IOC Report
c3f3d7cea638c32610d85c9c1dfdcfe3cba3dad9e932257113f07ffcac34b280_dump.exe

loading gif

Files

File Path
Type
Category
Malicious
c3f3d7cea638c32610d85c9c1dfdcfe3cba3dad9e932257113f07ffcac34b280_dump.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\GIEHIDHJDBFI\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\GIEHIDHJDBFI\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\GIEHIDHJDBFI\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\GIEHIDHJDBFI\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\sqls[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\21AE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\C9A7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\katA304.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\aarhevh
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\aarhevh:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\GIEHIDHJDBFI\BFHJJJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHIDHJDBFI\BGHJJD
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\GIEHIDHJDBFI\EGIIIE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GIEHIDHJDBFI\EGIIIE-shm
data
dropped
C:\ProgramData\GIEHIDHJDBFI\FBKEHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHIDHJDBFI\GIIDBG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIEHIDHJDBFI\GIIDBG-shm
data
dropped
C:\ProgramData\GIEHIDHJDBFI\HIDAFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHIDHJDBFI\HIDBFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GIEHIDHJDBFI\JEBKEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GIEHIDHJDBFI\JKECGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GIEHIDHJDBFI\KJEGCF
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GIEHIDHJDBFI\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\GIEHIDHJDBFI\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_21AE.exe_235897738a4fe6486c9e644353fd78c2d6f76761_9eae43eb_ff4c4d6d-eeb9-4364-bbaa-6577c1b82971\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7359.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 26 22:27:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7434.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7464.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199689717899[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3063), with CRLF, LF line terminators
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\c3f3d7cea638c32610d85c9c1dfdcfe3cba3dad9e932257113f07ffcac34b280_dump.exe
"C:\Users\user\Desktop\c3f3d7cea638c32610d85c9c1dfdcfe3cba3dad9e932257113f07ffcac34b280_dump.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\aarhevh
C:\Users\user\AppData\Roaming\aarhevh
malicious
C:\Users\user\AppData\Local\Temp\21AE.exe
C:\Users\user\AppData\Local\Temp\21AE.exe
malicious
C:\Users\user\AppData\Local\Temp\C9A7.exe
C:\Users\user\AppData\Local\Temp\C9A7.exe
malicious
C:\Users\user\AppData\Local\Temp\katA304.tmp
C:\Users\user\AppData\Local\Temp\katA304.tmp
malicious
C:\Users\user\AppData\Roaming\aarhevh
C:\Users\user\AppData\Roaming\aarhevh
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 1724
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\AppData\Local\Temp\katA304.tmp" & rd /s /q "C:\ProgramData\GIEHIDHJDBFI" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://whispedwoodmoodsksl.shop/api
188.114.97.3
malicious
http://23.145.40.124/pintxi1lv.exe
23.145.40.124
malicious
whispedwoodmoodsksl.shop
malicious
http://guteyr.cc/tmp/index.php
malicious
miniaturefinerninewjs.shop
malicious
obsceneclassyjuwks.shop
malicious
http://45.129.96.86/file/update.exe
45.129.96.86
malicious
https://steamcommunity.com/profiles/76561199689717899
104.102.42.29
malicious
http://dbfhns.in/tmp/index.php
187.143.58.5
malicious
http://lobulraualov.in.net/tmp/index.php
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://steamcommunity.com/profiles/76561199689717899Y
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://65.109.242.59/
65.109.242.59
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://excel.office.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=7tll
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://65.109.242.59/nss3.dll
65.109.242.59
http://185.235.137.54/file/host_so.exe
185.235.137.54
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://65.109.242.59/g
unknown
https://65.109.242.59/l
unknown
https://65.109.242.59/k
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
https://whispedwoodmoodsksl.shop/apie
unknown
https://s.ytimg.com;
unknown
https://t.me/copterwin
unknown
https://65.109.242.59/r
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=E0c90DJSB6Ld&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&l=
unknown
https://65.109.242.59/softokn3.dll
65.109.242.59
https://65.109.242.59/mozglue.dllao
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://steamcommunity.com/m
unknown
https://mozilla.org0/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://t.me/copterwinr0isMozilla/5.0
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://65.109.242.59/H
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js
unknown
https://whispedwoodmoodsksl.shop/X
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://65.109.242.59JKFI
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://65.109.242.59/freebl3.dll
65.109.242.59
https://lv.queniujq.cn
unknown
https://outlook.com
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://65.109.242.59a
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://65.109.242.59/#
unknown
https://community.clo
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://android.notify.windows.com/iOS
unknown
https://whispedwoodmoodsksl.shop/
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://65.109.242.59/mozglue.dllk~c
unknown
https://65.109.242.59;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://65.109.242.59/.
unknown
https://65.109.242.59/8
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://word.office.comon
unknown
https://65.109.242.59/sqls.dllYVj
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://65.109.242.59/mozglue.dll
65.109.242.59
https://65.109.242.59/vcruntime140.dll
65.109.242.59
https://65.109.242.59/sqls.dll
65.109.242.59
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/heade
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whispedwoodmoodsksl.shop
188.114.97.3
malicious
steamcommunity.com
104.102.42.29
malicious
dbfhns.in
187.143.58.5
malicious

IPs

IP
Domain
Country
Malicious
23.145.40.124
unknown
Reserved
malicious
188.114.97.3
whispedwoodmoodsksl.shop
European Union
malicious
104.102.42.29
steamcommunity.com
United States
malicious
187.143.58.5
dbfhns.in
Mexico
malicious
186.112.12.192
unknown
Colombia
malicious
91.202.233.231
unknown
Russian Federation
malicious
45.129.96.86
unknown
Estonia
malicious
185.235.137.54
unknown
Iran (ISLAMIC Republic Of)
65.109.242.59
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
There are 183 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E0000
direct allocation
page read and write
malicious
42D9000
direct allocation
page execute and read and write
malicious
4E1000
unclassified section
page read and write
malicious
44D0000
direct allocation
page read and write
malicious
160000
direct allocation
page read and write
malicious
41D0000
direct allocation
page execute and read and write
malicious
2590000
direct allocation
page execute and read and write
malicious
1D1000
unclassified section
page read and write
malicious
7FF5D7691000
unkown
page readonly
2C84000
trusted library allocation
page read and write
C460000
unkown
page read and write
11A0000
unkown
page read and write
11A0000
unkown
page read and write
977E000
stack
page read and write
30B0000
unkown
page read and write
1220000
unkown
page read and write
30C0000
unkown
page read and write
2C76000
trusted library allocation
page read and write
3240000
unkown
page read and write
2CC3000
trusted library allocation
page read and write
8B70000
unkown
page read and write
E4A2000
unkown
page read and write
3240000
unkown
page read and write
30B0000
unkown
page read and write
A1D000
heap
page read and write
2CC8000
trusted library allocation
page read and write
AA9D000
unkown
page read and write
30C0000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
3170000
unkown
page read and write
75CE000
stack
page read and write
9C6000
heap
page read and write
107CA000
unkown
page read and write
12B0000
unkown
page read and write
831000
heap
page read and write
8B70000
unkown
page read and write
2D71000
heap
page read and write
9A4000
heap
page read and write
978000
heap
page read and write
30B0000
unkown
page read and write
3230000
unkown
page read and write
7FF5D72D3000
unkown
page readonly
2C92000
trusted library allocation
page read and write
3090000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7648000
unkown
page readonly
258E000
stack
page read and write
A237000
unkown
page read and write
91F0000
unkown
page readonly
2C98000
trusted library allocation
page read and write
107C2000
unkown
page read and write
8B70000
unkown
page read and write
75F8000
unkown
page read and write
2CAE000
trusted library allocation
page read and write
1220000
unkown
page read and write
107CA000
unkown
page read and write
A67000
heap
page read and write
9C000
stack
page read and write
2CDE000
trusted library allocation
page read and write
A30000
heap
page read and write
8B70000
unkown
page read and write
12D0000
unkown
page readonly
3240000
unkown
page read and write
88E000
heap
page read and write
7FF5D723F000
unkown
page readonly
A4E000
heap
page read and write
4A12000
unkown
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
1220000
unkown
page read and write
3230000
unkown
page read and write
A83000
heap
page read and write
63F000
remote allocation
page execute and read and write
7DF4F2460000
unkown
page readonly
2CF0000
trusted library allocation
page read and write
A29000
heap
page read and write
30C0000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D76DA000
unkown
page readonly
7FF5D77A8000
unkown
page readonly
4AC000
unkown
page write copy
4B00000
unkown
page read and write
7FF5D7591000
unkown
page readonly
8FD8000
stack
page read and write
49BB000
unkown
page read and write
1220000
unkown
page read and write
1DB50000
trusted library allocation
page read and write
E550000
unkown
page read and write
835000
heap
page read and write
30C0000
unkown
page read and write
18FBD000
stack
page read and write
7FF5D7745000
unkown
page readonly
8B70000
unkown
page read and write
9B000
stack
page read and write
1902E000
stack
page read and write
30F0000
unkown
page read and write
21F1000
heap
page read and write
2CA8000
trusted library allocation
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
75FD000
unkown
page read and write
7FF5D769E000
unkown
page readonly
7FF5D771A000
unkown
page readonly
6CB65000
unkown
page readonly
3230000
unkown
page read and write
BE49000
stack
page read and write
A3F000
heap
page read and write
2CC8000
trusted library allocation
page read and write
A2D000
heap
page read and write
9A6A000
unkown
page read and write
2C93000
trusted library allocation
page read and write
8B70000
unkown
page read and write
19C000
stack
page read and write
30B0000
unkown
page read and write
107CA000
unkown
page read and write
1EAF000
stack
page read and write
2320000
remote allocation
page read and write
30C0000
unkown
page read and write
10E0000
stack
page read and write
3240000
unkown
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
3400000
unkown
page read and write
30C0000
unkown
page read and write
81F000
heap
page read and write
9F4000
heap
page read and write
A2A000
heap
page read and write
31B7000
trusted library allocation
page read and write
9A96000
unkown
page read and write
1220000
unkown
page read and write
60B000
remote allocation
page execute and read and write
818000
heap
page read and write
9A9E000
unkown
page read and write
2280000
direct allocation
page execute and read and write
99B0000
unkown
page read and write
8E50000
unkown
page read and write
30B0000
unkown
page read and write
2E54000
trusted library allocation
page read and write
7FF5D71EA000
unkown
page readonly
9D8000
heap
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
A34000
heap
page read and write
9F1000
heap
page read and write
F30D000
unkown
page read and write
3090000
unkown
page read and write
7FF5D7442000
unkown
page readonly
7FF5D71F9000
unkown
page readonly
C73E000
unkown
page read and write
7FF5D7485000
unkown
page readonly
30B0000
unkown
page read and write
9AC000
heap
page read and write
A1D000
heap
page read and write
1220000
unkown
page read and write
11A0000
unkown
page read and write
3080000
unkown
page read and write
7FF5D7438000
unkown
page readonly
3230000
unkown
page read and write
3230000
unkown
page read and write
927D000
stack
page read and write
11A0000
unkown
page read and write
2C80000
trusted library allocation
page read and write
30C0000
unkown
page read and write
7FF5D7360000
unkown
page readonly
C9FD000
unkown
page read and write
33C0000
heap
page read and write
3230000
unkown
page read and write
30C0000
unkown
page read and write
518F000
stack
page read and write
30C0000
unkown
page read and write
7FF5D7669000
unkown
page readonly
9C6000
heap
page read and write
2C85000
trusted library allocation
page read and write
30B0000
unkown
page read and write
2C5E000
stack
page read and write
A4D000
heap
page read and write
A17000
heap
page read and write
30C0000
unkown
page read and write
A391000
unkown
page read and write
7FF5D74A6000
unkown
page readonly
9B41000
unkown
page read and write
853B000
stack
page read and write
2CC8000
trusted library allocation
page read and write
A37000
heap
page read and write
7AE000
heap
page read and write
9D8000
heap
page read and write
9C1000
heap
page read and write
30B0000
unkown
page read and write
7FF5D77D2000
unkown
page readonly
30B0000
unkown
page read and write
7FF5CE33D000
unkown
page readonly
1220000
unkown
page read and write
8B70000
unkown
page read and write
1220000
unkown
page read and write
48C000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D75B8000
unkown
page readonly
AA40000
unkown
page read and write
3230000
unkown
page read and write
2FF9000
stack
page read and write
7810000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
AA01000
unkown
page read and write
7FF5D76D5000
unkown
page readonly
7AB0000
unkown
page read and write
7FF5D72FB000
unkown
page readonly
2CBF000
trusted library allocation
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7425000
unkown
page readonly
8B70000
unkown
page read and write
761E000
unkown
page read and write
7E9000
heap
page read and write
344F000
stack
page read and write
32B9B000
stack
page read and write
7F2000
heap
page read and write
8B70000
unkown
page read and write
7FF5D6BDB000
unkown
page readonly
3230000
unkown
page read and write
A12000
heap
page read and write
13A0000
unkown
page readonly
30C0000
unkown
page read and write
A9E9000
unkown
page read and write
A34000
heap
page read and write
49FD000
unkown
page read and write
18FF0000
remote allocation
page read and write
7FF5D71DA000
unkown
page readonly
7FF5D7700000
unkown
page readonly
30A0000
unkown
page read and write
2C81000
trusted library allocation
page read and write
30F0000
unkown
page read and write
3240000
unkown
page read and write
9A72000
unkown
page read and write
B330000
unkown
page read and write
115E000
stack
page read and write
A4D000
heap
page read and write
A15000
heap
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
9ABD000
unkown
page read and write
30B0000
unkown
page read and write
7FF5D7244000
unkown
page readonly
EB5000
stack
page read and write
30B0000
unkown
page read and write
6CF41000
unkown
page execute read
2C81000
trusted library allocation
page read and write
11A0000
unkown
page read and write
35CD000
unkown
page read and write
7FF5D7488000
unkown
page readonly
30B0000
unkown
page read and write
3240000
unkown
page read and write
91E000
heap
page read and write
7FF5D744E000
unkown
page readonly
7FF5D7764000
unkown
page readonly
A15000
heap
page read and write
30C0000
unkown
page read and write
9AB2000
unkown
page read and write
DD000
stack
page read and write
30B0000
unkown
page read and write
A52000
heap
page read and write
A1D000
heap
page read and write
7B60000
unkown
page readonly
81F000
heap
page read and write
340E000
stack
page read and write
30C0000
unkown
page read and write
1220000
unkown
page read and write
7FF5D77DA000
unkown
page readonly
30B0000
unkown
page read and write
A3E000
heap
page read and write
1200000
unkown
page read and write
5EA000
heap
page read and write
75E0000
unkown
page read and write
30C0000
unkown
page read and write
9D4000
heap
page read and write
16B2E000
stack
page read and write
2B1F000
stack
page read and write
2CDE000
trusted library allocation
page read and write
85F000
stack
page read and write
35CF000
unkown
page read and write
A36000
heap
page read and write
A16000
heap
page read and write
30C0000
unkown
page read and write
2CB2000
trusted library allocation
page read and write
9E3000
heap
page read and write
B559000
stack
page read and write
B980000
unkown
page readonly
1E1AE000
stack
page read and write
7AA000
heap
page read and write
30C0000
unkown
page read and write
3230000
unkown
page read and write
C78A000
unkown
page read and write
30C0000
unkown
page read and write
1B50A000
heap
page read and write
30C0000
unkown
page read and write
2231000
heap
page read and write
11A0000
unkown
page read and write
9B2C000
unkown
page read and write
2000F000
heap
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
A57000
heap
page read and write
35D5000
unkown
page read and write
9C4000
heap
page read and write
30C0000
unkown
page read and write
2CB1000
trusted library allocation
page read and write
C61D000
unkown
page read and write
7FF5D74F2000
unkown
page readonly
901000
heap
page read and write
84BB000
stack
page read and write
AA85000
unkown
page read and write
9B98000
unkown
page read and write
2CC0000
trusted library allocation
page read and write
30C0000
unkown
page read and write
7FF5D774A000
unkown
page readonly
11A0000
unkown
page read and write
2C76000
trusted library allocation
page read and write
3230000
unkown
page read and write
2320000
remote allocation
page read and write
30C0000
unkown
page read and write
3230000
unkown
page read and write
7FF5D706E000
unkown
page readonly
9D4000
heap
page read and write
9AF000
heap
page read and write
7FF5D7458000
unkown
page readonly
2C86000
trusted library allocation
page read and write
9C4000
heap
page read and write
1F70000
heap
page read and write
30C0000
unkown
page read and write
9F1000
heap
page read and write
2CA7000
trusted library allocation
page read and write
86E000
stack
page read and write
7FF5D776D000
unkown
page readonly
1220000
unkown
page read and write
9E5000
heap
page read and write
2C77000
trusted library allocation
page read and write
B4D0000
unkown
page readonly
107CA000
unkown
page read and write
3090000
unkown
page read and write
1DDCF000
direct allocation
page readonly
89C000
heap
page read and write
30B0000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
1220000
unkown
page read and write
8E50000
unkown
page read and write
3230000
unkown
page read and write
8EC5000
stack
page read and write
30B0000
unkown
page read and write
30B0000
unkown
page read and write
846000
heap
page read and write
A3E000
heap
page read and write
9A4000
heap
page read and write
3250000
unkown
page read and write
30B0000
unkown
page read and write
2CAE000
trusted library allocation
page read and write
7FF5D7385000
unkown
page readonly
2C8A000
trusted library allocation
page read and write
1220000
unkown
page read and write
30C0000
unkown
page read and write
A3C3000
unkown
page read and write
8E50000
unkown
page read and write
2C93000
trusted library allocation
page read and write
30C0000
unkown
page read and write
2C72000
trusted library allocation
page read and write
30C0000
unkown
page read and write
750000
heap
page read and write
1395000
heap
page read and write
49D6000
unkown
page read and write
7FF5D7336000
unkown
page readonly
ACF000
stack
page read and write
30B0000
unkown
page read and write
801000
heap
page read and write
43C000
remote allocation
page execute and read and write
F301000
unkown
page read and write
9BB000
heap
page read and write
11A0000
unkown
page read and write
2C85000
trusted library allocation
page read and write
30B0000
unkown
page read and write
7D3E000
stack
page read and write
30B0000
unkown
page read and write
E550000
unkown
page read and write
55D000
heap
page read and write
7FF5D77F0000
unkown
page readonly
30F0000
unkown
page read and write
2D75000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
A58000
heap
page read and write
2E1C000
trusted library allocation
page read and write
A2A000
heap
page read and write
97000
stack
page read and write
7FF5D743F000
unkown
page readonly
B0C000
heap
page read and write
9AA8000
unkown
page read and write
A79000
heap
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
10544000
unkown
page read and write
BF3E000
stack
page read and write
2CCD000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
9B0B000
unkown
page read and write
2D01000
trusted library allocation
page read and write
800000
heap
page read and write
49D000
unkown
page read and write
2C89000
trusted library allocation
page read and write
7FF5D7784000
unkown
page readonly
A73000
heap
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
5D4000
heap
page read and write
30A0000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D765F000
unkown
page readonly
9AC000
heap
page read and write
6F0000
heap
page read and write
3530000
unkown
page read and write
7FF5D71E6000
unkown
page readonly
7FF5D710B000
unkown
page readonly
30B0000
unkown
page read and write
D92F000
stack
page read and write
C875000
unkown
page read and write
400000
unkown
page readonly
2320000
remote allocation
page read and write
30A0000
unkown
page read and write
1220000
unkown
page read and write
30B0000
unkown
page read and write
30A0000
unkown
page read and write
2B5E000
stack
page read and write
7FF5D7398000
unkown
page readonly
C63C000
unkown
page read and write
1360000
unkown
page readonly
30F0000
unkown
page read and write
30B0000
unkown
page read and write
268F000
stack
page read and write
A3AC000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D77B9000
unkown
page readonly
A6E000
heap
page read and write
30C0000
unkown
page read and write
11D0000
unkown
page read and write
A4E000
heap
page read and write
9D8000
heap
page read and write
7FF5D7694000
unkown
page readonly
2CCA000
trusted library allocation
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
A92000
heap
page read and write
2C89000
trusted library allocation
page read and write
4080000
direct allocation
page execute and read and write
7FF5D76D7000
unkown
page readonly
18E000
stack
page read and write
1260000
unkown
page read and write
8B70000
unkown
page read and write
1226C000
stack
page read and write
7FF5D77C2000
unkown
page readonly
244E000
stack
page read and write
2030000
heap
page read and write
22F0000
heap
page read and write
7FF5D76C8000
unkown
page readonly
401000
unkown
page execute and write copy
C9A7000
unkown
page read and write
7FF5D762F000
unkown
page readonly
8B70000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7455000
unkown
page readonly
23A0000
direct allocation
page read and write
5F0000
heap
page read and write
1200000
unkown
page read and write
8B70000
unkown
page read and write
1DE0A000
direct allocation
page readonly
A17000
heap
page read and write
30C0000
unkown
page read and write
7FF5D747F000
unkown
page readonly
9BC000
heap
page read and write
A13000
heap
page read and write
25D0000
heap
page read and write
2CA5000
trusted library allocation
page read and write
E550000
unkown
page read and write
843F000
stack
page read and write
2CBD000
trusted library allocation
page read and write
7DF4F2471000
unkown
page execute read
9C1000
heap
page read and write
9A84000
unkown
page read and write
33B0000
unkown
page readonly
3230000
unkown
page read and write
8B70000
unkown
page read and write
30E0000
unkown
page read and write
21D0000
heap
page read and write
30B0000
unkown
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
1B4F9000
heap
page read and write
2CC5000
trusted library allocation
page read and write
A3D000
heap
page read and write
11A0000
unkown
page read and write
405000
unkown
page execute and read and write
A8F000
heap
page read and write
4A90000
unkown
page read and write
7FF5D77FD000
unkown
page readonly
3240000
unkown
page read and write
2CD0000
trusted library allocation
page read and write
30C0000
unkown
page read and write
400000
unkown
page execute and read and write
97B0000
unkown
page read and write
A67000
heap
page read and write
4AC0000
unkown
page read and write
831000
heap
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D7236000
unkown
page readonly
7F5000
heap
page read and write
C669000
unkown
page read and write
2EE4000
trusted library allocation
page read and write
30C0000
unkown
page read and write
C65E000
unkown
page read and write
7FF5D77E0000
unkown
page readonly
A6E000
heap
page read and write
2C80000
trusted library allocation
page read and write
846000
heap
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
1220000
unkown
page read and write
1DE02000
direct allocation
page read and write
73E000
stack
page read and write
35C3000
unkown
page read and write
18E000
stack
page read and write
A3AA000
unkown
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
A4D000
heap
page read and write
2CC6000
trusted library allocation
page read and write
7FF5D75DF000
unkown
page readonly
3230000
unkown
page read and write
2CCD000
trusted library allocation
page read and write
3250000
unkown
page read and write
A3B6000
unkown
page read and write
C4BD000
unkown
page read and write
779E000
unkown
page read and write
5479000
unkown
page read and write
105C6000
unkown
page read and write
30C0000
unkown
page read and write
2CA3000
trusted library allocation
page read and write
323C000
stack
page read and write
A87000
heap
page read and write
3230000
unkown
page read and write
3230000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
86E0000
unkown
page readonly
30B0000
unkown
page read and write
30C0000
unkown
page read and write
C4C6000
unkown
page read and write
89B000
heap
page read and write
9FAF000
stack
page read and write
2C81000
trusted library allocation
page read and write
3090000
unkown
page read and write
B03B000
stack
page read and write
140000
heap
page read and write
3380000
unkown
page read and write
A3D000
heap
page read and write
3240000
unkown
page read and write
30B0000
unkown
page read and write
7FF5D7292000
unkown
page readonly
30C0000
unkown
page read and write
A4F000
heap
page read and write
7FF5D738E000
unkown
page readonly
A4E000
heap
page read and write
655000
heap
page read and write
231E000
stack
page read and write
2C89000
trusted library allocation
page read and write
9D8000
heap
page read and write
8E90000
stack
page read and write
2C83000
trusted library allocation
page read and write
3626000
unkown
page read and write
9C1000
heap
page read and write
7FC000
heap
page read and write
572000
remote allocation
page execute and read and write
7FF5D74B8000
unkown
page readonly
3260000
unkown
page read and write
3240000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7257000
unkown
page readonly
30C0000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
7B20000
unkown
page read and write
30E0000
unkown
page read and write
7DBD000
stack
page read and write
30B0000
unkown
page read and write
2CAF000
trusted library allocation
page read and write
20D0000
heap
page read and write
400000
unkown
page readonly
B950000
unkown
page readonly
35D3000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
E00000
unkown
page readonly
30B0000
unkown
page read and write
BB10000
heap
page read and write
22DD000
stack
page read and write
6EF000
stack
page read and write
997C000
stack
page read and write
9AB4000
unkown
page read and write
1220000
unkown
page read and write
7FF5D76F5000
unkown
page readonly
30C0000
unkown
page read and write
9A8E000
unkown
page read and write
2CB5000
trusted library allocation
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D705D000
unkown
page readonly
2D0E000
trusted library allocation
page read and write
A7A000
heap
page read and write
35DC000
unkown
page read and write
A57000
heap
page read and write
30C0000
unkown
page read and write
11A0000
unkown
page read and write
2CBC000
trusted library allocation
page read and write
1E6FC000
stack
page read and write
49A8000
unkown
page read and write
A1D000
heap
page read and write
8B70000
unkown
page read and write
8D0000
heap
page read and write
30C0000
unkown
page read and write
2C92000
trusted library allocation
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
A48000
heap
page read and write
1340000
unkown
page read and write
8E4E000
stack
page read and write
8E50000
unkown
page read and write
213F000
stack
page read and write
3250000
unkown
page read and write
7FF5D77CD000
unkown
page readonly
3230000
unkown
page read and write
2C73000
trusted library allocation
page read and write
9E2E000
stack
page read and write
769A000
unkown
page read and write
1220000
unkown
page read and write
2CE1000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
2C86000
trusted library allocation
page read and write
7FF5D7267000
unkown
page readonly
400000
unkown
page readonly
30C0000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
9C6000
heap
page read and write
2CE9000
trusted library allocation
page read and write
7DF000
stack
page read and write
7AC0000
unkown
page read and write
2C89000
trusted library allocation
page read and write
3090000
unkown
page read and write
1200000
unkown
page read and write
A1D000
heap
page read and write
30C0000
unkown
page read and write
3090000
unkown
page read and write
405000
unkown
page execute and read and write
2CC3000
trusted library allocation
page read and write
1DBC8000
direct allocation
page execute read
AA0C000
unkown
page read and write
93B0000
unkown
page read and write
2CDE000
trusted library allocation
page read and write
30B0000
unkown
page read and write
89E000
stack
page read and write
A52000
heap
page read and write
30C0000
unkown
page read and write
11A0000
unkown
page read and write
7FF5D719C000
unkown
page readonly
2D06000
trusted library allocation
page read and write
BFB8000
stack
page read and write
3230000
unkown
page read and write
3230000
unkown
page read and write
8B70000
unkown
page read and write
AFBE000
stack
page read and write
30B0000
unkown
page read and write
2C81000
trusted library allocation
page read and write
A40000
heap
page read and write
7FF5D7394000
unkown
page readonly
7FF5D7808000
unkown
page readonly
A4D000
heap
page read and write
A12000
heap
page read and write
A1AF000
stack
page read and write
1E457000
heap
page read and write
30B0000
unkown
page read and write
A78000
heap
page read and write
A79000
heap
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
9E3000
heap
page read and write
7FF5D783B000
unkown
page readonly
3110000
unkown
page readonly
7440000
unkown
page read and write
2CC1000
trusted library allocation
page read and write
A02E000
stack
page read and write
1260000
unkown
page read and write
3230000
unkown
page read and write
A2A000
heap
page read and write
A72000
heap
page read and write
3270000
unkown
page read and write
3230000
unkown
page read and write
BB0B000
stack
page read and write
4986000
unkown
page read and write
1CE000
stack
page read and write
BEA0000
unkown
page readonly
30C0000
unkown
page read and write
A23A000
unkown
page read and write
7FF5D779E000
unkown
page readonly
35B3000
unkown
page read and write
7FF5D7820000
unkown
page readonly
30C0000
unkown
page read and write
610000
heap
page read and write
A30000
heap
page read and write
DD000
stack
page read and write
2C86000
trusted library allocation
page read and write
1281000
unkown
page readonly
30A0000
unkown
page read and write
8DE000
heap
page read and write
7FF5D77E9000
unkown
page readonly
30C0000
unkown
page read and write
7FF5D752F000
unkown
page readonly
8B70000
unkown
page read and write
7F7000
heap
page read and write
3230000
unkown
page read and write
7FF5D7643000
unkown
page readonly
30C0000
unkown
page read and write
404000
unkown
page execute and write copy
818000
heap
page read and write
2CB3000
trusted library allocation
page read and write
30C0000
unkown
page read and write
401000
unkown
page execute and write copy
7FF5D71AF000
unkown
page readonly
2CBD000
trusted library allocation
page read and write
8B70000
unkown
page read and write
7FF5D7795000
unkown
page readonly
2CA7000
trusted library allocation
page read and write
7FF5D7262000
unkown
page readonly
8B70000
unkown
page read and write
2CD5000
trusted library allocation
page read and write
19D000
stack
page read and write
A1D000
heap
page read and write
1220000
unkown
page read and write
2C97000
trusted library allocation
page read and write
30B0000
unkown
page read and write
3075C000
stack
page read and write
30C0000
unkown
page read and write
3230000
unkown
page read and write
8D3B000
stack
page read and write
30B0000
unkown
page read and write
2CAD000
trusted library allocation
page read and write
98FD000
stack
page read and write
8B70000
unkown
page read and write
1390000
heap
page read and write
35B5000
unkown
page read and write
3230000
unkown
page read and write
85BE000
stack
page read and write
2C80000
trusted library allocation
page read and write
A1A000
heap
page read and write
2C8D000
trusted library allocation
page read and write
7FF5D6A4B000
unkown
page readonly
2C94000
trusted library allocation
page read and write
93B0000
unkown
page read and write
2CCB000
trusted library allocation
page read and write
1220000
unkown
page read and write
3140000
unkown
page read and write
F2C2000
heap
page read and write
7FF5D72BD000
unkown
page readonly
9B95000
unkown
page read and write
30C0000
unkown
page read and write
2CAA000
trusted library allocation
page read and write
1E73C000
stack
page read and write
2C90000
trusted library allocation
page read and write
3230000
unkown
page read and write
1DBC0000
direct allocation
page execute and read and write
3230000
unkown
page read and write
7FF5D778A000
unkown
page readonly
7FF5D75BF000
unkown
page readonly
1F0000
heap
page read and write
9A5000
heap
page read and write
1220000
unkown
page read and write
53E1000
unkown
page read and write
9BD000
heap
page read and write
9C000
stack
page read and write
7693000
unkown
page read and write
8B70000
unkown
page read and write
2C95000
trusted library allocation
page read and write
838000
heap
page read and write
30B0000
unkown
page read and write
A79000
heap
page read and write
1260000
unkown
page read and write
3240000
unkown
page read and write
2CCA000
trusted library allocation
page read and write
5330000
unkown
page write copy
1200000
unkown
page read and write
A75000
heap
page read and write
8E50000
stack
page read and write
3230000
unkown
page read and write
7FF5D7558000
unkown
page readonly
7FF5D6AB6000
unkown
page readonly
1220000
unkown
page read and write
7FF5D774C000
unkown
page readonly
30C0000
unkown
page read and write
A15000
heap
page read and write
3240000
unkown
page read and write
3489000
stack
page read and write
2C95000
trusted library allocation
page read and write
11A0000
unkown
page read and write
49B000
unkown
page read and write
30A0000
unkown
page read and write
2EB0000
unkown
page read and write
C87B000
unkown
page read and write
1DE000
stack
page read and write
A57000
heap
page read and write
2C81000
trusted library allocation
page read and write
72E000
stack
page read and write
3260000
unkown
page read and write
30C0000
unkown
page read and write
190000
heap
page read and write
10604000
unkown
page read and write
A30000
heap
page read and write
3230000
unkown
page read and write
8B70000
unkown
page read and write
3230000
unkown
page read and write
3090000
unkown
page read and write
2021D000
heap
page read and write
8890000
unkown
page readonly
30C0000
unkown
page read and write
97B0000
unkown
page read and write
11A0000
unkown
page read and write
30B0000
unkown
page read and write
7FF5D72DF000
unkown
page readonly
7DF4F2470000
unkown
page readonly
3230000
unkown
page read and write
2D0E000
trusted library allocation
page read and write
30B0000
unkown
page read and write
2C91000
trusted library allocation
page read and write
8360000
unkown
page read and write
A17000
heap
page read and write
3240000
unkown
page read and write
1220000
unkown
page read and write
11A0000
unkown
page read and write
2CCD000
trusted library allocation
page read and write
C615000
unkown
page read and write
7DF4F2461000
unkown
page execute read
30C0000
unkown
page read and write
A39F000
unkown
page read and write
7FF5D77B6000
unkown
page readonly
7DF4F2480000
unkown
page readonly
2C8E000
trusted library allocation
page read and write
A17000
heap
page read and write
2C76000
trusted library allocation
page read and write
30C0000
unkown
page read and write
9A8000
heap
page read and write
9EB0000
unkown
page readonly
1220000
unkown
page read and write
77DB000
unkown
page read and write
A79000
heap
page read and write
3240000
unkown
page read and write
8B70000
unkown
page read and write
3240000
unkown
page read and write
801000
heap
page read and write
1DA60000
heap
page read and write
8B70000
unkown
page read and write
A43000
heap
page read and write
180000
heap
page read and write
33F0000
unkown
page read and write
1B480000
heap
page read and write
3090000
unkown
page read and write
9F4000
heap
page read and write
30C0000
unkown
page read and write
4A71000
unkown
page read and write
2C78000
trusted library allocation
page read and write
8B70000
unkown
page read and write
9A8C000
unkown
page read and write
7FF5D716B000
unkown
page readonly
7FF5D73F5000
unkown
page readonly
3260000
unkown
page read and write
30B0000
unkown
page read and write
9C000
stack
page read and write
7FF5D71C8000
unkown
page readonly
9E3000
heap
page read and write
2390000
heap
page read and write
2CB3000
trusted library allocation
page read and write
B85A000
stack
page read and write
A2A000
heap
page read and write
2C95000
trusted library allocation
page read and write
8B70000
unkown
page read and write
3240000
unkown
page read and write
A233000
unkown
page read and write
8B70000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
9B2000
heap
page read and write
A220000
unkown
page read and write
A48000
heap
page read and write
C5F8000
unkown
page read and write
7FF5D72D0000
unkown
page readonly
2C9E000
trusted library allocation
page read and write
11A0000
unkown
page read and write
F32F000
unkown
page read and write
1350000
unkown
page readonly
C81C000
unkown
page read and write
A40000
heap
page read and write
9EF000
heap
page read and write
107C3000
unkown
page read and write
7FF5D7482000
unkown
page readonly
30B0000
unkown
page read and write
B0BD000
stack
page read and write
C7C6000
unkown
page read and write
30C0000
unkown
page read and write
A57000
heap
page read and write
30C0000
unkown
page read and write
2CA3000
trusted library allocation
page read and write
9A94000
unkown
page read and write
2C99000
trusted library allocation
page read and write
1DE0D000
direct allocation
page readonly
21F0000
heap
page read and write
30E0000
unkown
page read and write
2F7E000
stack
page read and write
1DE24000
heap
page read and write
8B70000
unkown
page read and write
49C2000
unkown
page read and write
7FF5D751F000
unkown
page readonly
F13000
heap
page read and write
3240000
unkown
page read and write
7FC000
heap
page read and write
E10000
unkown
page readonly
9CE000
heap
page read and write
3240000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
7FF5D76AF000
unkown
page readonly
F2CA000
heap
page read and write
18E000
stack
page read and write
DD000
stack
page read and write
A57000
heap
page read and write
87D000
heap
page read and write
30B0000
unkown
page read and write
2C98000
trusted library allocation
page read and write
C609000
unkown
page read and write
18FF0000
remote allocation
page read and write
55A000
heap
page read and write
93B0000
unkown
page read and write
7FF5D7065000
unkown
page readonly
7FF5CE343000
unkown
page readonly
7FF5D71EF000
unkown
page readonly
1220000
unkown
page read and write
A36000
heap
page read and write
8A00000
unkown
page read and write
3270000
unkown
page read and write
7C31000
unkown
page read and write
A12000
heap
page read and write
2CE4000
trusted library allocation
page read and write
A86000
heap
page read and write
9B2000
heap
page read and write
400000
unkown
page readonly
30C0000
unkown
page read and write
A34000
heap
page read and write
1220000
unkown
page read and write
3240000
unkown
page read and write
2C94000
trusted library allocation
page read and write
7FF5D758D000
unkown
page readonly
8B70000
unkown
page read and write
30B0000
unkown
page read and write
2C97000
trusted library allocation
page read and write
3230000
unkown
page read and write
3090000
unkown
page read and write
30B0000
unkown
page read and write
11A0000
unkown
page read and write
1220000
unkown
page read and write
2C9B000
trusted library allocation
page read and write
7FF5D7452000
unkown
page readonly
4E0000
heap
page read and write
35B0000
unkown
page read and write
33B0000
heap
page read and write
8B70000
unkown
page read and write
401000
unkown
page execute read
25D3000
heap
page read and write
3240000
unkown
page read and write
7FF5D71BF000
unkown
page readonly
4A16000
unkown
page read and write
9EE000
heap
page read and write
7E58000
stack
page read and write
30B0000
unkown
page read and write
35F4000
unkown
page read and write
7FF5D7682000
unkown
page readonly
8B70000
unkown
page read and write
35C9000
unkown
page read and write
35E4000
unkown
page read and write
7FF5D72BF000
unkown
page readonly
400000
unkown
page readonly
1220000
unkown
page read and write
2C7C000
trusted library allocation
page read and write
8B70000
unkown
page read and write
A57000
heap
page read and write
A2A000
heap
page read and write
A12000
heap
page read and write
A2D7000
unkown
page read and write
7FF5D77C7000
unkown
page readonly
20156000
heap
page read and write
7FF5D7546000
unkown
page readonly
2C98000
trusted library allocation
page read and write
8C39000
stack
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
30B0000
unkown
page read and write
30B0000
unkown
page read and write
B220000
unkown
page read and write
A251000
unkown
page read and write
A27000
heap
page read and write
2D02000
trusted library allocation
page read and write
6CB5E000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D748C000
unkown
page readonly
7FF5D75D6000
unkown
page readonly
30C0000
unkown
page read and write
8B70000
unkown
page read and write
400000
unkown
page readonly
2D70000
heap
page read and write
76E000
stack
page read and write
B0E0000
unkown
page readonly
C1CC000
stack
page read and write
9C6000
heap
page read and write
2C7F000
trusted library allocation
page read and write
1250000
unkown
page read and write
2CB6000
trusted library allocation
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
A2A000
heap
page read and write
835000
heap
page read and write
2E44000
trusted library allocation
page read and write
30C0000
unkown
page read and write
C908000
unkown
page read and write
198000
stack
page read and write
8B70000
unkown
page read and write
A1C000
heap
page read and write
9EF000
heap
page read and write
2270000
heap
page read and write
8A46000
unkown
page read and write
A3D000
heap
page read and write
3090000
unkown
page read and write
2C81000
trusted library allocation
page read and write
3230000
unkown
page read and write
9679000
stack
page read and write
C621000
unkown
page read and write
30C0000
unkown
page read and write
170000
unclassified section
page read and write
3250000
unkown
page read and write
7FF5D7589000
unkown
page readonly
412000
unkown
page readonly
A4D000
heap
page read and write
1220000
unkown
page read and write
30B0000
unkown
page read and write
F2C0000
heap
page read and write
7FF5D71C4000
unkown
page readonly
93B0000
unkown
page read and write
1DF60000
heap
page read and write
A1F000
heap
page read and write
3240000
unkown
page read and write
2CD7000
trusted library allocation
page read and write
30C0000
unkown
page read and write
E550000
unkown
page read and write
130000
heap
page read and write
A72000
heap
page read and write
7FF5D75FF000
unkown
page readonly
2CA8000
trusted library allocation
page read and write
30F0000
unkown
page read and write
7FF5D768B000
unkown
page readonly
1E451000
heap
page read and write
30C0000
unkown
page read and write
A12000
heap
page read and write
1F80000
heap
page read and write
4ED0000
heap
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
9AC000
heap
page read and write
A27000
heap
page read and write
2C9E000
trusted library allocation
page read and write
30C0000
unkown
page read and write
E550000
unkown
page read and write
A5D000
heap
page read and write
8B70000
unkown
page read and write
2C9C000
trusted library allocation
page read and write
30C0000
unkown
page read and write
3080000
unkown
page read and write
2CFE000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
6CFCE000
unkown
page read and write
2EB0000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
1EE000
stack
page read and write
7FF5D772C000
unkown
page readonly
7DF4F24A1000
unkown
page execute read
7611000
unkown
page read and write
A31000
heap
page read and write
30B0000
unkown
page read and write
30F0000
unkown
page read and write
4B4000
unkown
page readonly
7FF5D7507000
unkown
page readonly
9D4000
heap
page read and write
7FF5D72C8000
unkown
page readonly
8B70000
unkown
page read and write
8B70000
unkown
page read and write
C806000
unkown
page read and write
3090000
unkown
page read and write
7AA0000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D781A000
unkown
page readonly
3230000
unkown
page read and write
89B000
heap
page read and write
534000
remote allocation
page execute and read and write
1220000
unkown
page read and write
7FF5D7429000
unkown
page readonly
6CB60000
unkown
page read and write
2C8C000
trusted library allocation
page read and write
6CB1F000
unkown
page readonly
7FF5D7760000
unkown
page readonly
4AF000
unkown
page write copy
2CB5000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
60B000
heap
page read and write
30D0000
unkown
page read and write
30A0000
unkown
page read and write
2C7D000
trusted library allocation
page read and write
7FF5D77DD000
unkown
page readonly
2CAD000
trusted library allocation
page read and write
30A0000
unkown
page read and write
A7A000
heap
page read and write
A70000
heap
page read and write
3457000
heap
page read and write
1220000
unkown
page read and write
7618000
unkown
page read and write
2C9B000
trusted library allocation
page read and write
2CFA000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
30C0000
unkown
page read and write
362A000
unkown
page read and write
3230000
unkown
page read and write
A17000
heap
page read and write
A273000
unkown
page read and write
942D000
stack
page read and write
7F7000
heap
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
9D8000
heap
page read and write
30C0000
unkown
page read and write
650000
heap
page read and write
30C0000
unkown
page read and write
404000
unkown
page execute and write copy
400000
unkown
page readonly
2CBA000
trusted library allocation
page read and write
3090000
stack
page read and write
42E000
remote allocation
page execute and read and write
A1D000
heap
page read and write
7FF5D72CE000
unkown
page readonly
A89000
heap
page read and write
2CC8000
trusted library allocation
page read and write
1270000
unkown
page read and write
1220000
unkown
page read and write
1DEC4000
heap
page read and write
422000
remote allocation
page execute and read and write
1220000
unkown
page read and write
87D000
heap
page read and write
401000
unkown
page execute and read and write
7FF5D71D7000
unkown
page readonly
7FF5D728E000
unkown
page readonly
77A2000
unkown
page read and write
9B1000
heap
page read and write
2CA2000
trusted library allocation
page read and write
8B70000
unkown
page read and write
7FF5D76E8000
unkown
page readonly
3230000
unkown
page read and write
838000
heap
page read and write
7DF4F2481000
unkown
page execute read
1E4D0000
heap
page read and write
30C0000
unkown
page read and write
3240000
unkown
page read and write
11A0000
unkown
page read and write
30D0000
unkown
page read and write
2CB6000
trusted library allocation
page read and write
327C000
stack
page read and write
2CEF000
trusted library allocation
page read and write
7FF5D7396000
unkown
page readonly
C7CB000
unkown
page read and write
30A0000
unkown
page read and write
87D000
heap
page read and write
4A40000
unkown
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
2CCC000
trusted library allocation
page read and write
1200000
unkown
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
30C0000
unkown
page read and write
89B000
heap
page read and write
3240000
unkown
page read and write
2C83000
trusted library allocation
page read and write
30B0000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D69BB000
unkown
page readonly
570000
heap
page read and write
7FF5D66E3000
unkown
page readonly
2C9B000
trusted library allocation
page read and write
9828000
unkown
page read and write
30C0000
unkown
page read and write
2C72000
trusted library allocation
page read and write
30C0000
unkown
page read and write
7637000
unkown
page read and write
7C90000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
30C0000
unkown
page read and write
3240000
unkown
page read and write
A5E000
heap
page read and write
9BC000
heap
page read and write
88F000
heap
page read and write
846000
heap
page read and write
E550000
unkown
page read and write
2C89000
trusted library allocation
page read and write
8B70000
unkown
page read and write
6C980000
unkown
page readonly
30C0000
unkown
page read and write
7989000
stack
page read and write
2C72000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
7FF5D7077000
unkown
page readonly
8B70000
unkown
page read and write
3240000
unkown
page read and write
30A0000
unkown
page read and write
1220000
unkown
page read and write
8B70000
unkown
page read and write
A90000
heap
page read and write
7FF5D75A6000
unkown
page readonly
7FF5D7534000
unkown
page readonly
1220000
unkown
page read and write
30C0000
unkown
page read and write
1E452000
heap
page read and write
30A0000
unkown
page read and write
7AE000
stack
page read and write
8F49000
stack
page read and write
C663000
unkown
page read and write
7FF5D720F000
unkown
page readonly
818000
heap
page read and write
1E3B0000
trusted library allocation
page read and write
E451000
unkown
page read and write
2CC0000
trusted library allocation
page read and write
F314000
unkown
page read and write
2CAF000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
9C1000
heap
page read and write
30B0000
unkown
page read and write
2CA7000
trusted library allocation
page read and write
C5F0000
unkown
page read and write
1DDCD000
direct allocation
page execute read
1220000
unkown
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
A3E000
heap
page read and write
2C98000
trusted library allocation
page read and write
B1C000
heap
page read and write
7686000
unkown
page read and write
2C9D000
trusted library allocation
page read and write
A49000
heap
page read and write
11A0000
unkown
page read and write
30C0000
unkown
page read and write
1064B000
unkown
page read and write
A54000
heap
page read and write
30B0000
unkown
page read and write
401000
unkown
page execute and read and write
1220000
unkown
page read and write
C472000
unkown
page read and write
8B70000
unkown
page read and write
2CC2000
trusted library allocation
page read and write
30B0000
unkown
page read and write
2CA2000
trusted library allocation
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
1220000
unkown
page read and write
C653000
unkown
page read and write
35A6000
trusted library allocation
page read and write
A33F000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
94AE000
stack
page read and write
A2A2000
unkown
page read and write
30C0000
unkown
page read and write
7605000
unkown
page read and write
7FF5D75D9000
unkown
page readonly
8B70000
unkown
page read and write
3230000
unkown
page read and write
7FF5D75B3000
unkown
page readonly
720000
heap
page read and write
3120000
unkown
page read and write
33C0000
unkown
page read and write
A40000
heap
page read and write
A3B9000
unkown
page read and write
30C0000
unkown
page read and write
3230000
unkown
page read and write
1220000
unkown
page read and write
2C81000
trusted library allocation
page read and write
9EAC000
stack
page read and write
7FF5D6ABD000
unkown
page readonly
1DA0A000
stack
page read and write
3250000
unkown
page read and write
4AA0000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
30D0000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D74C3000
unkown
page readonly
7B00000
unkown
page readonly
3230000
unkown
page read and write
30C0000
unkown
page read and write
A3D000
heap
page read and write
C617000
unkown
page read and write
2C85000
trusted library allocation
page read and write
8B70000
unkown
page read and write
30B0000
unkown
page read and write
1383000
heap
page read and write
A1D000
heap
page read and write
254F000
stack
page read and write
30C0000
unkown
page read and write
10E0000
unkown
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
105CB000
unkown
page read and write
9B9000
heap
page read and write
C61B000
unkown
page read and write
3250000
unkown
page read and write
30C0000
unkown
page read and write
4D4E000
stack
page read and write
82F000
stack
page read and write
2E4C000
trusted library allocation
page read and write
10583000
unkown
page read and write
5FD000
heap
page read and write
A55000
heap
page read and write
7FF5D7462000
unkown
page readonly
760F000
unkown
page read and write
30E0000
unkown
page read and write
1220000
unkown
page read and write
1220000
unkown
page read and write
C605000
unkown
page read and write
A4F000
heap
page read and write
3230000
unkown
page read and write
2EC0000
unkown
page readonly
7FF5D7837000
unkown
page readonly
3380000
unkown
page read and write
1220000
unkown
page read and write
2A1E000
stack
page read and write
881C000
stack
page read and write
3380000
unkown
page read and write
A52000
heap
page read and write
30A0000
stack
page read and write
7FF5D7705000
unkown
page readonly
9C8000
heap
page read and write
30B0000
unkown
page read and write
5463000
unkown
page read and write
7B10000
unkown
page read and write
7FF5D7450000
unkown
page readonly
6C981000
unkown
page execute read
1E45A000
heap
page read and write
9C1000
heap
page read and write
3230000
unkown
page read and write
7A0000
heap
page read and write
84C0000
stack
page read and write
1F80000
heap
page read and write
A79000
heap
page read and write
30A0000
unkown
page read and write
4A0E000
unkown
page read and write
A408000
unkown
page read and write
A63000
heap
page read and write
3240000
unkown
page read and write
F2D0000
unkown
page read and write
BDC0000
unkown
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
283AF000
stack
page read and write
30C0000
unkown
page read and write
3090000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7284000
unkown
page readonly
30B0000
unkown
page read and write
1200000
unkown
page read and write
A40E000
unkown
page read and write
7FF5D7075000
unkown
page readonly
49D000
unkown
page write copy
9A92000
unkown
page read and write
30C0000
unkown
page read and write
107CA000
unkown
page read and write
23A4000
direct allocation
page read and write
768E000
unkown
page read and write
95FB000
stack
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
A72000
heap
page read and write
A1D000
heap
page read and write
3240000
unkown
page read and write
30C0000
unkown
page read and write
140000
heap
page read and write
146EE000
stack
page read and write
8DCB000
stack
page read and write
30C0000
unkown
page read and write
C46F000
unkown
page read and write
30A0000
unkown
page read and write
9D4000
heap
page read and write
7FF5D77EB000
unkown
page readonly
30B0000
unkown
page read and write
A313000
unkown
page read and write
8B70000
unkown
page read and write
9AC000
heap
page read and write
2CC6000
trusted library allocation
page read and write
1220000
unkown
page read and write
A2A000
heap
page read and write
20016000
heap
page read and write
3230000
unkown
page read and write
401000
unkown
page execute read
3230000
unkown
page read and write
B28000
heap
page read and write
1DD26000
direct allocation
page execute read
30D0000
unkown
page read and write
1DA51000
heap
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
2C8E000
trusted library allocation
page read and write
9C8000
heap
page read and write
9A80000
unkown
page read and write
3240000
unkown
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
7FF5D7752000
unkown
page readonly
3250000
unkown
page read and write
1220000
unkown
page read and write
1F0000
heap
page read and write
AA04000
unkown
page read and write
2CD6000
trusted library allocation
page read and write
1220000
unkown
page read and write
2C81000
trusted library allocation
page read and write
1B4FB000
heap
page read and write
9D4000
heap
page read and write
1220000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
48E000
unkown
page readonly
30A0000
unkown
page read and write
2DAC000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
C44F000
stack
page read and write
30C0000
unkown
page read and write
2C98000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
1220000
unkown
page read and write
3240000
unkown
page read and write
30B0000
unkown
page read and write
A16000
heap
page read and write
30C0000
unkown
page read and write
A34000
heap
page read and write
30C0000
unkown
page read and write
60E000
stack
page read and write
1220000
unkown
page read and write
30E0000
unkown
page read and write
30C0000
unkown
page read and write
9A76000
unkown
page read and write
2C85000
trusted library allocation
page read and write
7FF5D72D7000
unkown
page readonly
C5FA000
unkown
page read and write
3240000
unkown
page read and write
553000
remote allocation
page execute and read and write
30C0000
unkown
page read and write
2C81000
trusted library allocation
page read and write
1380000
heap
page read and write
C97F000
unkown
page read and write
30C0000
unkown
page read and write
A73000
heap
page read and write
890000
heap
page read and write
3240000
unkown
page read and write
A39C000
unkown
page read and write
3230000
unkown
page read and write
3071000
unkown
page read and write
400000
unkown
page readonly
3240000
unkown
page read and write
A4E000
heap
page read and write
2C92000
trusted library allocation
page read and write
190000
stack
page read and write
2230000
heap
page read and write
7FF5D75F2000
unkown
page readonly
30C0000
unkown
page read and write
146AC000
stack
page read and write
30C0000
unkown
page read and write
7460000
unkown
page read and write
7FF5D72E9000
unkown
page readonly
A9A0000
unkown
page read and write
2CB3000
trusted library allocation
page read and write
E550000
unkown
page read and write
8B70000
unkown
page read and write
9E3000
heap
page read and write
30C0000
unkown
page read and write
7AF1000
unkown
page read and write
2C81000
trusted library allocation
page read and write
A57000
heap
page read and write
401000
unkown
page execute and read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
2CAA000
trusted library allocation
page read and write
8B70000
unkown
page read and write
A1D000
heap
page read and write
30C0000
unkown
page read and write
9CE000
heap
page read and write
7DC0000
unkown
page readonly
8B70000
unkown
page read and write
9E3000
heap
page read and write
3090000
unkown
page read and write
2CEF000
trusted library allocation
page read and write
7FF5D77E3000
unkown
page readonly
7FF5D7593000
unkown
page readonly
A8A000
heap
page read and write
35FA000
unkown
page read and write
30A8000
trusted library allocation
page read and write
A4E000
heap
page read and write
2C8D000
trusted library allocation
page read and write
30B0000
unkown
page read and write
9579000
stack
page read and write
1DA51000
heap
page read and write
C4DC000
unkown
page read and write
A2B5000
unkown
page read and write
3AB6000
trusted library allocation
page read and write
9C8000
heap
page read and write
3240000
unkown
page read and write
362D000
unkown
page read and write
7BD000
heap
page execute and read and write
451000
unkown
page execute and read and write
7FF5D766E000
unkown
page readonly
2CCF000
trusted library allocation
page read and write
1B46F000
stack
page read and write
30C0000
unkown
page read and write
107CA000
unkown
page read and write
30C0000
unkown
page read and write
7DD0000
heap
page read and write
2CA4000
trusted library allocation
page read and write
3450000
heap
page read and write
2C7B000
trusted library allocation
page read and write
7FF5D75AF000
unkown
page readonly
4A2000
unkown
page readonly
3006000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
30C0000
unkown
page read and write
419000
unkown
page write copy
1DBC1000
direct allocation
page execute read
E450000
unkown
page read and write
1220000
unkown
page read and write
8B70000
unkown
page read and write
1200000
unkown
page read and write
1F0000
heap
page read and write
A0D000
heap
page read and write
1DDD8000
direct allocation
page readonly
6CFD2000
unkown
page readonly
184000
heap
page read and write
A0A9000
stack
page read and write
2D0E000
trusted library allocation
page read and write
BE70000
unkown
page readonly
3380000
unkown
page read and write
8B70000
unkown
page read and write
8B70000
unkown
page read and write
A83000
heap
page read and write
2C98000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
600000
heap
page read and write
30A0000
unkown
page read and write
7E60000
unkown
page read and write
EF0000
heap
page read and write
2C99000
trusted library allocation
page read and write
4A44000
unkown
page read and write
30B0000
unkown
page read and write
7FF5D732D000
unkown
page readonly
1B484000
heap
page read and write
3090000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D7740000
unkown
page readonly
30A0000
unkown
page read and write
3280000
unkown
page read and write
AA06000
unkown
page read and write
30D0000
unkown
page read and write
1731000
unkown
page readonly
9CE000
heap
page read and write
9CE000
heap
page read and write
30B0000
unkown
page read and write
1220000
unkown
page read and write
81F000
heap
page read and write
20174000
heap
page read and write
3230000
unkown
page read and write
3500000
stack
page read and write
7FF5D7407000
unkown
page readonly
3630000
unkown
page readonly
7FF5D7523000
unkown
page readonly
910000
heap
page read and write
7FF5D71A6000
unkown
page readonly
3230000
unkown
page read and write
404000
unkown
page execute and write copy
30E0000
unkown
page read and write
3240000
unkown
page read and write
3230000
unkown
page read and write
2CA8000
trusted library allocation
page read and write
30C0000
unkown
page read and write
7FF5D7215000
unkown
page readonly
6CFBD000
unkown
page readonly
C0BA000
stack
page read and write
7FF5D74FA000
unkown
page readonly
1220000
unkown
page read and write
7FF5D66E8000
unkown
page readonly
94F4000
unkown
page read and write
4D8F000
stack
page read and write
10659000
unkown
page read and write
C5FD000
unkown
page read and write
1220000
unkown
page read and write
10504000
unkown
page read and write
2C76000
trusted library allocation
page read and write
FF0000
unkown
page readonly
1DA53000
heap
page read and write
2C89000
trusted library allocation
page read and write
5E0000
heap
page read and write
30C0000
unkown
page read and write
2CED000
trusted library allocation
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
2CAA000
trusted library allocation
page read and write
A7D000
heap
page read and write
2140000
direct allocation
page execute and read and write
30C0000
unkown
page read and write
1220000
unkown
page read and write
2CBF000
trusted library allocation
page read and write
3100000
unkown
page read and write
2CEE000
trusted library allocation
page read and write
7FF5D7797000
unkown
page readonly
1228000
unkown
page read and write
B4EF000
stack
page read and write
30C0000
unkown
page read and write
7FF5D717C000
unkown
page readonly
2CA7000
trusted library allocation
page read and write
C7BE000
unkown
page read and write
C035000
stack
page read and write
2CFA000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
AAAA000
unkown
page read and write
9460000
unkown
page read and write
91A000
heap
page read and write
7FF5D7272000
unkown
page readonly
1222F000
stack
page read and write
B8DB000
stack
page read and write
2C8D000
trusted library allocation
page read and write
3230000
unkown
page read and write
A27000
heap
page read and write
2C85000
trusted library allocation
page read and write
30C0000
unkown
page read and write
7FF5D71E0000
unkown
page readonly
2C91000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
550000
heap
page read and write
3230000
unkown
page read and write
30A0000
unkown
page read and write
3230000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
7FF5D7604000
unkown
page readonly
89FC000
stack
page read and write
9C000
stack
page read and write
A14000
heap
page read and write
2CE6000
trusted library allocation
page read and write
9F1000
heap
page read and write
3240000
unkown
page read and write
2C98000
trusted library allocation
page read and write
86D0000
unkown
page readonly
30C0000
unkown
page read and write
A28D000
unkown
page read and write
5BE000
stack
page read and write
30C0000
unkown
page read and write
2CBD000
trusted library allocation
page read and write
7FF5D777A000
unkown
page readonly
3250000
unkown
page read and write
30C0000
unkown
page read and write
107CA000
unkown
page read and write
7FF5D7639000
unkown
page readonly
30C0000
unkown
page read and write
76F8000
unkown
page read and write
2D73000
trusted library allocation
page read and write
7FF5D7391000
unkown
page readonly
2CA8000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FF5D745B000
unkown
page readonly
30A0000
unkown
page read and write
B83000
heap
page read and write
7C0000
heap
page read and write
1B5CC000
stack
page read and write
498000
unkown
page write copy
2CBD000
trusted library allocation
page read and write
18FF0000
remote allocation
page read and write
2EAB000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
7FF5D720A000
unkown
page readonly
114000
heap
page read and write
BE90000
unkown
page read and write
21CD000
stack
page read and write
30B0000
unkown
page read and write
9AC000
heap
page read and write
A34000
heap
page read and write
A3D000
heap
page read and write
9BC000
heap
page read and write
2D7B000
trusted library allocation
page read and write
1200000
unkown
page read and write
A286000
unkown
page read and write
2C89000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
3080000
stack
page read and write
2C81000
trusted library allocation
page read and write
30C0000
unkown
page read and write
F0C000
heap
page read and write
30C0000
unkown
page read and write
32D0000
heap
page read and write
2C89000
trusted library allocation
page read and write
7FF5D748A000
unkown
page readonly
1DBB0000
heap
page read and write
895000
heap
page read and write
30FB000
stack
page read and write
3090000
unkown
page read and write
7FF5D75EE000
unkown
page readonly
30B0000
unkown
page read and write
16B7E000
stack
page read and write
3230000
unkown
page read and write
30C0000
unkown
page read and write
30D0000
unkown
page read and write
30B0000
unkown
page read and write
107C3000
unkown
page read and write
2CC6000
trusted library allocation
page read and write
7691000
unkown
page read and write
110000
heap
page read and write
30F0000
unkown
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
9AAC000
unkown
page read and write
3310000
unkown
page read and write
9D4000
heap
page read and write
30F0000
unkown
page read and write
4AB0000
unkown
page read and write
8A70000
unkown
page read and write
6CF40000
unkown
page readonly
1000000
heap
page read and write
C642000
unkown
page read and write
8B70000
unkown
page read and write
498000
unkown
page read and write
2021B000
heap
page read and write
3230000
unkown
page read and write
FDAF000
stack
page read and write
7FF5D6BEF000
unkown
page readonly
30C0000
unkown
page read and write
A264000
unkown
page read and write
2CAD000
trusted library allocation
page read and write
30C0000
unkown
page read and write
2C85000
trusted library allocation
page read and write
A43000
heap
page read and write
3240000
unkown
page read and write
9D67000
unkown
page read and write
30E0000
unkown
page read and write
657000
heap
page read and write
8E50000
unkown
page read and write
30B0000
unkown
page read and write
A35000
heap
page read and write
7FF5D7404000
unkown
page readonly
A54000
heap
page read and write
1F0000
unclassified section
page read and write
8B70000
unkown
page read and write
C496000
unkown
page read and write
49FA000
unkown
page read and write
7FF5D7309000
unkown
page readonly
8B70000
unkown
page read and write
7FD000
heap
page read and write
3230000
unkown
page read and write
9B8000
heap
page read and write
8870000
unkown
page readonly
30C0000
unkown
page read and write
7FF5D729E000
unkown
page readonly
9CE000
heap
page read and write
96FE000
stack
page read and write
30C0000
unkown
page read and write
140000
heap
page read and write
A2A000
heap
page read and write
8B70000
unkown
page read and write
7FF5D75CB000
unkown
page readonly
7FF5D7073000
unkown
page readonly
1220000
unkown
page read and write
99C0000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
107CA000
unkown
page read and write
9CE000
heap
page read and write
A4D000
heap
page read and write
FDEE000
stack
page read and write
A9FD000
unkown
page read and write
A90000
heap
page read and write
A12F000
stack
page read and write
9E3000
heap
page read and write
8B70000
unkown
page read and write
11A0000
unkown
page read and write
A34000
heap
page read and write
30C0000
unkown
page read and write
A1F000
heap
page read and write
11A0000
unkown
page read and write
A72000
heap
page read and write
7609000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
7FF5D77F7000
unkown
page readonly
35BD000
unkown
page read and write
30F0000
unkown
page read and write
A49000
heap
page read and write
30C0000
unkown
page read and write
7F0000
heap
page read and write
2C95000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
7DF4F2491000
unkown
page execute read
2CA8000
trusted library allocation
page read and write
30E0000
unkown
page read and write
30C0000
unkown
page read and write
801000
heap
page read and write
8B70000
unkown
page read and write
3240000
unkown
page read and write
A31000
heap
page read and write
7C70000
unkown
page readonly
3371000
unkown
page read and write
30B0000
unkown
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
3240000
unkown
page read and write
8B70000
unkown
page read and write
9F1000
heap
page read and write
C24E000
stack
page read and write
3090000
heap
page read and write
1F81000
heap
page read and write
3240000
unkown
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
2C96000
trusted library allocation
page read and write
A17000
heap
page read and write
7FF5D75F6000
unkown
page readonly
30B0000
unkown
page read and write
3240000
unkown
page read and write
3240000
unkown
page read and write
9AA0000
unkown
page read and write
30C0000
unkown
page read and write
3090000
unkown
page read and write
30B0000
unkown
page read and write
4980000
unkown
page read and write
3160000
unkown
page read and write
2ECE000
stack
page read and write
8B70000
unkown
page read and write
7FF5D776F000
unkown
page readonly
7FF5D770F000
unkown
page readonly
30B0000
unkown
page read and write
8DA000
heap
page read and write
C48B000
unkown
page read and write
8B70000
unkown
page read and write
A14000
heap
page read and write
7FF5D75F9000
unkown
page readonly
7FF5D75C1000
unkown
page readonly
1220000
unkown
page read and write
35C1000
unkown
page read and write
30C0000
unkown
page read and write
2CBC000
trusted library allocation
page read and write
9EF000
heap
page read and write
8B70000
unkown
page read and write
97FF000
stack
page read and write
3230000
unkown
page read and write
30C0000
unkown
page read and write
B14000
heap
page read and write
3240000
unkown
page read and write
2340000
heap
page read and write
400000
unkown
page readonly
30C0000
unkown
page read and write
11A0000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
1200000
unkown
page read and write
30C0000
unkown
page read and write
1F83000
heap
page read and write
3240000
unkown
page read and write
C892000
unkown
page read and write
107CA000
unkown
page read and write
2CAD000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
30C0000
unkown
page read and write
3230000
unkown
page read and write
7CB0000
unkown
page readonly
760B000
unkown
page read and write
30C0000
unkown
page read and write
2CA8000
trusted library allocation
page read and write
75F000
stack
page read and write
A15000
heap
page read and write
7FF5D76CD000
unkown
page readonly
30C0000
unkown
page read and write
35D1000
unkown
page read and write
997000
heap
page read and write
2C93000
trusted library allocation
page read and write
1DA50000
heap
page read and write
30C0000
unkown
page read and write
B7DC000
stack
page read and write
2C77000
trusted library allocation
page read and write
2EB0000
unkown
page read and write
7FF5D77A4000
unkown
page readonly
A6A000
heap
page read and write
30C0000
unkown
page read and write
7FF5D7641000
unkown
page readonly
1160000
unkown
page read and write
2CAF000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
9A90000
unkown
page read and write
A16000
heap
page read and write
2D4A000
trusted library allocation
page read and write
760D000
unkown
page read and write
C62D000
unkown
page read and write
52B000
remote allocation
page execute and read and write
7FF5D7792000
unkown
page readonly
8B70000
unkown
page read and write
30A0000
unkown
page read and write
1DE0F000
direct allocation
page readonly
30D0000
unkown
page read and write
2D4A000
trusted library allocation
page read and write
3230000
unkown
page read and write
2C9C000
trusted library allocation
page read and write
11A0000
unkown
page read and write
1220000
unkown
page read and write
7654000
unkown
page read and write
30B0000
unkown
page read and write
A56000
heap
page read and write
AA92000
unkown
page read and write
7FF5D7722000
unkown
page readonly
7B80000
unkown
page readonly
1220000
unkown
page read and write
7FF5D7376000
unkown
page readonly
3240000
unkown
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
3230000
unkown
page read and write
A44000
heap
page read and write
7AE0000
unkown
page read and write
C483000
unkown
page read and write
30F0000
unkown
page read and write
1E449000
heap
page read and write
D96E000
stack
page read and write
6CB5F000
unkown
page write copy
30A0000
unkown
page read and write
30C0000
unkown
page read and write
A416000
unkown
page read and write
A1D000
heap
page read and write
7FF5D760E000
unkown
page readonly
107CA000
unkown
page read and write
7FF5D760B000
unkown
page readonly
9C6000
heap
page read and write
2190000
direct allocation
page read and write
11A0000
unkown
page read and write
130000
heap
page read and write
7FF5D770A000
unkown
page readonly
9AC3000
unkown
page read and write
9460000
unkown
page read and write
2C76000
trusted library allocation
page read and write
1220000
unkown
page read and write
30C0000
unkown
page read and write
238F000
stack
page read and write
A48000
heap
page read and write
C47F000
unkown
page read and write
107CA000
unkown
page read and write
1200000
unkown
page read and write
3240000
unkown
page read and write
A2C000
heap
page read and write
AA09000
unkown
page read and write
2C81000
trusted library allocation
page read and write
AE1D000
stack
page read and write
7FF5D775C000
unkown
page readonly
A78000
heap
page read and write
8DE000
stack
page read and write
7C80000
unkown
page read and write
B4BF000
stack
page read and write
30C0000
unkown
page read and write
1E9E9000
heap
page read and write
A72000
heap
page read and write
30B0000
unkown
page read and write
7FF5D71CC000
unkown
page readonly
9BD000
heap
page read and write
A20000
heap
page read and write
30B0000
unkown
page read and write
A3D000
heap
page read and write
2CBE000
trusted library allocation
page read and write
30C0000
unkown
page read and write
7FF5D7289000
unkown
page readonly
7FF5D723C000
unkown
page readonly
48E000
unkown
page readonly
89B000
heap
page read and write
30C0000
unkown
page read and write
30C0000
unkown
page read and write
A4D000
heap
page read and write
30C0000
unkown
page read and write
2C70000
trusted library allocation
page read and write
7FF5D749B000
unkown
page readonly
2CB8000
trusted library allocation
page read and write
1E4DA000
heap
page read and write
30B0000
unkown
page read and write
A9DF000
unkown
page read and write
9B2000
heap
page read and write
2CA8000
trusted library allocation
page read and write
30C0000
unkown
page read and write
8979000
stack
page read and write
A1C000
heap
page read and write
9B8D000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
8B70000
unkown
page read and write
2C8A000
trusted library allocation
page read and write
9460000
unkown
page read and write
3230000
unkown
page read and write
7FF5D7230000
unkown
page readonly
C450000
unkown
page read and write
30C0000
unkown
page read and write
7FF5D7280000
unkown
page readonly
3240000
unkown
page read and write
93B0000
stack
page read and write
2CAF000
trusted library allocation
page read and write
89B000
heap
page read and write
7FF5D7202000
unkown
page readonly
2EB0000
unkown
page read and write
C800000
unkown
page read and write
2C85000
trusted library allocation
page read and write
1200000
unkown
page read and write
107CA000
unkown
page read and write
30C0000
unkown
page read and write
C5F4000
unkown
page read and write
8B70000
unkown
page read and write
30B0000
unkown
page read and write
A384000
unkown
page read and write
1220000
unkown
page read and write
79E000
stack
page read and write
3240000
unkown
page read and write
10642000
unkown
page read and write
5DF000
stack
page read and write
2C94000
trusted library allocation
page read and write
1220000
unkown
page read and write
30E0000
unkown
page read and write
401000
unkown
page execute read
52E000
remote allocation
page execute and read and write
2E12000
trusted library allocation
page read and write
9EE000
heap
page read and write
3520000
unkown
page readonly
9AAA000
unkown
page read and write
30C0000
unkown
page read and write
7435000
stack
page read and write
7FF5D7799000
unkown
page readonly
8E50000
unkown
page read and write
3230000
unkown
page read and write
F335000
unkown
page read and write
A3D000
heap
page read and write
2C91000
trusted library allocation
page read and write
C625000
unkown
page read and write
7FF5D7703000
unkown
page readonly
30B0000
unkown
page read and write
2C8D000
trusted library allocation
page read and write
9ADB000
unkown
page read and write
8B70000
unkown
page read and write
3240000
unkown
page read and write
A1D000
heap
page read and write
2C91000
trusted library allocation
page read and write
30B0000
unkown
page read and write
7FF5D6BE4000
unkown
page readonly
9A98000
unkown
page read and write
2C89000
trusted library allocation
page read and write
3270000
unkown
page read and write
30C0000
unkown
page read and write
892000
heap
page read and write
9AF9000
unkown
page read and write
2CD6000
trusted library allocation
page read and write
401000
unkown
page execute and write copy
2CA4000
trusted library allocation
page read and write
2FCF000
stack
page read and write
8880000
unkown
page readonly
5E0000
heap
page read and write
9A4000
heap
page read and write
30B0000
unkown
page read and write
8B70000
unkown
page read and write
30C0000
unkown
page read and write
7631000
unkown
page read and write
A12000
heap
page read and write
A57000
heap
page read and write
7FF5D75E9000
unkown
page readonly
30B0000
unkown
page read and write
30B0000
unkown
page read and write
5EE000
heap
page read and write
30C0000
unkown
page read and write
30B0000
unkown
page read and write
8CB8000
stack
page read and write
30C0000
unkown
page read and write
7FF5D764F000
unkown
page readonly
There are 2093 hidden memdumps, click here to show them.