Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Archive.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Read-Only, ctime=Thu Oct 24 15:33:44 2024, mtime=Thu Oct 24 11:36:06 2024, atime=Thu Oct 24 15:33:44 2024, length=3289752,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\16a9868f-826f-4895-80a8-2589121f2327.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\594800bc-92d9-4a97-8367-4369cb3fae61.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\730d6d3f-43f4-41bf-8f0a-e2af144d8c0f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\943810b9-6762-4dbd-ba79-508a8a92114c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-671A3F39-165C.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Crashpad\throttle_store.dat
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\44f47071-7796-4013-9f59-1a610f12db56.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\4ff646df-e31c-483b-b309-c8868829ba10.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\js\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\wasm\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\ExtensionActivityComp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\ExtensionActivityEdge
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie
0xc, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network Action Predictor
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\26be1f42-241f-4220-b1b7-e8b33f24209a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\3426cef9-734a-4d87-9bd5-ec9f913cda28.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\70ccab7c-5a76-4a05-b764-096ababd279f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports~RF45b1fa.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\a700842a-8bf5-4da5-bf7c-548d985953fc.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\PreferredApps
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\README
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie
0x36, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\heavy_ad_intervention_opt_out.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State~RF45af7a.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State~RF45afa9.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State~RF45b314.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Read-Only, ctime=Thu Oct 24 15:33:44 2024, mtime=Thu Oct 24 11:36:06 2024, atime=Thu Oct 24 15:33:44 2024, length=3289752,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\WinRAR\version.dat
|
data
|
dropped
|
There are 108 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
|
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe"
|
||
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
|
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe" -isetup_integration
|
||
C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
|
"C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe"
|
||
C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
|
"C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=WinRAR.exe
--webview-exe-version=7.1.0 --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --noerrdialogs
--embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=6588.548.7445727294754826910
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView
/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Crashpad
--annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program
Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge
WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ffa2c0c8e88,0x7ffa2c0c8e98,0x7ffa2c0c8ea8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--mojo-platform-channel-handle=1728 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz
/prefetch:2
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView"
--webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1
--mojo-platform-channel-handle=2196 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService
--lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView"
--webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1
--mojo-platform-channel-handle=2460 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB
--device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some
--expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1729768802568476 --launch-time-ticks=4567489855 --mojo-platform-channel-handle=3452
--field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz /prefetch:1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://web.503188.com/?
|
unknown
|
||
https://hao.360.com/?installer
|
unknown
|
||
http://www.4399.com/flash/32979.htm
|
unknown
|
||
https://anglebug.com/7246?
|
unknown
|
||
http://hao123.di178.com/?r916
|
unknown
|
||
https://www.4399.com/flash/180977_3.htm
|
unknown
|
||
https://tg.602.com
|
unknown
|
||
https://www.4399.com/flash/127539_4.htm
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://www.4399.com/flash/205462_4.htm
|
unknown
|
||
https://www.4399.com/flash/145991_4.htm
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
https://ntp.msn.cn/edge/ntp
|
unknown
|
||
https://malaysia.smar
|
unknown
|
||
https://www.4399.com/flash/39379_2.htm
|
unknown
|
||
https://www.4399.com/flash/55146_4.htm
|
unknown
|
||
https://www.4399.com/flash/195673_4.htm
|
unknown
|
||
https://www.microsoftnews.cn/
|
unknown
|
||
https://kf.07073.com
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.4399.com/flash/18012.htm
|
unknown
|
||
https://www.4399.com/flash/zmhj.htm#search3-6407
|
unknown
|
||
http://bd.gy912.com
|
unknown
|
||
https://www.91duba.com/?f=
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://www.4399.com/flash/217926_2.htm
|
unknown
|
||
https://www.4399.com/flash/218860_1.htm
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://www.4399.com/flash/27924_2.htm
|
unknown
|
||
https://int.msn.cn/
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://unitedstates1.ss.wd.microsoft.us/
|
unknown
|
||
https://www.4399.com/flash/18012_4.htm
|
unknown
|
||
https://www.newduba.cn/?
|
unknown
|
||
https://www.4399.com/flash/48504.htm
|
unknown
|
||
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
|
unknown
|
||
http://anglebug.com/5881z
|
unknown
|
||
http://df.edge.qhkj.baicana.com
|
unknown
|
||
https://hao.qq.com/?unc=Af31026&s=o400493_1?
|
unknown
|
||
https://tp.9377s.com
|
unknown
|
||
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
http://r.emsoso.cn
|
unknown
|
||
https://www.4399.com/flash/zmhj.htm
|
unknown
|
||
https://www.4399.com/flash/69156_1.htm
|
unknown
|
||
https://www.4399.com/flash/776_1.htm
|
unknown
|
||
http://129fy.ie.chalai.net
|
unknown
|
||
https://www.4399.com/flash/198637_4.htm
|
unknown
|
||
https://www.4399.com/flash/133630_4.htm
|
unknown
|
||
http://sgcs.edge.ker58.com
|
unknown
|
||
https://www.4399.com/flash/218717_2.htm
|
unknown
|
||
https://www.4399.com/flash/136516_3.htm
|
unknown
|
||
https://www.4399.com/flash/203215_3.htm
|
unknown
|
||
https://www.4399.com/flash/207195_4.htm
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
https://discovery.lenovo.com.cn/home062291
|
unknown
|
||
https://www.newduba.cn/?f=
|
unknown
|
||
https://hao.360.com/?src=jsqth
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://my.4399.com/yxmsdzls/
|
unknown
|
||
https://xsts.auth.xboxlive.com
|
unknown
|
||
https://www.4399.com/flash/217855_4.htm
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://yxtg.taojike.com.cn/tg/ttfc.html?sc=
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://www.4399.com/flash/21674_3.htm
|
unknown
|
||
https://www.4399.com/flash/204650_1.htm
|
unknown
|
||
https://localhost.msn.com/
|
unknown
|
||
https://anglebug.com/7369w
|
unknown
|
||
https://www.4399.com/flash/115339_1.htm
|
unknown
|
||
https://www.4399.com/flash/203369_3.htm
|
unknown
|
||
https://www.jiegeng.com
|
unknown
|
||
https://internet-start.net/?
|
unknown
|
||
https://www.4399.com/flash/35538.htm
|
unknown
|
||
https://outlook.com/
|
unknown
|
||
https://www.4399.com/flash/218066_3.htm
|
unknown
|
||
https://www.4399.com/flash/6232_3.htm
|
unknown
|
||
https://www.4399.com/flash/195990_1.htm
|
unknown
|
||
https://www.4399.com/flash/12669_4.htm
|
unknown
|
||
https://www.4399.com/flash/204056_4.htm
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://www.4399.com/flash/205090_2.htm
|
unknown
|
||
http://anglebug.com/5430iew
|
unknown
|
||
https://www.startfenster.de
|
unknown
|
||
https://www.4399.com/flash/10379_3.htm
|
unknown
|
||
https://www.4399.com/flash/203018_4.htm
|
unknown
|
||
http://tx.edge.ker58.com
|
unknown
|
||
https://www.so.com/?src=
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
||
https://www.4399.com/flash/202828_2.htm
|
unknown
|
||
http://anglebug.com/5906
|
unknown
|
||
http://anglebug.com/2517
|
unknown
|
There are 90 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\WinRAR.exe
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\WinRAR.exe
|
Path
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Default
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ImmExec
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ExclNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
StoreNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
UseRAR
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SFXModule
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SFXIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SFXLogo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SFXLogo2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SFXElevate
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
CmtFile
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
CmtDataWide
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
VolumeSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
VolSizeMod
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
VolPause
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
RecVolNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Update
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Fresh
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SyncFiles
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Overwrite
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Move
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ArcRecBin
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ArcWipe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
WipeIfPassword
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Solid
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Test
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
RecEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
RecSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
EraseDest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
AddArcOnly
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ClearArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Lock
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Method
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
DictSizeLZ
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
DictSizeKB
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Background
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
WaitForOther
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
Shutdown
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PasswordData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
EncryptHeaders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ZipLegacyEncrypt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
OpenShared
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ProcessOwners
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SaveStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SaveSymLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SaveHardLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
GenerateArcName
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
VersionControl
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
BLAKE2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
FileCopies
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
OrigArcData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
QuickOpen
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
GenerateMask
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
FileTimeMode
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
FileDays
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
FileHours
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
FileMinutes
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
FileTimeLimit
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ArcTimeOriginal
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ArcTimeLatest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
mtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
ctime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
atime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PreserveAtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PathsAbs
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PathsNone
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PathsAbsDrive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SeparateArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SeparateArcDoubleExt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
SeparateArcSubfolders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
EmailArcTo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PackLongRange
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PackExhaustive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PackExe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
PackDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
|
CmdSwitches
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Default
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ImmExec
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ExclNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
StoreNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
UseRAR
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SFXModule
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SFXIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SFXLogo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SFXLogo2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SFXElevate
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
CmtFile
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
CmtDataWide
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
VolumeSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
VolSizeMod
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
VolPause
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
RecVolNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Update
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Fresh
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SyncFiles
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Overwrite
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Move
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ArcRecBin
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ArcWipe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
WipeIfPassword
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Solid
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Test
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
RecEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
RecSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
EraseDest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
AddArcOnly
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ClearArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Lock
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Method
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
DictSizeLZ
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
DictSizeKB
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Background
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
WaitForOther
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
Shutdown
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PasswordData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
EncryptHeaders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ZipLegacyEncrypt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
OpenShared
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ProcessOwners
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SaveStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SaveSymLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SaveHardLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
GenerateArcName
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
VersionControl
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
BLAKE2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
FileCopies
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
OrigArcData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
QuickOpen
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
GenerateMask
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
FileTimeMode
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
FileDays
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
FileHours
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
FileMinutes
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
FileTimeLimit
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ArcTimeOriginal
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ArcTimeLatest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
mtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
ctime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
atime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PreserveAtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PathsAbs
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PathsNone
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PathsAbsDrive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SeparateArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SeparateArcDoubleExt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
SeparateArcSubfolders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
EmailArcTo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PackLongRange
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PackExhaustive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PackExe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
PackDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
|
CmdSwitches
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Default
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ImmExec
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ExclNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
StoreNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
UseRAR
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SFXModule
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SFXIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SFXLogo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SFXLogo2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SFXElevate
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
CmtFile
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
CmtDataWide
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
VolumeSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
VolSizeMod
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
VolPause
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
RecVolNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Update
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Fresh
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SyncFiles
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Overwrite
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Move
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ArcRecBin
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ArcWipe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
WipeIfPassword
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Solid
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Test
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
RecEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
RecSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
EraseDest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
AddArcOnly
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ClearArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Lock
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Method
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
DictSizeLZ
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
DictSizeKB
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Background
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
WaitForOther
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
Shutdown
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PasswordData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
EncryptHeaders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ZipLegacyEncrypt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
OpenShared
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ProcessOwners
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SaveStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SaveSymLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SaveHardLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
GenerateArcName
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
VersionControl
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
BLAKE2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
FileCopies
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
OrigArcData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
QuickOpen
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
GenerateMask
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
FileTimeMode
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
FileDays
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
FileHours
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
FileMinutes
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
FileTimeLimit
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ArcTimeOriginal
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ArcTimeLatest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
mtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
ctime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
atime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PreserveAtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PathsAbs
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PathsNone
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PathsAbsDrive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SeparateArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SeparateArcDoubleExt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
SeparateArcSubfolders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
EmailArcTo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PackLongRange
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PackExhaustive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PackExe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
PackDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
|
CmdSwitches
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Default
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ImmExec
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ExclNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
StoreNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
UseRAR
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SFXModule
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SFXIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SFXLogo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SFXLogo2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SFXElevate
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
CmtFile
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
CmtDataWide
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
VolumeSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
VolSizeMod
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
VolPause
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
RecVolNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Update
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Fresh
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SyncFiles
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Overwrite
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Move
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ArcRecBin
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ArcWipe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
WipeIfPassword
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Solid
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Test
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
RecEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
RecSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
EraseDest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
AddArcOnly
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ClearArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Lock
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Method
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
DictSizeLZ
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
DictSizeKB
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Background
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
WaitForOther
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
Shutdown
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PasswordData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
EncryptHeaders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ZipLegacyEncrypt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
OpenShared
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ProcessOwners
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SaveStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SaveSymLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SaveHardLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
GenerateArcName
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
VersionControl
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
BLAKE2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
FileCopies
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
OrigArcData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
QuickOpen
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
GenerateMask
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
FileTimeMode
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
FileDays
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
FileHours
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
FileMinutes
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
FileTimeLimit
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ArcTimeOriginal
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ArcTimeLatest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
mtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
ctime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
atime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PreserveAtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PathsAbs
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PathsNone
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PathsAbsDrive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SeparateArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SeparateArcDoubleExt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
SeparateArcSubfolders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
EmailArcTo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PackLongRange
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PackExhaustive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PackExe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
PackDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
|
CmdSwitches
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Name
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Default
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ImmExec
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ExclNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
StoreNames
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
UseRAR
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SFXModule
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SFXIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SFXLogo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SFXLogo2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SFXElevate
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
CmtFile
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
CmtDataWide
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
VolumeSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
VolSizeMod
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
VolPause
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
RecVolNumber
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Update
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Fresh
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SyncFiles
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Overwrite
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Move
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ArcRecBin
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ArcWipe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
WipeIfPassword
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Solid
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Test
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
RecEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
RecSize
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
EraseDest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
AddArcOnly
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ClearArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Lock
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Method
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Background
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
WaitForOther
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
Shutdown
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PasswordData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
EncryptHeaders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ZipLegacyEncrypt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
OpenShared
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ProcessOwners
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SaveStreams
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SaveSymLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SaveHardLinks
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
GenerateArcName
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
VersionControl
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
BLAKE2
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
FileCopies
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
OrigArcData
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
QuickOpen
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
GenerateMask
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
FileTimeMode
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
FileDays
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
FileHours
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
FileMinutes
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
FileTimeLimit
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ArcTimeOriginal
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ArcTimeLatest
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
mtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
ctime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
atime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PreserveAtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PathsAbs
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PathsNone
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PathsAbsDrive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SeparateArc
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SeparateArcDoubleExt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
SeparateArcSubfolders
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
EmailArcTo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PackLongRange
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PackExhaustive
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PackExe
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
PackDelta
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
|
CmdSwitches
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
|
VerInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.rar
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.zip
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.cab
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.arj
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.lz
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.lzh
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.7z
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.tar
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.gz
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.uue
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.bz2
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.jar
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.iso
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.z
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.zipx
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.zst
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.001
|
Set
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\Links
|
Desktop
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\Links
|
StartMenu
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\Links
|
Programs
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
|
ShellExt
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
|
CascadedMenu
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
|
MenuIcons
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
|
LegacyMenu
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Misc
|
RemShown
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
|
Placement
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR
|
exe64
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
|
{B41DB860-8EE4-11D2-9906-E49FADC173CA}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
|
{B41DB860-64E4-11D2-9906-E49FADC173CA}
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
|
WinRAR
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities
|
ApplicationDescription
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.rar
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.zip
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.cab
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.arj
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.lz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.tlz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.lzh
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.lha
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.7z
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.tar
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.gz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.tgz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.uue
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.xxe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.uu
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.bz2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.tbz2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.bz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.tbz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.jar
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.iso
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.z
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.taz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.xz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.txz
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.zipx
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.zst
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.tzst
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
|
.001
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.rev
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinRAR archiver
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
|
LastFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
|
name
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
|
size
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
|
type
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
|
mtime
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout
|
Band76_0
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout
|
Band76_1
|
||
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout
|
Band76_2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
dr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
|
UsageStatsInSample
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
usagestats
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
urlstats
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
failed_count
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
There are 519 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7AF4002D4000
|
trusted library allocation
|
page read and write
|
||
1CFA3465000
|
heap
|
page read and write
|
||
24EAC4D0000
|
heap
|
page read and write
|
||
6520000F4000
|
trusted library allocation
|
page read and write
|
||
1CFA6532000
|
heap
|
page read and write
|
||
3F1000954000
|
trusted library allocation
|
page read and write
|
||
69B000238000
|
trusted library allocation
|
page read and write
|
||
225E6850000
|
heap
|
page read and write
|
||
1CFA6553000
|
heap
|
page read and write
|
||
652000070000
|
trusted library allocation
|
page read and write
|
||
2199C086000
|
heap
|
page read and write
|
||
5D68002B4000
|
trusted library allocation
|
page read and write
|
||
1CFA67BF000
|
heap
|
page read and write
|
||
191D91B0000
|
heap
|
page read and write
|
||
225E6313000
|
heap
|
page read and write
|
||
84D59FD000
|
stack
|
page read and write
|
||
3F1000238000
|
trusted library allocation
|
page read and write
|
||
12693E6D000
|
heap
|
page read and write
|
||
2BF800260000
|
trusted library allocation
|
page read and write
|
||
54DC00294000
|
direct allocation
|
page read and write
|
||
1CFA6648000
|
heap
|
page read and write
|
||
23C8002F0000
|
trusted library allocation
|
page read and write
|
||
2199DF00000
|
heap
|
page read and write
|
||
1CFA347C000
|
heap
|
page read and write
|
||
225E6973000
|
heap
|
page read and write
|
||
2199EBC0000
|
unkown
|
page read and write
|
||
12693FF6000
|
heap
|
page read and write
|
||
3F1000288000
|
trusted library allocation
|
page read and write
|
||
225E67F0000
|
heap
|
page read and write
|
||
12693ECA000
|
heap
|
page read and write
|
||
1CFA664E000
|
heap
|
page read and write
|
||
1E49DA18000
|
heap
|
page read and write
|
||
383400230000
|
trusted library allocation
|
page read and write
|
||
225E3B95000
|
heap
|
page read and write
|
||
3F10009A8000
|
trusted library allocation
|
page read and write
|
||
12693F69000
|
heap
|
page read and write
|
||
B8F4BFE000
|
unkown
|
page readonly
|
||
3F1000A0E000
|
trusted library allocation
|
page read and write
|
||
3F1000DB6000
|
trusted library allocation
|
page read and write
|
||
694C002FC000
|
trusted library allocation
|
page read and write
|
||
3F10003B0000
|
trusted library allocation
|
page read and write
|
||
24EAC4AE000
|
heap
|
page read and write
|
||
5A6400250000
|
trusted library allocation
|
page read and write
|
||
12693E99000
|
heap
|
page read and write
|
||
1CFA3474000
|
heap
|
page read and write
|
||
24EAC4BF000
|
heap
|
page read and write
|
||
3F1000BD0000
|
trusted library allocation
|
page read and write
|
||
47E400114000
|
trusted library allocation
|
page read and write
|
||
1D0F50A0000
|
heap
|
page read and write
|
||
210FE772000
|
unclassified section
|
page read and write
|
||
652000060000
|
trusted library allocation
|
page read and write
|
||
12693BF7000
|
heap
|
page read and write
|
||
3F1000CA0000
|
trusted library allocation
|
page read and write
|
||
24EAC4ED000
|
heap
|
page read and write
|
||
1D082560000
|
trusted library allocation
|
page read and write
|
||
1CFA3454000
|
heap
|
page read and write
|
||
225E3B70000
|
heap
|
page read and write
|
||
652000038000
|
trusted library allocation
|
page read and write
|
||
225E1E13000
|
heap
|
page read and write
|
||
12696854000
|
heap
|
page read and write
|
||
24EAEEBA000
|
heap
|
page read and write
|
||
3F1000CF0000
|
trusted library allocation
|
page read and write
|
||
47E400098000
|
trusted library allocation
|
page read and write
|
||
23F000190000
|
trusted library allocation
|
page read and write
|
||
B8ED3FE000
|
stack
|
page read and write
|
||
84C11FE000
|
unkown
|
page readonly
|
||
14400250000
|
direct allocation
|
page read and write
|
||
1CFA66FA000
|
heap
|
page read and write
|
||
225E6307000
|
heap
|
page read and write
|
||
23F0001E4000
|
trusted library allocation
|
page read and write
|
||
1CFA342B000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
AA230FF000
|
stack
|
page read and write
|
||
12693C45000
|
heap
|
page read and write
|
||
5DC00311000
|
direct allocation
|
page read and write
|
||
7AF40031C000
|
trusted library allocation
|
page read and write
|
||
225E40F7000
|
heap
|
page read and write
|
||
1CFA663D000
|
heap
|
page read and write
|
||
24EAA732000
|
heap
|
page read and write
|
||
3F1000D8C000
|
trusted library allocation
|
page read and write
|
||
16C00201000
|
direct allocation
|
page read and write
|
||
225E3BBA000
|
heap
|
page read and write
|
||
1CFA6592000
|
heap
|
page read and write
|
||
23C800401000
|
trusted library allocation
|
page read and write
|
||
3F10000A8000
|
trusted library allocation
|
page read and write
|
||
3F1000D50000
|
trusted library allocation
|
page read and write
|
||
24EAEF2F000
|
heap
|
page read and write
|
||
12693FD8000
|
heap
|
page read and write
|
||
3F1000B2C000
|
trusted library allocation
|
page read and write
|
||
23C800270000
|
trusted library allocation
|
page read and write
|
||
12693EA8000
|
heap
|
page read and write
|
||
225E3BB3000
|
heap
|
page read and write
|
||
1CFA3400000
|
heap
|
page read and write
|
||
5DC0031A000
|
direct allocation
|
page read and write
|
||
652000124000
|
trusted library allocation
|
page read and write
|
||
225E3B73000
|
heap
|
page read and write
|
||
225E6319000
|
heap
|
page read and write
|
||
2199DF23000
|
heap
|
page read and write
|
||
3F1000AE4000
|
trusted library allocation
|
page read and write
|
||
7FF713E66000
|
unkown
|
page read and write
|
||
B8F2BFE000
|
unkown
|
page readonly
|
||
12693F9E000
|
heap
|
page read and write
|
||
225E67AE000
|
heap
|
page read and write
|
||
47E400185000
|
trusted library allocation
|
page read and write
|
||
225E6962000
|
heap
|
page read and write
|
||
3F1000E28000
|
trusted library allocation
|
page read and write
|
||
225E1E24000
|
heap
|
page read and write
|
||
12693FE2000
|
heap
|
page read and write
|
||
1CFA65BC000
|
heap
|
page read and write
|
||
225E3BA9000
|
heap
|
page read and write
|
||
5D680025C000
|
trusted library allocation
|
page read and write
|
||
23F00013F000
|
trusted library allocation
|
page read and write
|
||
23F000088000
|
trusted library allocation
|
page read and write
|
||
225E3BB8000
|
heap
|
page read and write
|
||
84CC9FC000
|
stack
|
page read and write
|
||
12693C00000
|
heap
|
page read and write
|
||
225E3B77000
|
heap
|
page read and write
|
||
24EAC4D8000
|
heap
|
page read and write
|
||
1CFA6790000
|
heap
|
page read and write
|
||
1CFA191E000
|
heap
|
page read and write
|
||
12693E7E000
|
heap
|
page read and write
|
||
24EAEE74000
|
heap
|
page read and write
|
||
1CFA5710000
|
trusted library allocation
|
page read and write
|
||
24EAEE92000
|
heap
|
page read and write
|
||
3F100097C000
|
trusted library allocation
|
page read and write
|
||
23F00010C000
|
trusted library allocation
|
page read and write
|
||
12693E61000
|
heap
|
page read and write
|
||
210FEC02000
|
heap
|
page read and write
|
||
2BF8002A4000
|
trusted library allocation
|
page read and write
|
||
24EAA663000
|
heap
|
page read and write
|
||
12693C4D000
|
heap
|
page read and write
|
||
3F1000DE0000
|
trusted library allocation
|
page read and write
|
||
7FF713E6F000
|
unkown
|
page read and write
|
||
1269684A000
|
heap
|
page read and write
|
||
7FF695A7F000
|
unkown
|
page readonly
|
||
12693F9F000
|
heap
|
page read and write
|
||
AA22AFD000
|
stack
|
page read and write
|
||
B8EF3FE000
|
stack
|
page read and write
|
||
24EAE95B000
|
heap
|
page read and write
|
||
1CFA18EA000
|
heap
|
page read and write
|
||
16C002C4000
|
direct allocation
|
page read and write
|
||
225E67D0000
|
heap
|
page read and write
|
||
24EAF10C000
|
heap
|
page read and write
|
||
1CFA6543000
|
heap
|
page read and write
|
||
3F100098C000
|
trusted library allocation
|
page read and write
|
||
1CFA1918000
|
heap
|
page read and write
|
||
5628002AC000
|
trusted library allocation
|
page read and write
|
||
5DC00234000
|
direct allocation
|
page read and write
|
||
1CFA190B000
|
heap
|
page read and write
|
||
1CFA3482000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
225E3B47000
|
heap
|
page read and write
|
||
75A0002DC000
|
direct allocation
|
page read and write
|
||
24EAA730000
|
heap
|
page read and write
|
||
47E400001000
|
trusted library allocation
|
page read and write
|
||
219A1200000
|
heap
|
page read and write
|
||
24EAA6DA000
|
heap
|
page read and write
|
||
84E59FE000
|
stack
|
page read and write
|
||
3F10002AC000
|
trusted library allocation
|
page read and write
|
||
2199DF08000
|
heap
|
page read and write
|
||
7AF40025C000
|
trusted library allocation
|
page read and write
|
||
1CFA664A000
|
heap
|
page read and write
|
||
24EAC4A0000
|
heap
|
page read and write
|
||
84E61FE000
|
unkown
|
page readonly
|
||
7AF400201000
|
trusted library allocation
|
page read and write
|
||
12691DD1000
|
heap
|
page read and write
|
||
5D680027C000
|
trusted library allocation
|
page read and write
|
||
24EAF0C9000
|
heap
|
page read and write
|
||
12693F64000
|
heap
|
page read and write
|
||
2199DF36000
|
heap
|
page read and write
|
||
84DD1FE000
|
unkown
|
page readonly
|
||
694C00288000
|
trusted library allocation
|
page read and write
|
||
7FF630C7A000
|
unkown
|
page readonly
|
||
191D9238000
|
heap
|
page read and write
|
||
225E3BB1000
|
heap
|
page read and write
|
||
225E1E9D000
|
heap
|
page read and write
|
||
225E3BDE000
|
heap
|
page read and write
|
||
84E81FE000
|
unkown
|
page readonly
|
||
12694056000
|
heap
|
page read and write
|
||
1CFA342F000
|
heap
|
page read and write
|
||
24EAC50E000
|
heap
|
page read and write
|
||
84D49FE000
|
stack
|
page read and write
|
||
24EAEE8E000
|
heap
|
page read and write
|
||
7FF713EB0000
|
unkown
|
page readonly
|
||
1269402D000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
24EAF004000
|
heap
|
page read and write
|
||
3F1000066000
|
trusted library allocation
|
page read and write
|
||
2BF800408000
|
trusted library allocation
|
page read and write
|
||
1CFA659C000
|
heap
|
page read and write
|
||
210FE902000
|
heap
|
page read and write
|
||
34DC002CC000
|
trusted library allocation
|
page read and write
|
||
23C80029C000
|
trusted library allocation
|
page read and write
|
||
B8F23FE000
|
stack
|
page read and write
|
||
3834002A0000
|
trusted library allocation
|
page read and write
|
||
54DC002EC000
|
direct allocation
|
page read and write
|
||
12696855000
|
heap
|
page read and write
|
||
24EAA6F5000
|
heap
|
page read and write
|
||
3F1000A12000
|
trusted library allocation
|
page read and write
|
||
23F000120000
|
trusted library allocation
|
page read and write
|
||
47E400161000
|
trusted library allocation
|
page read and write
|
||
1E49DA02000
|
heap
|
page read and write
|
||
12693BC7000
|
heap
|
page read and write
|
||
24EAC4CD000
|
heap
|
page read and write
|
||
12691E75000
|
heap
|
page read and write
|
||
1CFA3445000
|
heap
|
page read and write
|
||
2199DF47000
|
heap
|
page read and write
|
||
12693B60000
|
heap
|
page read and write
|
||
694C002B0000
|
trusted library allocation
|
page read and write
|
||
24EAF0B7000
|
heap
|
page read and write
|
||
210FE6F0000
|
remote allocation
|
page read and write
|
||
1CFA3447000
|
heap
|
page read and write
|
||
12693C3B000
|
heap
|
page read and write
|
||
449D1FE000
|
stack
|
page read and write
|
||
1D0F5192000
|
unclassified section
|
page read and write
|
||
5D68002FC000
|
trusted library allocation
|
page read and write
|
||
24EAEFAE000
|
heap
|
page read and write
|
||
1D0F5235000
|
heap
|
page read and write
|
||
1CFA18F4000
|
heap
|
page read and write
|
||
225E3BD1000
|
heap
|
page read and write
|
||
5A640020C000
|
trusted library allocation
|
page read and write
|
||
12696BF5000
|
heap
|
page read and write
|
||
14400201000
|
direct allocation
|
page read and write
|
||
126967F0000
|
heap
|
page read and write
|
||
1CFA345D000
|
heap
|
page read and write
|
||
44A01FE000
|
stack
|
page read and write
|
||
23D476F0000
|
remote allocation
|
page read and write
|
||
12693815000
|
heap
|
page read and write
|
||
16C0026C000
|
direct allocation
|
page read and write
|
||
191D9440000
|
heap
|
page read and write
|
||
12693E92000
|
heap
|
page read and write
|
||
84E31FE000
|
unkown
|
page readonly
|
||
12693C59000
|
heap
|
page read and write
|
||
84D79FC000
|
stack
|
page read and write
|
||
16C00248000
|
direct allocation
|
page read and write
|
||
21082DB0000
|
unclassified section
|
page read and write
|
||
1CFA6787000
|
heap
|
page read and write
|
||
84D41FE000
|
unkown
|
page readonly
|
||
1CFA669A000
|
heap
|
page read and write
|
||
24EAC484000
|
heap
|
page read and write
|
||
24EAC505000
|
heap
|
page read and write
|
||
1CFA1913000
|
heap
|
page read and write
|
||
225E3C50000
|
heap
|
page read and write
|
||
1CFA65A6000
|
heap
|
page read and write
|
||
225E1EA7000
|
heap
|
page read and write
|
||
1CFA3465000
|
heap
|
page read and write
|
||
2BF80020C000
|
trusted library allocation
|
page read and write
|
||
12693C4D000
|
heap
|
page read and write
|
||
24EAA6E2000
|
heap
|
page read and write
|
||
24EAEFEA000
|
heap
|
page read and write
|
||
24EAEF52000
|
heap
|
page read and write
|
||
3F10000BC000
|
trusted library allocation
|
page read and write
|
||
225E699D000
|
heap
|
page read and write
|
||
12693C2E000
|
heap
|
page read and write
|
||
12693BFF000
|
heap
|
page read and write
|
||
562800298000
|
trusted library allocation
|
page read and write
|
||
24EAEEF8000
|
heap
|
page read and write
|
||
12693C04000
|
heap
|
page read and write
|
||
1CFA18AC000
|
heap
|
page read and write
|
||
3F1000D38000
|
trusted library allocation
|
page read and write
|
||
B8E7BFE000
|
unkown
|
page readonly
|
||
5D6800220000
|
trusted library allocation
|
page read and write
|
||
47E40017D000
|
trusted library allocation
|
page read and write
|
||
3F1000A0D000
|
trusted library allocation
|
page read and write
|
||
56280028C000
|
trusted library allocation
|
page read and write
|
||
12693714000
|
heap
|
page read and write
|
||
14400234000
|
direct allocation
|
page read and write
|
||
2199DF4F000
|
heap
|
page read and write
|
||
2199C102000
|
heap
|
page read and write
|
||
64861FD000
|
stack
|
page read and write
|
||
24EAF000000
|
heap
|
page read and write
|
||
1D08261D000
|
heap
|
page read and write
|
||
3F1000C8C000
|
trusted library allocation
|
page read and write
|
||
23F0000BC000
|
trusted library allocation
|
page read and write
|
||
1D082642000
|
heap
|
page read and write
|
||
12693C04000
|
heap
|
page read and write
|
||
23C800290000
|
trusted library allocation
|
page read and write
|
||
34DC0026C000
|
trusted library allocation
|
page read and write
|
||
1D0825C0000
|
unclassified section
|
page read and write
|
||
12693BE6000
|
heap
|
page read and write
|
||
12693E9E000
|
heap
|
page read and write
|
||
47E4000A8000
|
trusted library allocation
|
page read and write
|
||
1CFA6703000
|
heap
|
page read and write
|
||
383400238000
|
trusted library allocation
|
page read and write
|
||
1D082637000
|
heap
|
page read and write
|
||
12691DE9000
|
heap
|
page read and write
|
||
24EAEEC9000
|
heap
|
page read and write
|
||
24EAC499000
|
heap
|
page read and write
|
||
12691DCF000
|
heap
|
page read and write
|
||
5628002B8000
|
trusted library allocation
|
page read and write
|
||
23F0001D0000
|
trusted library allocation
|
page read and write
|
||
24EAE000000
|
trusted library allocation
|
page read and write
|
||
7FF713C30000
|
unkown
|
page readonly
|
||
225E3BC0000
|
heap
|
page read and write
|
||
2199C0F8000
|
heap
|
page read and write
|
||
7AF400211000
|
trusted library allocation
|
page read and write
|
||
1CFA342A000
|
heap
|
page read and write
|
||
3F1000A6E000
|
trusted library allocation
|
page read and write
|
||
84E09FB000
|
stack
|
page read and write
|
||
7FF630CCF000
|
unkown
|
page read and write
|
||
1D082623000
|
heap
|
page read and write
|
||
24EAEFD6000
|
heap
|
page read and write
|
||
B847FC000
|
stack
|
page read and write
|
||
24EAEF11000
|
heap
|
page read and write
|
||
12691E4F000
|
heap
|
page read and write
|
||
24EAA6EE000
|
heap
|
page read and write
|
||
3F1000CC4000
|
trusted library allocation
|
page read and write
|
||
12693FE4000
|
heap
|
page read and write
|
||
24EAEEAB000
|
heap
|
page read and write
|
||
84C49FE000
|
stack
|
page read and write
|
||
12695E90000
|
heap
|
page read and write
|
||
16C00230000
|
direct allocation
|
page read and write
|
||
3F1000D94000
|
trusted library allocation
|
page read and write
|
||
2BF8002F4000
|
trusted library allocation
|
page read and write
|
||
225E6363000
|
heap
|
page read and write
|
||
12691CE0000
|
heap
|
page read and write
|
||
24EAA70D000
|
heap
|
page read and write
|
||
12691E2A000
|
heap
|
page read and write
|
||
3F1000D08000
|
trusted library allocation
|
page read and write
|
||
47E4000DD000
|
trusted library allocation
|
page read and write
|
||
24EAEEDA000
|
heap
|
page read and write
|
||
5D68002F4000
|
trusted library allocation
|
page read and write
|
||
5D6800280000
|
trusted library allocation
|
page read and write
|
||
2199C12A000
|
heap
|
page read and write
|
||
1CFA67E1000
|
heap
|
page read and write
|
||
84D29FD000
|
stack
|
page read and write
|
||
47E400104000
|
trusted library allocation
|
page read and write
|
||
1CFA3390000
|
heap
|
page read and write
|
||
AA22DFC000
|
stack
|
page read and write
|
||
1CFA1938000
|
heap
|
page read and write
|
||
1D22CFF0000
|
heap
|
page read and write
|
||
12693BDC000
|
heap
|
page read and write
|
||
5628002C0000
|
trusted library allocation
|
page read and write
|
||
5D6800290000
|
trusted library allocation
|
page read and write
|
||
3F100000C000
|
trusted library allocation
|
page read and write
|
||
1CFA1872000
|
heap
|
page read and write
|
||
1CFA6549000
|
heap
|
page read and write
|
||
3F1000A18000
|
trusted library allocation
|
page read and write
|
||
694C0025C000
|
trusted library allocation
|
page read and write
|
||
24EAEEB1000
|
heap
|
page read and write
|
||
24EAA610000
|
heap
|
page read and write
|
||
2BF800220000
|
trusted library allocation
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
3F1000F74000
|
trusted library allocation
|
page read and write
|
||
1CFA653F000
|
heap
|
page read and write
|
||
225E3BAF000
|
heap
|
page read and write
|
||
12693FFC000
|
heap
|
page read and write
|
||
225E6357000
|
heap
|
page read and write
|
||
449B9FE000
|
unkown
|
page readonly
|
||
34DC002D8000
|
trusted library allocation
|
page read and write
|
||
225E67B0000
|
heap
|
page read and write
|
||
35091FD000
|
stack
|
page read and write
|
||
24EAA71B000
|
heap
|
page read and write
|
||
12691DE9000
|
heap
|
page read and write
|
||
1CFA65A9000
|
heap
|
page read and write
|
||
225E3B87000
|
heap
|
page read and write
|
||
7FF713E73000
|
unkown
|
page read and write
|
||
225E6361000
|
heap
|
page read and write
|
||
191D9230000
|
heap
|
page read and write
|
||
34DC002A0000
|
trusted library allocation
|
page read and write
|
||
1CFA659C000
|
heap
|
page read and write
|
||
3F1000D7C000
|
trusted library allocation
|
page read and write
|
||
84DD9FD000
|
stack
|
page read and write
|
||
1D0F5242000
|
heap
|
page read and write
|
||
1E49D990000
|
heap
|
page read and write
|
||
3834002E8000
|
trusted library allocation
|
page read and write
|
||
1CFA6539000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
12696870000
|
heap
|
page read and write
|
||
6520000BC000
|
trusted library allocation
|
page read and write
|
||
23C80031C000
|
trusted library allocation
|
page read and write
|
||
75A00024C000
|
direct allocation
|
page read and write
|
||
B807FC000
|
stack
|
page read and write
|
||
3F1000C78000
|
trusted library allocation
|
page read and write
|
||
1CFA3458000
|
heap
|
page read and write
|
||
1CFA6655000
|
heap
|
page read and write
|
||
12693F24000
|
heap
|
page read and write
|
||
225E67FB000
|
heap
|
page read and write
|
||
225E68A2000
|
heap
|
page read and write
|
||
23F0001BF000
|
trusted library allocation
|
page read and write
|
||
84DC9FE000
|
stack
|
page read and write
|
||
24EAC4C2000
|
heap
|
page read and write
|
||
3F1000570000
|
trusted library allocation
|
page read and write
|
||
24EAC490000
|
heap
|
page read and write
|
||
34DC00220000
|
trusted library allocation
|
page read and write
|
||
24EAA701000
|
heap
|
page read and write
|
||
47E400090000
|
trusted library allocation
|
page read and write
|
||
1CFA340D000
|
heap
|
page read and write
|
||
12691E35000
|
heap
|
page read and write
|
||
23F000150000
|
trusted library allocation
|
page read and write
|
||
191D9190000
|
heap
|
page read and write
|
||
B8F53FF000
|
stack
|
page read and write
|
||
12693C5E000
|
heap
|
page read and write
|
||
AA231FD000
|
stack
|
page read and write
|
||
3F10002B8000
|
trusted library allocation
|
page read and write
|
||
126967F1000
|
heap
|
page read and write
|
||
B8EBBFE000
|
unkown
|
page readonly
|
||
12693E8D000
|
heap
|
page read and write
|
||
225E5FE0000
|
heap
|
page read and write
|
||
225E1DE3000
|
heap
|
page read and write
|
||
3F100041C000
|
trusted library allocation
|
page read and write
|
||
24EAA6E6000
|
heap
|
page read and write
|
||
12693F30000
|
heap
|
page read and write
|
||
1CFA189A000
|
heap
|
page read and write
|
||
225E68BD000
|
heap
|
page read and write
|
||
47E4001DC000
|
trusted library allocation
|
page read and write
|
||
12691E7E000
|
heap
|
page read and write
|
||
12695690000
|
trusted library allocation
|
page read and write
|
||
24EAEF42000
|
heap
|
page read and write
|
||
24EAA6EC000
|
heap
|
page read and write
|
||
24EAA6A2000
|
heap
|
page read and write
|
||
12693EA6000
|
heap
|
page read and write
|
||
44A09FE000
|
unkown
|
page readonly
|
||
23F00023C000
|
trusted library allocation
|
page read and write
|
||
1CFA6703000
|
heap
|
page read and write
|
||
24EAEFB2000
|
heap
|
page read and write
|
||
24EAEF19000
|
heap
|
page read and write
|
||
7AF400348000
|
trusted library allocation
|
page read and write
|
||
225E691B000
|
heap
|
page read and write
|
||
5D68002C4000
|
trusted library allocation
|
page read and write
|
||
225E1E28000
|
heap
|
page read and write
|
||
210FE760000
|
heap
|
page readonly
|
||
7FF630C9F000
|
unkown
|
page readonly
|
||
75A000211000
|
direct allocation
|
page read and write
|
||
3F1000244000
|
trusted library allocation
|
page read and write
|
||
47E40020C000
|
trusted library allocation
|
page read and write
|
||
B8F43FE000
|
stack
|
page read and write
|
||
2199BFD0000
|
heap
|
page read and write
|
||
23F00000C000
|
trusted library allocation
|
page read and write
|
||
12693C19000
|
heap
|
page read and write
|
||
3F1000A3E000
|
trusted library allocation
|
page read and write
|
||
3F1000944000
|
trusted library allocation
|
page read and write
|
||
225E67C7000
|
heap
|
page read and write
|
||
B89FFE000
|
unkown
|
page readonly
|
||
225E62FE000
|
heap
|
page read and write
|
||
23F000184000
|
trusted library allocation
|
page read and write
|
||
12693EA8000
|
heap
|
page read and write
|
||
1CFA6543000
|
heap
|
page read and write
|
||
1CFA18FF000
|
heap
|
page read and write
|
||
2199C000000
|
heap
|
page read and write
|
||
3F1000CD4000
|
trusted library allocation
|
page read and write
|
||
12693E81000
|
heap
|
page read and write
|
||
7FF713E5F000
|
unkown
|
page read and write
|
||
1CFA65D5000
|
heap
|
page read and write
|
||
225E3753000
|
heap
|
page read and write
|
||
3F1000A2E000
|
trusted library allocation
|
page read and write
|
||
2199C113000
|
heap
|
page read and write
|
||
24EAF094000
|
heap
|
page read and write
|
||
3F1000248000
|
trusted library allocation
|
page read and write
|
||
12693EEE000
|
heap
|
page read and write
|
||
7AF4002F4000
|
trusted library allocation
|
page read and write
|
||
12693E79000
|
heap
|
page read and write
|
||
12691DC3000
|
heap
|
page read and write
|
||
69B0002D8000
|
trusted library allocation
|
page read and write
|
||
1CFA65A5000
|
heap
|
page read and write
|
||
24EAF084000
|
heap
|
page read and write
|
||
562800258000
|
trusted library allocation
|
page read and write
|
||
24EAEFD1000
|
heap
|
page read and write
|
||
3F1000060000
|
trusted library allocation
|
page read and write
|
||
7FF630C8D000
|
unkown
|
page readonly
|
||
3F1000C54000
|
trusted library allocation
|
page read and write
|
||
12691E6A000
|
heap
|
page read and write
|
||
12693C14000
|
heap
|
page read and write
|
||
5D6800230000
|
trusted library allocation
|
page read and write
|
||
23C800348000
|
trusted library allocation
|
page read and write
|
||
1CFA65A7000
|
heap
|
page read and write
|
||
225E3B8A000
|
heap
|
page read and write
|
||
47E40008C000
|
trusted library allocation
|
page read and write
|
||
24EAF072000
|
heap
|
page read and write
|
||
84BD9F6000
|
stack
|
page read and write
|
||
24EAEEFB000
|
heap
|
page read and write
|
||
225E3BD3000
|
heap
|
page read and write
|
||
219A1990000
|
heap
|
page read and write
|
||
225E3BD6000
|
heap
|
page read and write
|
||
5D68002F0000
|
trusted library allocation
|
page read and write
|
||
34DC002BC000
|
trusted library allocation
|
page read and write
|
||
1CFA18A8000
|
heap
|
page read and write
|
||
3F1000430000
|
trusted library allocation
|
page read and write
|
||
12693E74000
|
heap
|
page read and write
|
||
225E67B0000
|
heap
|
page read and write
|
||
12696870000
|
heap
|
page read and write
|
||
24EAEFB7000
|
heap
|
page read and write
|
||
12693F21000
|
heap
|
page read and write
|
||
24EAC4AA000
|
heap
|
page read and write
|
||
75A0002C4000
|
direct allocation
|
page read and write
|
||
3F1000C3C000
|
trusted library allocation
|
page read and write
|
||
1E49DCD0000
|
trusted library allocation
|
page read and write
|
||
225E67DA000
|
heap
|
page read and write
|
||
24EAF0C7000
|
heap
|
page read and write
|
||
225E3BDA000
|
heap
|
page read and write
|
||
1CFA6703000
|
heap
|
page read and write
|
||
24EAEFCD000
|
heap
|
page read and write
|
||
225E6831000
|
heap
|
page read and write
|
||
23C800238000
|
trusted library allocation
|
page read and write
|
||
12691E5D000
|
heap
|
page read and write
|
||
56280026C000
|
trusted library allocation
|
page read and write
|
||
12691DE3000
|
heap
|
page read and write
|
||
1E49DA28000
|
heap
|
page read and write
|
||
7FF695A5D000
|
unkown
|
page readonly
|
||
75A000280000
|
direct allocation
|
page read and write
|
||
24EAC4C9000
|
heap
|
page read and write
|
||
23F0000F4000
|
trusted library allocation
|
page read and write
|
||
24EAEF12000
|
heap
|
page read and write
|
||
C7AA6FF000
|
stack
|
page read and write
|
||
7FF713EBD000
|
unkown
|
page write copy
|
||
23F0000AC000
|
trusted library allocation
|
page read and write
|
||
5A6400230000
|
trusted library allocation
|
page read and write
|
||
225E68DF000
|
heap
|
page read and write
|
||
1CFA348B000
|
heap
|
page read and write
|
||
23C800308000
|
trusted library allocation
|
page read and write
|
||
44911FE000
|
stack
|
page read and write
|
||
2199DF41000
|
heap
|
page read and write
|
||
47E4001C4000
|
trusted library allocation
|
page read and write
|
||
47E40007C000
|
trusted library allocation
|
page read and write
|
||
225E67BC000
|
heap
|
page read and write
|
||
7AF4002B8000
|
trusted library allocation
|
page read and write
|
||
24EAA6A6000
|
heap
|
page read and write
|
||
5DC00310000
|
direct allocation
|
page read and write
|
||
75A0002C8000
|
direct allocation
|
page read and write
|
||
1CFA6617000
|
heap
|
page read and write
|
||
12693EED000
|
heap
|
page read and write
|
||
12693F8A000
|
heap
|
page read and write
|
||
12691E5D000
|
heap
|
page read and write
|
||
1CFA18F4000
|
heap
|
page read and write
|
||
24EAA719000
|
heap
|
page read and write
|
||
8D847FE000
|
unkown
|
page readonly
|
||
225E68A5000
|
heap
|
page read and write
|
||
225E682A000
|
heap
|
page read and write
|
||
5628002C4000
|
trusted library allocation
|
page read and write
|
||
24EAC49F000
|
heap
|
page read and write
|
||
1CFA6623000
|
heap
|
page read and write
|
||
1D22D000000
|
heap
|
page read and write
|
||
694C00278000
|
trusted library allocation
|
page read and write
|
||
3F1000EF0000
|
trusted library allocation
|
page read and write
|
||
225E3BCD000
|
heap
|
page read and write
|
||
3F10004A4000
|
trusted library allocation
|
page read and write
|
||
12691DCF000
|
heap
|
page read and write
|
||
3834002B4000
|
trusted library allocation
|
page read and write
|
||
126966A0000
|
heap
|
page read and write
|
||
225E6945000
|
heap
|
page read and write
|
||
14400280000
|
direct allocation
|
page read and write
|
||
126968BF000
|
heap
|
page read and write
|
||
34DC00260000
|
trusted library allocation
|
page read and write
|
||
12693C51000
|
heap
|
page read and write
|
||
210FE690000
|
heap
|
page read and write
|
||
16C00234000
|
direct allocation
|
page read and write
|
||
1D0F5180000
|
heap
|
page readonly
|
||
1CFA3290000
|
heap
|
page read and write
|
||
225E691B000
|
heap
|
page read and write
|
||
225E1DD3000
|
heap
|
page read and write
|
||
1CFA679D000
|
heap
|
page read and write
|
||
225E68CF000
|
heap
|
page read and write
|
||
3F1000A0C000
|
trusted library allocation
|
page read and write
|
||
225E6834000
|
heap
|
page read and write
|
||
24EAC48E000
|
heap
|
page read and write
|
||
24EAC489000
|
heap
|
page read and write
|
||
24EAEF08000
|
heap
|
page read and write
|
||
1CFA66D0000
|
heap
|
page read and write
|
||
24EAF050000
|
heap
|
page read and write
|
||
225E1E50000
|
heap
|
page read and write
|
||
3F1000884000
|
trusted library allocation
|
page read and write
|
||
7FF713EBD000
|
unkown
|
page readonly
|
||
47E4001A5000
|
trusted library allocation
|
page read and write
|
||
12693FE3000
|
heap
|
page read and write
|
||
1CFA67DF000
|
heap
|
page read and write
|
||
2199C12A000
|
heap
|
page read and write
|
||
225E62A1000
|
heap
|
page read and write
|
||
1CFA3489000
|
heap
|
page read and write
|
||
3F100028B000
|
trusted library allocation
|
page read and write
|
||
24EAC000000
|
heap
|
page read and write
|
||
1CFA65A5000
|
heap
|
page read and write
|
||
3F1000488000
|
trusted library allocation
|
page read and write
|
||
84C99FC000
|
stack
|
page read and write
|
||
225E680A000
|
heap
|
page read and write
|
||
225E3B67000
|
heap
|
page read and write
|
||
84CB1FE000
|
unkown
|
page readonly
|
||
2199C0F3000
|
heap
|
page read and write
|
||
225E635E000
|
heap
|
page read and write
|
||
7AF400280000
|
trusted library allocation
|
page read and write
|
||
24EAC4C9000
|
heap
|
page read and write
|
||
12693BD9000
|
heap
|
page read and write
|
||
24EAA6FB000
|
heap
|
page read and write
|
||
225E3BD4000
|
heap
|
page read and write
|
||
24EAC4DA000
|
heap
|
page read and write
|
||
2199DF23000
|
heap
|
page read and write
|
||
225E68A5000
|
heap
|
page read and write
|
||
7FF630D2D000
|
unkown
|
page write copy
|
||
225E68AB000
|
heap
|
page read and write
|
||
69B000258000
|
trusted library allocation
|
page read and write
|
||
24EAEF25000
|
heap
|
page read and write
|
||
7FF713EBE000
|
unkown
|
page readonly
|
||
24EAA73E000
|
heap
|
page read and write
|
||
47E4001D8000
|
trusted library allocation
|
page read and write
|
||
84E11FE000
|
unkown
|
page readonly
|
||
3F1000D60000
|
trusted library allocation
|
page read and write
|
||
24EAC49C000
|
heap
|
page read and write
|
||
2199C130000
|
heap
|
page read and write
|
||
12693BF2000
|
heap
|
page read and write
|
||
84DF9FD000
|
stack
|
page read and write
|
||
24EAA648000
|
heap
|
page read and write
|
||
3F10005EC000
|
trusted library allocation
|
page read and write
|
||
210FE802000
|
heap
|
page read and write
|
||
3F1000528000
|
trusted library allocation
|
page read and write
|
||
12691DDD000
|
heap
|
page read and write
|
||
1CFA67DF000
|
heap
|
page read and write
|
||
225E1EB7000
|
heap
|
page read and write
|
||
C7AA4FD000
|
stack
|
page read and write
|
||
24EAC4D0000
|
heap
|
page read and write
|
||
84CA9FA000
|
stack
|
page read and write
|
||
225E67C9000
|
heap
|
page read and write
|
||
12693E9E000
|
heap
|
page read and write
|
||
84D19FC000
|
stack
|
page read and write
|
||
7FF695AC3000
|
unkown
|
page read and write
|
||
24EAF084000
|
heap
|
page read and write
|
||
44951FB000
|
stack
|
page read and write
|
||
225E6927000
|
heap
|
page read and write
|
||
12693F9E000
|
heap
|
page read and write
|
||
24EAEFB2000
|
heap
|
page read and write
|
||
24EAEE50000
|
heap
|
page read and write
|
||
225E1E04000
|
heap
|
page read and write
|
||
144002C4000
|
direct allocation
|
page read and write
|
||
12693F14000
|
heap
|
page read and write
|
||
8DFCDFB000
|
stack
|
page read and write
|
||
225E6361000
|
heap
|
page read and write
|
||
652000058000
|
trusted library allocation
|
page read and write
|
||
1CFA6597000
|
heap
|
page read and write
|
||
3F1000910000
|
trusted library allocation
|
page read and write
|
||
3F1000288000
|
trusted library allocation
|
page read and write
|
||
23D476D0000
|
remote allocation
|
page read and write
|
||
1CFA18A3000
|
heap
|
page read and write
|
||
225E3BBC000
|
heap
|
page read and write
|
||
1CFA18AD000
|
heap
|
page read and write
|
||
225E6332000
|
heap
|
page read and write
|
||
12693F44000
|
heap
|
page read and write
|
||
1E49D9B0000
|
heap
|
page read and write
|
||
7FF713E58000
|
unkown
|
page read and write
|
||
7FF695AA8000
|
unkown
|
page write copy
|
||
1CFA3476000
|
heap
|
page read and write
|
||
1CFA659D000
|
heap
|
page read and write
|
||
12693C03000
|
heap
|
page read and write
|
||
23C80020C000
|
trusted library allocation
|
page read and write
|
||
210FE789000
|
unclassified section
|
page read and write
|
||
7AF4002B4000
|
trusted library allocation
|
page read and write
|
||
1CFA65A5000
|
heap
|
page read and write
|
||
84D21FE000
|
unkown
|
page readonly
|
||
1CFA3461000
|
heap
|
page read and write
|
||
5A64002B8000
|
trusted library allocation
|
page read and write
|
||
38340027C000
|
trusted library allocation
|
page read and write
|
||
2199C127000
|
heap
|
page read and write
|
||
1CFA65A5000
|
heap
|
page read and write
|
||
84BF9FE000
|
stack
|
page read and write
|
||
5DC0030B000
|
direct allocation
|
page read and write
|
||
1CFA343D000
|
heap
|
page read and write
|
||
24EAC4CB000
|
heap
|
page read and write
|
||
12696867000
|
heap
|
page read and write
|
||
23F000274000
|
trusted library allocation
|
page read and write
|
||
7AF400334000
|
trusted library allocation
|
page read and write
|
||
225E3BB5000
|
heap
|
page read and write
|
||
144002A8000
|
direct allocation
|
page read and write
|
||
12693C3F000
|
heap
|
page read and write
|
||
225E3B86000
|
heap
|
page read and write
|
||
84D31FE000
|
unkown
|
page readonly
|
||
1440029C000
|
direct allocation
|
page read and write
|
||
225E67D4000
|
heap
|
page read and write
|
||
225E1E04000
|
heap
|
page read and write
|
||
383400201000
|
trusted library allocation
|
page read and write
|
||
1CFA346A000
|
heap
|
page read and write
|
||
24EAEE51000
|
heap
|
page read and write
|
||
12693E7A000
|
heap
|
page read and write
|
||
47E400050000
|
trusted library allocation
|
page read and write
|
||
1CFA655B000
|
heap
|
page read and write
|
||
225E68A5000
|
heap
|
page read and write
|
||
3F1000F04000
|
trusted library allocation
|
page read and write
|
||
225E62ED000
|
heap
|
page read and write
|
||
225E692B000
|
heap
|
page read and write
|
||
225E3BBC000
|
heap
|
page read and write
|
||
2199C045000
|
heap
|
page read and write
|
||
12693C2E000
|
heap
|
page read and write
|
||
47E400124000
|
trusted library allocation
|
page read and write
|
||
47E400116000
|
trusted library allocation
|
page read and write
|
||
3F100096C000
|
trusted library allocation
|
page read and write
|
||
3F100020C000
|
trusted library allocation
|
page read and write
|
||
16C0028C000
|
direct allocation
|
page read and write
|
||
1CFA6645000
|
heap
|
page read and write
|
||
38340028C000
|
trusted library allocation
|
page read and write
|
||
3F1000EB5000
|
trusted library allocation
|
page read and write
|
||
24EAC4C5000
|
heap
|
page read and write
|
||
B897FE000
|
stack
|
page read and write
|
||
12693EE5000
|
heap
|
page read and write
|
||
24EAEEBF000
|
heap
|
page read and write
|
||
225E3B5A000
|
heap
|
page read and write
|
||
B8E9BFE000
|
unkown
|
page readonly
|
||
24EAC4DB000
|
heap
|
page read and write
|
||
3F1000F08000
|
trusted library allocation
|
page read and write
|
||
12691DDB000
|
heap
|
page read and write
|
||
24EAEFA8000
|
heap
|
page read and write
|
||
2199C158000
|
heap
|
page read and write
|
||
2BF8002E8000
|
trusted library allocation
|
page read and write
|
||
1CFA6553000
|
heap
|
page read and write
|
||
3F1000300000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
225E699A000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
24EAC4D8000
|
heap
|
page read and write
|
||
1CFA55F6000
|
heap
|
page read and write
|
||
24EAA690000
|
heap
|
page read and write
|
||
1CFA679D000
|
heap
|
page read and write
|
||
34DC0025C000
|
trusted library allocation
|
page read and write
|
||
3F1000054000
|
trusted library allocation
|
page read and write
|
||
3F10000CC000
|
trusted library allocation
|
page read and write
|
||
1CFA6711000
|
heap
|
page read and write
|
||
3F10004BC000
|
trusted library allocation
|
page read and write
|
||
5628002A4000
|
trusted library allocation
|
page read and write
|
||
1CFA65A0000
|
heap
|
page read and write
|
||
2BF8002B8000
|
trusted library allocation
|
page read and write
|
||
5A640025C000
|
trusted library allocation
|
page read and write
|
||
3F1000B74000
|
trusted library allocation
|
page read and write
|
||
24EAF0D2000
|
heap
|
page read and write
|
||
2199C0A4000
|
heap
|
page read and write
|
||
3F1000EC4000
|
trusted library allocation
|
page read and write
|
||
12696867000
|
heap
|
page read and write
|
||
694C0028C000
|
trusted library allocation
|
page read and write
|
||
23C800211000
|
trusted library allocation
|
page read and write
|
||
12694032000
|
heap
|
page read and write
|
||
24EAA6E2000
|
heap
|
page read and write
|
||
84CF9FD000
|
stack
|
page read and write
|
||
225E3B87000
|
heap
|
page read and write
|
||
1CFA3C9B000
|
heap
|
page read and write
|
||
1D0F5269000
|
heap
|
page read and write
|
||
2199C131000
|
heap
|
page read and write
|
||
7FF695880000
|
unkown
|
page readonly
|
||
2199DF3F000
|
heap
|
page read and write
|
||
1D082670000
|
heap
|
page read and write
|
||
225E3B9E000
|
heap
|
page read and write
|
||
B8E73FE000
|
stack
|
page read and write
|
||
210FE81B000
|
heap
|
page read and write
|
||
23F000114000
|
trusted library allocation
|
page read and write
|
||
12693EC9000
|
heap
|
page read and write
|
||
47E400169000
|
trusted library allocation
|
page read and write
|
||
12691DDB000
|
heap
|
page read and write
|
||
1CFA1873000
|
heap
|
page read and write
|
||
219A1562000
|
trusted library allocation
|
page read and write
|
||
225E680C000
|
heap
|
page read and write
|
||
34DC002E8000
|
trusted library allocation
|
page read and write
|
||
1D0825A7000
|
unclassified section
|
page read and write
|
||
2199DF02000
|
heap
|
page read and write
|
||
24EAEFA8000
|
heap
|
page read and write
|
||
3F100036C000
|
trusted library allocation
|
page read and write
|
||
12693FF6000
|
heap
|
page read and write
|
||
5D6800418000
|
trusted library allocation
|
page read and write
|
||
5D6800254000
|
trusted library allocation
|
page read and write
|
||
3F1000CE4000
|
trusted library allocation
|
page read and write
|
||
5DC002B4000
|
direct allocation
|
page read and write
|
||
5D6800211000
|
trusted library allocation
|
page read and write
|
||
225E698A000
|
heap
|
page read and write
|
||
84CF1FE000
|
unkown
|
page readonly
|
||
3F1000AEC000
|
trusted library allocation
|
page read and write
|
||
24EAA68A000
|
heap
|
page read and write
|
||
12693C07000
|
heap
|
page read and write
|
||
24EAC48C000
|
heap
|
page read and write
|
||
23F000038000
|
trusted library allocation
|
page read and write
|
||
1D0F526D000
|
heap
|
page read and write
|
||
225E62A1000
|
heap
|
page read and write
|
||
54DC00274000
|
direct allocation
|
page read and write
|
||
14400244000
|
direct allocation
|
page read and write
|
||
23F000001000
|
trusted library allocation
|
page read and write
|
||
449E9FE000
|
unkown
|
page readonly
|
||
1CFA347E000
|
heap
|
page read and write
|
||
3F1000B64000
|
trusted library allocation
|
page read and write
|
||
694C00408000
|
trusted library allocation
|
page read and write
|
||
7AF400404000
|
trusted library allocation
|
page read and write
|
||
1D22D041000
|
heap
|
page read and write
|
||
2BF800294000
|
trusted library allocation
|
page read and write
|
||
225E67D7000
|
heap
|
page read and write
|
||
1E49F602000
|
heap
|
page read and write
|
||
3F1000A7C000
|
trusted library allocation
|
page read and write
|
||
1CFA653F000
|
heap
|
page read and write
|
||
84D91FE000
|
unkown
|
page readonly
|
||
1CFA65B4000
|
heap
|
page read and write
|
||
3F1000A24000
|
trusted library allocation
|
page read and write
|
||
24EAC495000
|
heap
|
page read and write
|
||
23F000168000
|
trusted library allocation
|
page read and write
|
||
24EAEF17000
|
heap
|
page read and write
|
||
7FF630CC8000
|
unkown
|
page read and write
|
||
225E680A000
|
heap
|
page read and write
|
||
225E6845000
|
heap
|
page read and write
|
||
2199C127000
|
heap
|
page read and write
|
||
1CFA33FB000
|
heap
|
page read and write
|
||
144002AC000
|
direct allocation
|
page read and write
|
||
16C00280000
|
direct allocation
|
page read and write
|
||
24EAEF2F000
|
heap
|
page read and write
|
||
24EAC4FA000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
12691DE4000
|
heap
|
page read and write
|
||
12693EF1000
|
heap
|
page read and write
|
||
3F100040C000
|
trusted library allocation
|
page read and write
|
||
38340026C000
|
trusted library allocation
|
page read and write
|
||
1CFA344C000
|
heap
|
page read and write
|
||
1CFA192C000
|
heap
|
page read and write
|
||
2BF8002C0000
|
trusted library allocation
|
page read and write
|
||
449C1FD000
|
stack
|
page read and write
|
||
1CFA190D000
|
heap
|
page read and write
|
||
12693810000
|
heap
|
page read and write
|
||
3F1000E18000
|
trusted library allocation
|
page read and write
|
||
24EAEEC8000
|
heap
|
page read and write
|
||
225E691F000
|
heap
|
page read and write
|
||
24EAEFEB000
|
heap
|
page read and write
|
||
1CFA34C3000
|
heap
|
page read and write
|
||
3F100049A000
|
trusted library allocation
|
page read and write
|
||
16C0024C000
|
direct allocation
|
page read and write
|
||
75A00029C000
|
direct allocation
|
page read and write
|
||
24EAEF63000
|
heap
|
page read and write
|
||
7AF400361000
|
trusted library allocation
|
page read and write
|
||
24EAEE9D000
|
heap
|
page read and write
|
||
12693F41000
|
heap
|
page read and write
|
||
694C002C4000
|
trusted library allocation
|
page read and write
|
||
225E686F000
|
heap
|
page read and write
|
||
3F100008B000
|
trusted library allocation
|
page read and write
|
||
34DC00254000
|
trusted library allocation
|
page read and write
|
||
69B000298000
|
trusted library allocation
|
page read and write
|
||
1D0F5257000
|
heap
|
page read and write
|
||
84EA9FE000
|
stack
|
page read and write
|
||
47E400028000
|
trusted library allocation
|
page read and write
|
||
23F0001B0000
|
trusted library allocation
|
page read and write
|
||
1CFA65BE000
|
heap
|
page read and write
|
||
1CFA6610000
|
heap
|
page read and write
|
||
1CFA343A000
|
heap
|
page read and write
|
||
1D231A02000
|
heap
|
page read and write
|
||
225E3B9C000
|
heap
|
page read and write
|
||
54DC002D4000
|
direct allocation
|
page read and write
|
||
AA22CFE000
|
stack
|
page read and write
|
||
225E3B49000
|
heap
|
page read and write
|
||
225E3B9C000
|
heap
|
page read and write
|
||
24EAEFAE000
|
heap
|
page read and write
|
||
12693F69000
|
heap
|
page read and write
|
||
1D0F5200000
|
heap
|
page read and write
|
||
126968C4000
|
heap
|
page read and write
|
||
23F0000CC000
|
trusted library allocation
|
page read and write
|
||
44989FE000
|
unkown
|
page readonly
|
||
24EAEF2F000
|
heap
|
page read and write
|
||
12696834000
|
heap
|
page read and write
|
||
14400210000
|
direct allocation
|
page read and write
|
||
12693C09000
|
heap
|
page read and write
|
||
225E1E27000
|
heap
|
page read and write
|
||
219A120D000
|
heap
|
page read and write
|
||
12693640000
|
heap
|
page read and write
|
||
7AF400354000
|
trusted library allocation
|
page read and write
|
||
225E1E0A000
|
heap
|
page read and write
|
||
1D082602000
|
heap
|
page read and write
|
||
24EAEF43000
|
heap
|
page read and write
|
||
225E1DBD000
|
heap
|
page read and write
|
||
225E1E17000
|
heap
|
page read and write
|
||
2199C12F000
|
heap
|
page read and write
|
||
3F1000E71000
|
trusted library allocation
|
page read and write
|
||
225E693D000
|
heap
|
page read and write
|
||
225E6973000
|
heap
|
page read and write
|
||
24EAA684000
|
heap
|
page read and write
|
||
12691D43000
|
heap
|
page read and write
|
||
3F1000C9C000
|
trusted library allocation
|
page read and write
|
||
2199C129000
|
heap
|
page read and write
|
||
225E68A7000
|
heap
|
page read and write
|
||
1CFA3468000
|
heap
|
page read and write
|
||
225E3AE0000
|
heap
|
page read and write
|
||
12693FFB000
|
heap
|
page read and write
|
||
6520000E0000
|
trusted library allocation
|
page read and write
|
||
24EAEEEE000
|
heap
|
page read and write
|
||
1CFA18EA000
|
heap
|
page read and write
|
||
23F00012C000
|
trusted library allocation
|
page read and write
|
||
5D68002E0000
|
trusted library allocation
|
page read and write
|
||
3F1000280000
|
trusted library allocation
|
page read and write
|
||
225E67F0000
|
heap
|
page read and write
|
||
2199C12A000
|
heap
|
page read and write
|
||
562800220000
|
trusted library allocation
|
page read and write
|
||
652000094000
|
trusted library allocation
|
page read and write
|
||
1CFA32D0000
|
heap
|
page read and write
|
||
16C002AC000
|
direct allocation
|
page read and write
|
||
191D9445000
|
heap
|
page read and write
|
||
24EAC49F000
|
heap
|
page read and write
|
||
3508DFC000
|
stack
|
page read and write
|
||
84EB1FE000
|
unkown
|
page readonly
|
||
225E3B8E000
|
heap
|
page read and write
|
||
1CFA65D8000
|
heap
|
page read and write
|
||
34DC0028C000
|
trusted library allocation
|
page read and write
|
||
24EAEEEB000
|
heap
|
page read and write
|
||
8D82FFE000
|
stack
|
page read and write
|
||
54DC00220000
|
direct allocation
|
page read and write
|
||
12693C47000
|
heap
|
page read and write
|
||
3F100038B000
|
trusted library allocation
|
page read and write
|
||
47E4001E9000
|
trusted library allocation
|
page read and write
|
||
694C0029C000
|
trusted library allocation
|
page read and write
|
||
3F1000DC0000
|
trusted library allocation
|
page read and write
|
||
12693FCC000
|
heap
|
page read and write
|
||
B8F13FC000
|
stack
|
page read and write
|
||
7FF630C7D000
|
unkown
|
page readonly
|
||
1D08256F000
|
trusted library allocation
|
page read and write
|
||
23C800244000
|
trusted library allocation
|
page read and write
|
||
5DC0031F000
|
direct allocation
|
page read and write
|
||
24EAC501000
|
heap
|
page read and write
|
||
23F0001C4000
|
trusted library allocation
|
page read and write
|
||
12693BC7000
|
heap
|
page read and write
|
||
7AF4002FC000
|
trusted library allocation
|
page read and write
|
||
7FF713E58000
|
unkown
|
page read and write
|
||
23C800260000
|
trusted library allocation
|
page read and write
|
||
12691E6F000
|
heap
|
page read and write
|
||
84DF1FE000
|
unkown
|
page readonly
|
||
12693F33000
|
heap
|
page read and write
|
||
3F1000A01000
|
trusted library allocation
|
page read and write
|
||
2199C0F0000
|
heap
|
page read and write
|
||
21082DD0000
|
unclassified section
|
page read and write
|
||
210FE750000
|
heap
|
page read and write
|
||
47E40000C000
|
trusted library allocation
|
page read and write
|
||
3F1000829000
|
trusted library allocation
|
page read and write
|
||
24EAEE76000
|
heap
|
page read and write
|
||
3F1000AE4000
|
trusted library allocation
|
page read and write
|
||
84C29FC000
|
stack
|
page read and write
|
||
23F0000C5000
|
trusted library allocation
|
page read and write
|
||
24EAF033000
|
heap
|
page read and write
|
||
12691DC3000
|
heap
|
page read and write
|
||
24EAA69A000
|
heap
|
page read and write
|
||
3F1000EE4000
|
trusted library allocation
|
page read and write
|
||
3F10008D0000
|
trusted library allocation
|
page read and write
|
||
3F1000BC0000
|
trusted library allocation
|
page read and write
|
||
1CFA66F1000
|
heap
|
page read and write
|
||
24EAEEE2000
|
heap
|
page read and write
|
||
12691D88000
|
heap
|
page read and write
|
||
12696878000
|
heap
|
page read and write
|
||
2BF8002F8000
|
trusted library allocation
|
page read and write
|
||
16C00240000
|
direct allocation
|
page read and write
|
||
2199C0F0000
|
heap
|
page read and write
|
||
12691E64000
|
heap
|
page read and write
|
||
2199DF2C000
|
heap
|
page read and write
|
||
1CFA6598000
|
heap
|
page read and write
|
||
7FF630D1F000
|
unkown
|
page read and write
|
||
1CFA192A000
|
heap
|
page read and write
|
||
8DFEDFE000
|
stack
|
page read and write
|
||
7AF400418000
|
trusted library allocation
|
page read and write
|
||
5A6400288000
|
trusted library allocation
|
page read and write
|
||
23737FE000
|
stack
|
page read and write
|
||
24EAEEA3000
|
heap
|
page read and write
|
||
5A6400258000
|
trusted library allocation
|
page read and write
|
||
3F1000396000
|
trusted library allocation
|
page read and write
|
||
225E3BB3000
|
heap
|
page read and write
|
||
1CFA6722000
|
heap
|
page read and write
|
||
3F10008B0000
|
trusted library allocation
|
page read and write
|
||
3F1000248000
|
trusted library allocation
|
page read and write
|
||
1CFA6610000
|
heap
|
page read and write
|
||
2199C12A000
|
heap
|
page read and write
|
||
24EAEE9C000
|
heap
|
page read and write
|
||
7FF713E60000
|
unkown
|
page read and write
|
||
225E3B6E000
|
heap
|
page read and write
|
||
12691E38000
|
heap
|
page read and write
|
||
24EAC4B4000
|
heap
|
page read and write
|
||
3F1000538000
|
trusted library allocation
|
page read and write
|
||
12693FFB000
|
heap
|
page read and write
|
||
225E1EB9000
|
heap
|
page read and write
|
||
23C8002C4000
|
trusted library allocation
|
page read and write
|
||
694C00230000
|
trusted library allocation
|
page read and write
|
||
562800264000
|
trusted library allocation
|
page read and write
|
||
225E67CB000
|
heap
|
page read and write
|
||
1CFA3461000
|
heap
|
page read and write
|
||
3F10005EC000
|
trusted library allocation
|
page read and write
|
||
84C51FE000
|
unkown
|
page readonly
|
||
225E57E0000
|
trusted library allocation
|
page read and write
|
||
12693F08000
|
heap
|
page read and write
|
||
24EAC4A1000
|
heap
|
page read and write
|
||
7FF695A70000
|
unkown
|
page readonly
|
||
24EAC600000
|
heap
|
page read and write
|
||
12693F2A000
|
heap
|
page read and write
|
||
694C002B4000
|
trusted library allocation
|
page read and write
|
||
225E3B87000
|
heap
|
page read and write
|
||
225E1E21000
|
heap
|
page read and write
|
||
12691DC9000
|
heap
|
page read and write
|
||
84E01FE000
|
unkown
|
page readonly
|
||
5DC0021C000
|
direct allocation
|
page read and write
|
||
23C800250000
|
trusted library allocation
|
page read and write
|
||
12693BFD000
|
heap
|
page read and write
|
||
3F1000C34000
|
trusted library allocation
|
page read and write
|
||
23F000130000
|
trusted library allocation
|
page read and write
|
||
24EAA733000
|
heap
|
page read and write
|
||
23D47700000
|
heap
|
page read and write
|
||
5D68002B8000
|
trusted library allocation
|
page read and write
|
||
225E1D20000
|
heap
|
page read and write
|
||
225E1DD6000
|
heap
|
page read and write
|
||
1CFA659E000
|
heap
|
page read and write
|
||
1CFA6774000
|
heap
|
page read and write
|
||
3F1000DD0000
|
trusted library allocation
|
page read and write
|
||
54DC002CC000
|
direct allocation
|
page read and write
|
||
225E6830000
|
heap
|
page read and write
|
||
1CFA1895000
|
heap
|
page read and write
|
||
54DC00288000
|
direct allocation
|
page read and write
|
||
1CFA6680000
|
heap
|
page read and write
|
||
5DC00212000
|
direct allocation
|
page read and write
|
||
23F00025C000
|
trusted library allocation
|
page read and write
|
||
225E68AB000
|
heap
|
page read and write
|
||
2199DF66000
|
heap
|
page read and write
|
||
24EAEF29000
|
heap
|
page read and write
|
||
12693E60000
|
heap
|
page read and write
|
||
5DC00308000
|
direct allocation
|
page read and write
|
||
219A1302000
|
heap
|
page read and write
|
||
12693F3D000
|
heap
|
page read and write
|
||
23C800418000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
12693C0E000
|
heap
|
page read and write
|
||
2BF800270000
|
trusted library allocation
|
page read and write
|
||
1CFA3452000
|
heap
|
page read and write
|
||
12693C15000
|
heap
|
page read and write
|
||
225E6913000
|
heap
|
page read and write
|
||
54DC002DC000
|
direct allocation
|
page read and write
|
||
3F1000858000
|
trusted library allocation
|
page read and write
|
||
23F000188000
|
trusted library allocation
|
page read and write
|
||
7AF4002F0000
|
trusted library allocation
|
page read and write
|
||
225E3BAD000
|
heap
|
page read and write
|
||
1CFA33F7000
|
heap
|
page read and write
|
||
210FE813000
|
heap
|
page read and write
|
||
23736FE000
|
stack
|
page read and write
|
||
3F1000E50000
|
trusted library allocation
|
page read and write
|
||
225E1DC9000
|
heap
|
page read and write
|
||
12693EEA000
|
heap
|
page read and write
|
||
225E1E60000
|
heap
|
page read and write
|
||
5DC00268000
|
direct allocation
|
page read and write
|
||
2373AFE000
|
stack
|
page read and write
|
||
24EAC0C0000
|
heap
|
page read and write
|
||
35090FF000
|
stack
|
page read and write
|
||
12693F3F000
|
heap
|
page read and write
|
||
12693E85000
|
heap
|
page read and write
|
||
2BF8002D8000
|
trusted library allocation
|
page read and write
|
||
1CFA18B4000
|
heap
|
page read and write
|
||
24EAF051000
|
heap
|
page read and write
|
||
84CC1FE000
|
unkown
|
page readonly
|
||
2199C130000
|
heap
|
page read and write
|
||
2199C12F000
|
heap
|
page read and write
|
||
1D22D053000
|
heap
|
page read and write
|
||
24EAEF1B000
|
heap
|
page read and write
|
||
1CFA1896000
|
heap
|
page read and write
|
||
54DC00298000
|
direct allocation
|
page read and write
|
||
12691E32000
|
heap
|
page read and write
|
||
23F00001C000
|
trusted library allocation
|
page read and write
|
||
23F0001DC000
|
trusted library allocation
|
page read and write
|
||
5628002C4000
|
trusted library allocation
|
page read and write
|
||
54DC00254000
|
direct allocation
|
page read and write
|
||
225E3BCD000
|
heap
|
page read and write
|
||
23F0000E0000
|
trusted library allocation
|
page read and write
|
||
3F100080C000
|
trusted library allocation
|
page read and write
|
||
44981FC000
|
stack
|
page read and write
|
||
24EAC507000
|
heap
|
page read and write
|
||
AA22BFE000
|
stack
|
page read and write
|
||
24EAF062000
|
heap
|
page read and write
|
||
7AF400254000
|
trusted library allocation
|
page read and write
|
||
562800298000
|
trusted library allocation
|
page read and write
|
||
1CFA1893000
|
heap
|
page read and write
|
||
225E1EA0000
|
heap
|
page read and write
|
||
7AF400260000
|
trusted library allocation
|
page read and write
|
||
12693FF6000
|
heap
|
page read and write
|
||
225E68BE000
|
heap
|
page read and write
|
||
56280027C000
|
trusted library allocation
|
page read and write
|
||
2199C129000
|
heap
|
page read and write
|
||
12693FDE000
|
heap
|
page read and write
|
||
24EAC4A9000
|
heap
|
page read and write
|
||
1CFA1912000
|
heap
|
page read and write
|
||
3F10003EA000
|
trusted library allocation
|
page read and write
|
||
2199C134000
|
heap
|
page read and write
|
||
24EAA530000
|
heap
|
page read and write
|
||
69B000220000
|
trusted library allocation
|
page read and write
|
||
5D6800304000
|
trusted library allocation
|
page read and write
|
||
12696803000
|
heap
|
page read and write
|
||
47E4001B0000
|
trusted library allocation
|
page read and write
|
||
12691DEC000
|
heap
|
page read and write
|
||
47E40014C000
|
trusted library allocation
|
page read and write
|
||
225E6933000
|
heap
|
page read and write
|
||
1D0F523D000
|
heap
|
page read and write
|
||
12693F3E000
|
heap
|
page read and write
|
||
562800238000
|
trusted library allocation
|
page read and write
|
||
1CFA67DE000
|
heap
|
page read and write
|
||
12693ED6000
|
heap
|
page read and write
|
||
75A000270000
|
direct allocation
|
page read and write
|
||
3F100036C000
|
trusted library allocation
|
page read and write
|
||
1CFA67E1000
|
heap
|
page read and write
|
||
7AF4002B4000
|
trusted library allocation
|
page read and write
|
||
3F1000F62000
|
trusted library allocation
|
page read and write
|
||
24EAEE74000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
225E62DC000
|
heap
|
page read and write
|
||
3F1000B44000
|
trusted library allocation
|
page read and write
|
||
12696822000
|
heap
|
page read and write
|
||
12693FA2000
|
heap
|
page read and write
|
||
1CFA345E000
|
heap
|
page read and write
|
||
12693BE0000
|
heap
|
page read and write
|
||
1CFA3463000
|
heap
|
page read and write
|
||
3F1000DEF000
|
trusted library allocation
|
page read and write
|
||
1CFA65A1000
|
heap
|
page read and write
|
||
219A1202000
|
heap
|
page read and write
|
||
12693BF5000
|
heap
|
page read and write
|
||
23F000134000
|
trusted library allocation
|
page read and write
|
||
1CFA659C000
|
heap
|
page read and write
|
||
3F1000F54000
|
trusted library allocation
|
page read and write
|
||
C7A9DF4000
|
stack
|
page read and write
|
||
23F00022C000
|
trusted library allocation
|
page read and write
|
||
1CFA3418000
|
heap
|
page read and write
|
||
2BF800264000
|
trusted library allocation
|
page read and write
|
||
3F1000F7C000
|
trusted library allocation
|
page read and write
|
||
24EAC507000
|
heap
|
page read and write
|
||
12693C23000
|
heap
|
page read and write
|
||
1269689B000
|
heap
|
page read and write
|
||
3F1000DA8000
|
trusted library allocation
|
page read and write
|
||
24EAEEC4000
|
heap
|
page read and write
|
||
12693F2D000
|
heap
|
page read and write
|
||
225E3BD2000
|
heap
|
page read and write
|
||
65200001C000
|
trusted library allocation
|
page read and write
|
||
1CFA18B4000
|
heap
|
page read and write
|
||
12693C50000
|
heap
|
page read and write
|
||
5DC00380000
|
direct allocation
|
page read and write
|
||
24EAEF35000
|
heap
|
page read and write
|
||
1CFA6511000
|
heap
|
page read and write
|
||
34DC00201000
|
trusted library allocation
|
page read and write
|
||
3F1000DD4000
|
trusted library allocation
|
page read and write
|
||
12693BFD000
|
heap
|
page read and write
|
||
2373EFB000
|
stack
|
page read and write
|
||
35087B6000
|
stack
|
page read and write
|
||
3F10008E4000
|
trusted library allocation
|
page read and write
|
||
1D0F5245000
|
heap
|
page read and write
|
||
225E3750000
|
heap
|
page read and write
|
||
24EAC410000
|
heap
|
page read and write
|
||
225E3BB1000
|
heap
|
page read and write
|
||
23F000054000
|
trusted library allocation
|
page read and write
|
||
3F1000801000
|
trusted library allocation
|
page read and write
|
||
38340020C000
|
trusted library allocation
|
page read and write
|
||
1CFA6710000
|
heap
|
page read and write
|
||
2BF800404000
|
trusted library allocation
|
page read and write
|
||
5DC0023C000
|
direct allocation
|
page read and write
|
||
3F10009E4000
|
trusted library allocation
|
page read and write
|
||
1D0F5302000
|
heap
|
page read and write
|
||
1CFA31E0000
|
heap
|
page read and write
|
||
5D68002D4000
|
trusted library allocation
|
page read and write
|
||
3F1000C38000
|
trusted library allocation
|
page read and write
|
||
12693F2D000
|
heap
|
page read and write
|
||
1D22D01B000
|
heap
|
page read and write
|
||
225E6847000
|
heap
|
page read and write
|
||
56280023C000
|
trusted library allocation
|
page read and write
|
||
5DC00318000
|
direct allocation
|
page read and write
|
||
3F1000D98000
|
trusted library allocation
|
page read and write
|
||
3F1000594000
|
trusted library allocation
|
page read and write
|
||
5DC00358000
|
direct allocation
|
page read and write
|
||
225E3BAD000
|
heap
|
page read and write
|
||
12693F2A000
|
heap
|
page read and write
|
||
1D0F5050000
|
remote allocation
|
page read and write
|
||
2199BF60000
|
heap
|
page read and write
|
||
23F0001AC000
|
trusted library allocation
|
page read and write
|
||
225E6361000
|
heap
|
page read and write
|
||
8D817FE000
|
unkown
|
page readonly
|
||
5DC0030A000
|
direct allocation
|
page read and write
|
||
54DC00310000
|
direct allocation
|
page read and write
|
||
1CFA18FD000
|
heap
|
page read and write
|
||
24EAEFD1000
|
heap
|
page read and write
|
||
12691E44000
|
heap
|
page read and write
|
||
B827FE000
|
stack
|
page read and write
|
||
24EAEF08000
|
heap
|
page read and write
|
||
5DC0029C000
|
direct allocation
|
page read and write
|
||
1CFA18F9000
|
heap
|
page read and write
|
||
225E3BA4000
|
heap
|
page read and write
|
||
34DC00280000
|
trusted library allocation
|
page read and write
|
||
2199C12A000
|
heap
|
page read and write
|
||
2199DE02000
|
heap
|
page read and write
|
||
210FE82B000
|
heap
|
page read and write
|
||
562800298000
|
trusted library allocation
|
page read and write
|
||
24EAA714000
|
heap
|
page read and write
|
||
12693FE7000
|
heap
|
page read and write
|
||
12693F2D000
|
heap
|
page read and write
|
||
24EAA71E000
|
heap
|
page read and write
|
||
144002C8000
|
direct allocation
|
page read and write
|
||
12693FA1000
|
heap
|
page read and write
|
||
7AF400230000
|
trusted library allocation
|
page read and write
|
||
1CFA67AB000
|
heap
|
page read and write
|
||
24EAA6EF000
|
heap
|
page read and write
|
||
1CFA674C000
|
heap
|
page read and write
|
||
23C800310000
|
trusted library allocation
|
page read and write
|
||
7AF400350000
|
trusted library allocation
|
page read and write
|
||
3F1000DE4000
|
trusted library allocation
|
page read and write
|
||
12691E75000
|
heap
|
page read and write
|
||
65200000C000
|
trusted library allocation
|
page read and write
|
||
1CFA3461000
|
heap
|
page read and write
|
||
24EAEEEA000
|
heap
|
page read and write
|
||
24EAC48E000
|
heap
|
page read and write
|
||
225E634F000
|
heap
|
page read and write
|
||
1CFA1906000
|
heap
|
page read and write
|
||
3834002BC000
|
trusted library allocation
|
page read and write
|
||
24EAC4EB000
|
heap
|
page read and write
|
||
23F0000C8000
|
trusted library allocation
|
page read and write
|
||
24EAEFB6000
|
heap
|
page read and write
|
||
225E3B84000
|
heap
|
page read and write
|
||
2199C130000
|
heap
|
page read and write
|
||
3F1000F2C000
|
trusted library allocation
|
page read and write
|
||
694C002E0000
|
trusted library allocation
|
page read and write
|
||
3F1000001000
|
trusted library allocation
|
page read and write
|
||
12693C5B000
|
heap
|
page read and write
|
||
1CFA6703000
|
heap
|
page read and write
|
||
24EAA694000
|
heap
|
page read and write
|
||
23C8002F8000
|
trusted library allocation
|
page read and write
|
||
47E400024000
|
trusted library allocation
|
page read and write
|
||
7FF695B0D000
|
unkown
|
page write copy
|
||
24EAEF77000
|
heap
|
page read and write
|
||
12693C07000
|
heap
|
page read and write
|
||
1CFA67BF000
|
heap
|
page read and write
|
||
449F1FC000
|
stack
|
page read and write
|
||
1CFA343B000
|
heap
|
page read and write
|
||
2199C02B000
|
heap
|
page read and write
|
||
457E2CC000
|
stack
|
page read and write
|
||
5D6800404000
|
trusted library allocation
|
page read and write
|
||
3F100013C000
|
trusted library allocation
|
page read and write
|
||
2BF800274000
|
trusted library allocation
|
page read and write
|
||
225E62FE000
|
heap
|
page read and write
|
||
1E49DA00000
|
heap
|
page read and write
|
||
24EAA700000
|
heap
|
page read and write
|
||
1CFA6557000
|
heap
|
page read and write
|
||
1D22D102000
|
heap
|
page read and write
|
||
8D81FFC000
|
stack
|
page read and write
|
||
694C00334000
|
trusted library allocation
|
page read and write
|
||
7FF713EAE000
|
unkown
|
page read and write
|
||
23C800288000
|
trusted library allocation
|
page read and write
|
||
1269680A000
|
heap
|
page read and write
|
||
3F1000F44000
|
trusted library allocation
|
page read and write
|
||
23C80032B000
|
trusted library allocation
|
page read and write
|
||
1CFA66AC000
|
heap
|
page read and write
|
||
7AF400290000
|
trusted library allocation
|
page read and write
|
||
B8EA3FE000
|
stack
|
page read and write
|
||
1CFA1830000
|
heap
|
page read and write
|
||
5DC00288000
|
direct allocation
|
page read and write
|
||
3F1000D14000
|
trusted library allocation
|
page read and write
|
||
24EAF0E3000
|
heap
|
page read and write
|
||
84E19FD000
|
stack
|
page read and write
|
||
12691E7D000
|
heap
|
page read and write
|
||
225E67AD000
|
heap
|
page read and write
|
||
694C00310000
|
trusted library allocation
|
page read and write
|
||
24EAA69E000
|
heap
|
page read and write
|
||
3F1000A44000
|
trusted library allocation
|
page read and write
|
||
225E67DF000
|
heap
|
page read and write
|
||
3F1000BDC000
|
trusted library allocation
|
page read and write
|
||
1CFA6594000
|
heap
|
page read and write
|
||
225E692B000
|
heap
|
page read and write
|
||
23F00026C000
|
trusted library allocation
|
page read and write
|
||
24EAC4AC000
|
heap
|
page read and write
|
||
5A6400278000
|
trusted library allocation
|
page read and write
|
||
69B000248000
|
trusted library allocation
|
page read and write
|
||
44969FE000
|
unkown
|
page readonly
|
||
3F100022C000
|
trusted library allocation
|
page read and write
|
||
1D08266D000
|
heap
|
page read and write
|
||
24EAC4A1000
|
heap
|
page read and write
|
||
12694035000
|
heap
|
page read and write
|
||
3F1000244000
|
trusted library allocation
|
page read and write
|
||
225E1E96000
|
heap
|
page read and write
|
||
2BF8002B8000
|
trusted library allocation
|
page read and write
|
||
1CFA3459000
|
heap
|
page read and write
|
||
1CFA1893000
|
heap
|
page read and write
|
||
1CFA18A1000
|
heap
|
page read and write
|
||
225E67B4000
|
heap
|
page read and write
|
||
24EAEEA0000
|
heap
|
page read and write
|
||
3F1000A21000
|
trusted library allocation
|
page read and write
|
||
3F10005B8000
|
trusted library allocation
|
page read and write
|
||
12693ED3000
|
heap
|
page read and write
|
||
5DC00220000
|
direct allocation
|
page read and write
|
||
23C800334000
|
trusted library allocation
|
page read and write
|
||
12693BF2000
|
heap
|
page read and write
|
||
225E698A000
|
heap
|
page read and write
|
||
3F10005EC000
|
trusted library allocation
|
page read and write
|
||
225E686D000
|
heap
|
page read and write
|
||
24EAC4EE000
|
heap
|
page read and write
|
||
3F100080C000
|
trusted library allocation
|
page read and write
|
||
69B0002A0000
|
trusted library allocation
|
page read and write
|
||
16C002C0000
|
direct allocation
|
page read and write
|
||
3F1000D24000
|
trusted library allocation
|
page read and write
|
||
3F10008EC000
|
trusted library allocation
|
page read and write
|
||
225E68F2000
|
heap
|
page read and write
|
||
3F1000584000
|
trusted library allocation
|
page read and write
|
||
5DC002D4000
|
direct allocation
|
page read and write
|
||
23F000044000
|
trusted library allocation
|
page read and write
|
||
24EAC4DB000
|
heap
|
page read and write
|
||
B81FFE000
|
unkown
|
page readonly
|
||
5628002C0000
|
trusted library allocation
|
page read and write
|
||
1D0F5213000
|
heap
|
page read and write
|
||
B8F0BFE000
|
unkown
|
page readonly
|
||
5A64002C8000
|
trusted library allocation
|
page read and write
|
||
1CFA656E000
|
heap
|
page read and write
|
||
2199BFF0000
|
trusted library allocation
|
page read and write
|
||
1CFA18A0000
|
heap
|
page read and write
|
||
7FF630C7A000
|
unkown
|
page readonly
|
||
1D0F529A000
|
heap
|
page read and write
|
||
12693C5E000
|
heap
|
page read and write
|
||
562800302000
|
trusted library allocation
|
page read and write
|
||
1CFA6563000
|
heap
|
page read and write
|
||
24EAEFC4000
|
heap
|
page read and write
|
||
3F10000B9000
|
trusted library allocation
|
page read and write
|
||
2BF800288000
|
trusted library allocation
|
page read and write
|
||
12693F17000
|
heap
|
page read and write
|
||
B8E6BFE000
|
unkown
|
page readonly
|
||
225E3BCC000
|
heap
|
page read and write
|
||
12691DD5000
|
heap
|
page read and write
|
||
24EAA6E2000
|
heap
|
page read and write
|
||
1CFA3457000
|
heap
|
page read and write
|
||
1CFA673A000
|
heap
|
page read and write
|
||
24EAC4AE000
|
heap
|
page read and write
|
||
5D680040C000
|
trusted library allocation
|
page read and write
|
||
7FF630C90000
|
unkown
|
page readonly
|
||
2199C136000
|
heap
|
page read and write
|
||
5628002C0000
|
trusted library allocation
|
page read and write
|
||
12691DC9000
|
heap
|
page read and write
|
||
225E6838000
|
heap
|
page read and write
|
||
694C00404000
|
trusted library allocation
|
page read and write
|
||
24EAC4C4000
|
heap
|
page read and write
|
||
7AF40028C000
|
trusted library allocation
|
page read and write
|
||
3F10008B4000
|
trusted library allocation
|
page read and write
|
||
24EAF0E4000
|
heap
|
page read and write
|
||
1D082570000
|
trusted library allocation
|
page read and write
|
||
2199C0C7000
|
heap
|
page read and write
|
||
84E91FE000
|
unkown
|
page readonly
|
||
3F1000B80000
|
trusted library allocation
|
page read and write
|
||
3F1000C24000
|
trusted library allocation
|
page read and write
|
||
12696834000
|
heap
|
page read and write
|
||
12693F02000
|
heap
|
page read and write
|
||
23C800278000
|
trusted library allocation
|
page read and write
|
||
B8EE3FE000
|
stack
|
page read and write
|
||
225E68AB000
|
heap
|
page read and write
|
||
84C71FE000
|
unkown
|
page readonly
|
||
2199DF56000
|
heap
|
page read and write
|
||
84E29FE000
|
stack
|
page read and write
|
||
12693C24000
|
heap
|
page read and write
|
||
23C800424000
|
trusted library allocation
|
page read and write
|
||
12693C10000
|
heap
|
page read and write
|
||
694C00258000
|
trusted library allocation
|
page read and write
|
||
3F1000E0C000
|
trusted library allocation
|
page read and write
|
||
3F10003D8000
|
trusted library allocation
|
page read and write
|
||
12691E77000
|
heap
|
page read and write
|
||
12693E76000
|
heap
|
page read and write
|
||
12691DC3000
|
heap
|
page read and write
|
||
225E1DE4000
|
heap
|
page read and write
|
||
C7AA3FC000
|
stack
|
page read and write
|
||
225E67F8000
|
heap
|
page read and write
|
||
12693BEC000
|
heap
|
page read and write
|
||
84DE9FD000
|
stack
|
page read and write
|
||
1D22D105000
|
heap
|
page read and write
|
||
225E692B000
|
heap
|
page read and write
|
||
2199C12F000
|
heap
|
page read and write
|
||
47E400174000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
2199C013000
|
heap
|
page read and write
|
||
54DC00404000
|
direct allocation
|
page read and write
|
||
75A0002AC000
|
direct allocation
|
page read and write
|
||
5DC002C8000
|
direct allocation
|
page read and write
|
||
3F1000F60000
|
trusted library allocation
|
page read and write
|
||
12693EDA000
|
heap
|
page read and write
|
||
2199DF54000
|
heap
|
page read and write
|
||
1CFA659C000
|
heap
|
page read and write
|
||
1CFA348C000
|
heap
|
page read and write
|
||
84C91FE000
|
unkown
|
page readonly
|
||
47E4000FC000
|
trusted library allocation
|
page read and write
|
||
225E68F1000
|
heap
|
page read and write
|
||
1269381D000
|
heap
|
page read and write
|
||
24EAEEC9000
|
heap
|
page read and write
|
||
24EAEEC4000
|
heap
|
page read and write
|
||
24EAEEB2000
|
heap
|
page read and write
|
||
3F1000E4C000
|
trusted library allocation
|
page read and write
|
||
23F000201000
|
trusted library allocation
|
page read and write
|
||
24EAEEB4000
|
heap
|
page read and write
|
||
1CFA669A000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
23F000102000
|
trusted library allocation
|
page read and write
|
||
12691BD0000
|
heap
|
page read and write
|
||
2BF8002B0000
|
trusted library allocation
|
page read and write
|
||
12696823000
|
heap
|
page read and write
|
||
562800298000
|
trusted library allocation
|
page read and write
|
||
1E49F490000
|
heap
|
page read and write
|
||
225E67E4000
|
heap
|
page read and write
|
||
225E3BD6000
|
heap
|
page read and write
|
||
3F1000298000
|
trusted library allocation
|
page read and write
|
||
694C002F8000
|
trusted library allocation
|
page read and write
|
||
47E4001F0000
|
trusted library allocation
|
page read and write
|
||
23C8002D0000
|
trusted library allocation
|
page read and write
|
||
54DC002C0000
|
direct allocation
|
page read and write
|
||
12693C3D000
|
heap
|
page read and write
|
||
1D08263C000
|
heap
|
page read and write
|
||
3F10009DC000
|
trusted library allocation
|
page read and write
|
||
7FF713E0A000
|
unkown
|
page readonly
|
||
12693C07000
|
heap
|
page read and write
|
||
3508EFE000
|
stack
|
page read and write
|
||
1CFA1903000
|
heap
|
page read and write
|
||
84D01FE000
|
unkown
|
page readonly
|
||
84D71FE000
|
unkown
|
page readonly
|
||
75A000201000
|
direct allocation
|
page read and write
|
||
3F1000AC8000
|
trusted library allocation
|
page read and write
|
||
225E6872000
|
heap
|
page read and write
|
||
225E683C000
|
heap
|
page read and write
|
||
24EAA6D8000
|
heap
|
page read and write
|
||
225E3B72000
|
heap
|
page read and write
|
||
24EAC004000
|
heap
|
page read and write
|
||
1CFA1903000
|
heap
|
page read and write
|
||
B8EEBFE000
|
unkown
|
page readonly
|
||
126968C9000
|
heap
|
page read and write
|
||
225E6307000
|
heap
|
page read and write
|
||
225E67F4000
|
heap
|
page read and write
|
||
3F1000850000
|
trusted library allocation
|
page read and write
|
||
B8E83FE000
|
stack
|
page read and write
|
||
24EAF02F000
|
heap
|
page read and write
|
||
12691DD5000
|
heap
|
page read and write
|
||
24EAEFA8000
|
heap
|
page read and write
|
||
225E3B88000
|
heap
|
page read and write
|
||
B817FE000
|
stack
|
page read and write
|
||
2199C0E6000
|
heap
|
page read and write
|
||
24EAC4A1000
|
heap
|
page read and write
|
||
12691DD8000
|
heap
|
page read and write
|
||
1CFA18FF000
|
heap
|
page read and write
|
||
3F1000A54000
|
trusted library allocation
|
page read and write
|
||
12693EC3000
|
heap
|
page read and write
|
||
225E67EB000
|
heap
|
page read and write
|
||
23C800408000
|
trusted library allocation
|
page read and write
|
||
1D0F51E0000
|
trusted library allocation
|
page read and write
|
||
84CE9FD000
|
stack
|
page read and write
|
||
24EAA6F8000
|
heap
|
page read and write
|
||
47E400044000
|
trusted library allocation
|
page read and write
|
||
24EAF073000
|
heap
|
page read and write
|
||
12693FD5000
|
heap
|
page read and write
|
||
652000044000
|
trusted library allocation
|
page read and write
|
||
12694046000
|
heap
|
page read and write
|
||
1E49D9E0000
|
heap
|
page read and write
|
||
210FE800000
|
heap
|
page read and write
|
||
3F1000AC8000
|
trusted library allocation
|
page read and write
|
||
12691E2E000
|
heap
|
page read and write
|
||
1CFA66A2000
|
heap
|
page read and write
|
||
5DC00201000
|
direct allocation
|
page read and write
|
||
225E6844000
|
heap
|
page read and write
|
||
44921FF000
|
stack
|
page read and write
|
||
225E3B68000
|
heap
|
page read and write
|
||
23D476E2000
|
remote allocation
|
page execute read
|
||
12693C0D000
|
heap
|
page read and write
|
||
1CFA1915000
|
heap
|
page read and write
|
||
3F1000EEC000
|
trusted library allocation
|
page read and write
|
||
16C00298000
|
direct allocation
|
page read and write
|
||
225E67FD000
|
heap
|
page read and write
|
||
B8F3BFE000
|
unkown
|
page readonly
|
||
1CFA341D000
|
heap
|
page read and write
|
||
5D6800408000
|
trusted library allocation
|
page read and write
|
||
14400260000
|
direct allocation
|
page read and write
|
||
1CFA65A0000
|
heap
|
page read and write
|
||
3F1000AA4000
|
trusted library allocation
|
page read and write
|
||
3F1000928000
|
trusted library allocation
|
page read and write
|
||
3F10005E0000
|
trusted library allocation
|
page read and write
|
||
2199DF4B000
|
heap
|
page read and write
|
||
3F10005EC000
|
trusted library allocation
|
page read and write
|
||
12693C30000
|
heap
|
page read and write
|
||
24EAC48B000
|
heap
|
page read and write
|
||
2BF800278000
|
trusted library allocation
|
page read and write
|
||
1CFA6574000
|
heap
|
page read and write
|
||
1CFA3431000
|
heap
|
page read and write
|
||
3F100080C000
|
trusted library allocation
|
page read and write
|
||
12693F40000
|
heap
|
page read and write
|
||
2199C0EE000
|
heap
|
page read and write
|
||
12693FFB000
|
heap
|
page read and write
|
||
225E3B8C000
|
heap
|
page read and write
|
||
23740FE000
|
stack
|
page read and write
|
||
225E62B2000
|
heap
|
page read and write
|
||
84DE1FE000
|
unkown
|
page readonly
|
||
3F10000E8000
|
trusted library allocation
|
page read and write
|
||
12693FDC000
|
heap
|
page read and write
|
||
191D90B0000
|
heap
|
page read and write
|
||
24EAA722000
|
heap
|
page read and write
|
||
1CFA3479000
|
heap
|
page read and write
|
||
3F1000A39000
|
trusted library allocation
|
page read and write
|
||
1CFA65D8000
|
heap
|
page read and write
|
||
7AF40026C000
|
trusted library allocation
|
page read and write
|
||
2199DF37000
|
heap
|
page read and write
|
||
225E1E5C000
|
heap
|
page read and write
|
||
24EAC50E000
|
heap
|
page read and write
|
||
3F1000ED0000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
1D22CF50000
|
heap
|
page read and write
|
||
225E3BA1000
|
heap
|
page read and write
|
||
3F100049C000
|
trusted library allocation
|
page read and write
|
||
24EAC50A000
|
heap
|
page read and write
|
||
383400254000
|
trusted library allocation
|
page read and write
|
||
5DC00318000
|
direct allocation
|
page read and write
|
||
694C002EC000
|
trusted library allocation
|
page read and write
|
||
12693FE0000
|
heap
|
page read and write
|
||
24EAA698000
|
heap
|
page read and write
|
||
225E699A000
|
heap
|
page read and write
|
||
16C002C0000
|
direct allocation
|
page read and write
|
||
24EAC050000
|
heap
|
page read and write
|
||
5DC0027C000
|
direct allocation
|
page read and write
|
||
1CFA344C000
|
heap
|
page read and write
|
||
24EAA721000
|
heap
|
page read and write
|
||
84D11FE000
|
unkown
|
page readonly
|
||
225E62B3000
|
heap
|
page read and write
|
||
3F10001B4000
|
trusted library allocation
|
page read and write
|
||
1CFA67AA000
|
heap
|
page read and write
|
||
3F10000D8000
|
trusted library allocation
|
page read and write
|
||
225E3BB3000
|
heap
|
page read and write
|
||
210FEC05000
|
heap
|
page read and write
|
||
8DFDDFE000
|
stack
|
page read and write
|
||
24EAC4CD000
|
heap
|
page read and write
|
||
24EAC4B4000
|
heap
|
page read and write
|
||
14400220000
|
direct allocation
|
page read and write
|
||
B84FFE000
|
unkown
|
page readonly
|
||
23F0001C8000
|
trusted library allocation
|
page read and write
|
||
225E6805000
|
heap
|
page read and write
|
||
24EAEFFA000
|
heap
|
page read and write
|
||
84EC1FE000
|
unkown
|
page readonly
|
||
24EAA6EB000
|
heap
|
page read and write
|
||
225E635B000
|
heap
|
page read and write
|
||
3F1000838000
|
trusted library allocation
|
page read and write
|
||
69B000201000
|
trusted library allocation
|
page read and write
|
||
3F1000E38000
|
trusted library allocation
|
page read and write
|
||
7FF713E0A000
|
unkown
|
page readonly
|
||
225E681D000
|
heap
|
page read and write
|
||
24EAC4D4000
|
heap
|
page read and write
|
||
24EAA640000
|
heap
|
page read and write
|
||
5D680031C000
|
trusted library allocation
|
page read and write
|
||
3F1000984000
|
trusted library allocation
|
page read and write
|
||
5D6800201000
|
trusted library allocation
|
page read and write
|
||
84EB9FE000
|
stack
|
page read and write
|
||
1CFA55F0000
|
heap
|
page read and write
|
||
44961FC000
|
stack
|
page read and write
|
||
24EAC498000
|
heap
|
page read and write
|
||
225E6840000
|
heap
|
page read and write
|
||
24EAF062000
|
heap
|
page read and write
|
||
694C002D0000
|
trusted library allocation
|
page read and write
|
||
69B0002B0000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
225E68A6000
|
heap
|
page read and write
|
||
5DC00254000
|
direct allocation
|
page read and write
|
||
225E1E96000
|
heap
|
page read and write
|
||
B8E93FE000
|
stack
|
page read and write
|
||
3F1000184000
|
trusted library allocation
|
page read and write
|
||
24EAF0A4000
|
heap
|
page read and write
|
||
84E49FE000
|
stack
|
page read and write
|
||
24EAF005000
|
heap
|
page read and write
|
||
5DC00368000
|
direct allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
225E3B81000
|
heap
|
page read and write
|
||
12691DEB000
|
heap
|
page read and write
|
||
5A6400240000
|
trusted library allocation
|
page read and write
|
||
225E6352000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
225E67A1000
|
heap
|
page read and write
|
||
12693FF1000
|
heap
|
page read and write
|
||
24EAEE53000
|
heap
|
page read and write
|
||
23F0001CD000
|
trusted library allocation
|
page read and write
|
||
210FE7D0000
|
trusted library allocation
|
page read and write
|
||
54DC00244000
|
direct allocation
|
page read and write
|
||
225E6823000
|
heap
|
page read and write
|
||
12693FDB000
|
heap
|
page read and write
|
||
5A6400268000
|
trusted library allocation
|
page read and write
|
||
84BE9FE000
|
stack
|
page read and write
|
||
B8EABFE000
|
unkown
|
page readonly
|
||
3F1000DB6000
|
trusted library allocation
|
page read and write
|
||
B8F33FD000
|
stack
|
page read and write
|
||
47E400220000
|
trusted library allocation
|
page read and write
|
||
34DC00290000
|
trusted library allocation
|
page read and write
|
||
449A9FE000
|
unkown
|
page readonly
|
||
1CFA66CC000
|
heap
|
page read and write
|
||
3F1000BEC000
|
trusted library allocation
|
page read and write
|
||
1CFA1924000
|
heap
|
page read and write
|
||
75A000284000
|
direct allocation
|
page read and write
|
||
12693E73000
|
heap
|
page read and write
|
||
12691E4E000
|
heap
|
page read and write
|
||
2199C130000
|
heap
|
page read and write
|
||
225E686C000
|
heap
|
page read and write
|
||
225E6313000
|
heap
|
page read and write
|
||
7FF695B0D000
|
unkown
|
page readonly
|
||
5DC00316000
|
direct allocation
|
page read and write
|
||
12693F9C000
|
heap
|
page read and write
|
||
AA22EFE000
|
stack
|
page read and write
|
||
23F00024C000
|
trusted library allocation
|
page read and write
|
||
24EAEF16000
|
heap
|
page read and write
|
||
34DC0020D000
|
trusted library allocation
|
page read and write
|
||
24EAC4CC000
|
heap
|
page read and write
|
||
3F1000B0C000
|
trusted library allocation
|
page read and write
|
||
84C79FE000
|
stack
|
page read and write
|
||
225E3B4C000
|
heap
|
page read and write
|
||
69B000254000
|
trusted library allocation
|
page read and write
|
||
24EAC4C9000
|
heap
|
page read and write
|
||
383400220000
|
trusted library allocation
|
page read and write
|
||
1CFA6650000
|
heap
|
page read and write
|
||
24EAA70E000
|
heap
|
page read and write
|
||
7FF695A5A000
|
unkown
|
page readonly
|
||
47E400150000
|
trusted library allocation
|
page read and write
|
||
1CFA6766000
|
heap
|
page read and write
|
||
24EAC4B8000
|
heap
|
page read and write
|
||
12691E25000
|
heap
|
page read and write
|
||
144002DC000
|
direct allocation
|
page read and write
|
||
12693FF6000
|
heap
|
page read and write
|
||
69B000240000
|
trusted library allocation
|
page read and write
|
||
12693BC9000
|
heap
|
page read and write
|
||
1CFA65AE000
|
heap
|
page read and write
|
||
225E3BC8000
|
heap
|
page read and write
|
||
B8E63FE000
|
stack
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
54DC00230000
|
direct allocation
|
page read and write
|
||
24EAA691000
|
heap
|
page read and write
|
||
12693BDD000
|
heap
|
page read and write
|
||
2199BF90000
|
heap
|
page readonly
|
||
1CFA6639000
|
heap
|
page read and write
|
||
75A0002B0000
|
direct allocation
|
page read and write
|
||
225E62DC000
|
heap
|
page read and write
|
||
24EAEFBF000
|
heap
|
page read and write
|
||
5628002C0000
|
trusted library allocation
|
page read and write
|
||
225E3BB3000
|
heap
|
page read and write
|
||
225E6804000
|
heap
|
page read and write
|
||
3F1000D18000
|
trusted library allocation
|
page read and write
|
||
210FE708000
|
remote allocation
|
page execute read
|
||
1D22CFA0000
|
trusted library allocation
|
page read and write
|
||
47E4000FC000
|
trusted library allocation
|
page read and write
|
||
383400280000
|
trusted library allocation
|
page read and write
|
||
12693C25000
|
heap
|
page read and write
|
||
5A640027C000
|
trusted library allocation
|
page read and write
|
||
1CFA6576000
|
heap
|
page read and write
|
||
2199C0DC000
|
heap
|
page read and write
|
||
12693C29000
|
heap
|
page read and write
|
||
3F10009C0000
|
trusted library allocation
|
page read and write
|
||
1CFA6622000
|
heap
|
page read and write
|
||
3F10009EC000
|
trusted library allocation
|
page read and write
|
||
23F0000D8000
|
trusted library allocation
|
page read and write
|
||
225E3BBC000
|
heap
|
page read and write
|
||
5DC002D4000
|
direct allocation
|
page read and write
|
||
1CFA654C000
|
heap
|
page read and write
|
||
2199DF23000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
24EAA6F2000
|
heap
|
page read and write
|
||
3F10004A7000
|
trusted library allocation
|
page read and write
|
||
126968D0000
|
heap
|
page read and write
|
||
1269680A000
|
heap
|
page read and write
|
||
47E4000D4000
|
trusted library allocation
|
page read and write
|
||
24EAF051000
|
heap
|
page read and write
|
||
652000028000
|
trusted library allocation
|
page read and write
|
||
24EAC4DD000
|
heap
|
page read and write
|
||
7AF40020C000
|
trusted library allocation
|
page read and write
|
||
1D22CF80000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
24EAEFEC000
|
heap
|
page read and write
|
||
3F1000382000
|
trusted library allocation
|
page read and write
|
||
225E68A6000
|
heap
|
page read and write
|
||
225E3BA4000
|
heap
|
page read and write
|
||
12696812000
|
heap
|
page read and write
|
||
12693C31000
|
heap
|
page read and write
|
||
5DC002EC000
|
direct allocation
|
page read and write
|
||
225E3B61000
|
heap
|
page read and write
|
||
225E685D000
|
heap
|
page read and write
|
||
126967F1000
|
heap
|
page read and write
|
||
12693EAF000
|
heap
|
page read and write
|
||
7FFA5DA60000
|
direct allocation
|
page execute read
|
||
12693C0F000
|
heap
|
page read and write
|
||
47E400201000
|
trusted library allocation
|
page read and write
|
||
7FF713E58000
|
unkown
|
page write copy
|
||
34DC0027C000
|
trusted library allocation
|
page read and write
|
||
1CFA6642000
|
heap
|
page read and write
|
||
24EAF03B000
|
heap
|
page read and write
|
||
652000114000
|
trusted library allocation
|
page read and write
|
||
24EAA6A2000
|
heap
|
page read and write
|
||
12691E25000
|
heap
|
page read and write
|
||
24EAC4ED000
|
heap
|
page read and write
|
||
12691E7D000
|
heap
|
page read and write
|
||
1CFA3435000
|
heap
|
page read and write
|
||
34DC00230000
|
trusted library allocation
|
page read and write
|
||
225E3BD7000
|
heap
|
page read and write
|
||
23C80033C000
|
trusted library allocation
|
page read and write
|
||
1E49DB02000
|
heap
|
page read and write
|
||
457E3CE000
|
stack
|
page read and write
|
||
1CFA65BA000
|
heap
|
page read and write
|
||
225E6840000
|
heap
|
page read and write
|
||
5DC00308000
|
direct allocation
|
page read and write
|
||
12693C35000
|
heap
|
page read and write
|
||
84DB9FB000
|
stack
|
page read and write
|
||
1D22D05C000
|
heap
|
page read and write
|
||
3F100012C000
|
trusted library allocation
|
page read and write
|
||
7AF400220000
|
trusted library allocation
|
page read and write
|
||
1CFA674C000
|
heap
|
page read and write
|
||
24EAEE75000
|
heap
|
page read and write
|
||
1CFA3465000
|
heap
|
page read and write
|
||
3F1000422000
|
trusted library allocation
|
page read and write
|
||
1CFA3481000
|
heap
|
page read and write
|
||
1D0F5070000
|
heap
|
page read and write
|
||
1CFA65C4000
|
heap
|
page read and write
|
||
24EAEF11000
|
heap
|
page read and write
|
||
225E634F000
|
heap
|
page read and write
|
||
5DC00303000
|
direct allocation
|
page read and write
|
||
23F000060000
|
trusted library allocation
|
page read and write
|
||
1CFA6510000
|
heap
|
page read and write
|
||
2199C0E9000
|
heap
|
page read and write
|
||
12693F52000
|
heap
|
page read and write
|
||
47E4000D8000
|
trusted library allocation
|
page read and write
|
||
1CFA346C000
|
heap
|
page read and write
|
||
3F1000CCA000
|
trusted library allocation
|
page read and write
|
||
1CFA3461000
|
heap
|
page read and write
|
||
1CFA66E8000
|
heap
|
page read and write
|
||
7FF713EAF000
|
unkown
|
page read and write
|
||
225E62CA000
|
heap
|
page read and write
|
||
16C002D8000
|
direct allocation
|
page read and write
|
||
5A64002B0000
|
trusted library allocation
|
page read and write
|
||
14400270000
|
direct allocation
|
page read and write
|
||
1CFA669F000
|
heap
|
page read and write
|
||
2BF800308000
|
trusted library allocation
|
page read and write
|
||
44959FE000
|
unkown
|
page readonly
|
||
24EAC4CD000
|
heap
|
page read and write
|
||
1D22D02B000
|
heap
|
page read and write
|
||
2199BF80000
|
heap
|
page read and write
|
||
12696812000
|
heap
|
page read and write
|
||
84CB9FD000
|
stack
|
page read and write
|
||
1CFA656D000
|
heap
|
page read and write
|
||
23F00020C000
|
trusted library allocation
|
page read and write
|
||
1CFA659C000
|
heap
|
page read and write
|
||
1CFA6565000
|
heap
|
page read and write
|
||
1CFA18B8000
|
heap
|
page read and write
|
||
8D837FE000
|
unkown
|
page readonly
|
||
75A000244000
|
direct allocation
|
page read and write
|
||
225E1DB0000
|
heap
|
page read and write
|
||
34DC002B4000
|
trusted library allocation
|
page read and write
|
||
3F1000B9C000
|
trusted library allocation
|
page read and write
|
||
562800201000
|
trusted library allocation
|
page read and write
|
||
652000080000
|
trusted library allocation
|
page read and write
|
||
225E1E06000
|
heap
|
page read and write
|
||
1CFA66F0000
|
heap
|
page read and write
|
||
225E67EF000
|
heap
|
page read and write
|
||
B8EFBFE000
|
unkown
|
page readonly
|
||
1E49D9C0000
|
heap
|
page readonly
|
||
24EAA6EE000
|
heap
|
page read and write
|
||
1CFA1850000
|
heap
|
page read and write
|
||
16C002A4000
|
direct allocation
|
page read and write
|
||
225E1E10000
|
heap
|
page read and write
|
||
2BF800230000
|
trusted library allocation
|
page read and write
|
||
12693EA7000
|
heap
|
page read and write
|
||
23F000198000
|
trusted library allocation
|
page read and write
|
||
225E689A000
|
heap
|
page read and write
|
||
12693F28000
|
heap
|
page read and write
|
||
1CFA1942000
|
heap
|
page read and write
|
||
1CFA1924000
|
heap
|
page read and write
|
||
5DC0028C000
|
direct allocation
|
page read and write
|
||
24EAEF30000
|
heap
|
page read and write
|
||
75A000234000
|
direct allocation
|
page read and write
|
||
6520000CC000
|
trusted library allocation
|
page read and write
|
||
2373DFD000
|
stack
|
page read and write
|
||
225E3BAD000
|
heap
|
page read and write
|
||
84D39FE000
|
stack
|
page read and write
|
||
7FF630CD6000
|
unkown
|
page read and write
|
||
225E6812000
|
heap
|
page read and write
|
||
12693F2D000
|
heap
|
page read and write
|
||
12693F42000
|
heap
|
page read and write
|
||
1CFA18A0000
|
heap
|
page read and write
|
||
2373CFE000
|
stack
|
page read and write
|
||
24EAC479000
|
heap
|
page read and write
|
||
3F1000C58000
|
trusted library allocation
|
page read and write
|
||
1CFA3470000
|
heap
|
page read and write
|
||
23F000138000
|
trusted library allocation
|
page read and write
|
||
3F10002F0000
|
trusted library allocation
|
page read and write
|
||
12693F58000
|
heap
|
page read and write
|
||
24EAEEA7000
|
heap
|
page read and write
|
||
12693F9C000
|
heap
|
page read and write
|
||
1CFA18A5000
|
heap
|
page read and write
|
||
225E62EA000
|
heap
|
page read and write
|
||
5DC00230000
|
direct allocation
|
page read and write
|
||
B8F03FE000
|
stack
|
page read and write
|
||
12693E76000
|
heap
|
page read and write
|
||
225E67A0000
|
heap
|
page read and write
|
||
23F000170000
|
trusted library allocation
|
page read and write
|
||
225E6849000
|
heap
|
page read and write
|
||
2BF800250000
|
trusted library allocation
|
page read and write
|
||
3F1000C0C000
|
trusted library allocation
|
page read and write
|
||
12691D80000
|
heap
|
page read and write
|
||
3F10005EC000
|
trusted library allocation
|
page read and write
|
||
12696878000
|
heap
|
page read and write
|
||
2199DDD0000
|
trusted library section
|
page readonly
|
||
225E3BCA000
|
heap
|
page read and write
|
||
24EAEFD5000
|
heap
|
page read and write
|
||
1CFA6614000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
12693FC4000
|
heap
|
page read and write
|
||
652000054000
|
trusted library allocation
|
page read and write
|
||
24EAC4B4000
|
heap
|
page read and write
|
||
225E3B77000
|
heap
|
page read and write
|
||
24EAEFB4000
|
heap
|
page read and write
|
||
1CFA674C000
|
heap
|
page read and write
|
||
12696834000
|
heap
|
page read and write
|
||
1CFA656D000
|
heap
|
page read and write
|
||
225E68AB000
|
heap
|
page read and write
|
||
5A640029C000
|
trusted library allocation
|
page read and write
|
||
562800298000
|
trusted library allocation
|
page read and write
|
||
225E1E50000
|
heap
|
page read and write
|
||
1CFA6534000
|
heap
|
page read and write
|
||
1D22D059000
|
heap
|
page read and write
|
||
24EAA69E000
|
heap
|
page read and write
|
||
24EAEFAF000
|
heap
|
page read and write
|
||
B8EDBFE000
|
unkown
|
page readonly
|
||
12693BCD000
|
heap
|
page read and write
|
||
1CFA6787000
|
heap
|
page read and write
|
||
7AF400304000
|
trusted library allocation
|
page read and write
|
||
23C80023C000
|
trusted library allocation
|
page read and write
|
||
1D0F51C0000
|
heap
|
page read and write
|
||
5DC00298000
|
direct allocation
|
page read and write
|
||
5DC00328000
|
direct allocation
|
page read and write
|
||
47E4000C1000
|
trusted library allocation
|
page read and write
|
||
12693EE7000
|
heap
|
page read and write
|
||
1D08257F000
|
trusted library allocation
|
page read and write
|
||
12691E6F000
|
heap
|
page read and write
|
||
225E6857000
|
heap
|
page read and write
|
||
1269688A000
|
heap
|
page read and write
|
||
225E1D30000
|
heap
|
page read and write
|
||
54DC0023C000
|
direct allocation
|
page read and write
|
||
3F1000024000
|
trusted library allocation
|
page read and write
|
||
1CFA3477000
|
heap
|
page read and write
|
||
225E67CC000
|
heap
|
page read and write
|
||
84E51FE000
|
unkown
|
page readonly
|
||
3F1000020000
|
trusted library allocation
|
page read and write
|
||
12693EF9000
|
heap
|
page read and write
|
||
225E3BCA000
|
heap
|
page read and write
|
||
3508AFE000
|
stack
|
page read and write
|
||
3F1000070000
|
trusted library allocation
|
page read and write
|
||
24EAC483000
|
heap
|
page read and write
|
||
12693C49000
|
heap
|
page read and write
|
||
5628002AC000
|
trusted library allocation
|
page read and write
|
||
562800254000
|
trusted library allocation
|
page read and write
|
||
24EAF0A5000
|
heap
|
page read and write
|
||
75A000220000
|
direct allocation
|
page read and write
|
||
5DC00325000
|
direct allocation
|
page read and write
|
||
5DC002DC000
|
direct allocation
|
page read and write
|
||
5DC002B0000
|
direct allocation
|
page read and write
|
||
23F00021C000
|
trusted library allocation
|
page read and write
|
||
44901FC000
|
stack
|
page read and write
|
||
225E3BD4000
|
heap
|
page read and write
|
||
8D80FFE000
|
stack
|
page read and write
|
||
3F1000A26000
|
trusted library allocation
|
page read and write
|
||
3F100006A000
|
trusted library allocation
|
page read and write
|
||
12691DD9000
|
heap
|
page read and write
|
||
1D08267D000
|
heap
|
page read and write
|
||
23F00011C000
|
trusted library allocation
|
page read and write
|
||
225E1E0A000
|
heap
|
page read and write
|
||
562800268000
|
trusted library allocation
|
page read and write
|
||
1CFA346A000
|
heap
|
page read and write
|
||
47E4000C4000
|
trusted library allocation
|
page read and write
|
||
126968DB000
|
heap
|
page read and write
|
||
225E67FD000
|
heap
|
page read and write
|
||
3F1000D44000
|
trusted library allocation
|
page read and write
|
||
12693BE1000
|
heap
|
page read and write
|
||
694C0027C000
|
trusted library allocation
|
page read and write
|
||
84CD1FE000
|
unkown
|
page readonly
|
||
1CFA678E000
|
heap
|
page read and write
|
||
1CFA3409000
|
heap
|
page read and write
|
||
7FF695A6D000
|
unkown
|
page readonly
|
||
1CFA345E000
|
heap
|
page read and write
|
||
23F000160000
|
trusted library allocation
|
page read and write
|
||
225E3BD6000
|
heap
|
page read and write
|
||
7FF630AA0000
|
unkown
|
page readonly
|
||
3F1000D50000
|
trusted library allocation
|
page read and write
|
||
5628002C0000
|
trusted library allocation
|
page read and write
|
||
3F10001E8000
|
trusted library allocation
|
page read and write
|
||
24EAEF31000
|
heap
|
page read and write
|
||
3F1000F49000
|
trusted library allocation
|
page read and write
|
||
1D22D002000
|
heap
|
page read and write
|
||
24EAEE8B000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
1CFA67AA000
|
heap
|
page read and write
|
||
24EAA6EC000
|
heap
|
page read and write
|
||
225E3BAB000
|
heap
|
page read and write
|
||
24EAC4B4000
|
heap
|
page read and write
|
||
225E3BE0000
|
heap
|
page read and write
|
||
12693FE0000
|
heap
|
page read and write
|
||
1CFA194E000
|
heap
|
page read and write
|
||
12696802000
|
heap
|
page read and write
|
||
12696893000
|
heap
|
page read and write
|
||
225E682C000
|
heap
|
page read and write
|
||
23F0000DB000
|
trusted library allocation
|
page read and write
|
||
1CFA6706000
|
heap
|
page read and write
|
||
225E1E1F000
|
heap
|
page read and write
|
||
225E1DB4000
|
heap
|
page read and write
|
||
191DADA0000
|
heap
|
page read and write
|
||
3F1000A39000
|
trusted library allocation
|
page read and write
|
||
1CFA1909000
|
heap
|
page read and write
|
||
126968C1000
|
heap
|
page read and write
|
||
24EAEEE2000
|
heap
|
page read and write
|
||
3F1000381000
|
trusted library allocation
|
page read and write
|
||
3508BFE000
|
stack
|
page read and write
|
||
23C800230000
|
trusted library allocation
|
page read and write
|
||
5DC002C0000
|
direct allocation
|
page read and write
|
||
3F1000375000
|
trusted library allocation
|
page read and write
|
||
225E6913000
|
heap
|
page read and write
|
||
7AF4002A0000
|
trusted library allocation
|
page read and write
|
||
3F1000A2D000
|
trusted library allocation
|
page read and write
|
||
7AF4002D4000
|
trusted library allocation
|
page read and write
|
||
225E1EAF000
|
heap
|
page read and write
|
||
3F10008C6000
|
trusted library allocation
|
page read and write
|
||
1D22CF60000
|
heap
|
page readonly
|
||
24EAA739000
|
heap
|
page read and write
|
||
7FF630CC8000
|
unkown
|
page write copy
|
||
12693C55000
|
heap
|
page read and write
|
||
23F000180000
|
trusted library allocation
|
page read and write
|
||
1CFA6690000
|
heap
|
page read and write
|
||
225E1E9E000
|
heap
|
page read and write
|
||
562800244000
|
trusted library allocation
|
page read and write
|
||
24EAC477000
|
heap
|
page read and write
|
||
23C800334000
|
trusted library allocation
|
page read and write
|
||
12693BFD000
|
heap
|
page read and write
|
||
6520000A0000
|
trusted library allocation
|
page read and write
|
||
75A000260000
|
direct allocation
|
page read and write
|
||
3F10000F8000
|
trusted library allocation
|
page read and write
|
||
2BF800201000
|
trusted library allocation
|
page read and write
|
||
12691E25000
|
heap
|
page read and write
|
||
5DC00328000
|
direct allocation
|
page read and write
|
||
3F1000F20000
|
trusted library allocation
|
page read and write
|
||
5D68002B4000
|
trusted library allocation
|
page read and write
|
||
C7AA7FD000
|
stack
|
page read and write
|
||
225E67F6000
|
heap
|
page read and write
|
||
449A1FE000
|
stack
|
page read and write
|
||
2199C06D000
|
heap
|
page read and write
|
||
12693F3F000
|
heap
|
page read and write
|
||
3F1000960000
|
trusted library allocation
|
page read and write
|
||
225E3BC7000
|
heap
|
page read and write
|
||
3F1000444000
|
trusted library allocation
|
page read and write
|
||
24EAEE7E000
|
heap
|
page read and write
|
||
225E682B000
|
heap
|
page read and write
|
||
3F1000F6C000
|
trusted library allocation
|
page read and write
|
||
7FF713E66000
|
unkown
|
page read and write
|
||
5A640028C000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
225E67FC000
|
heap
|
page read and write
|
||
69B00027C000
|
trusted library allocation
|
page read and write
|
||
24EAF01F000
|
heap
|
page read and write
|
||
2199C12F000
|
heap
|
page read and write
|
||
225E6861000
|
heap
|
page read and write
|
||
8D83FFE000
|
stack
|
page read and write
|
||
225E3BA7000
|
heap
|
page read and write
|
||
47E400230000
|
trusted library allocation
|
page read and write
|
||
1CFA66E9000
|
heap
|
page read and write
|
||
1CFA341C000
|
heap
|
page read and write
|
||
24EAC4E7000
|
heap
|
page read and write
|
||
54DC00284000
|
direct allocation
|
page read and write
|
||
12694031000
|
heap
|
page read and write
|
||
12691DD1000
|
heap
|
page read and write
|
||
12693F05000
|
heap
|
page read and write
|
||
69B0002BC000
|
trusted library allocation
|
page read and write
|
||
3F1000244000
|
trusted library allocation
|
page read and write
|
||
1CFA65BF000
|
heap
|
page read and write
|
||
210FE720000
|
heap
|
page read and write
|
||
1CFA3443000
|
heap
|
page read and write
|
||
1269400C000
|
heap
|
page read and write
|
||
1CFA65E5000
|
heap
|
page read and write
|
||
457E67F000
|
stack
|
page read and write
|
||
3F1000CF8000
|
trusted library allocation
|
page read and write
|
||
12693C39000
|
heap
|
page read and write
|
||
3F1000F4E000
|
trusted library allocation
|
page read and write
|
||
23F0001A4000
|
trusted library allocation
|
page read and write
|
||
23F0001B8000
|
trusted library allocation
|
page read and write
|
||
225E3BCF000
|
heap
|
page read and write
|
||
225E699A000
|
heap
|
page read and write
|
||
1CFA669A000
|
heap
|
page read and write
|
||
225E1DC0000
|
heap
|
page read and write
|
||
24EAEEC4000
|
heap
|
page read and write
|
||
84C69FD000
|
stack
|
page read and write
|
||
12693FF0000
|
heap
|
page read and write
|
||
24EAC4B0000
|
heap
|
page read and write
|
||
126968BF000
|
heap
|
page read and write
|
||
219A1544000
|
trusted library allocation
|
page read and write
|
||
75A000250000
|
direct allocation
|
page read and write
|
||
7FF630CDF000
|
unkown
|
page read and write
|
||
1CFA3441000
|
heap
|
page read and write
|
||
B8ECBFE000
|
unkown
|
page readonly
|
||
7AF4002E0000
|
trusted library allocation
|
page read and write
|
||
24EAA6E6000
|
heap
|
page read and write
|
||
24EAC502000
|
heap
|
page read and write
|
||
3F1000B3C000
|
trusted library allocation
|
page read and write
|
||
1CFA34C0000
|
heap
|
page read and write
|
||
3F1000908000
|
trusted library allocation
|
page read and write
|
||
144002C4000
|
direct allocation
|
page read and write
|
||
1CFA192F000
|
heap
|
page read and write
|
||
16C002A8000
|
direct allocation
|
page read and write
|
||
24EAEF18000
|
heap
|
page read and write
|
||
23F0001B5000
|
trusted library allocation
|
page read and write
|
||
12691DA2000
|
heap
|
page read and write
|
||
1CFA66D1000
|
heap
|
page read and write
|
||
12693BDA000
|
heap
|
page read and write
|
||
84C01FE000
|
unkown
|
page readonly
|
||
225E3BAF000
|
heap
|
page read and write
|
||
23C800370000
|
trusted library allocation
|
page read and write
|
||
3F10001C1000
|
trusted library allocation
|
page read and write
|
||
7FF695AB6000
|
unkown
|
page read and write
|
||
225E3BC6000
|
heap
|
page read and write
|
||
225E693A000
|
heap
|
page read and write
|
||
84E39FE000
|
stack
|
page read and write
|
||
24EAA6EA000
|
heap
|
page read and write
|
||
84D89FC000
|
stack
|
page read and write
|
||
B8F1BFE000
|
unkown
|
page readonly
|
||
12693F03000
|
heap
|
page read and write
|
||
12693FD1000
|
heap
|
page read and write
|
||
3F1000248000
|
trusted library allocation
|
page read and write
|
||
225E3BCF000
|
heap
|
page read and write
|
||
1CFA3439000
|
heap
|
page read and write
|
||
24EAEEA0000
|
heap
|
page read and write
|
||
3F10003C5000
|
trusted library allocation
|
page read and write
|
||
126968E5000
|
heap
|
page read and write
|
||
1D22D013000
|
heap
|
page read and write
|
||
1CFA3489000
|
heap
|
page read and write
|
||
225E3BBA000
|
heap
|
page read and write
|
||
1D082674000
|
heap
|
page read and write
|
||
12693C0B000
|
heap
|
page read and write
|
||
2BF8002A4000
|
trusted library allocation
|
page read and write
|
||
2199C128000
|
heap
|
page read and write
|
||
1CFA66F7000
|
heap
|
page read and write
|
||
24EAEFFE000
|
heap
|
page read and write
|
||
5DC0031C000
|
direct allocation
|
page read and write
|
||
694C0020C000
|
trusted library allocation
|
page read and write
|
||
24EAA708000
|
heap
|
page read and write
|
||
7FF695AA8000
|
unkown
|
page read and write
|
||
3F1000498000
|
trusted library allocation
|
page read and write
|
||
7FF630D2D000
|
unkown
|
page readonly
|
||
5DC002D4000
|
direct allocation
|
page read and write
|
||
1CFA66AD000
|
heap
|
page read and write
|
||
54DC002A8000
|
direct allocation
|
page read and write
|
||
12693FA0000
|
heap
|
page read and write
|
||
24EAC4BC000
|
heap
|
page read and write
|
||
12693EDC000
|
heap
|
page read and write
|
||
1CFA18AB000
|
heap
|
page read and write
|
||
14400230000
|
direct allocation
|
page read and write
|
||
69B00028C000
|
trusted library allocation
|
page read and write
|
||
24EAC479000
|
heap
|
page read and write
|
||
24EAEE97000
|
heap
|
page read and write
|
||
47E400038000
|
trusted library allocation
|
page read and write
|
||
23C800310000
|
trusted library allocation
|
page read and write
|
||
449C9FE000
|
unkown
|
page readonly
|
||
6520000E4000
|
trusted library allocation
|
page read and write
|
||
12693E77000
|
heap
|
page read and write
|
||
3F1000E5C000
|
trusted library allocation
|
page read and write
|
||
12691CB0000
|
heap
|
page read and write
|
||
24EAEE9C000
|
heap
|
page read and write
|
||
1CFA652F000
|
heap
|
page read and write
|
||
126968D5000
|
heap
|
page read and write
|
||
3F10003E4000
|
trusted library allocation
|
page read and write
|
||
1CFA18FF000
|
heap
|
page read and write
|
||
23F0000A0000
|
trusted library allocation
|
page read and write
|
||
225E62A0000
|
heap
|
page read and write
|
||
12693BD9000
|
heap
|
page read and write
|
||
2BF800238000
|
trusted library allocation
|
page read and write
|
||
6520000D8000
|
trusted library allocation
|
page read and write
|
||
225E1E5C000
|
heap
|
page read and write
|
||
225E3B8B000
|
heap
|
page read and write
|
||
694C0040C000
|
trusted library allocation
|
page read and write
|
||
5D680020C000
|
trusted library allocation
|
page read and write
|
||
24EAF0C9000
|
heap
|
page read and write
|
||
225E3BC0000
|
heap
|
page read and write
|
||
24EAF0A4000
|
heap
|
page read and write
|
||
24EAC50E000
|
heap
|
page read and write
|
||
3F10001D8000
|
trusted library allocation
|
page read and write
|
||
1CFA6703000
|
heap
|
page read and write
|
||
1CFA32D5000
|
heap
|
page read and write
|
||
1D08263C000
|
heap
|
page read and write
|
||
1CFA660B000
|
heap
|
page read and write
|
||
1CFA6554000
|
heap
|
page read and write
|
||
23738FE000
|
stack
|
page read and write
|
||
12693BFD000
|
heap
|
page read and write
|
||
1CFA67CF000
|
heap
|
page read and write
|
||
24EAC4BF000
|
heap
|
page read and write
|
||
84C81FE000
|
unkown
|
page readonly
|
||
225E3B86000
|
heap
|
page read and write
|
||
84CA1FE000
|
unkown
|
page readonly
|
||
47E400228000
|
trusted library allocation
|
page read and write
|
||
24EAEE93000
|
heap
|
page read and write
|
||
3F1000030000
|
trusted library allocation
|
page read and write
|
||
24EAA73D000
|
heap
|
page read and write
|
||
5628002B8000
|
trusted library allocation
|
page read and write
|
||
23C800220000
|
trusted library allocation
|
page read and write
|
||
225E6937000
|
heap
|
page read and write
|
||
6520000AC000
|
trusted library allocation
|
page read and write
|
||
225E68A5000
|
heap
|
page read and write
|
||
1D082600000
|
heap
|
page read and write
|
||
69B000278000
|
trusted library allocation
|
page read and write
|
||
1CFA6542000
|
heap
|
page read and write
|
||
5DC00217000
|
direct allocation
|
page read and write
|
||
1CFA33F7000
|
heap
|
page read and write
|
||
65200010C000
|
trusted library allocation
|
page read and write
|
||
23F00018C000
|
trusted library allocation
|
page read and write
|
||
7FF713C31000
|
unkown
|
page execute read
|
||
3F1000389000
|
trusted library allocation
|
page read and write
|
||
5DC0033C000
|
direct allocation
|
page read and write
|
||
24EAEF23000
|
heap
|
page read and write
|
||
12693C16000
|
heap
|
page read and write
|
||
69B000230000
|
trusted library allocation
|
page read and write
|
||
B8EC3FE000
|
stack
|
page read and write
|
||
24EAC4D3000
|
heap
|
page read and write
|
||
1CFA3427000
|
heap
|
page read and write
|
||
23F00013C000
|
trusted library allocation
|
page read and write
|
||
34DC00238000
|
trusted library allocation
|
page read and write
|
||
84D69FD000
|
stack
|
page read and write
|
||
7AF400238000
|
trusted library allocation
|
page read and write
|
||
191D923E000
|
heap
|
page read and write
|
||
225E6935000
|
heap
|
page read and write
|
||
84E41FE000
|
unkown
|
page readonly
|
||
23C8002BC000
|
trusted library allocation
|
page read and write
|
||
24EAF084000
|
heap
|
page read and write
|
||
1CFA6754000
|
heap
|
page read and write
|
||
7FF713E88000
|
unkown
|
page read and write
|
||
24EAEED0000
|
heap
|
page read and write
|
||
84E71FE000
|
unkown
|
page readonly
|
||
1CFA66F1000
|
heap
|
page read and write
|
||
24EABEE0000
|
heap
|
page read and write
|
||
12693BE9000
|
heap
|
page read and write
|
||
24EAEE7E000
|
heap
|
page read and write
|
||
5A6400220000
|
trusted library allocation
|
page read and write
|
||
1CFA18B1000
|
heap
|
page read and write
|
||
5DC00258000
|
direct allocation
|
page read and write
|
||
3F1000CB4000
|
trusted library allocation
|
page read and write
|
||
1CFA6584000
|
heap
|
page read and write
|
||
24EAA692000
|
heap
|
page read and write
|
||
24EAA723000
|
heap
|
page read and write
|
||
1CFA66EB000
|
heap
|
page read and write
|
||
23C8002F4000
|
trusted library allocation
|
page read and write
|
||
1CFA3416000
|
heap
|
page read and write
|
||
3F10003DC000
|
trusted library allocation
|
page read and write
|
||
23C8002E0000
|
trusted library allocation
|
page read and write
|
||
84E79FB000
|
stack
|
page read and write
|
||
12693EF4000
|
heap
|
page read and write
|
||
7FF713E73000
|
unkown
|
page read and write
|
||
1CFA345A000
|
heap
|
page read and write
|
||
1CFA6590000
|
heap
|
page read and write
|
||
3F1000D44000
|
trusted library allocation
|
page read and write
|
||
225E3B9C000
|
heap
|
page read and write
|
||
38340025C000
|
trusted library allocation
|
page read and write
|
||
694C00250000
|
trusted library allocation
|
page read and write
|
||
225E3BBC000
|
heap
|
page read and write
|
||
C7AA1FD000
|
stack
|
page read and write
|
||
1CFA18A8000
|
heap
|
page read and write
|
||
1CFA3380000
|
heap
|
page read and write
|
||
1CFA6774000
|
heap
|
page read and write
|
||
8DFF5FE000
|
unkown
|
page readonly
|
||
1CFA344F000
|
heap
|
page read and write
|
||
225E3B47000
|
heap
|
page read and write
|
||
1CFA18AF000
|
heap
|
page read and write
|
||
1CFA672A000
|
heap
|
page read and write
|
||
23F000024000
|
trusted library allocation
|
page read and write
|
||
1CFA67E1000
|
heap
|
page read and write
|
||
1CFA6527000
|
heap
|
page read and write
|
||
24EAC495000
|
heap
|
page read and write
|
||
75A0002EC000
|
direct allocation
|
page read and write
|
||
12693FA1000
|
heap
|
page read and write
|
||
12693BE9000
|
heap
|
page read and write
|
||
5D6800260000
|
trusted library allocation
|
page read and write
|
||
225E68AB000
|
heap
|
page read and write
|
||
1CFA6551000
|
heap
|
page read and write
|
||
3F10005AC000
|
trusted library allocation
|
page read and write
|
||
225E3BD2000
|
heap
|
page read and write
|
||
225E68AB000
|
heap
|
page read and write
|
||
24EAC499000
|
heap
|
page read and write
|
||
2199BFB0000
|
heap
|
page read and write
|
||
12693E8C000
|
heap
|
page read and write
|
||
1CFA18EA000
|
heap
|
page read and write
|
||
1440024C000
|
direct allocation
|
page read and write
|
||
2199DF0C000
|
heap
|
page read and write
|
||
24EAEF20000
|
heap
|
page read and write
|
||
225E68AD000
|
heap
|
page read and write
|
||
14400284000
|
direct allocation
|
page read and write
|
||
12691E2F000
|
heap
|
page read and write
|
||
16C0025C000
|
direct allocation
|
page read and write
|
||
3F1000158000
|
trusted library allocation
|
page read and write
|
||
24EAA6EF000
|
heap
|
page read and write
|
||
5628002AC000
|
trusted library allocation
|
page read and write
|
||
1CFA66D6000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
24EAF0D3000
|
heap
|
page read and write
|
||
69B0002C8000
|
trusted library allocation
|
page read and write
|
||
225E68C0000
|
heap
|
page read and write
|
||
12693FC4000
|
heap
|
page read and write
|
||
23F00014C000
|
trusted library allocation
|
page read and write
|
||
24EABF90000
|
heap
|
page read and write
|
||
1CFA6764000
|
heap
|
page read and write
|
||
84E89FC000
|
stack
|
page read and write
|
||
12691E3F000
|
heap
|
page read and write
|
||
24EAC505000
|
heap
|
page read and write
|
||
8D807FE000
|
unkown
|
page readonly
|
||
47E4000EC000
|
trusted library allocation
|
page read and write
|
||
54DC002BC000
|
direct allocation
|
page read and write
|
||
3F10002A6000
|
trusted library allocation
|
page read and write
|
||
23F000080000
|
trusted library allocation
|
page read and write
|
||
12693F9C000
|
heap
|
page read and write
|
||
225E1E60000
|
heap
|
page read and write
|
||
24EAEE95000
|
heap
|
page read and write
|
||
1CFA18B8000
|
heap
|
page read and write
|
||
23F000178000
|
trusted library allocation
|
page read and write
|
||
225E699A000
|
heap
|
page read and write
|
||
24EAC4EB000
|
heap
|
page read and write
|
||
1CFA67DF000
|
heap
|
page read and write
|
||
7FF695AFF000
|
unkown
|
page read and write
|
||
3F10002EC000
|
trusted library allocation
|
page read and write
|
||
24EAF037000
|
heap
|
page read and write
|
||
225E3BAB000
|
heap
|
page read and write
|
||
225E3BD1000
|
heap
|
page read and write
|
||
69B00028C000
|
trusted library allocation
|
page read and write
|
||
225E67F8000
|
heap
|
page read and write
|
||
225E3BCA000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
24EAC4DB000
|
heap
|
page read and write
|
||
5A6400238000
|
trusted library allocation
|
page read and write
|
||
225E67BD000
|
heap
|
page read and write
|
||
8DFFDFD000
|
stack
|
page read and write
|
||
3F1000F85000
|
trusted library allocation
|
page read and write
|
||
1CFA1893000
|
heap
|
page read and write
|
||
1CFA3423000
|
heap
|
page read and write
|
||
3F1000874000
|
trusted library allocation
|
page read and write
|
||
47E4000B4000
|
trusted library allocation
|
page read and write
|
||
225E67B4000
|
heap
|
page read and write
|
||
1CFA18F9000
|
heap
|
page read and write
|
||
694C00201000
|
trusted library allocation
|
page read and write
|
||
C7AA2FE000
|
stack
|
page read and write
|
||
225E3BC0000
|
heap
|
page read and write
|
||
225E67BC000
|
heap
|
page read and write
|
||
2199DF0A000
|
heap
|
page read and write
|
||
24EAEFBE000
|
heap
|
page read and write
|
||
1D082500000
|
heap
|
page read and write
|
||
24EAA729000
|
heap
|
page read and write
|
||
24EAA68A000
|
heap
|
page read and write
|
||
652000001000
|
trusted library allocation
|
page read and write
|
||
3F10001A0000
|
trusted library allocation
|
page read and write
|
||
1CFA192C000
|
heap
|
page read and write
|
||
5628002F0000
|
trusted library allocation
|
page read and write
|
||
1CFA65D9000
|
heap
|
page read and write
|
||
225E3B7B000
|
heap
|
page read and write
|
||
1CFA6775000
|
heap
|
page read and write
|
||
47E40005C000
|
trusted library allocation
|
page read and write
|
||
24EAC47E000
|
heap
|
page read and write
|
||
652000110000
|
trusted library allocation
|
page read and write
|
||
3F1000CA4000
|
trusted library allocation
|
page read and write
|
||
24EAEF08000
|
heap
|
page read and write
|
||
2199C0A7000
|
heap
|
page read and write
|
||
225E692C000
|
heap
|
page read and write
|
||
47E40006C000
|
trusted library allocation
|
page read and write
|
||
3F1000164000
|
trusted library allocation
|
page read and write
|
||
225E3B75000
|
heap
|
page read and write
|
||
3F1000CED000
|
trusted library allocation
|
page read and write
|
||
12691E4A000
|
heap
|
page read and write
|
||
1D0F5502000
|
heap
|
page read and write
|
||
12693BE9000
|
heap
|
page read and write
|
||
5DC00278000
|
direct allocation
|
page read and write
|
||
1D231900000
|
trusted library section
|
page readonly
|
||
24EAA664000
|
heap
|
page read and write
|
||
24EAF005000
|
heap
|
page read and write
|
||
225E1D60000
|
heap
|
page read and write
|
||
2BF8002CC000
|
trusted library allocation
|
page read and write
|
||
1D08261B000
|
heap
|
page read and write
|
||
84BF1FE000
|
unkown
|
page readonly
|
||
69B00028C000
|
trusted library allocation
|
page read and write
|
||
225E67DF000
|
heap
|
page read and write
|
||
210FE7A0000
|
heap
|
page read and write
|
||
8D827FE000
|
unkown
|
page readonly
|
||
2199C128000
|
heap
|
page read and write
|
||
225E6983000
|
heap
|
page read and write
|
||
2199C134000
|
heap
|
page read and write
|
||
23C800430000
|
trusted library allocation
|
page read and write
|
||
12696870000
|
heap
|
page read and write
|
||
1CFA342D000
|
heap
|
page read and write
|
||
23C80040C000
|
trusted library allocation
|
page read and write
|
||
24EAC4B0000
|
heap
|
page read and write
|
||
7AF40040C000
|
trusted library allocation
|
page read and write
|
||
225E68D0000
|
heap
|
page read and write
|
||
3F1000EB8000
|
trusted library allocation
|
page read and write
|
||
3F1000E01000
|
trusted library allocation
|
page read and write
|
||
3F1000CE8000
|
trusted library allocation
|
page read and write
|
||
75A000290000
|
direct allocation
|
page read and write
|
||
3F1000814000
|
trusted library allocation
|
page read and write
|
||
24EAC49D000
|
heap
|
page read and write
|
||
1CFA65D2000
|
heap
|
page read and write
|
||
12693BF1000
|
heap
|
page read and write
|
||
24EAEFEC000
|
heap
|
page read and write
|
||
3F10008A0000
|
trusted library allocation
|
page read and write
|
||
5A64002E0000
|
trusted library allocation
|
page read and write
|
||
23F000134000
|
trusted library allocation
|
page read and write
|
||
23F00013C000
|
trusted library allocation
|
page read and write
|
||
24EAEEB7000
|
heap
|
page read and write
|
||
7FF695ABF000
|
unkown
|
page read and write
|
||
1CFA18EC000
|
heap
|
page read and write
|
||
1D22CF30000
|
heap
|
page read and write
|
||
3F1000114000
|
trusted library allocation
|
page read and write
|
||
44991FE000
|
stack
|
page read and write
|
||
3F1000824000
|
trusted library allocation
|
page read and write
|
||
24EAA71B000
|
heap
|
page read and write
|
||
24EAEF09000
|
heap
|
page read and write
|
||
54DC00264000
|
direct allocation
|
page read and write
|
||
12693F9C000
|
heap
|
page read and write
|
||
84D61FE000
|
unkown
|
page readonly
|
||
75A0002A8000
|
direct allocation
|
page read and write
|
||
24EAA72E000
|
heap
|
page read and write
|
||
2199C05C000
|
heap
|
page read and write
|
||
1D0F52FF000
|
heap
|
page read and write
|
||
5628002E4000
|
trusted library allocation
|
page read and write
|
||
69B000274000
|
trusted library allocation
|
page read and write
|
||
24EAC499000
|
heap
|
page read and write
|
||
54DC00408000
|
direct allocation
|
page read and write
|
||
12693F0A000
|
heap
|
page read and write
|
||
3F1000194000
|
trusted library allocation
|
page read and write
|
||
225E3BDC000
|
heap
|
page read and write
|
||
3834002D8000
|
trusted library allocation
|
page read and write
|
||
23F000070000
|
trusted library allocation
|
page read and write
|
||
449F9FE000
|
unkown
|
page readonly
|
||
1CFA191E000
|
heap
|
page read and write
|
||
12693C07000
|
heap
|
page read and write
|
||
225E3BB1000
|
heap
|
page read and write
|
||
2373FFB000
|
stack
|
page read and write
|
||
24EAF10C000
|
heap
|
page read and write
|
||
225E3B9E000
|
heap
|
page read and write
|
||
1D0F522B000
|
heap
|
page read and write
|
||
5D6800337000
|
trusted library allocation
|
page read and write
|
||
54DC002A4000
|
direct allocation
|
page read and write
|
||
3F1000254000
|
trusted library allocation
|
page read and write
|
||
24EAC053000
|
heap
|
page read and write
|
||
12693BF9000
|
heap
|
page read and write
|
||
1D08264B000
|
heap
|
page read and write
|
||
24EAC478000
|
heap
|
page read and write
|
||
1CFA1933000
|
heap
|
page read and write
|
||
1CFA658D000
|
heap
|
page read and write
|
||
2199C129000
|
heap
|
page read and write
|
||
23739FB000
|
stack
|
page read and write
|
||
1CFA341C000
|
heap
|
page read and write
|
||
225E6331000
|
heap
|
page read and write
|
||
3F1000C5F000
|
trusted library allocation
|
page read and write
|
||
C7AA0FE000
|
stack
|
page read and write
|
||
5D68002A0000
|
trusted library allocation
|
page read and write
|
||
225E3BB7000
|
heap
|
page read and write
|
||
12693BE2000
|
heap
|
page read and write
|
||
3F1000B54000
|
trusted library allocation
|
page read and write
|
||
1CFA6711000
|
heap
|
page read and write
|
||
24EAEF19000
|
heap
|
page read and write
|
||
1CFA1A20000
|
heap
|
page read and write
|
||
1CFA18F5000
|
heap
|
page read and write
|
||
1CFA343B000
|
heap
|
page read and write
|
||
225E680E000
|
heap
|
page read and write
|
||
1D0F4FF0000
|
heap
|
page read and write
|
||
24EAEFF2000
|
heap
|
page read and write
|
||
225E691B000
|
heap
|
page read and write
|
||
12691DA3000
|
heap
|
page read and write
|
||
23F000270000
|
trusted library allocation
|
page read and write
|
||
54DC00250000
|
direct allocation
|
page read and write
|
||
3F100096C000
|
trusted library allocation
|
page read and write
|
||
AA22796000
|
stack
|
page read and write
|
||
225E3BB5000
|
heap
|
page read and write
|
||
16C00220000
|
direct allocation
|
page read and write
|
||
3F1000174000
|
trusted library allocation
|
page read and write
|
||
24EAEEAE000
|
heap
|
page read and write
|
||
84E69FB000
|
stack
|
page read and write
|
||
562800298000
|
trusted library allocation
|
page read and write
|
||
5A64002D4000
|
trusted library allocation
|
page read and write
|
||
12693BF5000
|
heap
|
page read and write
|
||
5628002C4000
|
trusted library allocation
|
page read and write
|
||
225E3BCF000
|
heap
|
page read and write
|
||
24EAEF00000
|
heap
|
page read and write
|
||
3F10003A3000
|
trusted library allocation
|
page read and write
|
||
7FF713EBD000
|
unkown
|
page readonly
|
||
225E6880000
|
heap
|
page read and write
|
||
694C00268000
|
trusted library allocation
|
page read and write
|
||
12693C2E000
|
heap
|
page read and write
|
||
84C09FE000
|
stack
|
page read and write
|
||
225E6903000
|
heap
|
page read and write
|
||
84D09FB000
|
stack
|
page read and write
|
||
1E49DA13000
|
heap
|
page read and write
|
||
1CFA6588000
|
heap
|
page read and write
|
||
24EAA6F6000
|
heap
|
page read and write
|
||
B8E8BFE000
|
unkown
|
page readonly
|
||
84C31FE000
|
unkown
|
page readonly
|
||
1CFA6722000
|
heap
|
page read and write
|
||
47E4000E3000
|
trusted library allocation
|
page read and write
|
||
24EAC0CD000
|
heap
|
page read and write
|
||
24EAC4EB000
|
heap
|
page read and write
|
||
3834002CC000
|
trusted library allocation
|
page read and write
|
||
694C00211000
|
trusted library allocation
|
page read and write
|
||
1CFA1859000
|
heap
|
page read and write
|
||
12693BEC000
|
heap
|
page read and write
|
||
B82FFE000
|
unkown
|
page readonly
|
||
562800230000
|
trusted library allocation
|
page read and write
|
||
144002B0000
|
direct allocation
|
page read and write
|
||
34DC002CC000
|
trusted library allocation
|
page read and write
|
||
3F1000310000
|
trusted library allocation
|
page read and write
|
||
449B1FB000
|
stack
|
page read and write
|
||
5628002C4000
|
trusted library allocation
|
page read and write
|
||
B8E53F6000
|
stack
|
page read and write
|
||
5DC00244000
|
direct allocation
|
page read and write
|
||
24EAC4AE000
|
heap
|
page read and write
|
||
694C002B0000
|
trusted library allocation
|
page read and write
|
||
2BF8002A4000
|
trusted library allocation
|
page read and write
|
||
1D082590000
|
unclassified section
|
page read and write
|
||
3F100021C000
|
trusted library allocation
|
page read and write
|
||
3F1000930000
|
trusted library allocation
|
page read and write
|
||
3F1000C18000
|
trusted library allocation
|
page read and write
|
||
1D0F5402000
|
heap
|
page read and write
|
||
7AF400408000
|
trusted library allocation
|
page read and write
|
||
225E3B81000
|
heap
|
page read and write
|
||
694C00418000
|
trusted library allocation
|
page read and write
|
||
2199C0B9000
|
heap
|
page read and write
|
||
24EAC494000
|
heap
|
page read and write
|
||
23C8002AC000
|
trusted library allocation
|
page read and write
|
||
24EAA702000
|
heap
|
page read and write
|
||
2BF800248000
|
trusted library allocation
|
page read and write
|
||
225E6355000
|
heap
|
page read and write
|
||
12693C37000
|
heap
|
page read and write
|
||
21082DC7000
|
unclassified section
|
page read and write
|
||
12691E33000
|
heap
|
page read and write
|
||
3F1000A3C000
|
trusted library allocation
|
page read and write
|
||
1CFA18AB000
|
heap
|
page read and write
|
||
24EAC4B4000
|
heap
|
page read and write
|
||
54DC00234000
|
direct allocation
|
page read and write
|
||
1D22D06C000
|
heap
|
page read and write
|
||
2199C128000
|
heap
|
page read and write
|
||
24EAEFE6000
|
heap
|
page read and write
|
||
3F1000A6C000
|
trusted library allocation
|
page read and write
|
||
24EAF0C0000
|
heap
|
page read and write
|
||
24EAC0C4000
|
heap
|
page read and write
|
||
B8EB3FE000
|
stack
|
page read and write
|
||
23F000094000
|
trusted library allocation
|
page read and write
|
||
1CFA656E000
|
heap
|
page read and write
|
||
449E1FE000
|
stack
|
page read and write
|
||
1D08261D000
|
heap
|
page read and write
|
||
5628002D4000
|
trusted library allocation
|
page read and write
|
||
1D0F524C000
|
heap
|
page read and write
|
||
1CFA6537000
|
heap
|
page read and write
|
||
1269402D000
|
heap
|
page read and write
|
||
84DC1FE000
|
unkown
|
page readonly
|
||
84E21FE000
|
unkown
|
page readonly
|
||
225E3BA5000
|
heap
|
page read and write
|
||
84D51FE000
|
unkown
|
page readonly
|
||
1CFA6639000
|
heap
|
page read and write
|
||
2BF800314000
|
trusted library allocation
|
page read and write
|
||
23F0001BB000
|
trusted library allocation
|
page read and write
|
||
3F100082E000
|
trusted library allocation
|
page read and write
|
||
3F100023D000
|
trusted library allocation
|
page read and write
|
||
3F1000201000
|
trusted library allocation
|
page read and write
|
||
75A0002C4000
|
direct allocation
|
page read and write
|
||
24EAA6D8000
|
heap
|
page read and write
|
||
3F1000C01000
|
trusted library allocation
|
page read and write
|
||
24EAC4E4000
|
heap
|
page read and write
|
||
24EAA6E6000
|
heap
|
page read and write
|
||
3508CFD000
|
stack
|
page read and write
|
||
1CFA18B7000
|
heap
|
page read and write
|
||
47E400171000
|
trusted library allocation
|
page read and write
|
||
3F100011C000
|
trusted library allocation
|
page read and write
|
||
1CFA657F000
|
heap
|
page read and write
|
||
225E3B91000
|
heap
|
page read and write
|
||
12693C57000
|
heap
|
page read and write
|
||
3F1000C7C000
|
trusted library allocation
|
page read and write
|
||
225E67F0000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
12691E2A000
|
heap
|
page read and write
|
||
1CFA1895000
|
heap
|
page read and write
|
||
1D08260A000
|
heap
|
page read and write
|
||
1CFA3457000
|
heap
|
page read and write
|
||
225E3C54000
|
heap
|
page read and write
|
||
694C00328000
|
trusted library allocation
|
page read and write
|
||
1CFA3402000
|
heap
|
page read and write
|
||
1CFA18A5000
|
heap
|
page read and write
|
||
24EAEEB2000
|
heap
|
page read and write
|
||
84D81FE000
|
unkown
|
page readonly
|
||
24EAF0EC000
|
heap
|
page read and write
|
||
12693710000
|
heap
|
page read and write
|
||
24EAC4A5000
|
heap
|
page read and write
|
||
14400290000
|
direct allocation
|
page read and write
|
||
23C800201000
|
trusted library allocation
|
page read and write
|
||
225E6927000
|
heap
|
page read and write
|
||
1CFA67D6000
|
heap
|
page read and write
|
||
1CFA6790000
|
heap
|
page read and write
|
||
225E67BE000
|
heap
|
page read and write
|
||
3F1000560000
|
trusted library allocation
|
page read and write
|
||
12693F2D000
|
heap
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
225E67B0000
|
heap
|
page read and write
|
||
24EAC4A5000
|
heap
|
page read and write
|
||
1CFA3474000
|
heap
|
page read and write
|
||
47E40019C000
|
trusted library allocation
|
page read and write
|
||
1CFA669A000
|
heap
|
page read and write
|
||
225E1EB2000
|
heap
|
page read and write
|
||
7AF40027C000
|
trusted library allocation
|
page read and write
|
||
47E400134000
|
trusted library allocation
|
page read and write
|
||
1CFA656A000
|
heap
|
page read and write
|
||
24EAEFEA000
|
heap
|
page read and write
|
||
84C89FB000
|
stack
|
page read and write
|
||
694C00237000
|
trusted library allocation
|
page read and write
|
||
2199DF56000
|
heap
|
page read and write
|
||
1CFA3412000
|
heap
|
page read and write
|
||
5D6800238000
|
trusted library allocation
|
page read and write
|
||
2199C128000
|
heap
|
page read and write
|
||
3F10009B0000
|
trusted library allocation
|
page read and write
|
||
652000024000
|
trusted library allocation
|
page read and write
|
||
23C80033F000
|
trusted library allocation
|
page read and write
|
||
5D68002D4000
|
trusted library allocation
|
page read and write
|
||
457E34E000
|
stack
|
page read and write
|
||
12693EC5000
|
heap
|
page read and write
|
||
23C800404000
|
trusted library allocation
|
page read and write
|
||
69B000264000
|
trusted library allocation
|
page read and write
|
||
1269402D000
|
heap
|
page read and write
|
||
1CFA343B000
|
heap
|
page read and write
|
||
1CFA6594000
|
heap
|
page read and write
|
||
24EAA684000
|
heap
|
page read and write
|
||
3F1000080000
|
trusted library allocation
|
page read and write
|
||
2199DE13000
|
heap
|
page read and write
|
||
5DC00330000
|
direct allocation
|
page read and write
|
||
1CFA6696000
|
heap
|
page read and write
|
||
24EAA6D8000
|
heap
|
page read and write
|
||
3F10001D0000
|
trusted library allocation
|
page read and write
|
||
47E400218000
|
trusted library allocation
|
page read and write
|
||
24EAC4D6000
|
heap
|
page read and write
|
||
225E6859000
|
heap
|
page read and write
|
||
24EAC4AA000
|
heap
|
page read and write
|
||
225E692B000
|
heap
|
page read and write
|
||
24EAC4C0000
|
heap
|
page read and write
|
||
225E680A000
|
heap
|
page read and write
|
||
7AF4002C4000
|
trusted library allocation
|
page read and write
|
||
1CFA344C000
|
heap
|
page read and write
|
||
12693C09000
|
heap
|
page read and write
|
||
24EAC4A9000
|
heap
|
page read and write
|
||
225E67AF000
|
heap
|
page read and write
|
||
3F10008B8000
|
trusted library allocation
|
page read and write
|
||
5A6400201000
|
trusted library allocation
|
page read and write
|
||
225E6804000
|
heap
|
page read and write
|
||
75A000230000
|
direct allocation
|
page read and write
|
||
54DC00201000
|
direct allocation
|
page read and write
|
||
7FF695A5A000
|
unkown
|
page readonly
|
||
225E6307000
|
heap
|
page read and write
|
||
24EAC4FD000
|
heap
|
page read and write
|
||
12696842000
|
heap
|
page read and write
|
||
12691D40000
|
heap
|
page read and write
|
||
12691E5B000
|
heap
|
page read and write
|
||
2199DF13000
|
heap
|
page read and write
|
||
1269688B000
|
heap
|
page read and write
|
||
694C00220000
|
trusted library allocation
|
page read and write
|
||
3F10008C0000
|
trusted library allocation
|
page read and write
|
||
3F100036C000
|
trusted library allocation
|
page read and write
|
||
225E694A000
|
heap
|
page read and write
|
||
12693F4B000
|
heap
|
page read and write
|
||
449D9FE000
|
unkown
|
page readonly
|
||
3F10009B8000
|
trusted library allocation
|
page read and write
|
||
5D680026C000
|
trusted library allocation
|
page read and write
|
||
3F1000401000
|
trusted library allocation
|
page read and write
|
||
1CFA65D7000
|
heap
|
page read and write
|
||
5D680028C000
|
trusted library allocation
|
page read and write
|
||
44999FE000
|
unkown
|
page readonly
|
||
1CFA341F000
|
heap
|
page read and write
|
||
225E6836000
|
heap
|
page read and write
|
||
24EAEE84000
|
heap
|
page read and write
|
||
24EAC4B9000
|
heap
|
page read and write
|
||
16C0027C000
|
direct allocation
|
page read and write
|
||
12693BFE000
|
heap
|
page read and write
|
||
12693C16000
|
heap
|
page read and write
|
||
2373306000
|
stack
|
page read and write
|
||
7FF695AAF000
|
unkown
|
page read and write
|
||
225E3B68000
|
heap
|
page read and write
|
||
2199C128000
|
heap
|
page read and write
|
||
23F0000E4000
|
trusted library allocation
|
page read and write
|
||
225E6949000
|
heap
|
page read and write
|
||
225E680A000
|
heap
|
page read and write
|
||
383400290000
|
trusted library allocation
|
page read and write
|
||
383400260000
|
trusted library allocation
|
page read and write
|
There are 2536 hidden memdumps, click here to show them.