C0000
unkown
page read and write
1350000
unkown
page read and write
666000
heap
page read and write
9893000
unkown
page read and write
2CA3000
trusted library allocation
page read and write
3410000
unkown
page read and write
C4A0000
unkown
page read and write
3410000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
1DE02000
direct allocation
page read and write
A22000
heap
page read and write
3700000
unkown
page read and write
37F2000
unkown
page read and write
2D05000
trusted library allocation
page read and write
2E84000
heap
page read and write
2000B000
heap
page read and write
11B0000
unkown
page readonly
87D0000
unkown
page read and write
C10A000
stack
page read and write
1350000
unkown
page read and write
4C8A000
unkown
page read and write
1DDD8000
direct allocation
page readonly
F67B000
unkown
page read and write
18A0000
unkown
page readonly
7E70000
unkown
page read and write
975000
heap
page read and write
1360000
unkown
page read and write
7FF5ED692000
unkown
page readonly
C846000
unkown
page read and write
7847000
unkown
page read and write
978E000
unkown
page read and write
4AC000
unkown
page write copy
4CC0000
unkown
page read and write
CB89000
unkown
page read and write
2C76000
trusted library allocation
page read and write
A2B000
heap
page read and write
2C8E000
trusted library allocation
page read and write
3020000
unkown
page read and write
6B6000
heap
page read and write
979C000
unkown
page read and write
7CE0000
unkown
page read and write
7863000
unkown
page read and write
97D000
heap
page read and write
3020000
unkown
page read and write
93C0000
unkown
page read and write
A11F000
stack
page read and write
D93E000
stack
page read and write
2E41000
heap
page read and write
C893000
unkown
page read and write
87D0000
unkown
page read and write
2CAA000
trusted library allocation
page read and write
8EE000
heap
page read and write
2C80000
trusted library allocation
page read and write
1350000
unkown
page read and write
1340000
unkown
page read and write
A37000
heap
page read and write
2190000
remote allocation
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
1E22D000
heap
page read and write
2CA9000
trusted library allocation
page read and write
300E000
stack
page read and write
1360000
unkown
page read and write
7FF5ED507000
unkown
page readonly
AB39000
unkown
page read and write
A34000
heap
page read and write
4C40000
heap
page read and write
7FF5ED93E000
unkown
page readonly
F6F4000
unkown
page read and write
7FF5ED810000
unkown
page readonly
1360000
unkown
page read and write
2E2B000
heap
page execute and read and write
87D0000
unkown
page read and write
8E0000
heap
page read and write
A36000
heap
page read and write
1350000
unkown
page read and write
6B1000
heap
page read and write
3410000
unkown
page read and write
7FF5ED5F7000
unkown
page readonly
3410000
unkown
page read and write
32FB000
trusted library allocation
page read and write
3020000
unkown
page read and write
9C000
stack
page read and write
3738000
unkown
page read and write
87D0000
unkown
page read and write
1360000
unkown
page read and write
7FF5EDA69000
unkown
page readonly
1360000
unkown
page read and write
A2B000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
C6F4000
unkown
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
AF90000
unkown
page read and write
7FF5ED68C000
unkown
page readonly
7FF5ED4B0000
unkown
page readonly
7F7000
heap
page read and write
3210000
unkown
page read and write
7FF5ED73D000
unkown
page readonly
87D0000
unkown
page read and write
418000
unkown
page write copy
7FF5ED4F3000
unkown
page readonly
C6E3000
unkown
page read and write
3020000
unkown
page read and write
95D000
heap
page read and write
89C0000
unkown
page read and write
8EF0000
unkown
page read and write
A2B000
heap
page read and write
1340000
unkown
page read and write
18FF0000
remote allocation
page read and write
3410000
unkown
page read and write
4BE1000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
1350000
unkown
page read and write
A28000
heap
page read and write
87D0000
unkown
page read and write
18FF0000
remote allocation
page read and write
16B5E000
stack
page read and write
419000
unkown
page write copy
3795000
unkown
page read and write
7FF5ED7FD000
unkown
page readonly
1350000
unkown
page read and write
7FF5ED92C000
unkown
page readonly
3410000
unkown
page read and write
9A5000
heap
page read and write
93C0000
unkown
page read and write
2C91000
trusted library allocation
page read and write
3020000
unkown
page read and write
96DF000
unkown
page read and write
2C9E000
trusted library allocation
page read and write
7FF5ED349000
unkown
page readonly
7FF5ED87D000
unkown
page readonly
36D5000
stack
page read and write
9B000
stack
page read and write
2C8D000
trusted library allocation
page read and write
2D70000
heap
page read and write
7FF5ED986000
unkown
page readonly
20012000
heap
page read and write
76C0000
unkown
page read and write
3410000
unkown
page read and write
3020000
unkown
page read and write
318C000
stack
page read and write
2C89000
unkown
page read and write
A59000
heap
page read and write
A37D000
unkown
page read and write
2CDC000
trusted library allocation
page read and write
2C76000
trusted library allocation
page read and write
7FF5ED28E000
unkown
page readonly
9C6000
heap
page read and write
2CC8000
trusted library allocation
page read and write
6BA000
heap
page read and write
9D9000
heap
page read and write
A3E000
heap
page read and write
3410000
unkown
page read and write
A4B000
heap
page read and write
99E000
heap
page read and write
9A5000
heap
page read and write
3020000
unkown
page read and write
378E000
stack
page read and write
2DCC000
trusted library allocation
page read and write
1350000
unkown
page read and write
2CA7000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
1B4F9000
heap
page read and write
A63000
heap
page read and write
8208000
stack
page read and write
87D0000
unkown
page read and write
A310000
unkown
page read and write
6BE000
heap
page read and write
797D000
unkown
page read and write
7FF5ED975000
unkown
page readonly
7DF4F3041000
unkown
page execute read
97D000
heap
page read and write
2C8C000
unkown
page readonly
2C9E000
trusted library allocation
page read and write
A3D000
heap
page read and write
9EF000
heap
page read and write
8810000
unkown
page read and write
7FF5ED9C8000
unkown
page readonly
2CD5000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
906E000
stack
page read and write
2C7E000
trusted library allocation
page read and write
9AE000
stack
page read and write
A3B000
heap
page read and write
BDC0000
unkown
page readonly
2C71000
trusted library allocation
page read and write
87D0000
unkown
page read and write
79B1000
unkown
page read and write
2CCF000
trusted library allocation
page read and write
FDE0000
unkown
page read and write
93C0000
unkown
page read and write
3410000
unkown
page read and write
C54A000
unkown
page read and write
C512000
unkown
page read and write
18FF0000
remote allocation
page read and write
A22000
heap
page read and write
1340000
unkown
page read and write
2EAE000
stack
page read and write
7DF4F3051000
unkown
page execute read
8EF0000
unkown
page read and write
1DE0D000
direct allocation
page readonly
2CF4000
trusted library allocation
page read and write
7DF4F3040000
unkown
page readonly
A28000
heap
page read and write
3020000
heap
page read and write
6B1000
heap
page read and write
69A000
heap
page read and write
C964000
unkown
page read and write
9A1000
heap
page read and write
2E4C000
trusted library allocation
page read and write
1360000
unkown
page read and write
400000
unkown
page readonly
2CA4000
trusted library allocation
page read and write
93C0000
unkown
page read and write
8810000
unkown
page read and write
95DA000
stack
page read and write
3410000
unkown
page read and write
1350000
unkown
page read and write
FDE4000
unkown
page read and write
87D0000
unkown
page read and write
4B30000
heap
page read and write
1350000
unkown
page read and write
8BE000
stack
page read and write
4B8B000
unkown
page read and write
1390000
unkown
page read and write
9AA000
heap
page read and write
3410000
unkown
page read and write
91C0000
unkown
page read and write
4A0000
heap
page read and write
418000
unkown
page write copy
A4C000
heap
page read and write
A21000
heap
page read and write
9660000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
1350000
unkown
page read and write
3410000
unkown
page read and write
1370000
unkown
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
7FF5ED849000
unkown
page readonly
1DAC0000
heap
page read and write
2CBB000
trusted library allocation
page read and write
7FF5ED7C4000
unkown
page readonly
1340000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
8000000
unkown
page read and write
A494000
unkown
page read and write
1390000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
3410000
unkown
page read and write
99E000
heap
page read and write
2C97000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
989000
heap
page read and write
93C0000
unkown
page read and write
A23000
heap
page read and write
A2C000
heap
page read and write
37F9000
unkown
page read and write
8EF0000
unkown
page read and write
7FF5ED71E000
unkown
page readonly
308A000
stack
page read and write
40B000
unkown
page execute read
A3BE000
unkown
page read and write
87D0000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
3020000
unkown
page read and write
C51E000
unkown
page read and write
F676000
unkown
page read and write
93C0000
unkown
page read and write
B82A000
stack
page read and write
B8AB000
stack
page read and write
3659000
stack
page read and write
F6B4000
unkown
page read and write
91C0000
unkown
page read and write
1370000
unkown
page read and write
1370000
unkown
page read and write
3410000
unkown
page read and write
1440000
unkown
page read and write
1350000
unkown
page read and write
3410000
unkown
page read and write
2CBD000
trusted library allocation
page read and write
AF8D000
stack
page read and write
87D0000
unkown
page read and write
7FF5ED412000
unkown
page readonly
93C0000
unkown
page read and write
93C0000
unkown
page read and write
3020000
unkown
page read and write
A58000
heap
page read and write
1390000
unkown
page read and write
7FF5ED7DB000
unkown
page readonly
37AC000
unkown
page read and write
2D90000
direct allocation
page execute and read and write
35A0000
unkown
page readonly
93C0000
unkown
page read and write
9A2000
heap
page read and write
A2B000
heap
page read and write
A41000
heap
page read and write
A3E000
heap
page read and write
3020000
unkown
page read and write
1350000
unkown
page read and write
8810000
unkown
page read and write
400000
unkown
page readonly
3020000
unkown
page read and write
6BE000
heap
page read and write
A51000
heap
page read and write
A33E000
unkown
page read and write
7FF5ED4DF000
unkown
page readonly
AB5B000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
557000
heap
page read and write
7FF5ED1FC000
unkown
page readonly
A28000
heap
page read and write
312F000
stack
page read and write
A3A000
heap
page read and write
1370000
unkown
page read and write
993000
heap
page read and write
2FC0000
heap
page read and write
AAF000
stack
page read and write
3020000
unkown
page read and write
20219000
heap
page read and write
3410000
unkown
page read and write
BC9B000
stack
page read and write
2C76000
trusted library allocation
page read and write
3020000
unkown
page read and write
2D35000
trusted library allocation
page read and write
C6F2000
unkown
page read and write
9BE000
heap
page read and write
2C89000
unkown
page read and write
7FF5ED26E000
unkown
page readonly
996000
heap
page read and write
A32A000
unkown
page read and write
2CD3000
trusted library allocation
page read and write
3020000
unkown
page read and write
A375000
unkown
page read and write
1360000
unkown
page read and write
2CFD000
trusted library allocation
page read and write
3050000
unkown
page read and write
2C91000
trusted library allocation
page read and write
9B3000
heap
page read and write
A28000
heap
page read and write
9F3000
heap
page read and write
9FF000
heap
page read and write
96F000
stack
page read and write
3410000
unkown
page read and write
7DF4F3030000
unkown
page readonly
7FF5ED2A9000
unkown
page readonly
3410000
unkown
page read and write
1350000
unkown
page read and write
7FF5ED33F000
unkown
page readonly
A3F000
heap
page read and write
1350000
unkown
page read and write
680000
heap
page read and write
93C0000
unkown
page read and write
2B6E000
stack
page read and write
7FF5ED847000
unkown
page readonly
1350000
unkown
page read and write
7869000
unkown
page read and write
A4A1000
unkown
page read and write
6BB000
heap
page read and write
9F0000
heap
page read and write
7FF5ED68F000
unkown
page readonly
300F000
stack
page read and write
C544000
unkown
page read and write
2C9D000
trusted library allocation
page read and write
A21000
heap
page read and write
7DF4F3031000
unkown
page execute read
A50B000
unkown
page read and write
3020000
unkown
page read and write
7E11000
unkown
page read and write
3020000
unkown
page read and write
1350000
unkown
page read and write
7FF5ED9AE000
unkown
page readonly
A49E000
unkown
page read and write
1DF30000
trusted library allocation
page read and write
2CD5000
trusted library allocation
page read and write
1350000
unkown
page read and write
2C80000
trusted library allocation
page read and write
1390000
unkown
page read and write
2C8A000
trusted library allocation
page read and write
1360000
unkown
page read and write
4CE0000
unkown
page read and write
E842000
unkown
page read and write
87D0000
unkown
page read and write
AADB000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
2CD3000
trusted library allocation
page read and write
7FF5ED586000
unkown
page readonly
2C94000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
9A9000
heap
page read and write
6B1000
heap
page read and write
87D0000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED814000
unkown
page readonly
7FF5ED449000
unkown
page readonly
7FF5EDA76000
unkown
page readonly
7FF5ED806000
unkown
page readonly
1340000
unkown
page read and write
553000
remote allocation
page execute and read and write
E76A000
unkown
page read and write
2C8E000
trusted library allocation
page read and write
987B000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2C92000
trusted library allocation
page read and write
1350000
unkown
page read and write
9DED000
stack
page read and write
2E60000
heap
page read and write
980000
heap
page read and write
CBB3000
unkown
page read and write
8EF0000
unkown
page read and write
48E000
unkown
page readonly
14B0000
unkown
page readonly
9885000
unkown
page read and write
19C000
stack
page read and write
2C6E000
stack
page read and write
6B8000
heap
page read and write
2CCB000
trusted library allocation
page read and write
8810000
unkown
page read and write
93C0000
unkown
page read and write
9B60000
unkown
page readonly
1350000
unkown
page read and write
98C000
heap
page read and write
3797000
unkown
page read and write
A4B000
heap
page read and write
2D18000
trusted library allocation
page read and write
2DB0000
heap
page read and write
8EF0000
unkown
page read and write
2E80000
heap
page read and write
2DA0000
heap
page read and write
7FF5ED674000
unkown
page readonly
32FE000
stack
page read and write
987D000
unkown
page read and write
A28000
heap
page read and write
1350000
unkown
page read and write
2CB8000
trusted library allocation
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2CA8000
trusted library allocation
page read and write
1350000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
400000
unkown
page execute and read and write
1E4DC000
stack
page read and write
87D0000
unkown
page read and write
1370000
unkown
page read and write
2CA9000
trusted library allocation
page read and write
3410000
unkown
page read and write
3410000
unkown
page read and write
A4E000
heap
page read and write
7FF5ED59E000
unkown
page readonly
7DF4F3071000
unkown
page execute read
953000
heap
page read and write
2CD5000
trusted library allocation
page read and write
7FF5ED3A7000
unkown
page readonly
7E70000
unkown
page read and write
9A9000
heap
page read and write
B640000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
610000
heap
page read and write
1360000
unkown
page read and write
87D0000
unkown
page read and write
2C94000
trusted library allocation
page read and write
8810000
unkown
page read and write
1370000
unkown
page read and write
3410000
unkown
page read and write
8D50000
unkown
page read and write
2C76000
trusted library allocation
page read and write
32A0000
heap
page read and write
6B2000
heap
page read and write
CA42000
unkown
page read and write
87D0000
unkown
page read and write
97F000
heap
page read and write
993000
heap
page read and write
87D0000
unkown
page read and write
3020000
unkown
page read and write
E762000
unkown
page read and write
7F7000
heap
page read and write
2CA0000
trusted library allocation
page read and write
3020000
unkown
page read and write
1370000
unkown
page read and write
3020000
unkown
page read and write
37AE000
unkown
page read and write
4A80000
heap
page read and write
2E00000
unclassified section
page read and write
CA7C000
unkown
page read and write
255F000
stack
page read and write
93C0000
unkown
page read and write
3020000
unkown
page read and write
93C0000
unkown
page read and write
18E000
stack
page read and write
1E223000
heap
page read and write
7FF5EDA53000
unkown
page readonly
A2B000
heap
page read and write
1360000
unkown
page read and write
93C0000
unkown
page read and write
A59000
heap
page read and write
3410000
unkown
page read and write
2C71000
trusted library allocation
page read and write
1350000
unkown
page read and write
1340000
unkown
page read and write
87D0000
unkown
page read and write
1350000
unkown
page read and write
3044000
heap
page read and write
1DAC1000
heap
page read and write
C08A000
stack
page read and write
3410000
unkown
page read and write
87D0000
unkown
page read and write
2C71000
trusted library allocation
page read and write
996000
heap
page read and write
9550000
unkown
page readonly
2C9F000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
1370000
unkown
page read and write
2CA5000
trusted library allocation
page read and write
7950000
unkown
page read and write
3410000
unkown
page read and write
1340000
unkown
page read and write
3020000
unkown
page read and write
2C9C000
trusted library allocation
page read and write
2670000
heap
page read and write
1360000
unkown
page read and write
1350000
unkown
page read and write
52B000
remote allocation
page execute and read and write
989000
heap
page read and write
2CCD000
trusted library allocation
page read and write
2D80000
direct allocation
page read and write
1350000
unkown
page read and write
2C89000
trusted library allocation
page read and write
87D0000
unkown
page read and write
1370000
unkown
page read and write
7FF5ED279000
unkown
page readonly
9A2000
heap
page read and write
7FF5ED8E2000
unkown
page readonly
87D0000
unkown
page read and write
E76A000
unkown
page read and write
87D0000
unkown
page read and write
7FF5ED956000
unkown
page readonly
1230000
unkown
page read and write
87D0000
unkown
page read and write
7E60000
unkown
page read and write
E76A000
unkown
page read and write
333F000
stack
page read and write
1224C000
stack
page read and write
C6F8000
unkown
page read and write
1B50A000
heap
page read and write
4BE3000
unkown
page read and write
3020000
unkown
page read and write
8810000
unkown
page read and write
3410000
unkown
page read and write
93C0000
unkown
page read and write
C700000
unkown
page read and write
2CB7000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
2C8F000
trusted library allocation
page read and write
93C0000
unkown
page read and write
1E270000
heap
page read and write
6A9000
heap
page read and write
91C0000
unkown
page read and write
2C80000
trusted library allocation
page read and write
5557000
stack
page read and write
4CD0000
unkown
page read and write
190000
stack
page read and write
87D0000
unkown
page read and write
3380000
heap
page read and write
438000
remote allocation
page execute and read and write
AA90000
unkown
page read and write
E76A000
unkown
page read and write
87D0000
unkown
page read and write
8810000
unkown
page read and write
7FF5ED818000
unkown
page readonly
2CA6000
trusted library allocation
page read and write
1350000
unkown
page read and write
759F000
stack
page read and write
A28000
heap
page read and write
3020000
unkown
page read and write
2C80000
trusted library allocation
page read and write
93C0000
unkown
page read and write
40B000
unkown
page execute read
BAF9000
stack
page read and write
A27000
heap
page read and write
7FF5ED50A000
unkown
page readonly
4B78000
unkown
page read and write
2E31C000
stack
page read and write
1E231000
heap
page read and write
52E000
remote allocation
page execute and read and write
2C71000
trusted library allocation
page read and write
3020000
unkown
page read and write
7FF5ED735000
unkown
page readonly
7F30000
unkown
page read and write
818D000
stack
page read and write
AEF000
heap
page read and write
2C74000
trusted library allocation
page read and write
9FC000
heap
page read and write
A27000
heap
page read and write
87D0000
unkown
page read and write
3410000
unkown
page read and write
93C0000
unkown
page read and write
FDEC000
unkown
page read and write
401000
unkown
page execute read
2D08000
trusted library allocation
page read and write
3410000
unkown
page read and write
A28000
heap
page read and write
7D53000
unkown
page read and write
32E0000
heap
page read and write
7FF5EDA31000
unkown
page readonly
259E000
stack
page read and write
A0D000
heap
page read and write
7E70000
unkown
page read and write
A59000
heap
page read and write
3020000
unkown
page read and write
7DF4F3061000
unkown
page execute read
2C91000
trusted library allocation
page read and write
A4A000
heap
page read and write
3410000
unkown
page read and write
91C0000
unkown
page read and write
1340000
unkown
page read and write
1360000
unkown
page read and write
9FA000
heap
page read and write
7FF5ED990000
unkown
page readonly
400000
unkown
page readonly
7FF5ED644000
unkown
page readonly
800000
heap
page read and write
1360000
unkown
page read and write
A4AB000
unkown
page read and write
1F0000
heap
page read and write
1350000
unkown
page read and write
6B0000
heap
page read and write
7FF5ED516000
unkown
page readonly
2CA4000
trusted library allocation
page read and write
7F40000
unkown
page readonly
7C80000
unkown
page read and write
1350000
unkown
page read and write
A27000
heap
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2CB1000
trusted library allocation
page read and write
218D000
stack
page read and write
93C0000
unkown
page read and write
8810000
unkown
page read and write
2C79000
trusted library allocation
page read and write
2190000
remote allocation
page read and write
93C0000
unkown
page read and write
A63000
heap
page read and write
C92D000
unkown
page read and write
7E50000
unkown
page readonly
7857000
unkown
page read and write
A4E000
heap
page read and write
C6D8000
unkown
page read and write
7FF5ED942000
unkown
page readonly
7E70000
unkown
page read and write
9877000
unkown
page read and write
4D1F000
stack
page read and write
7FF5ED418000
unkown
page readonly
93C0000
unkown
page read and write
2C70000
trusted library allocation
page read and write
E763000
unkown
page read and write
2C87000
trusted library allocation
page read and write
2DF0000
direct allocation
page read and write
37F6000
unkown
page read and write
8810000
unkown
page read and write
2C91000
trusted library allocation
page read and write
A04000
heap
page read and write
3410000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
9815000
unkown
page read and write
1350000
unkown
page read and write
8810000
unkown
page read and write
410000
unkown
page readonly
2CAC000
trusted library allocation
page read and write
8810000
unkown
page read and write
3020000
unkown
page read and write
8810000
unkown
page read and write
97B5000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
9B3000
heap
page read and write
7FF5ED743000
unkown
page readonly
7FF5ED41C000
unkown
page readonly
87D0000
unkown
page read and write
2C8F000
trusted library allocation
page read and write
6CC6E000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
7FF5ED9D2000
unkown
page readonly
7FF5ED755000
unkown
page readonly
78A0000
unkown
page read and write
93C0000
unkown
page read and write
BD98000
stack
page read and write
8D3B000
stack
page read and write
557000
heap
page read and write
98C000
heap
page read and write
7FF5ED40D000
unkown
page readonly
7867000
unkown
page read and write
8D60000
unkown
page read and write
1505000
heap
page read and write
269F000
stack
page read and write
2CC4000
trusted library allocation
page read and write
1350000
unkown
page read and write
2CB1000
trusted library allocation
page read and write
3020000
unkown
page read and write
2CCD000
trusted library allocation
page read and write
AF90000
stack
page read and write
87D0000
unkown
page read and write
6BC000
heap
page read and write
9A10000
unkown
page read and write
1370000
unkown
page read and write
A28000
heap
page read and write
2CAA000
trusted library allocation
page read and write
CAA6000
unkown
page read and write
A2B000
heap
page read and write
93C0000
unkown
page read and write
98E000
heap
page read and write
A5B000
heap
page read and write
3020000
unkown
page read and write
E76A000
unkown
page read and write
2C8C000
trusted library allocation
page read and write
63F000
remote allocation
page execute and read and write
2C91000
trusted library allocation
page read and write
5CE000
heap
page read and write
9FA000
heap
page read and write
3410000
unkown
page read and write
8210000
unkown
page read and write
976000
heap
page read and write
2CC4000
trusted library allocation
page read and write
A59000
heap
page read and write
4A60000
heap
page read and write
3410000
unkown
page read and write
3020000
unkown
page read and write
7E70000
unkown
page read and write
1360000
unkown
page read and write
1340000
unkown
page read and write
19D000
stack
page read and write
7FF5ED91A000
unkown
page readonly
6BA000
heap
page read and write
2CB1000
trusted library allocation
page read and write
A4C000
heap
page read and write
3756000
unkown
page read and write
9A5000
heap
page read and write
4C4B000
unkown
page read and write
3410000
unkown
page read and write
1DAB0000
heap
page read and write
1370000
unkown
page read and write
7FF5ED71B000
unkown
page readonly
7FF5D1CCD000
unkown
page readonly
C49E000
stack
page read and write
8810000
unkown
page read and write
B00E000
stack
page read and write
7FF5ED4A1000
unkown
page readonly
2C89000
trusted library allocation
page read and write
1350000
unkown
page read and write
3410000
unkown
page read and write
87D0000
unkown
page read and write
8810000
unkown
page read and write
A58000
heap
page read and write
87D0000
unkown
page read and write
3410000
unkown
page read and write
923E000
stack
page read and write
3410000
unkown
page read and write
1370000
unkown
page read and write
A08000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
8D60000
unkown
page read and write
43C000
remote allocation
page execute and read and write
1E22B000
heap
page read and write
787C000
unkown
page read and write
7FF5ED39B000
unkown
page readonly
6CC6F000
unkown
page write copy
B22B000
stack
page read and write
3020000
unkown
page read and write
20217000
heap
page read and write
1340000
unkown
page read and write
2D71000
heap
page read and write
E76A000
unkown
page read and write
9410000
heap
page read and write
3410000
unkown
page read and write
1350000
unkown
page read and write
7E70000
unkown
page read and write
1350000
unkown
page read and write
7FF5ED295000
unkown
page readonly
A2E000
heap
page read and write
8BE9000
stack
page read and write
410000
unkown
page readonly
3410000
unkown
page read and write
A5B000
heap
page read and write
1370000
unkown
page read and write
8710000
unkown
page readonly
534000
remote allocation
page execute and read and write
1380000
unkown
page read and write
9869000
unkown
page read and write
3020000
unkown
page read and write
2C91000
trusted library allocation
page read and write
3410000
unkown
page read and write
1360000
unkown
page read and write
CB3D000
unkown
page read and write
1370000
unkown
page read and write
3410000
unkown
page read and write
1483000
heap
page read and write
33B6000
stack
page read and write
9C000
stack
page read and write
DE0000
unkown
page readonly
2C80000
trusted library allocation
page read and write
1360000
unkown
page read and write
3020000
unkown
page read and write
1350000
unkown
page read and write
2C89000
trusted library allocation
page read and write
1380000
unkown
page read and write
1340000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
C857000
unkown
page read and write
7884000
unkown
page read and write
496000
unkown
page write copy
7FF5ED4FD000
unkown
page readonly
8810000
unkown
page read and write
87D0000
unkown
page read and write
2DE0000
direct allocation
page execute and read and write
1370000
unkown
page read and write
2C8E000
trusted library allocation
page read and write
FDDD000
unkown
page read and write
8EF0000
unkown
page read and write
91C0000
unkown
page read and write
87D0000
unkown
page read and write
1340000
unkown
page read and write
91C0000
unkown
page read and write
3410000
unkown
page read and write
2D71000
heap
page read and write
2EE4000
trusted library allocation
page read and write
1F0000
heap
page read and write
9B3000
heap
page read and write
40B000
unkown
page execute read
2E1A000
heap
page read and write
400000
unkown
page execute and read and write
3D09000
trusted library allocation
page read and write
3020000
unkown
page read and write
401000
unkown
page execute read
48C0000
heap
page read and write
87D0000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
996000
heap
page read and write
91C0000
unkown
page read and write
34E9000
stack
page read and write
2C76000
trusted library allocation
page read and write
9F5000
heap
page read and write
2C7E000
trusted library allocation
page read and write
91C0000
unkown
page read and write
9795000
unkown
page read and write
A26000
heap
page read and write
3020000
stack
page read and write
1210000
unkown
page readonly
784A000
unkown
page read and write
1350000
unkown
page read and write
1DE0A000
direct allocation
page readonly
A34000
heap
page read and write
A59000
heap
page read and write
7FF5EDA2A000
unkown
page readonly
4B56000
unkown
page read and write
6D051000
unkown
page execute read
986F000
unkown
page read and write
2CED000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
7FF5ED8B4000
unkown
page readonly
7FF5ED495000
unkown
page readonly
3410000
unkown
page read and write
C561000
unkown
page read and write
42E000
remote allocation
page execute and read and write
2C9C000
trusted library allocation
page read and write
87BE000
stack
page read and write
4E10000
heap
page read and write
3020000
unkown
page read and write
8810000
unkown
page read and write
87D0000
unkown
page read and write
19C000
stack
page read and write
2C8C000
unkown
page readonly
3020000
unkown
page read and write
1350000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
88EE000
stack
page read and write
3050000
unkown
page read and write
C5A3000
unkown
page read and write
2D26000
trusted library allocation
page read and write
7FF5ED4C2000
unkown
page readonly
7DF4F3050000
unkown
page readonly
87D0000
unkown
page read and write
CA63000
unkown
page read and write
2C78000
trusted library allocation
page read and write
1DBC8000
direct allocation
page execute read
992000
heap
page read and write
785B000
unkown
page read and write
FD7F000
stack
page read and write
3410000
unkown
page read and write
2C9F000
trusted library allocation
page read and write
91B8000
stack
page read and write
DD0000
unkown
page readonly
2C91000
trusted library allocation
page read and write
560000
direct allocation
page execute and read and write
3410000
unkown
page read and write
87D0000
unkown
page read and write
7FF5ED980000
unkown
page readonly
1360000
unkown
page read and write
87D0000
unkown
page read and write
1390000
unkown
page read and write
2C8C000
unkown
page readonly
42D000
unkown
page read and write
1350000
unkown
page read and write
93C0000
unkown
page read and write
7FF5ED9CA000
unkown
page readonly
410000
unkown
page readonly
2DAC000
trusted library allocation
page read and write
1350000
unkown
page read and write
9FF000
heap
page read and write
2E2E000
stack
page read and write
1340000
unkown
page read and write
99E000
heap
page read and write
87D0000
unkown
page read and write
8EF0000
unkown
page read and write
2C8A000
trusted library allocation
page read and write
2CA0000
heap
page read and write
1370000
unkown
page read and write
3410000
unkown
page read and write
3441000
unkown
page read and write
E76A000
unkown
page read and write
410000
unkown
page readonly
2CC1000
trusted library allocation
page read and write
1370000
unkown
page read and write
23A0000
direct allocation
page read and write
557000
heap
page read and write
87D0000
unkown
page read and write
9A5000
heap
page read and write
4AF000
unkown
page write copy
21A0000
heap
page read and write
4BA6000
unkown
page read and write
2C89000
unkown
page read and write
1350000
unkown
page read and write
1F0000
heap
page read and write
93C0000
unkown
page read and write
9BE000
heap
page read and write
93C0000
unkown
page read and write
1DD26000
direct allocation
page execute read
91C0000
unkown
page read and write
C507000
unkown
page read and write
18F9E000
stack
page read and write
1DDCD000
direct allocation
page execute read
2CCE000
trusted library allocation
page read and write
A57000
heap
page read and write
87D0000
unkown
page read and write
A27000
heap
page read and write
87D0000
unkown
page read and write
98A8000
unkown
page read and write
B4BF000
stack
page read and write
7FF5ED9D6000
unkown
page readonly
A491000
unkown
page read and write
222E000
stack
page read and write
609000
heap
page read and write
3410000
unkown
page read and write
8EF0000
unkown
page read and write
A63000
heap
page read and write
87D0000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2C8E000
trusted library allocation
page read and write
6CC75000
unkown
page readonly
7FF5ED939000
unkown
page readonly
2D94000
trusted library allocation
page read and write
87D0000
unkown
page read and write
989000
heap
page read and write
1360000
unkown
page read and write
1370000
unkown
page read and write
7FF5ED850000
unkown
page readonly
3209000
stack
page read and write
3410000
unkown
page read and write
965C000
stack
page read and write
2CBC000
trusted library allocation
page read and write
9FF000
heap
page read and write
418000
unkown
page write copy
87D0000
unkown
page read and write
2E4E000
stack
page read and write
949000
heap
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
2C95000
trusted library allocation
page read and write
3800000
unkown
page readonly
7861000
unkown
page read and write
1340000
unkown
page read and write
A21000
heap
page read and write
2CB4000
trusted library allocation
page read and write
410000
unkown
page readonly
1350000
unkown
page read and write
87D0000
unkown
page read and write
A5A000
heap
page read and write
8EF0000
unkown
page read and write
87D0000
unkown
page read and write
2C8C000
unkown
page readonly
9875000
unkown
page read and write
1350000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2C89000
trusted library allocation
page read and write
1350000
unkown
page read and write
7900000
unkown
page read and write
C52C000
unkown
page read and write
7FF5ED2A4000
unkown
page readonly
1DE2F000
heap
page read and write
A37B000
unkown
page read and write
2C72000
trusted library allocation
page read and write
7FF5ED471000
unkown
page readonly
6D050000
unkown
page readonly
1370000
unkown
page read and write
6AF000
heap
page read and write
7953000
unkown
page read and write
A92000
heap
page read and write
9881000
unkown
page read and write
146CE000
stack
page read and write
2673000
heap
page read and write
3410000
unkown
page read and write
7FF5ED1F6000
unkown
page readonly
7FF5ED9A6000
unkown
page readonly
87D0000
unkown
page read and write
1F0000
heap
page read and write
2FAE000
stack
page read and write
2D35000
trusted library allocation
page read and write
A29E000
stack
page read and write
7FF5ED1CF000
unkown
page readonly
1200000
unkown
page readonly
7F0000
heap
page read and write
1DA0A000
stack
page read and write
2E46000
heap
page read and write
2C86000
trusted library allocation
page read and write
983000
heap
page read and write
2CBD000
trusted library allocation
page read and write
969000
heap
page read and write
2E1E000
heap
page read and write
3020000
unkown
page read and write
B150000
unkown
page read and write
7FF5ED46A000
unkown
page readonly
6B8000
heap
page read and write
A21E000
stack
page read and write
2D70000
heap
page read and write
1350000
unkown
page read and write
2CE5000
trusted library allocation
page read and write
2CAA000
trusted library allocation
page read and write
A379000
unkown
page read and write
1E784000
heap
page read and write
97D4000
unkown
page read and write
87D0000
unkown
page read and write
1340000
unkown
page read and write
4C7A000
unkown
page read and write
1350000
unkown
page read and write
FDA0000
unkown
page read and write
8810000
unkown
page read and write
1380000
unkown
page read and write
1370000
unkown
page read and write
9139000
stack
page read and write
87E000
stack
page read and write
7FF5ED4EF000
unkown
page readonly
7FF5ED451000
unkown
page readonly
E76A000
unkown
page read and write
334F000
stack
page read and write
7D5000
heap
page read and write
A3F000
heap
page read and write
1DDCF000
direct allocation
page readonly
1390000
unkown
page read and write
1350000
unkown
page read and write
3020000
unkown
page read and write
1360000
unkown
page read and write
7F2E000
stack
page read and write
7FF5ED94A000
unkown
page readonly
A4C000
heap
page read and write
7FF5ED885000
unkown
page readonly
983000
heap
page read and write
3020000
unkown
page read and write
AB3D000
unkown
page read and write
3748000
unkown
page read and write
A28000
heap
page read and write
310F000
stack
page read and write
A34000
heap
page read and write
C84D000
unkown
page read and write
93C0000
unkown
page read and write
3220000
unkown
page readonly
93C0000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
418000
unkown
page write copy
7FF5EDA38000
unkown
page readonly
C89A000
unkown
page read and write
3410000
unkown
page read and write
7FF5ED7D6000
unkown
page readonly
48E000
unkown
page readonly
87D0000
unkown
page read and write
C7C5000
unkown
page read and write
8860000
unkown
page read and write
68A000
heap
page read and write
7852000
unkown
page read and write
37FE000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
3580000
unkown
page readonly
C503000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
8730000
unkown
page read and write
8810000
unkown
page read and write
19C000
stack
page read and write
7FF5ED80C000
unkown
page readonly
BD1D000
stack
page read and write
1510000
unkown
page readonly
A4C000
heap
page read and write
7FF5ED821000
unkown
page readonly
1360000
unkown
page read and write
400000
unkown
page execute and read and write
9F6000
heap
page read and write
2D7B000
trusted library allocation
page read and write
996000
heap
page read and write
3020000
unkown
page read and write
2C8E000
trusted library allocation
page read and write
C516000
unkown
page read and write
97D000
heap
page read and write
1350000
unkown
page read and write
7FF5ED404000
unkown
page readonly
A51000
heap
page read and write
1380000
unkown
page read and write
B650000
unkown
page read and write
2C94000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
1490000
unkown
page read and write
A4C000
heap
page read and write
1350000
unkown
page read and write
37CF000
stack
page read and write
B08D000
stack
page read and write
302E000
heap
page execute and read and write
2CB9000
trusted library allocation
page read and write
1370000
unkown
page read and write
8810000
unkown
page read and write
1360000
unkown
page read and write
1360000
unkown
page read and write
2A1E000
stack
page read and write
87D0000
unkown
page read and write
2CC4000
trusted library allocation
page read and write
1370000
unkown
page read and write
A06000
heap
page read and write
7FF5ED74A000
unkown
page readonly
7FF5ED1BC000
unkown
page readonly
786B000
unkown
page read and write
4C9A000
unkown
page read and write
1340000
unkown
page read and write
2CEE000
stack
page read and write
2C8E000
trusted library allocation
page read and write
8810000
unkown
page read and write
B5AE000
stack
page read and write
2C71000
trusted library allocation
page read and write
9C000
stack
page read and write
1370000
unkown
page read and write
3410000
unkown
page read and write
36F0000
unkown
page readonly
2CA3000
trusted library allocation
page read and write
8EF0000
unkown
page read and write
3410000
unkown
page read and write
1370000
unkown
page read and write
FA4D000
stack
page read and write
6BE000
heap
page read and write
C563000
unkown
page read and write
8EF0000
unkown
page read and write
87D0000
unkown
page read and write
2E44000
trusted library allocation
page read and write
5590000
unkown
page write copy
1350000
unkown
page read and write
6D0DE000
unkown
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
2CA4000
trusted library allocation
page read and write
3410000
unkown
page read and write
1350000
unkown
page read and write
7FF5EDA70000
unkown
page readonly
A36000
heap
page read and write
87D0000
unkown
page read and write
A4F000
heap
page read and write
B729000
stack
page read and write
7FF5ED867000
unkown
page readonly
1902E000
stack
page read and write
9FA000
heap
page read and write
7FF5ED8E7000
unkown
page readonly
9BE000
heap
page read and write
93C0000
unkown
page read and write
87D0000
unkown
page read and write
21EE000
stack
page read and write
87D0000
unkown
page read and write
A4B000
heap
page read and write
2E0E000
stack
page read and write
1370000
unkown
page read and write
7D0000
heap
page read and write
3410000
unkown
page read and write
2C97000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
3020000
unkown
page read and write
A39000
heap
page read and write
2CE5000
trusted library allocation
page read and write
3020000
unkown
page read and write
10C0000
unkown
page readonly
87D0000
unkown
page read and write
C57F000
unkown
page read and write
572000
remote allocation
page execute and read and write
2CA4000
trusted library allocation
page read and write
3020000
unkown
page read and write
93C0000
unkown
page read and write
8810000
unkown
page read and write
1350000
unkown
page read and write
992000
heap
page read and write
A21000
heap
page read and write
2CCC000
trusted library allocation
page read and write
76E000
stack
page read and write
331E000
stack
page read and write
961000
heap
page read and write
93C0000
unkown
page read and write
A21000
heap
page read and write
7D40000
unkown
page read and write
C557000
unkown
page read and write
1360000
unkown
page read and write
3020000
unkown
page read and write
4BC9000
unkown
page read and write
A4C000
heap
page read and write
2C8D000
trusted library allocation
page read and write
2CB8000
trusted library allocation
page read and write
992000
heap
page read and write
7FF5ED426000
unkown
page readonly
8DA0000
unkown
page read and write
3020000
unkown
page read and write
3020000
unkown
page read and write
A34000
heap
page read and write
7FF5EDA14000
unkown
page readonly
91C0000
unkown
page read and write
1370000
unkown
page read and write
31DC000
trusted library allocation
page read and write
7FF5ED933000
unkown
page readonly
1340000
unkown
page read and write
87D0000
unkown
page read and write
1370000
unkown
page read and write
1370000
unkown
page read and write
6B5000
heap
page read and write
3410000
unkown
page read and write
3020000
unkown
page read and write
A19F000
stack
page read and write
AD0000
heap
page read and write
CB79000
unkown
page read and write
7FF5ED602000
unkown
page readonly
9F6000
heap
page read and write
1340000
unkown
page read and write
8D50000
unkown
page read and write
33F0000
unkown
page read and write
1B5CC000
stack
page read and write
3410000
unkown
page read and write
7D00000
unkown
page readonly
2C94000
trusted library allocation
page read and write
969000
heap
page read and write
1350000
unkown
page read and write
79D3000
unkown
page read and write
AAF6000
unkown
page read and write
2CBC000
trusted library allocation
page read and write
996000
heap
page read and write
4EE000
stack
page read and write
3410000
unkown
page read and write
99E000
heap
page read and write
6BA000
heap
page read and write
6B1000
heap
page read and write
93C0000
unkown
page read and write
3410000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
C4D0000
unkown
page read and write
6CA91000
unkown
page execute read
2C80000
trusted library allocation
page read and write
48F1000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
9FA000
heap
page read and write
A34000
heap
page read and write
7FF5ED85F000
unkown
page readonly
3410000
unkown
page read and write
8810000
unkown
page read and write
7CA0000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
8810000
unkown
page read and write
B7AD000
stack
page read and write
1240000
heap
page read and write
37A8000
unkown
page read and write
7FF5ED7CF000
unkown
page readonly
87D0000
unkown
page read and write
5DD000
heap
page execute and read and write
A39000
heap
page read and write
87D0000
unkown
page read and write
7FF5ED7F1000
unkown
page readonly
3020000
unkown
page read and write
2190000
remote allocation
page read and write
1E235000
heap
page read and write
8720000
unkown
page readonly
87D0000
unkown
page read and write
C8E1000
unkown
page read and write
3387000
heap
page read and write
1350000
unkown
page read and write
2C80000
trusted library allocation
page read and write
1350000
unkown
page read and write
8EF0000
unkown
page read and write
8810000
unkown
page read and write
93C0000
unkown
page read and write
87D0000
unkown
page read and write
8EF0000
unkown
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2390000
heap
page read and write
9FC000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
8B60000
unkown
page readonly
8810000
unkown
page read and write
557000
heap
page read and write
87D0000
unkown
page read and write
2C8F000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
97000
stack
page read and write
3410000
unkown
page read and write
48C1000
heap
page read and write
10D0000
heap
page read and write
3410000
unkown
page read and write
2CEC000
trusted library allocation
page read and write
7FF5ED8C1000
unkown
page readonly
8EF0000
unkown
page read and write
A3C000
heap
page read and write
A391000
unkown
page read and write
A364000
unkown
page read and write
986B000
unkown
page read and write
9AA000
heap
page read and write
8C7C000
unkown
page read and write
7FF5ED97A000
unkown
page readonly
7FF5ED8C6000
unkown
page readonly
6B8000
heap
page read and write
9B3000
heap
page read and write
7978000
unkown
page read and write
2CB6000
trusted library allocation
page read and write
C5AA000
unkown
page read and write
2CD2000
trusted library allocation
page read and write
7A34000
unkown
page read and write
3590000
unkown
page read and write
2290000
heap
page read and write
1350000
unkown
page read and write
C962000
unkown
page read and write
2C80000
trusted library allocation
page read and write
7FF5ED7E0000
unkown
page readonly
1E49C000
stack
page read and write
3410000
unkown
page read and write
C88B000
unkown
page read and write
7FF5EDA0B000
unkown
page readonly
8EF0000
unkown
page read and write
3410000
unkown
page read and write
3410000
unkown
page read and write
91C0000
stack
page read and write
93C0000
unkown
page read and write
1340000
unkown
page read and write
87D0000
unkown
page read and write
1350000
unkown
page read and write
89A0000
unkown
page read and write
3410000
unkown
page read and write
93C0000
unkown
page read and write
68E000
heap
page read and write
87D0000
unkown
page read and write
93C0000
unkown
page read and write
2CB7000
trusted library allocation
page read and write
97F000
heap
page read and write
8BF0000
unkown
page readonly
3410000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
A21000
heap
page read and write
9E6C000
stack
page read and write
1B46F000
stack
page read and write
3410000
unkown
page read and write
87D0000
unkown
page read and write
2E3A000
heap
page read and write
1370000
unkown
page read and write
2260000
heap
page read and write
6BE000
heap
page read and write
983000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
A2B000
heap
page read and write
3410000
unkown
page read and write
93C0000
unkown
page read and write
8EC6000
unkown
page read and write
7FF5ED800000
unkown
page readonly
2E10000
heap
page read and write
8810000
unkown
page read and write
A42000
heap
page read and write
FACB000
stack
page read and write
4970000
heap
page read and write
53E000
stack
page read and write
5C0000
heap
page read and write
B190000
unkown
page read and write
1F0000
heap
page read and write
87D0000
unkown
page read and write
B10D000
stack
page read and write
4B90000
unkown
page read and write
93C0000
unkown
page read and write
A2C000
heap
page read and write
968B000
unkown
page read and write
8EF0000
unkown
page read and write
1340000
unkown
page read and write
3240000
unkown
page read and write
6CC2F000
unkown
page readonly
A2B000
heap
page read and write
495000
unkown
page read and write
7DA3000
unkown
page read and write
8810000
unkown
page read and write
9792000
unkown
page read and write
1350000
unkown
page read and write
976000
heap
page read and write
7FF5ED853000
unkown
page readonly
302F000
stack
page read and write
9A5B000
unkown
page read and write
9A2000
heap
page read and write
3410000
unkown
page read and write
8D50000
unkown
page read and write
93C0000
unkown
page read and write
1370000
unkown
page read and write
FE05000
unkown
page read and write
1350000
unkown
page read and write
93C0000
unkown
page read and write
1350000
unkown
page read and write
9AE0000
unkown
page read and write
9929000
unkown
page read and write
990000
heap
page read and write
87D0000
unkown
page read and write
A84000
heap
page read and write
2D26000
trusted library allocation
page read and write
1DAC1000
heap
page read and write
9798000
unkown
page read and write
987F000
unkown
page read and write
E7F1000
unkown
page read and write
3020000
unkown
page read and write
7859000
unkown
page read and write
2C8C000
unkown
page readonly
3020000
unkown
page read and write
8810000
unkown
page read and write
6CC70000
unkown
page read and write
7E70000
unkown
page read and write
1390000
unkown
page read and write
87D0000
unkown
page read and write
3075B000
stack
page read and write
8810000
unkown
page read and write
2C9D000
trusted library allocation
page read and write
2C8C000
unkown
page readonly
2CCD000
trusted library allocation
page read and write
7FF5ED4E8000
unkown
page readonly
7FF5ED697000
unkown
page readonly
1350000
unkown
page read and write
19C000
stack
page read and write
3410000
unkown
page read and write
785D000
unkown
page read and write
1380000
unkown
page read and write
1350000
unkown
page read and write
E763000
unkown
page read and write
93C0000
unkown
page read and write
2C8F000
trusted library allocation
page read and write
99E000
heap
page read and write
7FF5ED781000
unkown
page readonly
3020000
unkown
page read and write
9F8000
heap
page read and write
2C85000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
7FF5ED5C1000
unkown
page readonly
93C0000
unkown
page read and write
91C0000
unkown
page read and write
A327000
unkown
page read and write
3410000
unkown
page read and write
7FF5ED3DA000
unkown
page readonly
A51000
heap
page read and write
9873000
unkown
page read and write
87D0000
unkown
page read and write
87D0000
unkown
page read and write
2250000
heap
page read and write
1350000
unkown
page read and write
B629000
stack
page read and write
7FF5ED872000
unkown
page readonly
56D9000
unkown
page read and write
7FF5ED803000
unkown
page readonly
93C0000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
7FF5ED915000
unkown
page readonly
A39B000
unkown
page read and write
323C000
stack
page read and write
65E000
stack
page read and write
3020000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
1350000
unkown
page read and write
87D0000
unkown
page read and write
2CA4000
trusted library allocation
page read and write
BDD0000
unkown
page readonly
7D20000
unkown
page readonly
There are 2083 hidden memdumps, click here to show them.