IOC Report
xvJv1BpknZ.exe

loading gif

Files

File Path
Type
Category
Malicious
xvJv1BpknZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\FBGIDHCAAKEB\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FBGIDHCAAKEB\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FBGIDHCAAKEB\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\FBGIDHCAAKEB\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\sqls[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5876.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\EE6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\katDDA4.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\etrtabd
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\etrtabd:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\FBGIDHCAAKEB\AEBKEC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FBGIDHCAAKEB\BFIIID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBGIDHCAAKEB\DAKEHI
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\FBGIDHCAAKEB\ECAEGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBGIDHCAAKEB\GHDBAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FBGIDHCAAKEB\GIEBAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBGIDHCAAKEB\HIJJEG
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\FBGIDHCAAKEB\IDGDAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBGIDHCAAKEB\IEBAAF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\FBGIDHCAAKEB\JJDBFC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FBGIDHCAAKEB\JJDBFC-shm
data
dropped
C:\ProgramData\FBGIDHCAAKEB\JKEBFB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FBGIDHCAAKEB\JKEBFB-shm
data
dropped
C:\ProgramData\FBGIDHCAAKEB\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\FBGIDHCAAKEB\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5876.exe_bb83caaba8bfb67bcd28d62359ef968548a83a_8606972a_f768a413-62bc-4891-a9fa-1e0424f3e302\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDB1.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 27 13:24:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREE9D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREECC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\76561199689717899[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3063), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xvJv1BpknZ.exe
"C:\Users\user\Desktop\xvJv1BpknZ.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\etrtabd
C:\Users\user\AppData\Roaming\etrtabd
malicious
C:\Users\user\AppData\Local\Temp\5876.exe
C:\Users\user\AppData\Local\Temp\5876.exe
malicious
C:\Users\user\AppData\Local\Temp\EE6.exe
C:\Users\user\AppData\Local\Temp\EE6.exe
malicious
C:\Users\user\AppData\Local\Temp\katDDA4.tmp
C:\Users\user\AppData\Local\Temp\katDDA4.tmp
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7992 -s 468
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\AppData\Local\Temp\katDDA4.tmp" & rd /s /q "C:\ProgramData\FBGIDHCAAKEB" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
whispedwoodmoodsksl.shop
malicious
http://guteyr.cc/tmp/index.php
malicious
http://45.129.96.86/file/update.exe
45.129.96.86
malicious
https://steamcommunity.com/profiles/76561199689717899
104.102.42.29
malicious
holicisticscrarws.shop
malicious
https://37.27.34.12/mozglue.dll
37.27.34.12
https://duckduckgo.com/chrome_newtab
unknown
https://powerpoint.office.comer
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://37.27.34.12
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://37.27.34.12/=
unknown
https://37.27.34.12/
37.27.34.12
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://s.ytimg.com;
unknown
https://t.me/copterwin
unknown
https://37.27.34.12BFBKFB
unknown
https://android.notify.windows.com/iOSd
unknown
https://whispedwoodmoodsksl.shop/D
unknown
https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
unknown
https://whispedwoodmoodsksl.shop/H
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://t.me/copterwinr0isMozilla/5.0
unknown
https://37.27.34.12/freebl3.dllBu
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://37.27.34.12/vcruntime140.dlly
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://whispedwoodmoodsksl.shop/n
unknown
https://www.google.com/recaptcha/
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://checkout.steampowered.com/
unknown
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
unknown
https://37.27.34.12/freebl3.dll
37.27.34.12
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
unknown
https://help.steampowered.com/en/
unknown
https://java.co
unknown
https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
http://schemas.micro
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
unknown
https://37.27.34.12/freebl3.dll0u
unknown
https://steamcommunity.com/workshop/
unknown
https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199689717899/badges
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://store.steampowered.com/legal/
unknown
https://37.27.34.12/nss3.dll
37.27.34.12
https://37.27.34.12/softokn3.dllX:/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://37.27.34.12KEBFIE
unknown
https://37.27.34.12/msvcp140.dlly
unknown
http://rpi.net.au/~ajohnson/resourcehacker
unknown
https://store.steampowered.com/
unknown
https://37.27.34.12/softokn3.dll
37.27.34.12
http://ns.adobeS
unknown
http://127.0.0.1:27060
unknown
https://steamcommunity.com/login/home/?go
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA-dark
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0E948A694F8C48079B908C8EA9DDF9EA&timeOut=5000&oc
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=X93cgZRtuH6z&l=engli
unknown
https://api.steampowered.com/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://store.steampowered.com/mobile
unknown
https://www.msn.com:443/en-us/feed
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whispedwoodmoodsksl.shop
188.114.96.3
malicious
steamcommunity.com
104.102.42.29
malicious
dbfhns.in
190.13.174.94
malicious
15.164.165.52.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
23.145.40.124
unknown
Reserved
malicious
190.147.128.172
unknown
Colombia
malicious
109.175.29.39
unknown
Bosnia and Herzegowina
malicious
104.102.42.29
steamcommunity.com
United States
malicious
190.13.174.94
dbfhns.in
Chile
malicious
188.114.96.3
whispedwoodmoodsksl.shop
European Union
malicious
91.202.233.231
unknown
Russian Federation
malicious
45.129.96.86
unknown
Estonia
malicious
37.27.34.12
unknown
Iran (ISLAMIC Republic Of)
185.235.137.54
unknown
Iran (ISLAMIC Republic Of)

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
KGLToGCSUpdatedRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.M2V\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MPE\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
There are 182 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4279000
direct allocation
page execute and read and write
malicious
21E0000
direct allocation
page read and write
malicious
2441000
unclassified section
page read and write
malicious
2120000
direct allocation
page read and write
malicious
929000
heap
page read and write
malicious
44B0000
direct allocation
page read and write
malicious
3C01000
unclassified section
page read and write
malicious
4470000
direct allocation
page execute and read and write
malicious
4170000
direct allocation
page execute and read and write
malicious
8CA0000
unkown
page read and write
7DF411EF0000
unkown
page readonly
422000
remote allocation
page execute and read and write
9DF000
heap
page read and write
7FF503010000
unkown
page readonly
5BE000
stack
page read and write
A06000
heap
page read and write
9C2000
heap
page read and write
9EC000
heap
page read and write
EE20000
unkown
page read and write
2D7D000
trusted library allocation
page read and write
7FF503020000
unkown
page readonly
ECD4000
unkown
page read and write
100DA000
unkown
page read and write
72A000
heap
page read and write
BC0000
unkown
page read and write
B37000
heap
page read and write
6EE6000
unkown
page read and write
DFD0000
unkown
page read and write
80C0000
unkown
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
7FA000
heap
page read and write
ECD6000
unkown
page read and write
877000
heap
page read and write
7F70000
unkown
page readonly
BFEE000
unkown
page read and write
76D0000
unkown
page read and write
76D0000
unkown
page read and write
7FF502D48000
unkown
page readonly
91A7000
unkown
page read and write
7FF502B6E000
unkown
page readonly
A0D000
heap
page read and write
7FF5031B0000
unkown
page readonly
76AE000
stack
page read and write
DFD0000
unkown
page read and write
8090000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
8C70000
unkown
page read and write
DFD0000
unkown
page read and write
8CA0000
unkown
page read and write
80B0000
unkown
page read and write
B5F0000
unkown
page readonly
DFD0000
unkown
page read and write
2CBE000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
2CA1000
trusted library allocation
page read and write
1E3A0000
trusted library allocation
page read and write
1DDD8000
direct allocation
page readonly
8CA0000
unkown
page read and write
80B0000
unkown
page read and write
77D000
stack
page read and write
80C0000
unkown
page read and write
76D0000
unkown
page read and write
8080000
unkown
page read and write
9C000
stack
page read and write
2C92000
trusted library allocation
page read and write
BC0000
unkown
page read and write
7FF5032B5000
unkown
page readonly
7FF503114000
unkown
page readonly
BC15000
unkown
page read and write
85D000
heap
page read and write
3082000
unkown
page read and write
1E43C000
heap
page read and write
7FF502C2E000
unkown
page readonly
9E0000
heap
page read and write
80B0000
unkown
page read and write
2C8E000
trusted library allocation
page read and write
1F71000
unkown
page readonly
80B0000
unkown
page read and write
6FE3000
unkown
page read and write
BCD000
unkown
page read and write
968000
heap
page read and write
6D0000
heap
page read and write
919F000
unkown
page read and write
85D000
heap
page read and write
80B0000
unkown
page read and write
A02000
heap
page read and write
80B0000
unkown
page read and write
2CB8000
trusted library allocation
page read and write
8090000
unkown
page read and write
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
2500000
unkown
page read and write
DFD0000
unkown
page read and write
A06000
heap
page read and write
2C78000
trusted library allocation
page read and write
8090000
unkown
page read and write
2C97000
trusted library allocation
page read and write
7FF5030B4000
unkown
page readonly
1DAC1000
heap
page read and write
A0A000
heap
page read and write
7840000
unkown
page read and write
7FF50327C000
unkown
page readonly
9FD000
heap
page read and write
3C40000
heap
page read and write
2C8B000
trusted library allocation
page read and write
100DA000
unkown
page read and write
B1BF000
stack
page read and write
8C70000
unkown
page read and write
BC0000
unkown
page read and write
23DF000
stack
page read and write
EE20000
unkown
page read and write
BDF5000
unkown
page read and write
100DA000
unkown
page read and write
48C000
unkown
page read and write
829B000
stack
page read and write
2C90000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
8090000
unkown
page read and write
7580000
unkown
page read and write
9DF000
heap
page read and write
8070000
unkown
page read and write
DFD0000
unkown
page read and write
879000
heap
page read and write
35EF000
trusted library allocation
page read and write
BC0000
unkown
page read and write
572000
remote allocation
page execute and read and write
9D7000
heap
page read and write
16B70000
remote allocation
page read and write
DFD0000
unkown
page read and write
2C8F000
trusted library allocation
page read and write
9F6000
heap
page read and write
7750000
unkown
page read and write
9830000
unkown
page read and write
BC0000
unkown
page read and write
2CB2000
trusted library allocation
page read and write
7FF503051000
unkown
page readonly
8C90000
unkown
page read and write
DFD0000
unkown
page read and write
7FF50270A000
unkown
page readonly
80B0000
unkown
page read and write
8080000
unkown
page read and write
6ED7000
unkown
page read and write
9800000
unkown
page read and write
1B5CC000
stack
page read and write
80C0000
unkown
page read and write
80B0000
unkown
page read and write
7FF502CD4000
unkown
page readonly
80C0000
unkown
page read and write
BEAF000
unkown
page read and write
7FF502E9C000
unkown
page readonly
7FF502D91000
unkown
page readonly
96E000
heap
page read and write
7FF502F86000
unkown
page readonly
16B1D000
stack
page read and write
7BE000
stack
page read and write
1DDCF000
direct allocation
page readonly
BDE0000
unkown
page read and write
80B0000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
BC0000
unkown
page read and write
283AF000
stack
page read and write
9CF2000
unkown
page read and write
BEE8000
unkown
page read and write
80D0000
unkown
page read and write
8C80000
unkown
page read and write
8C80000
unkown
page read and write
295E000
stack
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
7FF50317C000
unkown
page readonly
2C7A000
trusted library allocation
page read and write
8C70000
unkown
page read and write
1F0000
heap
page read and write
80C0000
unkown
page read and write
2D23000
trusted library allocation
page read and write
80B0000
unkown
page read and write
70A000
heap
page read and write
B36000
heap
page read and write
7FF5032CF000
unkown
page readonly
2CFA000
trusted library allocation
page read and write
7750000
unkown
page read and write
80B0000
unkown
page read and write
B6AC000
unkown
page read and write
983000
heap
page read and write
7FF502F4B000
unkown
page readonly
2D30000
trusted library allocation
page read and write
2A60000
unkown
page readonly
AF80000
unkown
page read and write
16BAE000
stack
page read and write
97E000
heap
page read and write
9F6000
heap
page read and write
95E000
heap
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
9FF000
heap
page read and write
8C80000
unkown
page read and write
97E000
heap
page read and write
7FF5030C4000
unkown
page readonly
8080000
unkown
page read and write
A01000
heap
page read and write
FE9B000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
9E1000
heap
page read and write
960000
heap
page read and write
2F20000
unkown
page readonly
DFD0000
unkown
page read and write
8C80000
unkown
page read and write
BC0000
unkown
page read and write
9D01000
unkown
page read and write
2C81000
trusted library allocation
page read and write
9D7000
heap
page read and write
6E6E2000
unkown
page readonly
8BF0000
unkown
page read and write
2C8F000
trusted library allocation
page read and write
48E000
unkown
page readonly
2C81000
trusted library allocation
page read and write
8090000
unkown
page read and write
DCA0000
stack
page read and write
8C70000
unkown
page read and write
2C78000
trusted library allocation
page read and write
7FF4ECBF5000
unkown
page readonly
2D4E000
stack
page read and write
963000
heap
page read and write
1F0000
heap
page read and write
80B0000
unkown
page read and write
4378000
unkown
page read and write
8090000
unkown
page read and write
4020000
direct allocation
page execute and read and write
BC0000
unkown
page read and write
8090000
unkown
page read and write
7FF50331B000
unkown
page readonly
7750000
unkown
page read and write
80B0000
unkown
page read and write
9C8000
heap
page read and write
8C70000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
8C70000
unkown
page read and write
991000
heap
page read and write
B237000
stack
page read and write
BC0000
unkown
page read and write
960000
heap
page read and write
9DE000
heap
page read and write
BC0000
unkown
page read and write
2CCA000
trusted library allocation
page read and write
8100000
unkown
page readonly
A98F000
stack
page read and write
2DB3000
trusted library allocation
page read and write
8CA0000
unkown
page read and write
B5E0000
unkown
page read and write
80B0000
unkown
page read and write
21FE000
heap
page read and write
2C80000
trusted library allocation
page read and write
7F80000
unkown
page read and write
9416000
unkown
page read and write
E90000
unkown
page readonly
8C70000
unkown
page read and write
44D0000
unkown
page read and write
BC0000
unkown
page read and write
2D24000
trusted library allocation
page read and write
425000
unkown
page write copy
7FF502D68000
unkown
page readonly
8D48000
stack
page read and write
A06000
heap
page read and write
2C9F000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
BC08000
unkown
page read and write
2C86000
trusted library allocation
page read and write
19C000
stack
page read and write
7FF502D84000
unkown
page readonly
9DE000
heap
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
821B000
stack
page read and write
43C000
remote allocation
page execute and read and write
7F80000
unkown
page read and write
BC0000
unkown
page read and write
4AC000
unkown
page write copy
8090000
unkown
page read and write
8C80000
unkown
page read and write
1F0000
heap
page read and write
434000
remote allocation
page execute and read and write
9C2000
heap
page read and write
22D0000
heap
page read and write
EE20000
unkown
page read and write
2CA1000
trusted library allocation
page read and write
80A0000
unkown
page read and write
FE14000
unkown
page read and write
BC0000
unkown
page read and write
BC0000
unkown
page read and write
972000
heap
page read and write
6E651000
unkown
page execute read
9364000
unkown
page read and write
DFD0000
unkown
page read and write
96A000
heap
page read and write
2D3B000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
991000
heap
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
8C70000
unkown
page read and write
7549000
stack
page read and write
7FF503239000
unkown
page readonly
A76B000
stack
page read and write
7FF50332C000
unkown
page readonly
9092000
unkown
page read and write
7FF5030A3000
unkown
page readonly
80B0000
unkown
page read and write
2CB2000
trusted library allocation
page read and write
8F0000
heap
page read and write
80B0000
unkown
page read and write
7FF5032F2000
unkown
page readonly
E4CF000
stack
page read and write
7FF502D61000
unkown
page readonly
80A0000
unkown
page read and write
EE20000
unkown
page read and write
2C78000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
A3A000
heap
page read and write
1DE0D000
direct allocation
page readonly
A23000
heap
page read and write
1E70C000
stack
page read and write
1EA96000
heap
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF503185000
unkown
page readonly
988000
heap
page read and write
2064000
heap
page read and write
100D3000
unkown
page read and write
2CA4000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
7FF502F6F000
unkown
page readonly
2D70000
heap
page read and write
2C81000
trusted library allocation
page read and write
8C70000
unkown
page read and write
BC0000
unkown
page read and write
9C7000
heap
page read and write
8C70000
unkown
page read and write
7FF502DC0000
unkown
page readonly
8070000
unkown
page read and write
9830000
unkown
page read and write
7F0000
heap
page read and write
BC0000
unkown
page read and write
7FF5031E8000
unkown
page readonly
860000
heap
page read and write
AA8D000
stack
page read and write
DFD0000
unkown
page read and write
8CA0000
unkown
page read and write
DFD0000
unkown
page read and write
449A000
unkown
page read and write
8000000
unkown
page read and write
2E79000
stack
page read and write
8C80000
unkown
page read and write
8070000
unkown
page read and write
BC2000
unkown
page read and write
401000
unkown
page execute read
A28000
heap
page read and write
972000
heap
page read and write
96E000
heap
page read and write
7FF503275000
unkown
page readonly
DFD0000
unkown
page read and write
100DA000
unkown
page read and write
8596000
unkown
page read and write
8CA0000
unkown
page read and write
96A000
heap
page read and write
2D30000
trusted library allocation
page read and write
ABD0000
unkown
page read and write
7FF502DB3000
unkown
page readonly
6ED0000
unkown
page read and write
30D0000
heap
page read and write
B78F000
stack
page read and write
8051000
unkown
page read and write
2CA7000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
30A1000
unkown
page read and write
80B0000
unkown
page read and write
BC0000
unkown
page read and write
416000
unkown
page readonly
7750000
unkown
page read and write
2D47000
trusted library allocation
page read and write
BC0000
unkown
page read and write
80A0000
unkown
page read and write
DFD0000
unkown
page read and write
2CC7000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
9FB000
heap
page read and write
8C70000
unkown
page read and write
8C80000
unkown
page read and write
8090000
unkown
page read and write
8C80000
unkown
page read and write
2178000
heap
page read and write
7FF5031AD000
unkown
page readonly
862000
heap
page read and write
7FF503298000
unkown
page readonly
7FF5032EB000
unkown
page readonly
427000
unkown
page read and write
976000
heap
page read and write
7750000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
3E50000
heap
page read and write
8C70000
unkown
page read and write
2CA9000
trusted library allocation
page read and write
991000
heap
page read and write
2EF0000
stack
page read and write
9C8000
heap
page read and write
7FF502DCE000
unkown
page readonly
9FB000
heap
page read and write
6ECE000
unkown
page read and write
7480000
unkown
page read and write
7FF502D70000
unkown
page readonly
7FF502FAF000
unkown
page readonly
7FF5032BD000
unkown
page readonly
7560000
unkown
page readonly
9E6000
heap
page read and write
2CD6000
trusted library allocation
page read and write
76B0000
heap
page read and write
819F000
stack
page read and write
B68C000
stack
page read and write
967000
heap
page read and write
9C5000
heap
page read and write
DFD0000
unkown
page read and write
21F0000
heap
page read and write
A0E000
heap
page read and write
8C70000
unkown
page read and write
2CB0000
trusted library allocation
page read and write
BC0000
unkown
page read and write
A34000
heap
page read and write
264F000
stack
page read and write
B5D0000
unkown
page readonly
2C71000
trusted library allocation
page read and write
A22000
heap
page read and write
8090000
unkown
page read and write
BC0000
unkown
page read and write
9CF000
heap
page read and write
2D2F000
trusted library allocation
page read and write
7FF50328B000
unkown
page readonly
DFD0000
unkown
page read and write
2211000
heap
page read and write
9D0D000
unkown
page read and write
190000
stack
page read and write
862000
heap
page read and write
6D235000
unkown
page readonly
7720000
unkown
page readonly
BA8B000
stack
page read and write
80B0000
unkown
page read and write
8070000
unkown
page read and write
C1AB000
unkown
page read and write
8090000
unkown
page read and write
80B0000
unkown
page read and write
9D6B000
unkown
page read and write
2110000
direct allocation
page execute and read and write
8C80000
unkown
page read and write
8CA0000
unkown
page read and write
873000
heap
page read and write
BEA9000
unkown
page read and write
8090000
unkown
page read and write
BC0000
unkown
page read and write
96A000
heap
page read and write
8CA0000
unkown
page read and write
A02000
heap
page read and write
2CC5000
trusted library allocation
page read and write
7FF502D00000
unkown
page readonly
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
AAA0000
unkown
page readonly
30A5000
unkown
page read and write
8080000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
B009000
stack
page read and write
7FF502B78000
unkown
page readonly
862000
heap
page read and write
6EE4000
unkown
page read and write
DCA0000
unkown
page read and write
2CA4000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
97F9000
stack
page read and write
474E000
stack
page read and write
2C8B000
trusted library allocation
page read and write
9D7000
heap
page read and write
2C92000
trusted library allocation
page read and write
8C70000
unkown
page read and write
20D4000
heap
page read and write
7FF502DF9000
unkown
page readonly
80B0000
unkown
page read and write
8080000
unkown
page read and write
9F6000
heap
page read and write
7FFB000
stack
page read and write
76D0000
unkown
page read and write
9BAA000
unkown
page read and write
9CEA000
unkown
page read and write
BBE8000
unkown
page read and write
8CA0000
unkown
page read and write
40D000
unkown
page readonly
9CC000
heap
page read and write
2DD3000
trusted library allocation
page read and write
9CC000
heap
page read and write
ABE0000
unkown
page read and write
A2A000
heap
page read and write
FE96000
unkown
page read and write
ECC1000
unkown
page read and write
A8EA000
stack
page read and write
DFD0000
unkown
page read and write
2D60000
heap
page read and write
9CCF000
unkown
page read and write
2DA0000
unkown
page readonly
2C86000
trusted library allocation
page read and write
FED2000
unkown
page read and write
308F000
unkown
page read and write
8070000
unkown
page read and write
5F0000
heap
page read and write
7FF502B7D000
unkown
page readonly
9BF7000
unkown
page read and write
7FF502DB8000
unkown
page readonly
7FF503216000
unkown
page readonly
A0D000
heap
page read and write
9DF000
heap
page read and write
B09B000
stack
page read and write
2CA8000
trusted library allocation
page read and write
A06000
heap
page read and write
76D0000
unkown
page read and write
8070000
unkown
page read and write
4463000
unkown
page read and write
6D050000
unkown
page readonly
40B000
unkown
page execute read
DFD0000
unkown
page read and write
7FF5031C3000
unkown
page readonly
76A0000
unkown
page readonly
20D0000
heap
page read and write
85D000
heap
page read and write
2DC0000
unkown
page read and write
214A000
heap
page read and write
983000
heap
page read and write
DFD0000
unkown
page read and write
BC0C000
unkown
page read and write
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
E040000
heap
page read and write
2CA2000
trusted library allocation
page read and write
BDCD000
unkown
page read and write
2120000
direct allocation
page read and write
18FEF000
stack
page read and write
24E0000
unkown
page read and write
A36000
heap
page read and write
DFD0000
unkown
page read and write
7FF502B7F000
unkown
page readonly
86E000
stack
page read and write
B549000
stack
page read and write
4D00000
unkown
page write copy
DFD0000
unkown
page read and write
2E53000
trusted library allocation
page read and write
860000
heap
page read and write
7FF502E62000
unkown
page readonly
EE20000
unkown
page read and write
7FF503082000
unkown
page readonly
8070000
unkown
page read and write
A23000
heap
page read and write
BDA9000
unkown
page read and write
95E000
heap
page read and write
7FF502C8C000
unkown
page readonly
76D0000
unkown
page read and write
7FF502D65000
unkown
page readonly
2C79000
trusted library allocation
page read and write
BC0000
unkown
page read and write
9D4000
heap
page read and write
8070000
unkown
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
FE53000
unkown
page read and write
2021C000
heap
page read and write
8C70000
unkown
page read and write
76B5000
heap
page read and write
7FF503167000
unkown
page readonly
BC0000
unkown
page read and write
85C000
heap
page read and write
2D9B000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
A34A000
unkown
page read and write
997F000
stack
page read and write
DFD0000
unkown
page read and write
949000
heap
page read and write
2C94000
trusted library allocation
page read and write
A22000
heap
page read and write
9D8000
heap
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
EE6A000
heap
page read and write
7FF502EF3000
unkown
page readonly
8080000
unkown
page read and write
30A3000
unkown
page read and write
7FF502C4B000
unkown
page readonly
A346000
unkown
page read and write
9E5000
heap
page read and write
8CA0000
unkown
page read and write
7FF502B88000
unkown
page readonly
7FF503365000
unkown
page readonly
2CB1000
trusted library allocation
page read and write
8C80000
unkown
page read and write
2C71000
trusted library allocation
page read and write
8070000
unkown
page read and write
8090000
unkown
page read and write
534000
remote allocation
page execute and read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
80C0000
unkown
page read and write
8070000
unkown
page read and write
BC0000
unkown
page read and write
2161000
heap
page read and write
80B0000
unkown
page read and write
BC0000
unkown
page read and write
77FE000
stack
page read and write
2C80000
trusted library allocation
page read and write
8C80000
unkown
page read and write
2C74000
trusted library allocation
page read and write
80B0000
unkown
page read and write
860000
heap
page read and write
7FF503175000
unkown
page readonly
7FF502B93000
unkown
page readonly
7A60000
unkown
page read and write
6FBF000
unkown
page read and write
8C80000
unkown
page read and write
8889000
stack
page read and write
6EF3000
unkown
page read and write
4AF000
unkown
page write copy
96E000
heap
page read and write
DFD0000
unkown
page read and write
7750000
unkown
page read and write
BC0000
unkown
page read and write
1B50A000
heap
page read and write
7FF50323B000
unkown
page readonly
6B0000
heap
page read and write
2C83000
trusted library allocation
page read and write
9FA000
heap
page read and write
9800000
unkown
page read and write
9F9000
heap
page read and write
2D61000
trusted library allocation
page read and write
232E000
stack
page read and write
80B0000
unkown
page read and write
8C70000
unkown
page read and write
8CA0000
unkown
page read and write
2C75000
trusted library allocation
page read and write
875000
heap
page read and write
DFD0000
unkown
page read and write
7FF50308A000
unkown
page readonly
9B70000
unkown
page read and write
7FF503368000
unkown
page readonly
7FF503087000
unkown
page readonly
991000
heap
page read and write
192000
stack
page read and write
DFD0000
unkown
page read and write
7FF502DBC000
unkown
page readonly
DFD0000
unkown
page read and write
6F09000
unkown
page read and write
80B0000
unkown
page read and write
2CC6000
trusted library allocation
page read and write
DCA0000
unkown
page read and write
7FF5032C2000
unkown
page readonly
8080000
unkown
page read and write
7FF502B8B000
unkown
page readonly
1F71000
unkown
page readonly
2CAF000
trusted library allocation
page read and write
8090000
unkown
page read and write
80F0000
unkown
page readonly
80B0000
unkown
page read and write
7FF502D10000
unkown
page readonly
ABCB000
stack
page read and write
DFD0000
unkown
page read and write
A20000
heap
page read and write
9CC000
heap
page read and write
7750000
unkown
page read and write
80B0000
unkown
page read and write
7FF503006000
unkown
page readonly
99E000
heap
page read and write
992000
heap
page read and write
1F71000
unkown
page readonly
BC0000
unkown
page read and write
80B0000
unkown
page read and write
A3A000
heap
page read and write
80B0000
unkown
page read and write
6E15000
stack
page read and write
DC60000
unkown
page read and write
BC0000
unkown
page read and write
447A000
unkown
page read and write
80B0000
unkown
page read and write
8C80000
unkown
page read and write
80C0000
unkown
page read and write
80B0000
unkown
page read and write
22BD000
stack
page read and write
2C7A000
trusted library allocation
page read and write
8C80000
unkown
page read and write
7FF5032DF000
unkown
page readonly
4DB1000
unkown
page read and write
97E000
heap
page read and write
BC0000
unkown
page read and write
198000
stack
page read and write
DFD0000
unkown
page read and write
A06000
heap
page read and write
8C70000
unkown
page read and write
8080000
unkown
page read and write
3E51000
heap
page read and write
9830000
unkown
page read and write
80B0000
unkown
page read and write
2C7A000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
2CA2000
trusted library allocation
page read and write
9CC000
heap
page read and write
76D0000
unkown
page read and write
7FF50318B000
unkown
page readonly
75BE000
stack
page read and write
2C7F000
trusted library allocation
page read and write
7FF5032DB000
unkown
page readonly
DFD0000
unkown
page read and write
2DF0000
unkown
page read and write
977000
heap
page read and write
80A0000
unkown
page read and write
7FF502D1B000
unkown
page readonly
BC0000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
9CF6000
unkown
page read and write
400000
unkown
page execute and read and write
A01000
heap
page read and write
7FF50316E000
unkown
page readonly
2CB2000
trusted library allocation
page read and write
401000
unkown
page execute read
99E000
heap
page read and write
7FF502E53000
unkown
page readonly
A22000
heap
page read and write
7FF502CF5000
unkown
page readonly
80D0000
unkown
page read and write
2CA6000
trusted library allocation
page read and write
80C0000
unkown
page read and write
9C7000
heap
page read and write
80B0000
unkown
page read and write
1E434000
heap
page read and write
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
DFD0000
unkown
page read and write
96CC000
stack
page read and write
2C81000
trusted library allocation
page read and write
570000
heap
page read and write
1DA9E000
stack
page read and write
2CA4000
trusted library allocation
page read and write
8C70000
unkown
page read and write
80A0000
unkown
page read and write
BC0000
unkown
page read and write
1DED1000
heap
page read and write
8C70000
unkown
page read and write
416000
unkown
page readonly
DC60000
stack
page read and write
A36000
heap
page read and write
7FF502F9F000
unkown
page readonly
7FF503354000
unkown
page readonly
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
7750000
unkown
page read and write
425000
unkown
page write copy
2C80000
trusted library allocation
page read and write
7F8000
heap
page read and write
22FE000
stack
page read and write
9CE000
heap
page read and write
B5A1000
unkown
page read and write
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
DFD0000
unkown
page read and write
C0DE000
unkown
page read and write
818000
heap
page read and write
7FF5030FF000
unkown
page readonly
8C70000
unkown
page read and write
7D0000
heap
page read and write
B580000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
A22000
heap
page read and write
80B0000
unkown
page read and write
8080000
unkown
page read and write
7FF503151000
unkown
page readonly
BC0000
unkown
page read and write
EE20000
unkown
page read and write
2EB6000
trusted library allocation
page read and write
A06000
heap
page read and write
992000
heap
page read and write
DFD0000
unkown
page read and write
7710000
unkown
page readonly
9800000
unkown
page read and write
20BE000
stack
page read and write
B590000
heap
page read and write
2D25000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
80B0000
unkown
page read and write
9840000
unkown
page read and write
BE99000
unkown
page read and write
DFD0000
unkown
page read and write
7FF502D3E000
unkown
page readonly
DFD0000
unkown
page read and write
7FF503227000
unkown
page readonly
2120000
direct allocation
page execute and read and write
80B0000
unkown
page read and write
7FF5026F7000
unkown
page readonly
80B0000
unkown
page read and write
30CD000
unkown
page read and write
400000
unkown
page readonly
80C0000
unkown
page read and write
8B5000
stack
page read and write
8070000
unkown
page read and write
DFD0000
unkown
page read and write
20C0000
direct allocation
page execute and read and write
8080000
unkown
page read and write
2C89000
trusted library allocation
page read and write
309F000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
873000
heap
page read and write
2AC0000
unkown
page readonly
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
8CA0000
unkown
page read and write
968000
heap
page read and write
DFD0000
unkown
page read and write
43FD000
unkown
page read and write
7FF5030CE000
unkown
page readonly
988000
heap
page read and write
EE20000
unkown
page read and write
BDD5000
unkown
page read and write
43B0000
unkown
page read and write
44A0000
unkown
page read and write
1E58A000
heap
page read and write
2593000
heap
page read and write
BC0000
unkown
page read and write
7FF5030D9000
unkown
page readonly
2CA7000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
97E000
heap
page read and write
8070000
unkown
page read and write
A13000
heap
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
9FB000
heap
page read and write
80B0000
unkown
page read and write
9C09000
unkown
page read and write
2D34000
trusted library allocation
page read and write
EE20000
unkown
page read and write
9C0000
heap
page read and write
448A000
unkown
page read and write
BC0000
unkown
page read and write
9830000
unkown
page read and write
96E000
heap
page read and write
9C9000
heap
page read and write
8C70000
unkown
page read and write
9840000
unkown
page read and write
401000
unkown
page execute read
702D000
unkown
page read and write
80B0000
unkown
page read and write
7FF5030E6000
unkown
page readonly
1DAC0000
heap
page read and write
A0B000
heap
page read and write
80B0000
unkown
page read and write
1F0000
heap
page read and write
2430000
unclassified section
page read and write
2C78000
trusted library allocation
page read and write
765E000
stack
page read and write
8090000
unkown
page read and write
2070000
heap
page read and write
79D000
heap
page execute and read and write
BC27000
unkown
page read and write
8090000
unkown
page read and write
2C92000
trusted library allocation
page read and write
BC0000
unkown
page read and write
85A000
heap
page read and write
BC0000
unkown
page read and write
80B0000
unkown
page read and write
8CE000
heap
page read and write
DFD0000
unkown
page read and write
968000
heap
page read and write
8090000
unkown
page read and write
8450000
unkown
page read and write
956000
heap
page read and write
63F000
remote allocation
page execute and read and write
7FF502F2C000
unkown
page readonly
8090000
unkown
page read and write
3B0C000
trusted library allocation
page read and write
4435000
unkown
page read and write
1B484000
heap
page read and write
80B0000
unkown
page read and write
8CA0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF503270000
unkown
page readonly
8C70000
unkown
page read and write
BC0000
unkown
page read and write
BC0000
unkown
page read and write
9FB000
heap
page read and write
1DBC0000
direct allocation
page execute and read and write
80C0000
unkown
page read and write
47A000
unkown
page write copy
9F6000
heap
page read and write
FF51000
unkown
page read and write
9C2C000
unkown
page read and write
8C80000
unkown
page read and write
8C70000
unkown
page read and write
9800000
unkown
page read and write
7FF502E3F000
unkown
page readonly
80B0000
unkown
page read and write
85D000
heap
page read and write
1E74C000
stack
page read and write
DFD0000
unkown
page read and write
2CC9000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page read and write
8C90000
unkown
page read and write
BC80000
unkown
page read and write
1E447000
heap
page read and write
8C80000
unkown
page read and write
7370000
unkown
page read and write
2C78000
trusted library allocation
page read and write
9CC000
heap
page read and write
A1A000
heap
page read and write
7FF502E0A000
unkown
page readonly
DC60000
unkown
page read and write
425000
unkown
page read and write
40B000
unkown
page execute read
2C79000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
8090000
unkown
page read and write
1B47C000
stack
page read and write
2670000
remote allocation
page read and write
BC30000
unkown
page read and write
8CA0000
unkown
page read and write
8C80000
unkown
page read and write
A03000
heap
page read and write
43C7000
unkown
page read and write
419000
unkown
page write copy
A34D000
unkown
page read and write
BC0000
unkown
page read and write
DFD0000
unkown
page read and write
8C70000
unkown
page read and write
7FF502EB7000
unkown
page readonly
C0D1000
unkown
page read and write
3091000
unkown
page read and write
6D230000
unkown
page read and write
7FF503287000
unkown
page readonly
7FF502EE3000
unkown
page readonly
2D27000
trusted library allocation
page read and write
52B000
remote allocation
page execute and read and write
BC0000
unkown
page read and write
2CB9000
trusted library allocation
page read and write
8C70000
unkown
page read and write
2CF2000
trusted library allocation
page read and write
735000
heap
page read and write
22D3000
heap
page read and write
BC0000
unkown
page read and write
7FF502F66000
unkown
page readonly
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
8C70000
unkown
page read and write
A22000
heap
page read and write
EE20000
unkown
page read and write
DFD0000
unkown
page read and write
9D58000
unkown
page read and write
6ED9000
unkown
page read and write
DFD0000
unkown
page read and write
BA0C000
stack
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
BC0000
unkown
page read and write
760E000
stack
page read and write
2CA9000
trusted library allocation
page read and write
9D60000
unkown
page read and write
964000
heap
page read and write
730000
heap
page read and write
9CF000
heap
page read and write
80C0000
unkown
page read and write
40D000
unkown
page readonly
2CAF000
trusted library allocation
page read and write
9F6000
heap
page read and write
FFA2000
unkown
page read and write
7FF503277000
unkown
page readonly
100DA000
unkown
page read and write
9C9000
heap
page read and write
BC0000
unkown
page read and write
9E1000
heap
page read and write
863000
heap
page read and write
983000
heap
page read and write
80B0000
unkown
page read and write
4398000
unkown
page read and write
80B0000
unkown
page read and write
8090000
unkown
page read and write
8C80000
unkown
page read and write
9C0000
heap
page read and write
8070000
unkown
page read and write
9237000
unkown
page read and write
2C78000
trusted library allocation
page read and write
8CA0000
unkown
page read and write
2C81000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page read and write
9CF000
stack
page read and write
7470000
unkown
page read and write
9C5000
heap
page read and write
BC0000
unkown
page read and write
80B0000
unkown
page read and write
AB49000
stack
page read and write
2C7A000
trusted library allocation
page read and write
8110000
unkown
page read and write
2CFF000
trusted library allocation
page read and write
8E0000
unkown
page readonly
9FD000
heap
page read and write
96E000
heap
page read and write
80B0000
unkown
page read and write
93F6000
unkown
page read and write
737000
heap
page read and write
BC0000
unkown
page read and write
9FC000
heap
page read and write
6D1EF000
unkown
page readonly
8080000
unkown
page read and write
DFD0000
unkown
page read and write
3BFF000
stack
page read and write
8CA0000
unkown
page read and write
A22000
heap
page read and write
6E0000
direct allocation
page execute and read and write
2D24000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
80C0000
unkown
page read and write
400000
unkown
page readonly
B560000
unkown
page read and write
DFD0000
unkown
page read and write
9E6000
heap
page read and write
2C3C000
stack
page read and write
DFD0000
unkown
page read and write
A06000
heap
page read and write
2D23000
trusted library allocation
page read and write
80B0000
unkown
page read and write
85C000
heap
page read and write
E3CF000
stack
page read and write
9C3000
heap
page read and write
B010000
unkown
page read and write
7DF411EE1000
unkown
page execute read
20AE000
stack
page read and write
DFD0000
unkown
page read and write
2270000
heap
page read and write
24E0000
heap
page read and write
A22000
heap
page read and write
80B0000
unkown
page read and write
2CC5000
trusted library allocation
page read and write
80C0000
unkown
page read and write
2170000
direct allocation
page read and write
21AE000
stack
page read and write
2C76000
trusted library allocation
page read and write
1E44F000
heap
page read and write
A03000
heap
page read and write
7FF50324D000
unkown
page readonly
DFD0000
unkown
page read and write
478F000
stack
page read and write
7F80000
unkown
page read and write
8610000
unkown
page read and write
8C80000
unkown
page read and write
BC0000
unkown
page read and write
2AA0000
unkown
page read and write
2C81000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
9191000
unkown
page read and write
8CA0000
unkown
page read and write
7630000
unkown
page readonly
2CB2000
trusted library allocation
page read and write
8C80000
unkown
page read and write
7FF502D15000
unkown
page readonly
2CDA000
trusted library allocation
page read and write
733000
heap
page read and write
401000
unkown
page execute read
9D4000
heap
page read and write
2C78000
trusted library allocation
page read and write
A0E000
heap
page read and write
8080000
unkown
page read and write
7FF5032C0000
unkown
page readonly
BC0000
unkown
page read and write
2EF2000
stack
page read and write
3DA0000
heap
page read and write
7A58000
stack
page read and write
BC0000
unkown
page read and write
976000
heap
page read and write
BC0000
unkown
page read and write
76E0000
unkown
page readonly
BE1C000
unkown
page read and write
735000
heap
page read and write
8C80000
unkown
page read and write
DCD5000
stack
page read and write
19C000
stack
page read and write
21DF000
stack
page read and write
73E000
stack
page read and write
BC0000
unkown
page read and write
810000
unkown
page readonly
2C81000
trusted library allocation
page read and write
1DE0A000
direct allocation
page readonly
80B0000
unkown
page read and write
FEE9000
unkown
page read and write
80B0000
unkown
page read and write
9C4000
heap
page read and write
7FF503130000
unkown
page readonly
8080000
unkown
page read and write
42E000
remote allocation
page execute and read and write
80B0000
unkown
page read and write
60B000
remote allocation
page execute and read and write
DC60000
unkown
page read and write
2C97000
trusted library allocation
page read and write
9DF000
heap
page read and write
438000
remote allocation
page execute and read and write
3003000
trusted library allocation
page read and write
863000
heap
page read and write
2D47000
trusted library allocation
page read and write
9F5000
heap
page read and write
DFD0000
unkown
page read and write
9E8000
heap
page read and write
A02000
heap
page read and write
19C000
stack
page read and write
8090000
unkown
page read and write
80B0000
unkown
page read and write
2CDF000
trusted library allocation
page read and write
9F1000
unkown
page readonly
2D00000
heap
page read and write
BC55000
unkown
page read and write
401000
unkown
page execute read
9C3000
heap
page read and write
7FF502D8F000
unkown
page readonly
2D33000
trusted library allocation
page read and write
968000
heap
page read and write
80A0000
unkown
page read and write
9CC000
heap
page read and write
2CB7000
trusted library allocation
page read and write
8C90000
unkown
page read and write
983000
heap
page read and write
8070000
unkown
page read and write
AF7F000
stack
page read and write
BEA3000
unkown
page read and write
DFD0000
unkown
page read and write
7FF502CDD000
unkown
page readonly
B5DF000
stack
page read and write
8070000
unkown
page read and write
8070000
unkown
page read and write
BC0000
unkown
page read and write
80B0000
unkown
page read and write
A07000
heap
page read and write
DFD0000
unkown
page read and write
2D0B000
stack
page read and write
A25000
heap
page read and write
80B0000
unkown
page read and write
9D7000
heap
page read and write
9840000
unkown
page read and write
4402000
unkown
page read and write
7FF502E43000
unkown
page readonly
DFD0000
unkown
page read and write
21B0000
heap
page read and write
7FF502DD1000
unkown
page readonly
7FF502D29000
unkown
page readonly
BD6C000
unkown
page read and write
7FF502D6B000
unkown
page readonly
307E000
unkown
page read and write
8C70000
unkown
page read and write
80B0000
unkown
page read and write
757E000
stack
page read and write
2A90000
unkown
page readonly
9D4000
heap
page read and write
BC0000
unkown
page read and write
76D0000
unkown
page read and write
80B0000
unkown
page read and write
2CA4000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
2CC7000
trusted library allocation
page read and write
3067000
unkown
page read and write
9B83000
unkown
page read and write
DFD0000
unkown
page read and write
737000
heap
page read and write
9F6000
heap
page read and write
76D0000
unkown
page read and write
80B0000
unkown
page read and write
8BF0000
unkown
page read and write
5F7000
heap
page read and write
43B4000
unkown
page read and write
956000
heap
page read and write
2CA2000
trusted library allocation
page read and write
A02000
heap
page read and write
DFD0000
unkown
page read and write
9BF000
heap
page read and write
48E0000
heap
page read and write
2CAF000
trusted library allocation
page read and write
BC0000
unkown
page read and write
7DF411EE0000
unkown
page readonly
1DAB0000
heap
page read and write
7FF502D33000
unkown
page readonly
7FF502D04000
unkown
page readonly
210E000
stack
page read and write
9B000
stack
page read and write
8070000
unkown
page read and write
2D24000
trusted library allocation
page read and write
8080000
unkown
page read and write
80A0000
unkown
page read and write
9A7F000
stack
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF503055000
unkown
page readonly
80B0000
unkown
page read and write
7FF5032EE000
unkown
page readonly
DFD0000
unkown
page read and write
2ECE000
stack
page read and write
80B0000
unkown
page read and write
BF7A000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
9840000
unkown
page read and write
1E580000
heap
page read and write
7FF502D45000
unkown
page readonly
855E000
stack
page read and write
977E000
stack
page read and write
80B0000
unkown
page read and write
2C75000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
2CE0000
heap
page read and write
DFD0000
unkown
page read and write
77E000
stack
page read and write
DFD0000
unkown
page read and write
800000
unkown
page readonly
8090000
unkown
page read and write
43AC000
unkown
page read and write
8BF0000
unkown
page read and write
1DE02000
direct allocation
page read and write
970000
heap
page read and write
BC0000
unkown
page read and write
7FF50331F000
unkown
page readonly
858000
heap
page read and write
7DF411ED1000
unkown
page execute read
3099000
unkown
page read and write
2C7A000
trusted library allocation
page read and write
2B5E000
stack
page read and write
2CD8000
trusted library allocation
page read and write
3E40000
heap
page read and write
A22000
heap
page read and write
DFD0000
unkown
page read and write
7FF502C9D000
unkown
page readonly
7FF502CFA000
unkown
page readonly
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
80D0000
unkown
page read and write
BFB9000
unkown
page read and write
20015000
heap
page read and write
80C0000
unkown
page read and write
80B0000
unkown
page read and write
96A000
heap
page read and write
7FF503235000
unkown
page readonly
2C8F000
trusted library allocation
page read and write
8070000
unkown
page read and write
8C70000
unkown
page read and write
701D000
unkown
page read and write
831E000
stack
page read and write
983000
heap
page read and write
8C70000
unkown
page read and write
2CB2000
trusted library allocation
page read and write
BC0000
unkown
page read and write
9800000
unkown
page read and write
BC0000
unkown
page read and write
7750000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
780000
heap
page read and write
1DA0A000
stack
page read and write
DFD0000
unkown
page read and write
8C80000
unkown
page read and write
BDCB000
unkown
page read and write
80EE000
stack
page read and write
2C91000
trusted library allocation
page read and write
7FF50310B000
unkown
page readonly
8CA0000
unkown
page read and write
9F6000
heap
page read and write
80A0000
unkown
page read and write
8090000
unkown
page read and write
AC2000
heap
page read and write
80B0000
unkown
page read and write
5F0000
heap
page read and write
242F000
stack
page read and write
9D3000
heap
page read and write
24E0000
stack
page read and write
3010000
unkown
page read and write
80B0000
unkown
page read and write
7FF502F88000
unkown
page readonly
80B0000
unkown
page read and write
7FF5031BC000
unkown
page readonly
2D30000
trusted library allocation
page read and write
2F6F000
stack
page read and write
97E000
heap
page read and write
91FB000
unkown
page read and write
963000
heap
page read and write
2CC5000
trusted library allocation
page read and write
7DF411EF1000
unkown
page execute read
8C70000
unkown
page read and write
80B0000
unkown
page read and write
972000
heap
page read and write
DFD0000
unkown
page read and write
ECF4000
unkown
page read and write
9D03000
unkown
page read and write
DFD0000
unkown
page read and write
2E23000
trusted library allocation
page read and write
99F000
heap
page read and write
2CEE000
trusted library allocation
page read and write
2FCF000
stack
page read and write
76D0000
unkown
page read and write
7FF503110000
unkown
page readonly
852000
heap
page read and write
7FF502F94000
unkown
page readonly
7FF502DD3000
unkown
page readonly
EE20000
unkown
page read and write
80B0000
unkown
page read and write
95D000
heap
page read and write
866000
heap
page read and write
74C2000
unkown
page read and write
DFD0000
unkown
page read and write
BC0000
unkown
page read and write
9C4000
heap
page read and write
2CA2000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
8CA0000
unkown
page read and write
988000
heap
page read and write
80B0000
unkown
page read and write
BF2E000
unkown
page read and write
2C70000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
9FB000
heap
page read and write
8BF0000
unkown
page read and write
BC0000
unkown
page read and write
7FF502DC8000
unkown
page readonly
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
9AFF000
stack
page read and write
8601000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
BC0000
unkown
page read and write
2D37000
trusted library allocation
page read and write
9C000
stack
page read and write
80C0000
unkown
page read and write
6E650000
unkown
page readonly
1DBC8000
direct allocation
page execute read
A2F0000
unkown
page read and write
BC0000
unkown
page read and write
76D0000
unkown
page read and write
80B0000
unkown
page read and write
7FF5032F7000
unkown
page readonly
EE20000
unkown
page read and write
DFD0000
unkown
page read and write
2CB2000
trusted library allocation
page read and write
18E000
stack
page read and write
2C80000
trusted library allocation
page read and write
991000
heap
page read and write
8C80000
unkown
page read and write
7FF502FA9000
unkown
page readonly
BC0000
unkown
page read and write
A2B000
heap
page read and write
2C71000
trusted library allocation
page read and write
7FF502F47000
unkown
page readonly
439B000
unkown
page read and write
100DA000
unkown
page read and write
9E5000
heap
page read and write
1DD26000
direct allocation
page execute read
2140000
heap
page read and write
8CA0000
unkown
page read and write
7FF502F7A000
unkown
page readonly
7FF5030EF000
unkown
page readonly
BC0000
unkown
page read and write
DFD0000
unkown
page read and write
8090000
unkown
page read and write
B33A000
stack
page read and write
6D22F000
unkown
page write copy
DFD0000
unkown
page read and write
9193000
unkown
page read and write
1B4F9000
heap
page read and write
1090000
unkown
page readonly
BDC7000
unkown
page read and write
3075C000
stack
page read and write
16B70000
remote allocation
page read and write
30B4000
unkown
page read and write
7FF502D25000
unkown
page readonly
2EEB000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
8090000
unkown
page read and write
EE20000
unkown
page read and write
2C71000
trusted library allocation
page read and write
2C7C000
stack
page read and write
250F000
stack
page read and write
8080000
unkown
page read and write
BC0000
unkown
page read and write
78E000
heap
page read and write
A86E000
stack
page read and write
2CCE000
trusted library allocation
page read and write
451000
unkown
page execute and read and write
8C80000
unkown
page read and write
E30000
unkown
page read and write
9FB000
heap
page read and write
9330000
unkown
page read and write
7FF502F96000
unkown
page readonly
80D0000
unkown
page read and write
6FDB000
unkown
page read and write
8C80000
unkown
page read and write
8C80000
unkown
page read and write
DFD0000
unkown
page read and write
2D2E000
trusted library allocation
page read and write
553000
remote allocation
page execute and read and write
9DF000
heap
page read and write
8070000
unkown
page read and write
EE20000
unkown
page read and write
2B58000
stack
page read and write
7FF502C30000
unkown
page readonly
425000
unkown
page read and write
DCA0000
unkown
page read and write
8090000
unkown
page read and write
9255000
unkown
page read and write
9AA000
heap
page read and write
85D000
heap
page read and write
DFD0000
unkown
page read and write
2A1E000
stack
page read and write
9C000
stack
page read and write
7FF50335D000
unkown
page readonly
4431000
unkown
page read and write
6F0F000
unkown
page read and write
2CD3000
trusted library allocation
page read and write
BC0000
unkown
page read and write
7FF5032FE000
unkown
page readonly
9800000
unkown
page read and write
2CA2000
trusted library allocation
page read and write
8080000
unkown
page read and write
7750000
unkown
page read and write
80B0000
unkown
page read and write
9840000
unkown
page read and write
2C80000
unkown
page readonly
DFD0000
unkown
page read and write
8C70000
unkown
page read and write
C147000
unkown
page read and write
BC0000
unkown
page read and write
7FF503118000
unkown
page readonly
988000
heap
page read and write
76D0000
unkown
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
9E1000
heap
page read and write
A02000
heap
page read and write
BFAE000
unkown
page read and write
BEE6000
unkown
page read and write
16B70000
remote allocation
page read and write
A07000
heap
page read and write
7FF5032D7000
unkown
page readonly
6EE1000
unkown
page read and write
E80000
heap
page read and write
DFD0000
unkown
page read and write
7FF50312D000
unkown
page readonly
80C0000
unkown
page read and write
988000
heap
page read and write
7550000
unkown
page read and write
19D000
stack
page read and write
2D67000
heap
page read and write
EE20000
unkown
page read and write
80B0000
unkown
page read and write
A34000
heap
page read and write
2130000
unclassified section
page read and write
6D22E000
unkown
page read and write
76D0000
unkown
page read and write
80B0000
unkown
page read and write
3086000
unkown
page read and write
9BE3000
unkown
page read and write
A32F000
unkown
page read and write
2520000
stack
page read and write
7FF503347000
unkown
page readonly
8C70000
unkown
page read and write
BC19000
unkown
page read and write
FF14000
unkown
page read and write
2CAD000
trusted library allocation
page read and write
7DF411ED0000
unkown
page readonly
80B0000
unkown
page read and write
7FF503195000
unkown
page readonly
2C75000
trusted library allocation
page read and write
A2A000
heap
page read and write
EE20000
unkown
page read and write
8090000
unkown
page read and write
214E000
heap
page read and write
3C91000
heap
page read and write
4405000
unkown
page read and write
2C99000
trusted library allocation
page read and write
ECCD000
unkown
page read and write
80B0000
unkown
page read and write
7C9000
heap
page read and write
7FF502DDB000
unkown
page readonly
2C9E000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
8080000
unkown
page read and write
2CD8000
trusted library allocation
page read and write
412000
unkown
page readonly
80C0000
unkown
page read and write
9BCB000
unkown
page read and write
80B0000
unkown
page read and write
9DF000
heap
page read and write
79DD000
stack
page read and write
1B4FB000
heap
page read and write
EE20000
unkown
page read and write
9C9000
heap
page read and write
2C81000
trusted library allocation
page read and write
8070000
unkown
page read and write
24F0000
unkown
page read and write
EE62000
heap
page read and write
7FF502EF7000
unkown
page readonly
8C70000
unkown
page read and write
2CBC000
trusted library allocation
page read and write
7FF5030AA000
unkown
page readonly
8090000
unkown
page read and write
DFD0000
unkown
page read and write
2CAF000
trusted library allocation
page read and write
9F8000
heap
page read and write
A02000
heap
page read and write
2560000
unkown
page read and write
8090000
unkown
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
8C70000
unkown
page read and write
DFD0000
unkown
page read and write
936E000
unkown
page read and write
700000
heap
page read and write
BE14000
unkown
page read and write
20173000
heap
page read and write
9F6000
heap
page read and write
2D71000
heap
page read and write
2CB2000
trusted library allocation
page read and write
7FF503108000
unkown
page readonly
B570000
unkown
page read and write
100D3000
unkown
page read and write
254E000
stack
page read and write
DFD0000
unkown
page read and write
9CC000
heap
page read and write
97E000
heap
page read and write
B2BA000
stack
page read and write
A28000
heap
page read and write
76D0000
unkown
page read and write
9F6000
heap
page read and write
8080000
unkown
page read and write
80B0000
unkown
page read and write
8A49000
stack
page read and write
A03000
heap
page read and write
2C9C000
trusted library allocation
page read and write
7FF502E8F000
unkown
page readonly
A28000
heap
page read and write
80B0000
unkown
page read and write
BC0000
unkown
page read and write
24A0000
heap
page read and write
DFD0000
unkown
page read and write
4E49000
unkown
page read and write
DFD0000
unkown
page read and write
7DF411F11000
unkown
page execute read
7FF503257000
unkown
page readonly
2C78000
trusted library allocation
page read and write
5F5000
heap
page read and write
30EA000
trusted library allocation
page read and write
48E000
unkown
page readonly
100DA000
unkown
page read and write
2CB2000
trusted library allocation
page read and write
1DE0F000
direct allocation
page readonly
7609000
stack
page read and write
2C75000
trusted library allocation
page read and write
9BDE000
unkown
page read and write
8090000
unkown
page read and write
100DA000
unkown
page read and write
255A000
stack
page read and write
BFF4000
unkown
page read and write
6FF000
stack
page read and write
80C0000
unkown
page read and write
A06000
heap
page read and write
95F000
heap
page read and write
2300000
heap
page read and write
1DF7C000
heap
page read and write
DFD0000
unkown
page read and write
7FF5030C9000
unkown
page readonly
240D000
stack
page read and write
8C70000
unkown
page read and write
9E4000
heap
page read and write
8070000
unkown
page read and write
A36B000
unkown
page read and write
80B0000
unkown
page read and write
795D000
stack
page read and write
80B0000
unkown
page read and write
7FF503326000
unkown
page readonly
8C80000
unkown
page read and write
1F71000
unkown
page readonly
BB0E000
stack
page read and write
9C9000
heap
page read and write
983000
heap
page read and write
9C8A000
unkown
page read and write
80D0000
unkown
page read and write
7FF50302D000
unkown
page readonly
DFD0000
unkown
page read and write
80C0000
unkown
page read and write
2CAE000
trusted library allocation
page read and write
8CA0000
unkown
page read and write
76D0000
unkown
page read and write
DFD0000
unkown
page read and write
7490000
unkown
page read and write
7610000
unkown
page readonly
8080000
unkown
page read and write
21FA000
heap
page read and write
8080000
unkown
page read and write
BE96000
unkown
page read and write
EE20000
unkown
page read and write
BC0000
unkown
page read and write
7FF502F6A000
unkown
page readonly
9D7000
heap
page read and write
7FF4ECBEF000
unkown
page readonly
2C7B000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
FE5F000
stack
page read and write
2D28000
trusted library allocation
page read and write
80B0000
unkown
page read and write
7FF502F22000
unkown
page readonly
80B0000
unkown
page read and write
8070000
unkown
page read and write
8C70000
unkown
page read and write
8C90000
unkown
page read and write
B1B000
heap
page read and write
91DE000
unkown
page read and write
2170000
direct allocation
page read and write
9CC000
heap
page read and write
8C80000
unkown
page read and write
2CF0000
heap
page read and write
DFD0000
unkown
page read and write
873000
heap
page read and write
2D82000
trusted library allocation
page read and write
7FF503231000
unkown
page readonly
8C70000
unkown
page read and write
40D000
unkown
page readonly
A13000
heap
page read and write
80B0000
unkown
page read and write
2CB1000
trusted library allocation
page read and write
EE20000
unkown
page read and write
7FF503189000
unkown
page readonly
7FF5031FF000
unkown
page readonly
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
7FF5032C8000
unkown
page readonly
309D000
unkown
page read and write
74B0000
unkown
page read and write
7FF503126000
unkown
page readonly
8090000
unkown
page read and write
8080000
unkown
page read and write
80C0000
unkown
page read and write
E50000
unkown
page readonly
76D0000
unkown
page read and write
1DAC1000
heap
page read and write
80B0000
unkown
page read and write
7FF503223000
unkown
page readonly
44B0000
unkown
page read and write
70E000
heap
page read and write
8090000
unkown
page read and write
80B0000
unkown
page read and write
84DE000
stack
page read and write
7FF5032A5000
unkown
page readonly
8BC9000
stack
page read and write
2350000
heap
page read and write
8090000
unkown
page read and write
6E6CD000
unkown
page readonly
FEDB000
unkown
page read and write
2670000
remote allocation
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
76D0000
unkown
page read and write
3C90000
heap
page read and write
3008000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
100DA000
unkown
page read and write
BC0000
unkown
page read and write
400000
unkown
page readonly
7FF502FA2000
unkown
page readonly
7F80000
stack
page read and write
427000
unkown
page read and write
80B0000
unkown
page read and write
1E442000
heap
page read and write
873000
heap
page read and write
8C70000
unkown
page read and write
7750000
unkown
page read and write
6ECB000
unkown
page read and write
7FF502D41000
unkown
page readonly
DFD0000
unkown
page read and write
7FF503155000
unkown
page readonly
EE20000
unkown
page read and write
DFD0000
unkown
page read and write
513F000
stack
page read and write
9F9000
heap
page read and write
BC0000
unkown
page read and write
99F000
heap
page read and write
2C94000
trusted library allocation
page read and write
BC0000
unkown
page read and write
EE60000
heap
page read and write
98FC000
stack
page read and write
2D2E000
trusted library allocation
page read and write
7FF5030E4000
unkown
page readonly
7FF502CCE000
unkown
page readonly
7FF5026FF000
unkown
page readonly
931A000
unkown
page read and write
C149000
unkown
page read and write
8C80000
unkown
page read and write
80B0000
unkown
page read and write
7FF5030DE000
unkown
page readonly
80B0000
unkown
page read and write
78A000
heap
page read and write
DFD0000
unkown
page read and write
964E000
stack
page read and write
9050000
unkown
page read and write
2D41000
trusted library allocation
page read and write
99FF000
stack
page read and write
9F5000
heap
page read and write
DFD0000
unkown
page read and write
8C80000
unkown
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF5031DA000
unkown
page readonly
2060000
heap
page read and write
6EC0000
unkown
page read and write
2D37000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
2E25000
trusted library allocation
page read and write
7FF502D20000
unkown
page readonly
2D3B000
trusted library allocation
page read and write
80B0000
unkown
page read and write
9E0000
unkown
page read and write
475000
unkown
page read and write
4E33000
unkown
page read and write
9E6000
heap
page read and write
6E6DE000
unkown
page read and write
DFD0000
unkown
page read and write
2F10000
unkown
page readonly
C00A000
unkown
page read and write
7FF502E02000
unkown
page readonly
2153000
heap
page execute and read and write
97E000
heap
page read and write
7FF503245000
unkown
page readonly
8CA0000
unkown
page read and write
8CA0000
unkown
page read and write
DFD0000
unkown
page read and write
8C90000
unkown
page read and write
8C70000
unkown
page read and write
BC0000
unkown
page read and write
80B0000
unkown
page read and write
8440000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
2B1F000
stack
page read and write
2D23000
trusted library allocation
page read and write
2C5A000
stack
page read and write
7FF502EC9000
unkown
page readonly
BC0000
unkown
page read and write
8C70000
unkown
page read and write
DFD0000
unkown
page read and write
2000E000
heap
page read and write
9F8000
heap
page read and write
21E0000
direct allocation
page read and write
BDF0000
unkown
page read and write
400000
unkown
page readonly
100DA000
unkown
page read and write
8C80000
unkown
page read and write
76D0000
unkown
page read and write
BC0000
unkown
page read and write
80B0000
unkown
page read and write
7FF5030A5000
unkown
page readonly
7651000
unkown
page read and write
983000
heap
page read and write
BC0000
unkown
page read and write
4370000
unkown
page read and write
7FF503206000
unkown
page readonly
2CA2000
trusted library allocation
page read and write
90BD000
unkown
page read and write
7FF502DAD000
unkown
page readonly
BC7000
unkown
page read and write
80B0000
unkown
page read and write
2590000
heap
page read and write
32B9B000
stack
page read and write
DFD0000
unkown
page read and write
8090000
unkown
page read and write
43EA000
unkown
page read and write
8090000
unkown
page read and write
BC21000
unkown
page read and write
964000
heap
page read and write
7620000
unkown
page readonly
7FF503158000
unkown
page readonly
7FF502B9A000
unkown
page readonly
9D54000
unkown
page read and write
EC90000
unkown
page read and write
63E000
stack
page read and write
233F000
stack
page read and write
7FF50334D000
unkown
page readonly
2C97000
trusted library allocation
page read and write
2C74000
trusted library allocation
page read and write
BC0000
unkown
page read and write
7FF50326B000
unkown
page readonly
DFD0000
unkown
page read and write
9CC000
heap
page read and write
9D0000
unkown
page read and write
2670000
remote allocation
page read and write
BC0000
unkown
page read and write
7FF502CF2000
unkown
page readonly
2C5E000
stack
page read and write
80C0000
unkown
page read and write
2CDE000
trusted library allocation
page read and write
8070000
unkown
page read and write
80B0000
unkown
page read and write
1DBC1000
direct allocation
page execute read
8070000
unkown
page read and write
BC0000
unkown
page read and write
BC0000
unkown
page read and write
A02000
heap
page read and write
80D0000
unkown
page read and write
9800000
unkown
page read and write
BC0000
unkown
page read and write
2D7C000
trusted library allocation
page read and write
8070000
unkown
page read and write
9366000
unkown
page read and write
6EB0000
unkown
page read and write
2021A000
heap
page read and write
BC0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF503187000
unkown
page readonly
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
A3F000
heap
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
2E4B000
trusted library allocation
page read and write
80B0000
unkown
page read and write
80B0000
unkown
page read and write
9C0000
heap
page read and write
988000
heap
page read and write
7FF502FB4000
unkown
page readonly
9E1000
heap
page read and write
BC0000
unkown
page read and write
100DA000
unkown
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF502F8A000
unkown
page readonly
80B0000
unkown
page read and write
80B0000
unkown
page read and write
988000
heap
page read and write
968000
heap
page read and write
1F0000
heap
page read and write
7750000
unkown
page read and write
987C000
stack
page read and write
9CC000
heap
page read and write
8C80000
unkown
page read and write
80A0000
unkown
page read and write
8C80000
unkown
page read and write
80B0000
unkown
page read and write
7FF5031B7000
unkown
page readonly
80B0000
unkown
page read and write
2DB0000
unkown
page read and write
8090000
unkown
page read and write
7FF502D18000
unkown
page readonly
2D48000
trusted library allocation
page read and write
8C70000
unkown
page read and write
DFD0000
unkown
page read and write
C60000
unkown
page readonly
95C4000
unkown
page read and write
BBB0000
unkown
page read and write
2CEE000
trusted library allocation
page read and write
A03000
heap
page read and write
EE20000
unkown
page read and write
76D0000
unkown
page read and write
7FF502EBB000
unkown
page readonly
A06000
heap
page read and write
8090000
unkown
page read and write
2C7F000
trusted library allocation
page read and write
8CA0000
unkown
page read and write
2C7A000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page read and write
BEF6000
unkown
page read and write
2CA7000
trusted library allocation
page read and write
216B000
heap
page read and write
2D33000
trusted library allocation
page read and write
1B480000
heap
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
8CA0000
unkown
page read and write
BBFA000
unkown
page read and write
97000
stack
page read and write
EE20000
unkown
page read and write
8090000
unkown
page read and write
96A000
heap
page read and write
8C80000
unkown
page read and write
7FF502DC3000
unkown
page readonly
80B0000
unkown
page read and write
8C80000
unkown
page read and write
47F000
unkown
page readonly
2CA6000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
2CC6000
trusted library allocation
page read and write
BC0000
unkown
page read and write
1903C000
stack
page read and write
80B0000
unkown
page read and write
7750000
unkown
page read and write
7FF5032AF000
unkown
page readonly
6E99000
stack
page read and write
9450000
unkown
page readonly
7FF503333000
unkown
page readonly
7FF502E60000
unkown
page readonly
7FF503360000
unkown
page readonly
2CC5000
trusted library allocation
page read and write
7FF50322D000
unkown
page readonly
2C81000
trusted library allocation
page read and write
7FF502E0D000
unkown
page readonly
A03000
heap
page read and write
A20000
heap
page read and write
5D0000
heap
page read and write
8090000
unkown
page read and write
80B0000
unkown
page read and write
9830000
unkown
page read and write
AA0B000
stack
page read and write
9B8A000
unkown
page read and write
8090000
unkown
page read and write
69E000
stack
page read and write
2BDA000
stack
page read and write
8CA0000
unkown
page read and write
1229F000
stack
page read and write
BF0000
unkown
page readonly
BC0000
unkown
page read and write
52E000
remote allocation
page execute and read and write
80B0000
unkown
page read and write
7FF502EC2000
unkown
page readonly
80B0000
unkown
page read and write
976000
heap
page read and write
95A000
heap
page read and write
97F000
stack
page read and write
100DA000
unkown
page read and write
1DE2E000
heap
page read and write
20155000
heap
page read and write
8C70000
unkown
page read and write
9ED000
heap
page read and write
A06000
heap
page read and write
6D051000
unkown
page execute read
DFD0000
unkown
page read and write
416000
unkown
page readonly
9800000
unkown
page read and write
96D000
heap
page read and write
2C78000
trusted library allocation
page read and write
2C70000
unkown
page readonly
9D7000
heap
page read and write
9830000
unkown
page read and write
A01000
heap
page read and write
DFD0000
unkown
page read and write
7FF50303F000
unkown
page readonly
8090000
unkown
page read and write
2060000
heap
page read and write
972000
heap
page read and write
BC0000
unkown
page read and write
4B4000
unkown
page readonly
2C96000
trusted library allocation
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
29D9000
stack
page read and write
8CA000
heap
page read and write
A17000
heap
page read and write
85D000
heap
page read and write
C0FD000
unkown
page read and write
A7ED000
stack
page read and write
DFD0000
unkown
page read and write
475000
unkown
page write copy
80B0000
unkown
page read and write
7FF503161000
unkown
page readonly
7FF503032000
unkown
page readonly
BC5C000
unkown
page read and write
B11B000
stack
page read and write
976000
heap
page read and write
E44E000
stack
page read and write
DFD0000
unkown
page read and write
80B0000
unkown
page read and write
8AE000
stack
page read and write
E85000
heap
page read and write
7750000
unkown
page read and write
BC0000
unkown
page read and write
416000
unkown
page readonly
BA6000
stack
page read and write
8C0000
heap
page read and write
DFD0000
unkown
page read and write
919C000
unkown
page read and write
8C80000
unkown
page read and write
90DA000
unkown
page read and write
7FF50328F000
unkown
page readonly
9F9000
heap
page read and write
30AC000
unkown
page read and write
9D6000
heap
page read and write
98C000
heap
page read and write
DFD0000
unkown
page read and write
8080000
unkown
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
1DDCD000
direct allocation
page execute read
9F5000
heap
page read and write
76D0000
unkown
page read and write
7FF503129000
unkown
page readonly
2228000
heap
page read and write
2CB9000
trusted library allocation
page read and write
720000
heap
page read and write
7FF502FB7000
unkown
page readonly
2CC1000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
7FF502E5E000
unkown
page readonly
2CBE000
trusted library allocation
page read and write
80B0000
unkown
page read and write
DFD0000
unkown
page read and write
8C80000
unkown
page read and write
8070000
unkown
page read and write
A22000
heap
page read and write
2CEC000
trusted library allocation
page read and write
2400000
heap
page read and write
731000
heap
page read and write
2D2E000
trusted library allocation
page read and write
7DF411F01000
unkown
page execute read
995000
heap
page read and write
8C70000
unkown
page read and write
2203000
heap
page execute and read and write
9800000
unkown
page read and write
8080000
unkown
page read and write
A08000
heap
page read and write
2D2E000
trusted library allocation
page read and write
7FF50301B000
unkown
page readonly
EE20000
unkown
page read and write
2A59000
stack
page read and write
7FF503335000
unkown
page readonly
9BE6000
unkown
page read and write
400000
unkown
page readonly
BC0000
unkown
page read and write
100D2000
unkown
page read and write
9CF4000
unkown
page read and write
DFD0000
unkown
page read and write
2174000
direct allocation
page read and write
40D000
unkown
page readonly
2DE0000
unkown
page read and write
918D000
unkown
page read and write
8C70000
unkown
page read and write
3088000
unkown
page read and write
972000
heap
page read and write
9B87000
unkown
page read and write
1DA40000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
BC0000
unkown
page read and write
BFB4000
unkown
page read and write
146DD000
stack
page read and write
DFD0000
unkown
page read and write
DFD0000
unkown
page read and write
7FF502D9D000
unkown
page readonly
9800000
unkown
page read and write
906A000
unkown
page read and write
DA1F000
stack
page read and write
7FF502E06000
unkown
page readonly
DFD0000
unkown
page read and write
There are 2055 hidden memdumps, click here to show them.