IOC Report
Archive.zip

loading gif

Files

File Path
Type
Category
Malicious
Archive.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Read-Only, ctime=Thu Oct 24 15:33:44 2024, mtime=Thu Oct 24 11:36:06 2024, atime=Thu Oct 24 15:33:44 2024, length=3289752, window=hide
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\16a9868f-826f-4895-80a8-2589121f2327.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\594800bc-92d9-4a97-8367-4369cb3fae61.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\730d6d3f-43f4-41bf-8f0a-e2af144d8c0f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\943810b9-6762-4dbd-ba79-508a8a92114c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-671A3F39-165C.pma
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\44f47071-7796-4013-9f59-1a610f12db56.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\4ff646df-e31c-483b-b309-c8868829ba10.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\26be1f42-241f-4220-b1b7-e8b33f24209a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\3426cef9-734a-4d87-9bd5-ec9f913cda28.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\70ccab7c-5a76-4a05-b764-096ababd279f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports~RF45b1fa.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Network\a700842a-8bf5-4da5-bf7c-548d985953fc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State~RF45af7a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State~RF45afa9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Local State~RF45b314.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Read-Only, ctime=Thu Oct 24 15:33:44 2024, mtime=Thu Oct 24 11:36:06 2024, atime=Thu Oct 24 15:33:44 2024, length=3289752, window=hide
dropped
C:\Users\user\AppData\Roaming\WinRAR\version.dat
data
dropped
There are 108 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe"
malicious
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe" -isetup_integration
malicious
C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
"C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe"
malicious
C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe
"C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_ce8de59e2277e9003f3a9c96260ce099ca7cda6c.zip\WinRAR.exe"
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=6588.548.7445727294754826910
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ffa2c0c8e88,0x7ffa2c0c8e98,0x7ffa2c0c8ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1728 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2196 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2460 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\WinRAR.exe.WebView2\EBWebView" --webview-exe-name=WinRAR.exe --webview-exe-version=7.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1729768802568476 --launch-time-ticks=4567489855 --mojo-platform-channel-handle=3452 --field-trial-handle=1732,i,9282830004954028553,13470874776180929565,262144 --enable-features=MojoIpcz /prefetch:1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://web.503188.com/?
unknown
https://hao.360.com/?installer
unknown
http://www.4399.com/flash/32979.htm
unknown
https://anglebug.com/7246?
unknown
http://hao123.di178.com/?r916
unknown
https://www.4399.com/flash/180977_3.htm
unknown
https://tg.602.com
unknown
https://www.4399.com/flash/127539_4.htm
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://www.4399.com/flash/205462_4.htm
unknown
https://www.4399.com/flash/145991_4.htm
unknown
http://www.chambersign.org1
unknown
https://ntp.msn.cn/edge/ntp
unknown
https://malaysia.smar
unknown
https://www.4399.com/flash/39379_2.htm
unknown
https://www.4399.com/flash/55146_4.htm
unknown
https://www.4399.com/flash/195673_4.htm
unknown
https://www.microsoftnews.cn/
unknown
https://kf.07073.com
unknown
http://unisolated.invalid/
unknown
https://www.4399.com/flash/18012.htm
unknown
https://www.4399.com/flash/zmhj.htm#search3-6407
unknown
http://bd.gy912.com
unknown
https://www.91duba.com/?f=
unknown
http://anglebug.com/6929
unknown
https://www.4399.com/flash/217926_2.htm
unknown
https://www.4399.com/flash/218860_1.htm
unknown
https://anglebug.com/7246
unknown
https://www.4399.com/flash/27924_2.htm
unknown
https://int.msn.cn/
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://www.4399.com/flash/18012_4.htm
unknown
https://www.newduba.cn/?
unknown
https://www.4399.com/flash/48504.htm
unknown
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
unknown
http://anglebug.com/5881z
unknown
http://df.edge.qhkj.baicana.com
unknown
https://hao.qq.com/?unc=Af31026&s=o400493_1?
unknown
https://tp.9377s.com
unknown
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
unknown
http://anglebug.com/4722
unknown
http://r.emsoso.cn
unknown
https://www.4399.com/flash/zmhj.htm
unknown
https://www.4399.com/flash/69156_1.htm
unknown
https://www.4399.com/flash/776_1.htm
unknown
http://129fy.ie.chalai.net
unknown
https://www.4399.com/flash/198637_4.htm
unknown
https://www.4399.com/flash/133630_4.htm
unknown
http://sgcs.edge.ker58.com
unknown
https://www.4399.com/flash/218717_2.htm
unknown
https://www.4399.com/flash/136516_3.htm
unknown
https://www.4399.com/flash/203215_3.htm
unknown
https://www.4399.com/flash/207195_4.htm
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://discovery.lenovo.com.cn/home062291
unknown
https://www.newduba.cn/?f=
unknown
https://hao.360.com/?src=jsqth
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://my.4399.com/yxmsdzls/
unknown
https://xsts.auth.xboxlive.com
unknown
https://www.4399.com/flash/217855_4.htm
unknown
http://anglebug.com/3862
unknown
https://yxtg.taojike.com.cn/tg/ttfc.html?sc=
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://www.4399.com/flash/21674_3.htm
unknown
https://www.4399.com/flash/204650_1.htm
unknown
https://localhost.msn.com/
unknown
https://anglebug.com/7369w
unknown
https://www.4399.com/flash/115339_1.htm
unknown
https://www.4399.com/flash/203369_3.htm
unknown
https://www.jiegeng.com
unknown
https://internet-start.net/?
unknown
https://www.4399.com/flash/35538.htm
unknown
https://outlook.com/
unknown
https://www.4399.com/flash/218066_3.htm
unknown
https://www.4399.com/flash/6232_3.htm
unknown
https://www.4399.com/flash/195990_1.htm
unknown
https://www.4399.com/flash/12669_4.htm
unknown
https://www.4399.com/flash/204056_4.htm
unknown
http://anglebug.com/3970
unknown
https://www.4399.com/flash/205090_2.htm
unknown
http://anglebug.com/5430iew
unknown
https://www.startfenster.de
unknown
https://www.4399.com/flash/10379_3.htm
unknown
https://www.4399.com/flash/203018_4.htm
unknown
http://tx.edge.ker58.com
unknown
https://www.so.com/?src=
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
https://anglebug.com/7162
unknown
https://www.4399.com/flash/202828_2.htm
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\WinRAR.exe
NULL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\WinRAR.exe
Path
malicious
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Name
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Default
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ImmExec
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ExclNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
StoreNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
UseRAR
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SFXModule
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SFXIcon
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SFXLogo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SFXLogo2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SFXElevate
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
CmtFile
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
CmtDataWide
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
VolumeSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
VolSizeMod
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
VolPause
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
RecVolNumber
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Update
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Fresh
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SyncFiles
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Overwrite
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Move
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ArcRecBin
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ArcWipe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
WipeIfPassword
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Solid
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Test
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
RecEnabled
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
RecSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
EraseDest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
AddArcOnly
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ClearArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Lock
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Method
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
DictSizeLZ
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
DictSizeKB
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Background
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
WaitForOther
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
Shutdown
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PasswordData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
EncryptHeaders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ZipLegacyEncrypt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
OpenShared
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ProcessOwners
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SaveStreams
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SaveSymLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SaveHardLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
GenerateArcName
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
VersionControl
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
BLAKE2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
FileCopies
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
OrigArcData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
QuickOpen
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
GenerateMask
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
FileTimeMode
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
FileDays
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
FileHours
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
FileMinutes
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
FileTimeLimit
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ArcTimeOriginal
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ArcTimeLatest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
mtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
ctime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
atime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PreserveAtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PathsAbs
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PathsNone
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PathsAbsDrive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SeparateArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SeparateArcDoubleExt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
SeparateArcSubfolders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
EmailArcTo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PackLongRange
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PackExhaustive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PackExe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
PackDelta
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\0
CmdSwitches
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Name
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Default
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ImmExec
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ExclNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
StoreNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
UseRAR
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SFXModule
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SFXIcon
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SFXLogo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SFXLogo2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SFXElevate
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
CmtFile
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
CmtDataWide
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
VolumeSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
VolSizeMod
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
VolPause
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
RecVolNumber
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Update
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Fresh
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SyncFiles
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Overwrite
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Move
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ArcRecBin
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ArcWipe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
WipeIfPassword
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Solid
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Test
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
RecEnabled
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
RecSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
EraseDest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
AddArcOnly
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ClearArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Lock
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Method
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
DictSizeLZ
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
DictSizeKB
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Background
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
WaitForOther
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
Shutdown
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PasswordData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
EncryptHeaders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ZipLegacyEncrypt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
OpenShared
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ProcessOwners
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SaveStreams
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SaveSymLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SaveHardLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
GenerateArcName
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
VersionControl
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
BLAKE2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
FileCopies
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
OrigArcData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
QuickOpen
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
GenerateMask
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
FileTimeMode
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
FileDays
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
FileHours
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
FileMinutes
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
FileTimeLimit
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ArcTimeOriginal
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ArcTimeLatest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
mtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
ctime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
atime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PreserveAtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PathsAbs
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PathsNone
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PathsAbsDrive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SeparateArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SeparateArcDoubleExt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
SeparateArcSubfolders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
EmailArcTo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PackLongRange
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PackExhaustive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PackExe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
PackDelta
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\1
CmdSwitches
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Name
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Default
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ImmExec
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ExclNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
StoreNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
UseRAR
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SFXModule
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SFXIcon
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SFXLogo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SFXLogo2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SFXElevate
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
CmtFile
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
CmtDataWide
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
VolumeSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
VolSizeMod
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
VolPause
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
RecVolNumber
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Update
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Fresh
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SyncFiles
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Overwrite
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Move
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ArcRecBin
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ArcWipe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
WipeIfPassword
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Solid
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Test
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
RecEnabled
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
RecSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
EraseDest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
AddArcOnly
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ClearArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Lock
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Method
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
DictSizeLZ
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
DictSizeKB
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Background
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
WaitForOther
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
Shutdown
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PasswordData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
EncryptHeaders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ZipLegacyEncrypt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
OpenShared
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ProcessOwners
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SaveStreams
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SaveSymLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SaveHardLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
GenerateArcName
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
VersionControl
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
BLAKE2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
FileCopies
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
OrigArcData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
QuickOpen
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
GenerateMask
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
FileTimeMode
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
FileDays
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
FileHours
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
FileMinutes
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
FileTimeLimit
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ArcTimeOriginal
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ArcTimeLatest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
mtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
ctime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
atime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PreserveAtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PathsAbs
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PathsNone
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PathsAbsDrive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SeparateArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SeparateArcDoubleExt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
SeparateArcSubfolders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
EmailArcTo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PackLongRange
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PackExhaustive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PackExe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
PackDelta
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\2
CmdSwitches
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Name
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Default
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ImmExec
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ExclNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
StoreNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
UseRAR
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SFXModule
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SFXIcon
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SFXLogo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SFXLogo2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SFXElevate
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
CmtFile
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
CmtDataWide
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
VolumeSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
VolSizeMod
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
VolPause
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
RecVolNumber
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Update
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Fresh
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SyncFiles
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Overwrite
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Move
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ArcRecBin
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ArcWipe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
WipeIfPassword
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Solid
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Test
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
RecEnabled
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
RecSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
EraseDest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
AddArcOnly
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ClearArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Lock
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Method
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
DictSizeLZ
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
DictSizeKB
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Background
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
WaitForOther
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
Shutdown
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PasswordData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
EncryptHeaders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ZipLegacyEncrypt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
OpenShared
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ProcessOwners
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SaveStreams
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SaveSymLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SaveHardLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
GenerateArcName
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
VersionControl
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
BLAKE2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
FileCopies
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
OrigArcData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
QuickOpen
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
GenerateMask
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
FileTimeMode
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
FileDays
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
FileHours
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
FileMinutes
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
FileTimeLimit
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ArcTimeOriginal
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ArcTimeLatest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
mtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
ctime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
atime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PreserveAtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PathsAbs
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PathsNone
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PathsAbsDrive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SeparateArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SeparateArcDoubleExt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
SeparateArcSubfolders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
EmailArcTo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PackLongRange
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PackExhaustive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PackExe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
PackDelta
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\3
CmdSwitches
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Name
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Default
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ImmExec
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ExclNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
StoreNames
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
UseRAR
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SFXModule
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SFXIcon
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SFXLogo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SFXLogo2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SFXElevate
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
CmtFile
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
CmtDataWide
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
VolumeSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
VolSizeMod
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
VolPause
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
RecVolNumber
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Update
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Fresh
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SyncFiles
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Overwrite
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Move
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ArcRecBin
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ArcWipe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
WipeIfPassword
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Solid
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Test
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
RecEnabled
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
RecSize
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
EraseDest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
AddArcOnly
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ClearArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Lock
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Method
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Background
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
WaitForOther
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
Shutdown
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PasswordData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
EncryptHeaders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ZipLegacyEncrypt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
OpenShared
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ProcessOwners
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SaveStreams
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SaveSymLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SaveHardLinks
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
GenerateArcName
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
VersionControl
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
BLAKE2
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
FileCopies
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
OrigArcData
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
QuickOpen
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
GenerateMask
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
FileTimeMode
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
FileDays
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
FileHours
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
FileMinutes
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
FileTimeLimit
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ArcTimeOriginal
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ArcTimeLatest
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
mtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
ctime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
atime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PreserveAtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PathsAbs
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PathsNone
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PathsAbsDrive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SeparateArc
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SeparateArcDoubleExt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
SeparateArcSubfolders
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
EmailArcTo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PackLongRange
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PackExhaustive
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PackExe
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
PackDelta
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Profiles\4
CmdSwitches
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
VerInfo
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.rar
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.zip
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.cab
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.arj
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.lz
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.lzh
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.7z
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.tar
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.gz
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.uue
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.bz2
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.jar
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.iso
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.z
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.zipx
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.zst
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\.001
Set
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\Links
Desktop
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\Links
StartMenu
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup\Links
Programs
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
ShellExt
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
CascadedMenu
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
MenuIcons
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Setup
LegacyMenu
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Misc
RemShown
HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Placement
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR
exe64
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
{B41DB860-8EE4-11D2-9906-E49FADC173CA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
{B41DB860-64E4-11D2-9906-E49FADC173CA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
WinRAR
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities
ApplicationDescription
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.rar
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.zip
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.cab
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.arj
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.lz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.tlz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.lzh
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.lha
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.7z
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.tar
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.gz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.tgz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.uue
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.xxe
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.uu
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.bz2
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.tbz2
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.bz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.tbz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.jar
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.iso
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.z
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.taz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.xz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.txz
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.zipx
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.zst
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.tzst
HKEY_LOCAL_MACHINE\SOFTWARE\WinRAR\Capabilities\FileAssociations
.001
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.rev
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinRAR archiver
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
LastFolder
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
name
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
size
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
type
HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
mtime
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout
Band76_0
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout
Band76_1
HKEY_CURRENT_USER\SOFTWARE\WinRAR\General\Toolbar\Layout
Band76_2
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 519 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7AF4002D4000
trusted library allocation
page read and write
1CFA3465000
heap
page read and write
24EAC4D0000
heap
page read and write
6520000F4000
trusted library allocation
page read and write
1CFA6532000
heap
page read and write
3F1000954000
trusted library allocation
page read and write
69B000238000
trusted library allocation
page read and write
225E6850000
heap
page read and write
1CFA6553000
heap
page read and write
652000070000
trusted library allocation
page read and write
2199C086000
heap
page read and write
5D68002B4000
trusted library allocation
page read and write
1CFA67BF000
heap
page read and write
191D91B0000
heap
page read and write
225E6313000
heap
page read and write
84D59FD000
stack
page read and write
3F1000238000
trusted library allocation
page read and write
12693E6D000
heap
page read and write
2BF800260000
trusted library allocation
page read and write
54DC00294000
direct allocation
page read and write
1CFA6648000
heap
page read and write
23C8002F0000
trusted library allocation
page read and write
2199DF00000
heap
page read and write
1CFA347C000
heap
page read and write
225E6973000
heap
page read and write
2199EBC0000
unkown
page read and write
12693FF6000
heap
page read and write
3F1000288000
trusted library allocation
page read and write
225E67F0000
heap
page read and write
12693ECA000
heap
page read and write
1CFA664E000
heap
page read and write
1E49DA18000
heap
page read and write
383400230000
trusted library allocation
page read and write
225E3B95000
heap
page read and write
3F10009A8000
trusted library allocation
page read and write
12693F69000
heap
page read and write
B8F4BFE000
unkown
page readonly
3F1000A0E000
trusted library allocation
page read and write
3F1000DB6000
trusted library allocation
page read and write
694C002FC000
trusted library allocation
page read and write
3F10003B0000
trusted library allocation
page read and write
24EAC4AE000
heap
page read and write
5A6400250000
trusted library allocation
page read and write
12693E99000
heap
page read and write
1CFA3474000
heap
page read and write
24EAC4BF000
heap
page read and write
3F1000BD0000
trusted library allocation
page read and write
47E400114000
trusted library allocation
page read and write
1D0F50A0000
heap
page read and write
210FE772000
unclassified section
page read and write
652000060000
trusted library allocation
page read and write
12693BF7000
heap
page read and write
3F1000CA0000
trusted library allocation
page read and write
24EAC4ED000
heap
page read and write
1D082560000
trusted library allocation
page read and write
1CFA3454000
heap
page read and write
225E3B70000
heap
page read and write
652000038000
trusted library allocation
page read and write
225E1E13000
heap
page read and write
12696854000
heap
page read and write
24EAEEBA000
heap
page read and write
3F1000CF0000
trusted library allocation
page read and write
47E400098000
trusted library allocation
page read and write
23F000190000
trusted library allocation
page read and write
B8ED3FE000
stack
page read and write
84C11FE000
unkown
page readonly
14400250000
direct allocation
page read and write
1CFA66FA000
heap
page read and write
225E6307000
heap
page read and write
23F0001E4000
trusted library allocation
page read and write
1CFA342B000
heap
page read and write
2199DF56000
heap
page read and write
AA230FF000
stack
page read and write
12693C45000
heap
page read and write
5DC00311000
direct allocation
page read and write
7AF40031C000
trusted library allocation
page read and write
225E40F7000
heap
page read and write
1CFA663D000
heap
page read and write
24EAA732000
heap
page read and write
3F1000D8C000
trusted library allocation
page read and write
16C00201000
direct allocation
page read and write
225E3BBA000
heap
page read and write
1CFA6592000
heap
page read and write
23C800401000
trusted library allocation
page read and write
3F10000A8000
trusted library allocation
page read and write
3F1000D50000
trusted library allocation
page read and write
24EAEF2F000
heap
page read and write
12693FD8000
heap
page read and write
3F1000B2C000
trusted library allocation
page read and write
23C800270000
trusted library allocation
page read and write
12693EA8000
heap
page read and write
225E3BB3000
heap
page read and write
1CFA3400000
heap
page read and write
5DC0031A000
direct allocation
page read and write
652000124000
trusted library allocation
page read and write
225E3B73000
heap
page read and write
225E6319000
heap
page read and write
2199DF23000
heap
page read and write
3F1000AE4000
trusted library allocation
page read and write
7FF713E66000
unkown
page read and write
B8F2BFE000
unkown
page readonly
12693F9E000
heap
page read and write
225E67AE000
heap
page read and write
47E400185000
trusted library allocation
page read and write
225E6962000
heap
page read and write
3F1000E28000
trusted library allocation
page read and write
225E1E24000
heap
page read and write
12693FE2000
heap
page read and write
1CFA65BC000
heap
page read and write
225E3BA9000
heap
page read and write
5D680025C000
trusted library allocation
page read and write
23F00013F000
trusted library allocation
page read and write
23F000088000
trusted library allocation
page read and write
225E3BB8000
heap
page read and write
84CC9FC000
stack
page read and write
12693C00000
heap
page read and write
225E3B77000
heap
page read and write
24EAC4D8000
heap
page read and write
1CFA6790000
heap
page read and write
1CFA191E000
heap
page read and write
12693E7E000
heap
page read and write
24EAEE74000
heap
page read and write
1CFA5710000
trusted library allocation
page read and write
24EAEE92000
heap
page read and write
3F100097C000
trusted library allocation
page read and write
23F00010C000
trusted library allocation
page read and write
12693E61000
heap
page read and write
210FEC02000
heap
page read and write
2BF8002A4000
trusted library allocation
page read and write
24EAA663000
heap
page read and write
12693C4D000
heap
page read and write
3F1000DE0000
trusted library allocation
page read and write
7FF713E6F000
unkown
page read and write
1269684A000
heap
page read and write
7FF695A7F000
unkown
page readonly
12693F9F000
heap
page read and write
AA22AFD000
stack
page read and write
B8EF3FE000
stack
page read and write
24EAE95B000
heap
page read and write
1CFA18EA000
heap
page read and write
16C002C4000
direct allocation
page read and write
225E67D0000
heap
page read and write
24EAF10C000
heap
page read and write
1CFA6543000
heap
page read and write
3F100098C000
trusted library allocation
page read and write
1CFA1918000
heap
page read and write
5628002AC000
trusted library allocation
page read and write
5DC00234000
direct allocation
page read and write
1CFA190B000
heap
page read and write
1CFA3482000
heap
page read and write
2199DF56000
heap
page read and write
225E3B47000
heap
page read and write
75A0002DC000
direct allocation
page read and write
24EAA730000
heap
page read and write
47E400001000
trusted library allocation
page read and write
219A1200000
heap
page read and write
24EAA6DA000
heap
page read and write
84E59FE000
stack
page read and write
3F10002AC000
trusted library allocation
page read and write
2199DF08000
heap
page read and write
7AF40025C000
trusted library allocation
page read and write
1CFA664A000
heap
page read and write
24EAC4A0000
heap
page read and write
84E61FE000
unkown
page readonly
7AF400201000
trusted library allocation
page read and write
12691DD1000
heap
page read and write
5D680027C000
trusted library allocation
page read and write
24EAF0C9000
heap
page read and write
12693F64000
heap
page read and write
2199DF36000
heap
page read and write
84DD1FE000
unkown
page readonly
694C00288000
trusted library allocation
page read and write
7FF630C7A000
unkown
page readonly
191D9238000
heap
page read and write
225E3BB1000
heap
page read and write
225E1E9D000
heap
page read and write
225E3BDE000
heap
page read and write
84E81FE000
unkown
page readonly
12694056000
heap
page read and write
1CFA342F000
heap
page read and write
24EAC50E000
heap
page read and write
84D49FE000
stack
page read and write
24EAEE8E000
heap
page read and write
7FF713EB0000
unkown
page readonly
1269402D000
heap
page read and write
2199DF13000
heap
page read and write
24EAF004000
heap
page read and write
3F1000066000
trusted library allocation
page read and write
2BF800408000
trusted library allocation
page read and write
1CFA659C000
heap
page read and write
210FE902000
heap
page read and write
34DC002CC000
trusted library allocation
page read and write
23C80029C000
trusted library allocation
page read and write
B8F23FE000
stack
page read and write
3834002A0000
trusted library allocation
page read and write
54DC002EC000
direct allocation
page read and write
12696855000
heap
page read and write
24EAA6F5000
heap
page read and write
3F1000A12000
trusted library allocation
page read and write
23F000120000
trusted library allocation
page read and write
47E400161000
trusted library allocation
page read and write
1E49DA02000
heap
page read and write
12693BC7000
heap
page read and write
24EAC4CD000
heap
page read and write
12691E75000
heap
page read and write
1CFA3445000
heap
page read and write
2199DF47000
heap
page read and write
12693B60000
heap
page read and write
694C002B0000
trusted library allocation
page read and write
24EAF0B7000
heap
page read and write
210FE6F0000
remote allocation
page read and write
1CFA3447000
heap
page read and write
12693C3B000
heap
page read and write
449D1FE000
stack
page read and write
1D0F5192000
unclassified section
page read and write
5D68002FC000
trusted library allocation
page read and write
24EAEFAE000
heap
page read and write
1D0F5235000
heap
page read and write
1CFA18F4000
heap
page read and write
225E3BD1000
heap
page read and write
5A640020C000
trusted library allocation
page read and write
12696BF5000
heap
page read and write
14400201000
direct allocation
page read and write
126967F0000
heap
page read and write
1CFA345D000
heap
page read and write
44A01FE000
stack
page read and write
23D476F0000
remote allocation
page read and write
12693815000
heap
page read and write
16C0026C000
direct allocation
page read and write
191D9440000
heap
page read and write
12693E92000
heap
page read and write
84E31FE000
unkown
page readonly
12693C59000
heap
page read and write
84D79FC000
stack
page read and write
16C00248000
direct allocation
page read and write
21082DB0000
unclassified section
page read and write
1CFA6787000
heap
page read and write
84D41FE000
unkown
page readonly
1CFA669A000
heap
page read and write
24EAC484000
heap
page read and write
24EAC505000
heap
page read and write
1CFA1913000
heap
page read and write
225E3C50000
heap
page read and write
1CFA65A6000
heap
page read and write
225E1EA7000
heap
page read and write
1CFA3465000
heap
page read and write
2BF80020C000
trusted library allocation
page read and write
12693C4D000
heap
page read and write
24EAA6E2000
heap
page read and write
24EAEFEA000
heap
page read and write
24EAEF52000
heap
page read and write
3F10000BC000
trusted library allocation
page read and write
225E699D000
heap
page read and write
12693C2E000
heap
page read and write
12693BFF000
heap
page read and write
562800298000
trusted library allocation
page read and write
24EAEEF8000
heap
page read and write
12693C04000
heap
page read and write
1CFA18AC000
heap
page read and write
3F1000D38000
trusted library allocation
page read and write
B8E7BFE000
unkown
page readonly
5D6800220000
trusted library allocation
page read and write
47E40017D000
trusted library allocation
page read and write
3F1000A0D000
trusted library allocation
page read and write
56280028C000
trusted library allocation
page read and write
12693714000
heap
page read and write
14400234000
direct allocation
page read and write
2199DF4F000
heap
page read and write
2199C102000
heap
page read and write
64861FD000
stack
page read and write
24EAF000000
heap
page read and write
1D08261D000
heap
page read and write
3F1000C8C000
trusted library allocation
page read and write
23F0000BC000
trusted library allocation
page read and write
1D082642000
heap
page read and write
12693C04000
heap
page read and write
23C800290000
trusted library allocation
page read and write
34DC0026C000
trusted library allocation
page read and write
1D0825C0000
unclassified section
page read and write
12693BE6000
heap
page read and write
12693E9E000
heap
page read and write
47E4000A8000
trusted library allocation
page read and write
1CFA6703000
heap
page read and write
383400238000
trusted library allocation
page read and write
1D082637000
heap
page read and write
12691DE9000
heap
page read and write
24EAEEC9000
heap
page read and write
24EAC499000
heap
page read and write
12691DCF000
heap
page read and write
5628002B8000
trusted library allocation
page read and write
23F0001D0000
trusted library allocation
page read and write
24EAE000000
trusted library allocation
page read and write
7FF713C30000
unkown
page readonly
225E3BC0000
heap
page read and write
2199C0F8000
heap
page read and write
7AF400211000
trusted library allocation
page read and write
1CFA342A000
heap
page read and write
3F1000A6E000
trusted library allocation
page read and write
84E09FB000
stack
page read and write
7FF630CCF000
unkown
page read and write
1D082623000
heap
page read and write
24EAEFD6000
heap
page read and write
B847FC000
stack
page read and write
24EAEF11000
heap
page read and write
12691E4F000
heap
page read and write
24EAA6EE000
heap
page read and write
3F1000CC4000
trusted library allocation
page read and write
12693FE4000
heap
page read and write
24EAEEAB000
heap
page read and write
84C49FE000
stack
page read and write
12695E90000
heap
page read and write
16C00230000
direct allocation
page read and write
3F1000D94000
trusted library allocation
page read and write
2BF8002F4000
trusted library allocation
page read and write
225E6363000
heap
page read and write
12691CE0000
heap
page read and write
24EAA70D000
heap
page read and write
12691E2A000
heap
page read and write
3F1000D08000
trusted library allocation
page read and write
47E4000DD000
trusted library allocation
page read and write
24EAEEDA000
heap
page read and write
5D68002F4000
trusted library allocation
page read and write
5D6800280000
trusted library allocation
page read and write
2199C12A000
heap
page read and write
1CFA67E1000
heap
page read and write
84D29FD000
stack
page read and write
47E400104000
trusted library allocation
page read and write
1CFA3390000
heap
page read and write
AA22DFC000
stack
page read and write
1CFA1938000
heap
page read and write
1D22CFF0000
heap
page read and write
12693BDC000
heap
page read and write
5628002C0000
trusted library allocation
page read and write
5D6800290000
trusted library allocation
page read and write
3F100000C000
trusted library allocation
page read and write
1CFA1872000
heap
page read and write
1CFA6549000
heap
page read and write
3F1000A18000
trusted library allocation
page read and write
694C0025C000
trusted library allocation
page read and write
24EAEEB1000
heap
page read and write
24EAA610000
heap
page read and write
2BF800220000
trusted library allocation
page read and write
2199DF13000
heap
page read and write
3F1000F74000
trusted library allocation
page read and write
1CFA653F000
heap
page read and write
225E3BAF000
heap
page read and write
12693FFC000
heap
page read and write
225E6357000
heap
page read and write
449B9FE000
unkown
page readonly
34DC002D8000
trusted library allocation
page read and write
225E67B0000
heap
page read and write
35091FD000
stack
page read and write
24EAA71B000
heap
page read and write
12691DE9000
heap
page read and write
1CFA65A9000
heap
page read and write
225E3B87000
heap
page read and write
7FF713E73000
unkown
page read and write
225E6361000
heap
page read and write
191D9230000
heap
page read and write
34DC002A0000
trusted library allocation
page read and write
1CFA659C000
heap
page read and write
3F1000D7C000
trusted library allocation
page read and write
84DD9FD000
stack
page read and write
1D0F5242000
heap
page read and write
1E49D990000
heap
page read and write
3834002E8000
trusted library allocation
page read and write
1CFA6539000
heap
page read and write
2199DF56000
heap
page read and write
12696870000
heap
page read and write
6520000BC000
trusted library allocation
page read and write
23C80031C000
trusted library allocation
page read and write
75A00024C000
direct allocation
page read and write
B807FC000
stack
page read and write
3F1000C78000
trusted library allocation
page read and write
1CFA3458000
heap
page read and write
1CFA6655000
heap
page read and write
12693F24000
heap
page read and write
225E67FB000
heap
page read and write
225E68A2000
heap
page read and write
23F0001BF000
trusted library allocation
page read and write
84DC9FE000
stack
page read and write
24EAC4C2000
heap
page read and write
3F1000570000
trusted library allocation
page read and write
24EAC490000
heap
page read and write
34DC00220000
trusted library allocation
page read and write
24EAA701000
heap
page read and write
47E400090000
trusted library allocation
page read and write
1CFA340D000
heap
page read and write
12691E35000
heap
page read and write
23F000150000
trusted library allocation
page read and write
191D9190000
heap
page read and write
B8F53FF000
stack
page read and write
12693C5E000
heap
page read and write
AA231FD000
stack
page read and write
3F10002B8000
trusted library allocation
page read and write
126967F1000
heap
page read and write
B8EBBFE000
unkown
page readonly
12693E8D000
heap
page read and write
225E5FE0000
heap
page read and write
225E1DE3000
heap
page read and write
3F100041C000
trusted library allocation
page read and write
24EAA6E6000
heap
page read and write
12693F30000
heap
page read and write
1CFA189A000
heap
page read and write
225E68BD000
heap
page read and write
47E4001DC000
trusted library allocation
page read and write
12691E7E000
heap
page read and write
12695690000
trusted library allocation
page read and write
24EAEF42000
heap
page read and write
24EAA6EC000
heap
page read and write
24EAA6A2000
heap
page read and write
12693EA6000
heap
page read and write
44A09FE000
unkown
page readonly
23F00023C000
trusted library allocation
page read and write
1CFA6703000
heap
page read and write
24EAEFB2000
heap
page read and write
24EAEF19000
heap
page read and write
7AF400348000
trusted library allocation
page read and write
225E691B000
heap
page read and write
5D68002C4000
trusted library allocation
page read and write
225E1E28000
heap
page read and write
210FE760000
heap
page readonly
7FF630C9F000
unkown
page readonly
75A000211000
direct allocation
page read and write
3F1000244000
trusted library allocation
page read and write
47E40020C000
trusted library allocation
page read and write
B8F43FE000
stack
page read and write
2199BFD0000
heap
page read and write
23F00000C000
trusted library allocation
page read and write
12693C19000
heap
page read and write
3F1000A3E000
trusted library allocation
page read and write
3F1000944000
trusted library allocation
page read and write
225E67C7000
heap
page read and write
B89FFE000
unkown
page readonly
225E62FE000
heap
page read and write
23F000184000
trusted library allocation
page read and write
12693EA8000
heap
page read and write
1CFA6543000
heap
page read and write
1CFA18FF000
heap
page read and write
2199C000000
heap
page read and write
3F1000CD4000
trusted library allocation
page read and write
12693E81000
heap
page read and write
7FF713E5F000
unkown
page read and write
1CFA65D5000
heap
page read and write
225E3753000
heap
page read and write
3F1000A2E000
trusted library allocation
page read and write
2199C113000
heap
page read and write
24EAF094000
heap
page read and write
3F1000248000
trusted library allocation
page read and write
12693EEE000
heap
page read and write
7AF4002F4000
trusted library allocation
page read and write
12693E79000
heap
page read and write
12691DC3000
heap
page read and write
69B0002D8000
trusted library allocation
page read and write
1CFA65A5000
heap
page read and write
24EAF084000
heap
page read and write
562800258000
trusted library allocation
page read and write
24EAEFD1000
heap
page read and write
3F1000060000
trusted library allocation
page read and write
7FF630C8D000
unkown
page readonly
3F1000C54000
trusted library allocation
page read and write
12691E6A000
heap
page read and write
12693C14000
heap
page read and write
5D6800230000
trusted library allocation
page read and write
23C800348000
trusted library allocation
page read and write
1CFA65A7000
heap
page read and write
225E3B8A000
heap
page read and write
47E40008C000
trusted library allocation
page read and write
24EAF072000
heap
page read and write
84BD9F6000
stack
page read and write
24EAEEFB000
heap
page read and write
225E3BD3000
heap
page read and write
219A1990000
heap
page read and write
225E3BD6000
heap
page read and write
5D68002F0000
trusted library allocation
page read and write
34DC002BC000
trusted library allocation
page read and write
1CFA18A8000
heap
page read and write
3F1000430000
trusted library allocation
page read and write
12693E74000
heap
page read and write
225E67B0000
heap
page read and write
12696870000
heap
page read and write
24EAEFB7000
heap
page read and write
12693F21000
heap
page read and write
24EAC4AA000
heap
page read and write
75A0002C4000
direct allocation
page read and write
3F1000C3C000
trusted library allocation
page read and write
1E49DCD0000
trusted library allocation
page read and write
225E67DA000
heap
page read and write
24EAF0C7000
heap
page read and write
225E3BDA000
heap
page read and write
1CFA6703000
heap
page read and write
24EAEFCD000
heap
page read and write
225E6831000
heap
page read and write
23C800238000
trusted library allocation
page read and write
12691E5D000
heap
page read and write
56280026C000
trusted library allocation
page read and write
12691DE3000
heap
page read and write
1E49DA28000
heap
page read and write
7FF695A5D000
unkown
page readonly
75A000280000
direct allocation
page read and write
24EAC4C9000
heap
page read and write
23F0000F4000
trusted library allocation
page read and write
24EAEF12000
heap
page read and write
C7AA6FF000
stack
page read and write
7FF713EBD000
unkown
page write copy
23F0000AC000
trusted library allocation
page read and write
5A6400230000
trusted library allocation
page read and write
225E68DF000
heap
page read and write
1CFA348B000
heap
page read and write
23C800308000
trusted library allocation
page read and write
44911FE000
stack
page read and write
2199DF41000
heap
page read and write
47E4001C4000
trusted library allocation
page read and write
47E40007C000
trusted library allocation
page read and write
225E67BC000
heap
page read and write
7AF4002B8000
trusted library allocation
page read and write
24EAA6A6000
heap
page read and write
5DC00310000
direct allocation
page read and write
75A0002C8000
direct allocation
page read and write
1CFA6617000
heap
page read and write
12693EED000
heap
page read and write
12693F8A000
heap
page read and write
12691E5D000
heap
page read and write
1CFA18F4000
heap
page read and write
24EAA719000
heap
page read and write
8D847FE000
unkown
page readonly
225E68A5000
heap
page read and write
225E682A000
heap
page read and write
5628002C4000
trusted library allocation
page read and write
24EAC49F000
heap
page read and write
1CFA6623000
heap
page read and write
1D22D000000
heap
page read and write
694C00278000
trusted library allocation
page read and write
3F1000EF0000
trusted library allocation
page read and write
225E3BCD000
heap
page read and write
3F10004A4000
trusted library allocation
page read and write
12691DCF000
heap
page read and write
3834002B4000
trusted library allocation
page read and write
126966A0000
heap
page read and write
225E6945000
heap
page read and write
14400280000
direct allocation
page read and write
126968BF000
heap
page read and write
34DC00260000
trusted library allocation
page read and write
12693C51000
heap
page read and write
210FE690000
heap
page read and write
16C00234000
direct allocation
page read and write
1D0F5180000
heap
page readonly
1CFA3290000
heap
page read and write
225E691B000
heap
page read and write
225E1DD3000
heap
page read and write
1CFA679D000
heap
page read and write
225E68CF000
heap
page read and write
3F1000A0C000
trusted library allocation
page read and write
225E6834000
heap
page read and write
24EAC48E000
heap
page read and write
24EAC489000
heap
page read and write
24EAEF08000
heap
page read and write
1CFA66D0000
heap
page read and write
24EAF050000
heap
page read and write
225E1E50000
heap
page read and write
3F1000884000
trusted library allocation
page read and write
7FF713EBD000
unkown
page readonly
47E4001A5000
trusted library allocation
page read and write
12693FE3000
heap
page read and write
1CFA67DF000
heap
page read and write
2199C12A000
heap
page read and write
225E62A1000
heap
page read and write
1CFA3489000
heap
page read and write
3F100028B000
trusted library allocation
page read and write
24EAC000000
heap
page read and write
1CFA65A5000
heap
page read and write
3F1000488000
trusted library allocation
page read and write
84C99FC000
stack
page read and write
225E680A000
heap
page read and write
225E3B67000
heap
page read and write
84CB1FE000
unkown
page readonly
2199C0F3000
heap
page read and write
225E635E000
heap
page read and write
7AF400280000
trusted library allocation
page read and write
24EAC4C9000
heap
page read and write
12693BD9000
heap
page read and write
24EAA6FB000
heap
page read and write
225E3BD4000
heap
page read and write
24EAC4DA000
heap
page read and write
2199DF23000
heap
page read and write
225E68A5000
heap
page read and write
7FF630D2D000
unkown
page write copy
225E68AB000
heap
page read and write
69B000258000
trusted library allocation
page read and write
24EAEF25000
heap
page read and write
7FF713EBE000
unkown
page readonly
24EAA73E000
heap
page read and write
47E4001D8000
trusted library allocation
page read and write
84E11FE000
unkown
page readonly
3F1000D60000
trusted library allocation
page read and write
24EAC49C000
heap
page read and write
2199C130000
heap
page read and write
12693BF2000
heap
page read and write
84DF9FD000
stack
page read and write
24EAA648000
heap
page read and write
3F10005EC000
trusted library allocation
page read and write
210FE802000
heap
page read and write
3F1000528000
trusted library allocation
page read and write
12691DDD000
heap
page read and write
1CFA67DF000
heap
page read and write
225E1EB7000
heap
page read and write
C7AA4FD000
stack
page read and write
24EAC4D0000
heap
page read and write
84CA9FA000
stack
page read and write
225E67C9000
heap
page read and write
12693E9E000
heap
page read and write
84D19FC000
stack
page read and write
7FF695AC3000
unkown
page read and write
24EAF084000
heap
page read and write
44951FB000
stack
page read and write
225E6927000
heap
page read and write
12693F9E000
heap
page read and write
24EAEFB2000
heap
page read and write
24EAEE50000
heap
page read and write
225E1E04000
heap
page read and write
144002C4000
direct allocation
page read and write
12693F14000
heap
page read and write
8DFCDFB000
stack
page read and write
225E6361000
heap
page read and write
652000058000
trusted library allocation
page read and write
1CFA6597000
heap
page read and write
3F1000910000
trusted library allocation
page read and write
3F1000288000
trusted library allocation
page read and write
23D476D0000
remote allocation
page read and write
1CFA18A3000
heap
page read and write
225E3BBC000
heap
page read and write
1CFA18AD000
heap
page read and write
225E6332000
heap
page read and write
12693F44000
heap
page read and write
1E49D9B0000
heap
page read and write
7FF713E58000
unkown
page read and write
7FF695AA8000
unkown
page write copy
1CFA3476000
heap
page read and write
1CFA659D000
heap
page read and write
12693C03000
heap
page read and write
23C80020C000
trusted library allocation
page read and write
210FE789000
unclassified section
page read and write
7AF4002B4000
trusted library allocation
page read and write
1CFA65A5000
heap
page read and write
84D21FE000
unkown
page readonly
1CFA3461000
heap
page read and write
5A64002B8000
trusted library allocation
page read and write
38340027C000
trusted library allocation
page read and write
2199C127000
heap
page read and write
1CFA65A5000
heap
page read and write
84BF9FE000
stack
page read and write
5DC0030B000
direct allocation
page read and write
1CFA343D000
heap
page read and write
24EAC4CB000
heap
page read and write
12696867000
heap
page read and write
23F000274000
trusted library allocation
page read and write
7AF400334000
trusted library allocation
page read and write
225E3BB5000
heap
page read and write
144002A8000
direct allocation
page read and write
12693C3F000
heap
page read and write
225E3B86000
heap
page read and write
84D31FE000
unkown
page readonly
1440029C000
direct allocation
page read and write
225E67D4000
heap
page read and write
225E1E04000
heap
page read and write
383400201000
trusted library allocation
page read and write
1CFA346A000
heap
page read and write
24EAEE51000
heap
page read and write
12693E7A000
heap
page read and write
47E400050000
trusted library allocation
page read and write
1CFA655B000
heap
page read and write
225E68A5000
heap
page read and write
3F1000F04000
trusted library allocation
page read and write
225E62ED000
heap
page read and write
225E692B000
heap
page read and write
225E3BBC000
heap
page read and write
2199C045000
heap
page read and write
12693C2E000
heap
page read and write
47E400124000
trusted library allocation
page read and write
47E400116000
trusted library allocation
page read and write
3F100096C000
trusted library allocation
page read and write
3F100020C000
trusted library allocation
page read and write
16C0028C000
direct allocation
page read and write
1CFA6645000
heap
page read and write
38340028C000
trusted library allocation
page read and write
3F1000EB5000
trusted library allocation
page read and write
24EAC4C5000
heap
page read and write
B897FE000
stack
page read and write
12693EE5000
heap
page read and write
24EAEEBF000
heap
page read and write
225E3B5A000
heap
page read and write
B8E9BFE000
unkown
page readonly
24EAC4DB000
heap
page read and write
3F1000F08000
trusted library allocation
page read and write
12691DDB000
heap
page read and write
24EAEFA8000
heap
page read and write
2199C158000
heap
page read and write
2BF8002E8000
trusted library allocation
page read and write
1CFA6553000
heap
page read and write
3F1000300000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
225E699A000
heap
page read and write
2199DF56000
heap
page read and write
24EAC4D8000
heap
page read and write
1CFA55F6000
heap
page read and write
24EAA690000
heap
page read and write
1CFA679D000
heap
page read and write
34DC0025C000
trusted library allocation
page read and write
3F1000054000
trusted library allocation
page read and write
3F10000CC000
trusted library allocation
page read and write
1CFA6711000
heap
page read and write
3F10004BC000
trusted library allocation
page read and write
5628002A4000
trusted library allocation
page read and write
1CFA65A0000
heap
page read and write
2BF8002B8000
trusted library allocation
page read and write
5A640025C000
trusted library allocation
page read and write
3F1000B74000
trusted library allocation
page read and write
24EAF0D2000
heap
page read and write
2199C0A4000
heap
page read and write
3F1000EC4000
trusted library allocation
page read and write
12696867000
heap
page read and write
694C0028C000
trusted library allocation
page read and write
23C800211000
trusted library allocation
page read and write
12694032000
heap
page read and write
24EAA6E2000
heap
page read and write
84CF9FD000
stack
page read and write
225E3B87000
heap
page read and write
1CFA3C9B000
heap
page read and write
1D0F5269000
heap
page read and write
2199C131000
heap
page read and write
7FF695880000
unkown
page readonly
2199DF3F000
heap
page read and write
1D082670000
heap
page read and write
225E3B9E000
heap
page read and write
B8E73FE000
stack
page read and write
210FE81B000
heap
page read and write
23F000114000
trusted library allocation
page read and write
12693EC9000
heap
page read and write
47E400169000
trusted library allocation
page read and write
12691DDB000
heap
page read and write
1CFA1873000
heap
page read and write
219A1562000
trusted library allocation
page read and write
225E680C000
heap
page read and write
34DC002E8000
trusted library allocation
page read and write
1D0825A7000
unclassified section
page read and write
2199DF02000
heap
page read and write
24EAEFA8000
heap
page read and write
3F100036C000
trusted library allocation
page read and write
12693FF6000
heap
page read and write
5D6800418000
trusted library allocation
page read and write
5D6800254000
trusted library allocation
page read and write
3F1000CE4000
trusted library allocation
page read and write
5DC002B4000
direct allocation
page read and write
5D6800211000
trusted library allocation
page read and write
225E698A000
heap
page read and write
84CF1FE000
unkown
page readonly
3F1000AEC000
trusted library allocation
page read and write
24EAA68A000
heap
page read and write
12693C07000
heap
page read and write
24EAC48C000
heap
page read and write
23F000038000
trusted library allocation
page read and write
1D0F526D000
heap
page read and write
225E62A1000
heap
page read and write
54DC00274000
direct allocation
page read and write
14400244000
direct allocation
page read and write
23F000001000
trusted library allocation
page read and write
449E9FE000
unkown
page readonly
1CFA347E000
heap
page read and write
3F1000B64000
trusted library allocation
page read and write
694C00408000
trusted library allocation
page read and write
7AF400404000
trusted library allocation
page read and write
1D22D041000
heap
page read and write
2BF800294000
trusted library allocation
page read and write
225E67D7000
heap
page read and write
1E49F602000
heap
page read and write
3F1000A7C000
trusted library allocation
page read and write
1CFA653F000
heap
page read and write
84D91FE000
unkown
page readonly
1CFA65B4000
heap
page read and write
3F1000A24000
trusted library allocation
page read and write
24EAC495000
heap
page read and write
23F000168000
trusted library allocation
page read and write
24EAEF17000
heap
page read and write
7FF630CC8000
unkown
page read and write
225E680A000
heap
page read and write
225E6845000
heap
page read and write
2199C127000
heap
page read and write
1CFA33FB000
heap
page read and write
144002AC000
direct allocation
page read and write
16C00280000
direct allocation
page read and write
24EAEF2F000
heap
page read and write
24EAC4FA000
heap
page read and write
2199DF56000
heap
page read and write
12691DE4000
heap
page read and write
12693EF1000
heap
page read and write
3F100040C000
trusted library allocation
page read and write
38340026C000
trusted library allocation
page read and write
1CFA344C000
heap
page read and write
1CFA192C000
heap
page read and write
2BF8002C0000
trusted library allocation
page read and write
449C1FD000
stack
page read and write
1CFA190D000
heap
page read and write
12693810000
heap
page read and write
3F1000E18000
trusted library allocation
page read and write
24EAEEC8000
heap
page read and write
225E691F000
heap
page read and write
24EAEFEB000
heap
page read and write
1CFA34C3000
heap
page read and write
3F100049A000
trusted library allocation
page read and write
16C0024C000
direct allocation
page read and write
75A00029C000
direct allocation
page read and write
24EAEF63000
heap
page read and write
7AF400361000
trusted library allocation
page read and write
24EAEE9D000
heap
page read and write
12693F41000
heap
page read and write
694C002C4000
trusted library allocation
page read and write
225E686F000
heap
page read and write
3F100008B000
trusted library allocation
page read and write
34DC00254000
trusted library allocation
page read and write
69B000298000
trusted library allocation
page read and write
1D0F5257000
heap
page read and write
84EA9FE000
stack
page read and write
47E400028000
trusted library allocation
page read and write
23F0001B0000
trusted library allocation
page read and write
1CFA65BE000
heap
page read and write
1CFA6610000
heap
page read and write
1CFA343A000
heap
page read and write
1D231A02000
heap
page read and write
225E3B9C000
heap
page read and write
54DC002D4000
direct allocation
page read and write
AA22CFE000
stack
page read and write
225E3B49000
heap
page read and write
225E3B9C000
heap
page read and write
24EAEFAE000
heap
page read and write
12693F69000
heap
page read and write
1D0F5200000
heap
page read and write
126968C4000
heap
page read and write
23F0000CC000
trusted library allocation
page read and write
44989FE000
unkown
page readonly
24EAEF2F000
heap
page read and write
12696834000
heap
page read and write
14400210000
direct allocation
page read and write
12693C09000
heap
page read and write
225E1E27000
heap
page read and write
219A120D000
heap
page read and write
12693640000
heap
page read and write
7AF400354000
trusted library allocation
page read and write
225E1E0A000
heap
page read and write
1D082602000
heap
page read and write
24EAEF43000
heap
page read and write
225E1DBD000
heap
page read and write
225E1E17000
heap
page read and write
2199C12F000
heap
page read and write
3F1000E71000
trusted library allocation
page read and write
225E693D000
heap
page read and write
225E6973000
heap
page read and write
24EAA684000
heap
page read and write
12691D43000
heap
page read and write
3F1000C9C000
trusted library allocation
page read and write
2199C129000
heap
page read and write
225E68A7000
heap
page read and write
1CFA3468000
heap
page read and write
225E3AE0000
heap
page read and write
12693FFB000
heap
page read and write
6520000E0000
trusted library allocation
page read and write
24EAEEEE000
heap
page read and write
1CFA18EA000
heap
page read and write
23F00012C000
trusted library allocation
page read and write
5D68002E0000
trusted library allocation
page read and write
3F1000280000
trusted library allocation
page read and write
225E67F0000
heap
page read and write
2199C12A000
heap
page read and write
562800220000
trusted library allocation
page read and write
652000094000
trusted library allocation
page read and write
1CFA32D0000
heap
page read and write
16C002AC000
direct allocation
page read and write
191D9445000
heap
page read and write
24EAC49F000
heap
page read and write
3508DFC000
stack
page read and write
84EB1FE000
unkown
page readonly
225E3B8E000
heap
page read and write
1CFA65D8000
heap
page read and write
34DC0028C000
trusted library allocation
page read and write
24EAEEEB000
heap
page read and write
8D82FFE000
stack
page read and write
54DC00220000
direct allocation
page read and write
12693C47000
heap
page read and write
3F100038B000
trusted library allocation
page read and write
47E4001E9000
trusted library allocation
page read and write
694C0029C000
trusted library allocation
page read and write
3F1000DC0000
trusted library allocation
page read and write
12693FCC000
heap
page read and write
B8F13FC000
stack
page read and write
7FF630C7D000
unkown
page readonly
1D08256F000
trusted library allocation
page read and write
23C800244000
trusted library allocation
page read and write
5DC0031F000
direct allocation
page read and write
24EAC501000
heap
page read and write
23F0001C4000
trusted library allocation
page read and write
12693BC7000
heap
page read and write
7AF4002FC000
trusted library allocation
page read and write
7FF713E58000
unkown
page read and write
23C800260000
trusted library allocation
page read and write
12691E6F000
heap
page read and write
84DF1FE000
unkown
page readonly
12693F33000
heap
page read and write
3F1000A01000
trusted library allocation
page read and write
2199C0F0000
heap
page read and write
21082DD0000
unclassified section
page read and write
210FE750000
heap
page read and write
47E40000C000
trusted library allocation
page read and write
3F1000829000
trusted library allocation
page read and write
24EAEE76000
heap
page read and write
3F1000AE4000
trusted library allocation
page read and write
84C29FC000
stack
page read and write
23F0000C5000
trusted library allocation
page read and write
24EAF033000
heap
page read and write
12691DC3000
heap
page read and write
24EAA69A000
heap
page read and write
3F1000EE4000
trusted library allocation
page read and write
3F10008D0000
trusted library allocation
page read and write
3F1000BC0000
trusted library allocation
page read and write
1CFA66F1000
heap
page read and write
24EAEEE2000
heap
page read and write
12691D88000
heap
page read and write
12696878000
heap
page read and write
2BF8002F8000
trusted library allocation
page read and write
16C00240000
direct allocation
page read and write
2199C0F0000
heap
page read and write
12691E64000
heap
page read and write
2199DF2C000
heap
page read and write
1CFA6598000
heap
page read and write
7FF630D1F000
unkown
page read and write
1CFA192A000
heap
page read and write
8DFEDFE000
stack
page read and write
7AF400418000
trusted library allocation
page read and write
5A6400288000
trusted library allocation
page read and write
23737FE000
stack
page read and write
24EAEEA3000
heap
page read and write
5A6400258000
trusted library allocation
page read and write
3F1000396000
trusted library allocation
page read and write
225E3BB3000
heap
page read and write
1CFA6722000
heap
page read and write
3F10008B0000
trusted library allocation
page read and write
3F1000248000
trusted library allocation
page read and write
1CFA6610000
heap
page read and write
2199C12A000
heap
page read and write
24EAEE9C000
heap
page read and write
7FF713E60000
unkown
page read and write
225E3B6E000
heap
page read and write
12691E38000
heap
page read and write
24EAC4B4000
heap
page read and write
3F1000538000
trusted library allocation
page read and write
12693FFB000
heap
page read and write
225E1EB9000
heap
page read and write
23C8002C4000
trusted library allocation
page read and write
694C00230000
trusted library allocation
page read and write
562800264000
trusted library allocation
page read and write
225E67CB000
heap
page read and write
1CFA3461000
heap
page read and write
3F10005EC000
trusted library allocation
page read and write
84C51FE000
unkown
page readonly
225E57E0000
trusted library allocation
page read and write
12693F08000
heap
page read and write
24EAC4A1000
heap
page read and write
7FF695A70000
unkown
page readonly
24EAC600000
heap
page read and write
12693F2A000
heap
page read and write
694C002B4000
trusted library allocation
page read and write
225E3B87000
heap
page read and write
225E1E21000
heap
page read and write
12691DC9000
heap
page read and write
84E01FE000
unkown
page readonly
5DC0021C000
direct allocation
page read and write
23C800250000
trusted library allocation
page read and write
12693BFD000
heap
page read and write
3F1000C34000
trusted library allocation
page read and write
23F000130000
trusted library allocation
page read and write
24EAA733000
heap
page read and write
23D47700000
heap
page read and write
5D68002B8000
trusted library allocation
page read and write
225E1D20000
heap
page read and write
225E1DD6000
heap
page read and write
1CFA659E000
heap
page read and write
1CFA6774000
heap
page read and write
3F1000DD0000
trusted library allocation
page read and write
54DC002CC000
direct allocation
page read and write
225E6830000
heap
page read and write
1CFA1895000
heap
page read and write
54DC00288000
direct allocation
page read and write
1CFA6680000
heap
page read and write
5DC00212000
direct allocation
page read and write
23F00025C000
trusted library allocation
page read and write
225E68AB000
heap
page read and write
2199DF66000
heap
page read and write
24EAEF29000
heap
page read and write
12693E60000
heap
page read and write
5DC00308000
direct allocation
page read and write
219A1302000
heap
page read and write
12693F3D000
heap
page read and write
23C800418000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
12693C0E000
heap
page read and write
2BF800270000
trusted library allocation
page read and write
1CFA3452000
heap
page read and write
12693C15000
heap
page read and write
225E6913000
heap
page read and write
54DC002DC000
direct allocation
page read and write
3F1000858000
trusted library allocation
page read and write
23F000188000
trusted library allocation
page read and write
7AF4002F0000
trusted library allocation
page read and write
225E3BAD000
heap
page read and write
1CFA33F7000
heap
page read and write
210FE813000
heap
page read and write
23736FE000
stack
page read and write
3F1000E50000
trusted library allocation
page read and write
225E1DC9000
heap
page read and write
12693EEA000
heap
page read and write
225E1E60000
heap
page read and write
5DC00268000
direct allocation
page read and write
2373AFE000
stack
page read and write
24EAC0C0000
heap
page read and write
35090FF000
stack
page read and write
12693F3F000
heap
page read and write
12693E85000
heap
page read and write
2BF8002D8000
trusted library allocation
page read and write
1CFA18B4000
heap
page read and write
24EAF051000
heap
page read and write
84CC1FE000
unkown
page readonly
2199C130000
heap
page read and write
2199C12F000
heap
page read and write
1D22D053000
heap
page read and write
24EAEF1B000
heap
page read and write
1CFA1896000
heap
page read and write
54DC00298000
direct allocation
page read and write
12691E32000
heap
page read and write
23F00001C000
trusted library allocation
page read and write
23F0001DC000
trusted library allocation
page read and write
5628002C4000
trusted library allocation
page read and write
54DC00254000
direct allocation
page read and write
225E3BCD000
heap
page read and write
23F0000E0000
trusted library allocation
page read and write
3F100080C000
trusted library allocation
page read and write
44981FC000
stack
page read and write
24EAC507000
heap
page read and write
AA22BFE000
stack
page read and write
24EAF062000
heap
page read and write
7AF400254000
trusted library allocation
page read and write
562800298000
trusted library allocation
page read and write
1CFA1893000
heap
page read and write
225E1EA0000
heap
page read and write
7AF400260000
trusted library allocation
page read and write
12693FF6000
heap
page read and write
225E68BE000
heap
page read and write
56280027C000
trusted library allocation
page read and write
2199C129000
heap
page read and write
12693FDE000
heap
page read and write
24EAC4A9000
heap
page read and write
1CFA1912000
heap
page read and write
3F10003EA000
trusted library allocation
page read and write
2199C134000
heap
page read and write
24EAA530000
heap
page read and write
69B000220000
trusted library allocation
page read and write
5D6800304000
trusted library allocation
page read and write
12696803000
heap
page read and write
47E4001B0000
trusted library allocation
page read and write
12691DEC000
heap
page read and write
47E40014C000
trusted library allocation
page read and write
225E6933000
heap
page read and write
1D0F523D000
heap
page read and write
12693F3E000
heap
page read and write
562800238000
trusted library allocation
page read and write
1CFA67DE000
heap
page read and write
12693ED6000
heap
page read and write
75A000270000
direct allocation
page read and write
3F100036C000
trusted library allocation
page read and write
1CFA67E1000
heap
page read and write
7AF4002B4000
trusted library allocation
page read and write
3F1000F62000
trusted library allocation
page read and write
24EAEE74000
heap
page read and write
2199DF13000
heap
page read and write
225E62DC000
heap
page read and write
3F1000B44000
trusted library allocation
page read and write
12696822000
heap
page read and write
12693FA2000
heap
page read and write
1CFA345E000
heap
page read and write
12693BE0000
heap
page read and write
1CFA3463000
heap
page read and write
3F1000DEF000
trusted library allocation
page read and write
1CFA65A1000
heap
page read and write
219A1202000
heap
page read and write
12693BF5000
heap
page read and write
23F000134000
trusted library allocation
page read and write
1CFA659C000
heap
page read and write
3F1000F54000
trusted library allocation
page read and write
C7A9DF4000
stack
page read and write
23F00022C000
trusted library allocation
page read and write
1CFA3418000
heap
page read and write
2BF800264000
trusted library allocation
page read and write
3F1000F7C000
trusted library allocation
page read and write
24EAC507000
heap
page read and write
12693C23000
heap
page read and write
1269689B000
heap
page read and write
3F1000DA8000
trusted library allocation
page read and write
24EAEEC4000
heap
page read and write
12693F2D000
heap
page read and write
225E3BD2000
heap
page read and write
65200001C000
trusted library allocation
page read and write
1CFA18B4000
heap
page read and write
12693C50000
heap
page read and write
5DC00380000
direct allocation
page read and write
24EAEF35000
heap
page read and write
1CFA6511000
heap
page read and write
34DC00201000
trusted library allocation
page read and write
3F1000DD4000
trusted library allocation
page read and write
12693BFD000
heap
page read and write
2373EFB000
stack
page read and write
35087B6000
stack
page read and write
3F10008E4000
trusted library allocation
page read and write
1D0F5245000
heap
page read and write
225E3750000
heap
page read and write
24EAC410000
heap
page read and write
225E3BB1000
heap
page read and write
23F000054000
trusted library allocation
page read and write
3F1000801000
trusted library allocation
page read and write
38340020C000
trusted library allocation
page read and write
1CFA6710000
heap
page read and write
2BF800404000
trusted library allocation
page read and write
5DC0023C000
direct allocation
page read and write
3F10009E4000
trusted library allocation
page read and write
1D0F5302000
heap
page read and write
1CFA31E0000
heap
page read and write
5D68002D4000
trusted library allocation
page read and write
3F1000C38000
trusted library allocation
page read and write
12693F2D000
heap
page read and write
1D22D01B000
heap
page read and write
225E6847000
heap
page read and write
56280023C000
trusted library allocation
page read and write
5DC00318000
direct allocation
page read and write
3F1000D98000
trusted library allocation
page read and write
3F1000594000
trusted library allocation
page read and write
5DC00358000
direct allocation
page read and write
225E3BAD000
heap
page read and write
12693F2A000
heap
page read and write
1D0F5050000
remote allocation
page read and write
2199BF60000
heap
page read and write
23F0001AC000
trusted library allocation
page read and write
225E6361000
heap
page read and write
8D817FE000
unkown
page readonly
5DC0030A000
direct allocation
page read and write
54DC00310000
direct allocation
page read and write
1CFA18FD000
heap
page read and write
24EAEFD1000
heap
page read and write
12691E44000
heap
page read and write
B827FE000
stack
page read and write
24EAEF08000
heap
page read and write
5DC0029C000
direct allocation
page read and write
1CFA18F9000
heap
page read and write
225E3BA4000
heap
page read and write
34DC00280000
trusted library allocation
page read and write
2199C12A000
heap
page read and write
2199DE02000
heap
page read and write
210FE82B000
heap
page read and write
562800298000
trusted library allocation
page read and write
24EAA714000
heap
page read and write
12693FE7000
heap
page read and write
12693F2D000
heap
page read and write
24EAA71E000
heap
page read and write
144002C8000
direct allocation
page read and write
12693FA1000
heap
page read and write
7AF400230000
trusted library allocation
page read and write
1CFA67AB000
heap
page read and write
24EAA6EF000
heap
page read and write
1CFA674C000
heap
page read and write
23C800310000
trusted library allocation
page read and write
7AF400350000
trusted library allocation
page read and write
3F1000DE4000
trusted library allocation
page read and write
12691E75000
heap
page read and write
65200000C000
trusted library allocation
page read and write
1CFA3461000
heap
page read and write
24EAEEEA000
heap
page read and write
24EAC48E000
heap
page read and write
225E634F000
heap
page read and write
1CFA1906000
heap
page read and write
3834002BC000
trusted library allocation
page read and write
24EAC4EB000
heap
page read and write
23F0000C8000
trusted library allocation
page read and write
24EAEFB6000
heap
page read and write
225E3B84000
heap
page read and write
2199C130000
heap
page read and write
3F1000F2C000
trusted library allocation
page read and write
694C002E0000
trusted library allocation
page read and write
3F1000001000
trusted library allocation
page read and write
12693C5B000
heap
page read and write
1CFA6703000
heap
page read and write
24EAA694000
heap
page read and write
23C8002F8000
trusted library allocation
page read and write
47E400024000
trusted library allocation
page read and write
7FF695B0D000
unkown
page write copy
24EAEF77000
heap
page read and write
12693C07000
heap
page read and write
1CFA67BF000
heap
page read and write
449F1FC000
stack
page read and write
1CFA343B000
heap
page read and write
2199C02B000
heap
page read and write
457E2CC000
stack
page read and write
5D6800404000
trusted library allocation
page read and write
3F100013C000
trusted library allocation
page read and write
2BF800274000
trusted library allocation
page read and write
225E62FE000
heap
page read and write
1E49DA00000
heap
page read and write
24EAA700000
heap
page read and write
1CFA6557000
heap
page read and write
1D22D102000
heap
page read and write
8D81FFC000
stack
page read and write
694C00334000
trusted library allocation
page read and write
7FF713EAE000
unkown
page read and write
23C800288000
trusted library allocation
page read and write
1269680A000
heap
page read and write
3F1000F44000
trusted library allocation
page read and write
23C80032B000
trusted library allocation
page read and write
1CFA66AC000
heap
page read and write
7AF400290000
trusted library allocation
page read and write
B8EA3FE000
stack
page read and write
1CFA1830000
heap
page read and write
5DC00288000
direct allocation
page read and write
3F1000D14000
trusted library allocation
page read and write
24EAF0E3000
heap
page read and write
84E19FD000
stack
page read and write
12691E7D000
heap
page read and write
225E67AD000
heap
page read and write
694C00310000
trusted library allocation
page read and write
24EAA69E000
heap
page read and write
3F1000A44000
trusted library allocation
page read and write
225E67DF000
heap
page read and write
3F1000BDC000
trusted library allocation
page read and write
1CFA6594000
heap
page read and write
225E692B000
heap
page read and write
23F00026C000
trusted library allocation
page read and write
24EAC4AC000
heap
page read and write
5A6400278000
trusted library allocation
page read and write
69B000248000
trusted library allocation
page read and write
44969FE000
unkown
page readonly
3F100022C000
trusted library allocation
page read and write
1D08266D000
heap
page read and write
24EAC4A1000
heap
page read and write
12694035000
heap
page read and write
3F1000244000
trusted library allocation
page read and write
225E1E96000
heap
page read and write
2BF8002B8000
trusted library allocation
page read and write
1CFA3459000
heap
page read and write
1CFA1893000
heap
page read and write
1CFA18A1000
heap
page read and write
225E67B4000
heap
page read and write
24EAEEA0000
heap
page read and write
3F1000A21000
trusted library allocation
page read and write
3F10005B8000
trusted library allocation
page read and write
12693ED3000
heap
page read and write
5DC00220000
direct allocation
page read and write
23C800334000
trusted library allocation
page read and write
12693BF2000
heap
page read and write
225E698A000
heap
page read and write
3F10005EC000
trusted library allocation
page read and write
225E686D000
heap
page read and write
24EAC4EE000
heap
page read and write
3F100080C000
trusted library allocation
page read and write
69B0002A0000
trusted library allocation
page read and write
16C002C0000
direct allocation
page read and write
3F1000D24000
trusted library allocation
page read and write
3F10008EC000
trusted library allocation
page read and write
225E68F2000
heap
page read and write
3F1000584000
trusted library allocation
page read and write
5DC002D4000
direct allocation
page read and write
23F000044000
trusted library allocation
page read and write
24EAC4DB000
heap
page read and write
B81FFE000
unkown
page readonly
5628002C0000
trusted library allocation
page read and write
1D0F5213000
heap
page read and write
B8F0BFE000
unkown
page readonly
5A64002C8000
trusted library allocation
page read and write
1CFA656E000
heap
page read and write
2199BFF0000
trusted library allocation
page read and write
1CFA18A0000
heap
page read and write
7FF630C7A000
unkown
page readonly
1D0F529A000
heap
page read and write
12693C5E000
heap
page read and write
562800302000
trusted library allocation
page read and write
1CFA6563000
heap
page read and write
24EAEFC4000
heap
page read and write
3F10000B9000
trusted library allocation
page read and write
2BF800288000
trusted library allocation
page read and write
12693F17000
heap
page read and write
B8E6BFE000
unkown
page readonly
225E3BCC000
heap
page read and write
12691DD5000
heap
page read and write
24EAA6E2000
heap
page read and write
1CFA3457000
heap
page read and write
1CFA673A000
heap
page read and write
24EAC4AE000
heap
page read and write
5D680040C000
trusted library allocation
page read and write
7FF630C90000
unkown
page readonly
2199C136000
heap
page read and write
5628002C0000
trusted library allocation
page read and write
12691DC9000
heap
page read and write
225E6838000
heap
page read and write
694C00404000
trusted library allocation
page read and write
24EAC4C4000
heap
page read and write
7AF40028C000
trusted library allocation
page read and write
3F10008B4000
trusted library allocation
page read and write
24EAF0E4000
heap
page read and write
1D082570000
trusted library allocation
page read and write
2199C0C7000
heap
page read and write
84E91FE000
unkown
page readonly
3F1000B80000
trusted library allocation
page read and write
3F1000C24000
trusted library allocation
page read and write
12696834000
heap
page read and write
12693F02000
heap
page read and write
23C800278000
trusted library allocation
page read and write
B8EE3FE000
stack
page read and write
225E68AB000
heap
page read and write
84C71FE000
unkown
page readonly
2199DF56000
heap
page read and write
84E29FE000
stack
page read and write
12693C24000
heap
page read and write
23C800424000
trusted library allocation
page read and write
12693C10000
heap
page read and write
694C00258000
trusted library allocation
page read and write
3F1000E0C000
trusted library allocation
page read and write
3F10003D8000
trusted library allocation
page read and write
12691E77000
heap
page read and write
12693E76000
heap
page read and write
12691DC3000
heap
page read and write
225E1DE4000
heap
page read and write
C7AA3FC000
stack
page read and write
225E67F8000
heap
page read and write
12693BEC000
heap
page read and write
84DE9FD000
stack
page read and write
1D22D105000
heap
page read and write
225E692B000
heap
page read and write
2199C12F000
heap
page read and write
47E400174000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
2199C013000
heap
page read and write
54DC00404000
direct allocation
page read and write
75A0002AC000
direct allocation
page read and write
5DC002C8000
direct allocation
page read and write
3F1000F60000
trusted library allocation
page read and write
12693EDA000
heap
page read and write
2199DF54000
heap
page read and write
1CFA659C000
heap
page read and write
1CFA348C000
heap
page read and write
84C91FE000
unkown
page readonly
47E4000FC000
trusted library allocation
page read and write
225E68F1000
heap
page read and write
1269381D000
heap
page read and write
24EAEEC9000
heap
page read and write
24EAEEC4000
heap
page read and write
24EAEEB2000
heap
page read and write
3F1000E4C000
trusted library allocation
page read and write
23F000201000
trusted library allocation
page read and write
24EAEEB4000
heap
page read and write
1CFA669A000
heap
page read and write
2199DF13000
heap
page read and write
23F000102000
trusted library allocation
page read and write
12691BD0000
heap
page read and write
2BF8002B0000
trusted library allocation
page read and write
12696823000
heap
page read and write
562800298000
trusted library allocation
page read and write
1E49F490000
heap
page read and write
225E67E4000
heap
page read and write
225E3BD6000
heap
page read and write
3F1000298000
trusted library allocation
page read and write
694C002F8000
trusted library allocation
page read and write
47E4001F0000
trusted library allocation
page read and write
23C8002D0000
trusted library allocation
page read and write
54DC002C0000
direct allocation
page read and write
12693C3D000
heap
page read and write
1D08263C000
heap
page read and write
3F10009DC000
trusted library allocation
page read and write
7FF713E0A000
unkown
page readonly
12693C07000
heap
page read and write
3508EFE000
stack
page read and write
1CFA1903000
heap
page read and write
84D01FE000
unkown
page readonly
84D71FE000
unkown
page readonly
75A000201000
direct allocation
page read and write
3F1000AC8000
trusted library allocation
page read and write
225E6872000
heap
page read and write
225E683C000
heap
page read and write
24EAA6D8000
heap
page read and write
225E3B72000
heap
page read and write
24EAC004000
heap
page read and write
1CFA1903000
heap
page read and write
B8EEBFE000
unkown
page readonly
126968C9000
heap
page read and write
225E6307000
heap
page read and write
225E67F4000
heap
page read and write
3F1000850000
trusted library allocation
page read and write
B8E83FE000
stack
page read and write
24EAF02F000
heap
page read and write
12691DD5000
heap
page read and write
24EAEFA8000
heap
page read and write
225E3B88000
heap
page read and write
B817FE000
stack
page read and write
2199C0E6000
heap
page read and write
24EAC4A1000
heap
page read and write
12691DD8000
heap
page read and write
1CFA18FF000
heap
page read and write
3F1000A54000
trusted library allocation
page read and write
12693EC3000
heap
page read and write
225E67EB000
heap
page read and write
23C800408000
trusted library allocation
page read and write
1D0F51E0000
trusted library allocation
page read and write
84CE9FD000
stack
page read and write
24EAA6F8000
heap
page read and write
47E400044000
trusted library allocation
page read and write
24EAF073000
heap
page read and write
12693FD5000
heap
page read and write
652000044000
trusted library allocation
page read and write
12694046000
heap
page read and write
1E49D9E0000
heap
page read and write
210FE800000
heap
page read and write
3F1000AC8000
trusted library allocation
page read and write
12691E2E000
heap
page read and write
1CFA66A2000
heap
page read and write
5DC00201000
direct allocation
page read and write
225E6844000
heap
page read and write
44921FF000
stack
page read and write
225E3B68000
heap
page read and write
23D476E2000
remote allocation
page execute read
12693C0D000
heap
page read and write
1CFA1915000
heap
page read and write
3F1000EEC000
trusted library allocation
page read and write
16C00298000
direct allocation
page read and write
225E67FD000
heap
page read and write
B8F3BFE000
unkown
page readonly
1CFA341D000
heap
page read and write
5D6800408000
trusted library allocation
page read and write
14400260000
direct allocation
page read and write
1CFA65A0000
heap
page read and write
3F1000AA4000
trusted library allocation
page read and write
3F1000928000
trusted library allocation
page read and write
3F10005E0000
trusted library allocation
page read and write
2199DF4B000
heap
page read and write
3F10005EC000
trusted library allocation
page read and write
12693C30000
heap
page read and write
24EAC48B000
heap
page read and write
2BF800278000
trusted library allocation
page read and write
1CFA6574000
heap
page read and write
1CFA3431000
heap
page read and write
3F100080C000
trusted library allocation
page read and write
12693F40000
heap
page read and write
2199C0EE000
heap
page read and write
12693FFB000
heap
page read and write
225E3B8C000
heap
page read and write
23740FE000
stack
page read and write
225E62B2000
heap
page read and write
84DE1FE000
unkown
page readonly
3F10000E8000
trusted library allocation
page read and write
12693FDC000
heap
page read and write
191D90B0000
heap
page read and write
24EAA722000
heap
page read and write
1CFA3479000
heap
page read and write
3F1000A39000
trusted library allocation
page read and write
1CFA65D8000
heap
page read and write
7AF40026C000
trusted library allocation
page read and write
2199DF37000
heap
page read and write
225E1E5C000
heap
page read and write
24EAC50E000
heap
page read and write
3F1000ED0000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
1D22CF50000
heap
page read and write
225E3BA1000
heap
page read and write
3F100049C000
trusted library allocation
page read and write
24EAC50A000
heap
page read and write
383400254000
trusted library allocation
page read and write
5DC00318000
direct allocation
page read and write
694C002EC000
trusted library allocation
page read and write
12693FE0000
heap
page read and write
24EAA698000
heap
page read and write
225E699A000
heap
page read and write
16C002C0000
direct allocation
page read and write
24EAC050000
heap
page read and write
5DC0027C000
direct allocation
page read and write
1CFA344C000
heap
page read and write
24EAA721000
heap
page read and write
84D11FE000
unkown
page readonly
225E62B3000
heap
page read and write
3F10001B4000
trusted library allocation
page read and write
1CFA67AA000
heap
page read and write
3F10000D8000
trusted library allocation
page read and write
225E3BB3000
heap
page read and write
210FEC05000
heap
page read and write
8DFDDFE000
stack
page read and write
24EAC4CD000
heap
page read and write
24EAC4B4000
heap
page read and write
14400220000
direct allocation
page read and write
B84FFE000
unkown
page readonly
23F0001C8000
trusted library allocation
page read and write
225E6805000
heap
page read and write
24EAEFFA000
heap
page read and write
84EC1FE000
unkown
page readonly
24EAA6EB000
heap
page read and write
225E635B000
heap
page read and write
3F1000838000
trusted library allocation
page read and write
69B000201000
trusted library allocation
page read and write
3F1000E38000
trusted library allocation
page read and write
7FF713E0A000
unkown
page readonly
225E681D000
heap
page read and write
24EAC4D4000
heap
page read and write
24EAA640000
heap
page read and write
5D680031C000
trusted library allocation
page read and write
3F1000984000
trusted library allocation
page read and write
5D6800201000
trusted library allocation
page read and write
84EB9FE000
stack
page read and write
1CFA55F0000
heap
page read and write
44961FC000
stack
page read and write
24EAC498000
heap
page read and write
225E6840000
heap
page read and write
24EAF062000
heap
page read and write
694C002D0000
trusted library allocation
page read and write
69B0002B0000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
225E68A6000
heap
page read and write
5DC00254000
direct allocation
page read and write
225E1E96000
heap
page read and write
B8E93FE000
stack
page read and write
3F1000184000
trusted library allocation
page read and write
24EAF0A4000
heap
page read and write
84E49FE000
stack
page read and write
24EAF005000
heap
page read and write
5DC00368000
direct allocation
page read and write
2199DF56000
heap
page read and write
2199DF13000
heap
page read and write
225E3B81000
heap
page read and write
12691DEB000
heap
page read and write
5A6400240000
trusted library allocation
page read and write
225E6352000
heap
page read and write
2199DF56000
heap
page read and write
225E67A1000
heap
page read and write
12693FF1000
heap
page read and write
24EAEE53000
heap
page read and write
23F0001CD000
trusted library allocation
page read and write
210FE7D0000
trusted library allocation
page read and write
54DC00244000
direct allocation
page read and write
225E6823000
heap
page read and write
12693FDB000
heap
page read and write
5A6400268000
trusted library allocation
page read and write
84BE9FE000
stack
page read and write
B8EABFE000
unkown
page readonly
3F1000DB6000
trusted library allocation
page read and write
B8F33FD000
stack
page read and write
47E400220000
trusted library allocation
page read and write
34DC00290000
trusted library allocation
page read and write
449A9FE000
unkown
page readonly
1CFA66CC000
heap
page read and write
3F1000BEC000
trusted library allocation
page read and write
1CFA1924000
heap
page read and write
75A000284000
direct allocation
page read and write
12693E73000
heap
page read and write
12691E4E000
heap
page read and write
2199C130000
heap
page read and write
225E686C000
heap
page read and write
225E6313000
heap
page read and write
7FF695B0D000
unkown
page readonly
5DC00316000
direct allocation
page read and write
12693F9C000
heap
page read and write
AA22EFE000
stack
page read and write
23F00024C000
trusted library allocation
page read and write
24EAEF16000
heap
page read and write
34DC0020D000
trusted library allocation
page read and write
24EAC4CC000
heap
page read and write
3F1000B0C000
trusted library allocation
page read and write
84C79FE000
stack
page read and write
225E3B4C000
heap
page read and write
69B000254000
trusted library allocation
page read and write
24EAC4C9000
heap
page read and write
383400220000
trusted library allocation
page read and write
1CFA6650000
heap
page read and write
24EAA70E000
heap
page read and write
7FF695A5A000
unkown
page readonly
47E400150000
trusted library allocation
page read and write
1CFA6766000
heap
page read and write
24EAC4B8000
heap
page read and write
12691E25000
heap
page read and write
144002DC000
direct allocation
page read and write
12693FF6000
heap
page read and write
69B000240000
trusted library allocation
page read and write
12693BC9000
heap
page read and write
1CFA65AE000
heap
page read and write
225E3BC8000
heap
page read and write
B8E63FE000
stack
page read and write
2199DF13000
heap
page read and write
54DC00230000
direct allocation
page read and write
24EAA691000
heap
page read and write
12693BDD000
heap
page read and write
2199BF90000
heap
page readonly
1CFA6639000
heap
page read and write
75A0002B0000
direct allocation
page read and write
225E62DC000
heap
page read and write
24EAEFBF000
heap
page read and write
5628002C0000
trusted library allocation
page read and write
225E3BB3000
heap
page read and write
225E6804000
heap
page read and write
3F1000D18000
trusted library allocation
page read and write
210FE708000
remote allocation
page execute read
1D22CFA0000
trusted library allocation
page read and write
47E4000FC000
trusted library allocation
page read and write
383400280000
trusted library allocation
page read and write
12693C25000
heap
page read and write
5A640027C000
trusted library allocation
page read and write
1CFA6576000
heap
page read and write
2199C0DC000
heap
page read and write
12693C29000
heap
page read and write
3F10009C0000
trusted library allocation
page read and write
1CFA6622000
heap
page read and write
3F10009EC000
trusted library allocation
page read and write
23F0000D8000
trusted library allocation
page read and write
225E3BBC000
heap
page read and write
5DC002D4000
direct allocation
page read and write
1CFA654C000
heap
page read and write
2199DF23000
heap
page read and write
2199DF56000
heap
page read and write
24EAA6F2000
heap
page read and write
3F10004A7000
trusted library allocation
page read and write
126968D0000
heap
page read and write
1269680A000
heap
page read and write
47E4000D4000
trusted library allocation
page read and write
24EAF051000
heap
page read and write
652000028000
trusted library allocation
page read and write
24EAC4DD000
heap
page read and write
7AF40020C000
trusted library allocation
page read and write
1D22CF80000
heap
page read and write
2199DF13000
heap
page read and write
24EAEFEC000
heap
page read and write
3F1000382000
trusted library allocation
page read and write
225E68A6000
heap
page read and write
225E3BA4000
heap
page read and write
12696812000
heap
page read and write
12693C31000
heap
page read and write
5DC002EC000
direct allocation
page read and write
225E3B61000
heap
page read and write
225E685D000
heap
page read and write
126967F1000
heap
page read and write
12693EAF000
heap
page read and write
7FFA5DA60000
direct allocation
page execute read
12693C0F000
heap
page read and write
47E400201000
trusted library allocation
page read and write
7FF713E58000
unkown
page write copy
34DC0027C000
trusted library allocation
page read and write
1CFA6642000
heap
page read and write
24EAF03B000
heap
page read and write
652000114000
trusted library allocation
page read and write
24EAA6A2000
heap
page read and write
12691E25000
heap
page read and write
24EAC4ED000
heap
page read and write
12691E7D000
heap
page read and write
1CFA3435000
heap
page read and write
34DC00230000
trusted library allocation
page read and write
225E3BD7000
heap
page read and write
23C80033C000
trusted library allocation
page read and write
1E49DB02000
heap
page read and write
457E3CE000
stack
page read and write
1CFA65BA000
heap
page read and write
225E6840000
heap
page read and write
5DC00308000
direct allocation
page read and write
12693C35000
heap
page read and write
84DB9FB000
stack
page read and write
1D22D05C000
heap
page read and write
3F100012C000
trusted library allocation
page read and write
7AF400220000
trusted library allocation
page read and write
1CFA674C000
heap
page read and write
24EAEE75000
heap
page read and write
1CFA3465000
heap
page read and write
3F1000422000
trusted library allocation
page read and write
1CFA3481000
heap
page read and write
1D0F5070000
heap
page read and write
1CFA65C4000
heap
page read and write
24EAEF11000
heap
page read and write
225E634F000
heap
page read and write
5DC00303000
direct allocation
page read and write
23F000060000
trusted library allocation
page read and write
1CFA6510000
heap
page read and write
2199C0E9000
heap
page read and write
12693F52000
heap
page read and write
47E4000D8000
trusted library allocation
page read and write
1CFA346C000
heap
page read and write
3F1000CCA000
trusted library allocation
page read and write
1CFA3461000
heap
page read and write
1CFA66E8000
heap
page read and write
7FF713EAF000
unkown
page read and write
225E62CA000
heap
page read and write
16C002D8000
direct allocation
page read and write
5A64002B0000
trusted library allocation
page read and write
14400270000
direct allocation
page read and write
1CFA669F000
heap
page read and write
2BF800308000
trusted library allocation
page read and write
44959FE000
unkown
page readonly
24EAC4CD000
heap
page read and write
1D22D02B000
heap
page read and write
2199BF80000
heap
page read and write
12696812000
heap
page read and write
84CB9FD000
stack
page read and write
1CFA656D000
heap
page read and write
23F00020C000
trusted library allocation
page read and write
1CFA659C000
heap
page read and write
1CFA6565000
heap
page read and write
1CFA18B8000
heap
page read and write
8D837FE000
unkown
page readonly
75A000244000
direct allocation
page read and write
225E1DB0000
heap
page read and write
34DC002B4000
trusted library allocation
page read and write
3F1000B9C000
trusted library allocation
page read and write
562800201000
trusted library allocation
page read and write
652000080000
trusted library allocation
page read and write
225E1E06000
heap
page read and write
1CFA66F0000
heap
page read and write
225E67EF000
heap
page read and write
B8EFBFE000
unkown
page readonly
1E49D9C0000
heap
page readonly
24EAA6EE000
heap
page read and write
1CFA1850000
heap
page read and write
16C002A4000
direct allocation
page read and write
225E1E10000
heap
page read and write
2BF800230000
trusted library allocation
page read and write
12693EA7000
heap
page read and write
23F000198000
trusted library allocation
page read and write
225E689A000
heap
page read and write
12693F28000
heap
page read and write
1CFA1942000
heap
page read and write
1CFA1924000
heap
page read and write
5DC0028C000
direct allocation
page read and write
24EAEF30000
heap
page read and write
75A000234000
direct allocation
page read and write
6520000CC000
trusted library allocation
page read and write
2373DFD000
stack
page read and write
225E3BAD000
heap
page read and write
84D39FE000
stack
page read and write
7FF630CD6000
unkown
page read and write
225E6812000
heap
page read and write
12693F2D000
heap
page read and write
12693F42000
heap
page read and write
1CFA18A0000
heap
page read and write
2373CFE000
stack
page read and write
24EAC479000
heap
page read and write
3F1000C58000
trusted library allocation
page read and write
1CFA3470000
heap
page read and write
23F000138000
trusted library allocation
page read and write
3F10002F0000
trusted library allocation
page read and write
12693F58000
heap
page read and write
24EAEEA7000
heap
page read and write
12693F9C000
heap
page read and write
1CFA18A5000
heap
page read and write
225E62EA000
heap
page read and write
5DC00230000
direct allocation
page read and write
B8F03FE000
stack
page read and write
12693E76000
heap
page read and write
225E67A0000
heap
page read and write
23F000170000
trusted library allocation
page read and write
225E6849000
heap
page read and write
2BF800250000
trusted library allocation
page read and write
3F1000C0C000
trusted library allocation
page read and write
12691D80000
heap
page read and write
3F10005EC000
trusted library allocation
page read and write
12696878000
heap
page read and write
2199DDD0000
trusted library section
page readonly
225E3BCA000
heap
page read and write
24EAEFD5000
heap
page read and write
1CFA6614000
heap
page read and write
2199DF13000
heap
page read and write
12693FC4000
heap
page read and write
652000054000
trusted library allocation
page read and write
24EAC4B4000
heap
page read and write
225E3B77000
heap
page read and write
24EAEFB4000
heap
page read and write
1CFA674C000
heap
page read and write
12696834000
heap
page read and write
1CFA656D000
heap
page read and write
225E68AB000
heap
page read and write
5A640029C000
trusted library allocation
page read and write
562800298000
trusted library allocation
page read and write
225E1E50000
heap
page read and write
1CFA6534000
heap
page read and write
1D22D059000
heap
page read and write
24EAA69E000
heap
page read and write
24EAEFAF000
heap
page read and write
B8EDBFE000
unkown
page readonly
12693BCD000
heap
page read and write
1CFA6787000
heap
page read and write
7AF400304000
trusted library allocation
page read and write
23C80023C000
trusted library allocation
page read and write
1D0F51C0000
heap
page read and write
5DC00298000
direct allocation
page read and write
5DC00328000
direct allocation
page read and write
47E4000C1000
trusted library allocation
page read and write
12693EE7000
heap
page read and write
1D08257F000
trusted library allocation
page read and write
12691E6F000
heap
page read and write
225E6857000
heap
page read and write
1269688A000
heap
page read and write
225E1D30000
heap
page read and write
54DC0023C000
direct allocation
page read and write
3F1000024000
trusted library allocation
page read and write
1CFA3477000
heap
page read and write
225E67CC000
heap
page read and write
84E51FE000
unkown
page readonly
3F1000020000
trusted library allocation
page read and write
12693EF9000
heap
page read and write
225E3BCA000
heap
page read and write
3508AFE000
stack
page read and write
3F1000070000
trusted library allocation
page read and write
24EAC483000
heap
page read and write
12693C49000
heap
page read and write
5628002AC000
trusted library allocation
page read and write
562800254000
trusted library allocation
page read and write
24EAF0A5000
heap
page read and write
75A000220000
direct allocation
page read and write
5DC00325000
direct allocation
page read and write
5DC002DC000
direct allocation
page read and write
5DC002B0000
direct allocation
page read and write
23F00021C000
trusted library allocation
page read and write
44901FC000
stack
page read and write
225E3BD4000
heap
page read and write
8D80FFE000
stack
page read and write
3F1000A26000
trusted library allocation
page read and write
3F100006A000
trusted library allocation
page read and write
12691DD9000
heap
page read and write
1D08267D000
heap
page read and write
23F00011C000
trusted library allocation
page read and write
225E1E0A000
heap
page read and write
562800268000
trusted library allocation
page read and write
1CFA346A000
heap
page read and write
47E4000C4000
trusted library allocation
page read and write
126968DB000
heap
page read and write
225E67FD000
heap
page read and write
3F1000D44000
trusted library allocation
page read and write
12693BE1000
heap
page read and write
694C0027C000
trusted library allocation
page read and write
84CD1FE000
unkown
page readonly
1CFA678E000
heap
page read and write
1CFA3409000
heap
page read and write
7FF695A6D000
unkown
page readonly
1CFA345E000
heap
page read and write
23F000160000
trusted library allocation
page read and write
225E3BD6000
heap
page read and write
7FF630AA0000
unkown
page readonly
3F1000D50000
trusted library allocation
page read and write
5628002C0000
trusted library allocation
page read and write
3F10001E8000
trusted library allocation
page read and write
24EAEF31000
heap
page read and write
3F1000F49000
trusted library allocation
page read and write
1D22D002000
heap
page read and write
24EAEE8B000
heap
page read and write
2199DF56000
heap
page read and write
1CFA67AA000
heap
page read and write
24EAA6EC000
heap
page read and write
225E3BAB000
heap
page read and write
24EAC4B4000
heap
page read and write
225E3BE0000
heap
page read and write
12693FE0000
heap
page read and write
1CFA194E000
heap
page read and write
12696802000
heap
page read and write
12696893000
heap
page read and write
225E682C000
heap
page read and write
23F0000DB000
trusted library allocation
page read and write
1CFA6706000
heap
page read and write
225E1E1F000
heap
page read and write
225E1DB4000
heap
page read and write
191DADA0000
heap
page read and write
3F1000A39000
trusted library allocation
page read and write
1CFA1909000
heap
page read and write
126968C1000
heap
page read and write
24EAEEE2000
heap
page read and write
3F1000381000
trusted library allocation
page read and write
3508BFE000
stack
page read and write
23C800230000
trusted library allocation
page read and write
5DC002C0000
direct allocation
page read and write
3F1000375000
trusted library allocation
page read and write
225E6913000
heap
page read and write
7AF4002A0000
trusted library allocation
page read and write
3F1000A2D000
trusted library allocation
page read and write
7AF4002D4000
trusted library allocation
page read and write
225E1EAF000
heap
page read and write
3F10008C6000
trusted library allocation
page read and write
1D22CF60000
heap
page readonly
24EAA739000
heap
page read and write
7FF630CC8000
unkown
page write copy
12693C55000
heap
page read and write
23F000180000
trusted library allocation
page read and write
1CFA6690000
heap
page read and write
225E1E9E000
heap
page read and write
562800244000
trusted library allocation
page read and write
24EAC477000
heap
page read and write
23C800334000
trusted library allocation
page read and write
12693BFD000
heap
page read and write
6520000A0000
trusted library allocation
page read and write
75A000260000
direct allocation
page read and write
3F10000F8000
trusted library allocation
page read and write
2BF800201000
trusted library allocation
page read and write
12691E25000
heap
page read and write
5DC00328000
direct allocation
page read and write
3F1000F20000
trusted library allocation
page read and write
5D68002B4000
trusted library allocation
page read and write
C7AA7FD000
stack
page read and write
225E67F6000
heap
page read and write
449A1FE000
stack
page read and write
2199C06D000
heap
page read and write
12693F3F000
heap
page read and write
3F1000960000
trusted library allocation
page read and write
225E3BC7000
heap
page read and write
3F1000444000
trusted library allocation
page read and write
24EAEE7E000
heap
page read and write
225E682B000
heap
page read and write
3F1000F6C000
trusted library allocation
page read and write
7FF713E66000
unkown
page read and write
5A640028C000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
225E67FC000
heap
page read and write
69B00027C000
trusted library allocation
page read and write
24EAF01F000
heap
page read and write
2199C12F000
heap
page read and write
225E6861000
heap
page read and write
8D83FFE000
stack
page read and write
225E3BA7000
heap
page read and write
47E400230000
trusted library allocation
page read and write
1CFA66E9000
heap
page read and write
1CFA341C000
heap
page read and write
24EAC4E7000
heap
page read and write
54DC00284000
direct allocation
page read and write
12694031000
heap
page read and write
12691DD1000
heap
page read and write
12693F05000
heap
page read and write
69B0002BC000
trusted library allocation
page read and write
3F1000244000
trusted library allocation
page read and write
1CFA65BF000
heap
page read and write
210FE720000
heap
page read and write
1CFA3443000
heap
page read and write
1269400C000
heap
page read and write
1CFA65E5000
heap
page read and write
457E67F000
stack
page read and write
3F1000CF8000
trusted library allocation
page read and write
12693C39000
heap
page read and write
3F1000F4E000
trusted library allocation
page read and write
23F0001A4000
trusted library allocation
page read and write
23F0001B8000
trusted library allocation
page read and write
225E3BCF000
heap
page read and write
225E699A000
heap
page read and write
1CFA669A000
heap
page read and write
225E1DC0000
heap
page read and write
24EAEEC4000
heap
page read and write
84C69FD000
stack
page read and write
12693FF0000
heap
page read and write
24EAC4B0000
heap
page read and write
126968BF000
heap
page read and write
219A1544000
trusted library allocation
page read and write
75A000250000
direct allocation
page read and write
7FF630CDF000
unkown
page read and write
1CFA3441000
heap
page read and write
B8ECBFE000
unkown
page readonly
7AF4002E0000
trusted library allocation
page read and write
24EAA6E6000
heap
page read and write
24EAC502000
heap
page read and write
3F1000B3C000
trusted library allocation
page read and write
1CFA34C0000
heap
page read and write
3F1000908000
trusted library allocation
page read and write
144002C4000
direct allocation
page read and write
1CFA192F000
heap
page read and write
16C002A8000
direct allocation
page read and write
24EAEF18000
heap
page read and write
23F0001B5000
trusted library allocation
page read and write
12691DA2000
heap
page read and write
1CFA66D1000
heap
page read and write
12693BDA000
heap
page read and write
84C01FE000
unkown
page readonly
225E3BAF000
heap
page read and write
23C800370000
trusted library allocation
page read and write
3F10001C1000
trusted library allocation
page read and write
7FF695AB6000
unkown
page read and write
225E3BC6000
heap
page read and write
225E693A000
heap
page read and write
84E39FE000
stack
page read and write
24EAA6EA000
heap
page read and write
84D89FC000
stack
page read and write
B8F1BFE000
unkown
page readonly
12693F03000
heap
page read and write
12693FD1000
heap
page read and write
3F1000248000
trusted library allocation
page read and write
225E3BCF000
heap
page read and write
1CFA3439000
heap
page read and write
24EAEEA0000
heap
page read and write
3F10003C5000
trusted library allocation
page read and write
126968E5000
heap
page read and write
1D22D013000
heap
page read and write
1CFA3489000
heap
page read and write
225E3BBA000
heap
page read and write
1D082674000
heap
page read and write
12693C0B000
heap
page read and write
2BF8002A4000
trusted library allocation
page read and write
2199C128000
heap
page read and write
1CFA66F7000
heap
page read and write
24EAEFFE000
heap
page read and write
5DC0031C000
direct allocation
page read and write
694C0020C000
trusted library allocation
page read and write
24EAA708000
heap
page read and write
7FF695AA8000
unkown
page read and write
3F1000498000
trusted library allocation
page read and write
7FF630D2D000
unkown
page readonly
5DC002D4000
direct allocation
page read and write
1CFA66AD000
heap
page read and write
54DC002A8000
direct allocation
page read and write
12693FA0000
heap
page read and write
24EAC4BC000
heap
page read and write
12693EDC000
heap
page read and write
1CFA18AB000
heap
page read and write
14400230000
direct allocation
page read and write
69B00028C000
trusted library allocation
page read and write
24EAC479000
heap
page read and write
24EAEE97000
heap
page read and write
47E400038000
trusted library allocation
page read and write
23C800310000
trusted library allocation
page read and write
449C9FE000
unkown
page readonly
6520000E4000
trusted library allocation
page read and write
12693E77000
heap
page read and write
3F1000E5C000
trusted library allocation
page read and write
12691CB0000
heap
page read and write
24EAEE9C000
heap
page read and write
1CFA652F000
heap
page read and write
126968D5000
heap
page read and write
3F10003E4000
trusted library allocation
page read and write
1CFA18FF000
heap
page read and write
23F0000A0000
trusted library allocation
page read and write
225E62A0000
heap
page read and write
12693BD9000
heap
page read and write
2BF800238000
trusted library allocation
page read and write
6520000D8000
trusted library allocation
page read and write
225E1E5C000
heap
page read and write
225E3B8B000
heap
page read and write
694C0040C000
trusted library allocation
page read and write
5D680020C000
trusted library allocation
page read and write
24EAF0C9000
heap
page read and write
225E3BC0000
heap
page read and write
24EAF0A4000
heap
page read and write
24EAC50E000
heap
page read and write
3F10001D8000
trusted library allocation
page read and write
1CFA6703000
heap
page read and write
1CFA32D5000
heap
page read and write
1D08263C000
heap
page read and write
1CFA660B000
heap
page read and write
1CFA6554000
heap
page read and write
23738FE000
stack
page read and write
12693BFD000
heap
page read and write
1CFA67CF000
heap
page read and write
24EAC4BF000
heap
page read and write
84C81FE000
unkown
page readonly
225E3B86000
heap
page read and write
84CA1FE000
unkown
page readonly
47E400228000
trusted library allocation
page read and write
24EAEE93000
heap
page read and write
3F1000030000
trusted library allocation
page read and write
24EAA73D000
heap
page read and write
5628002B8000
trusted library allocation
page read and write
23C800220000
trusted library allocation
page read and write
225E6937000
heap
page read and write
6520000AC000
trusted library allocation
page read and write
225E68A5000
heap
page read and write
1D082600000
heap
page read and write
69B000278000
trusted library allocation
page read and write
1CFA6542000
heap
page read and write
5DC00217000
direct allocation
page read and write
1CFA33F7000
heap
page read and write
65200010C000
trusted library allocation
page read and write
23F00018C000
trusted library allocation
page read and write
7FF713C31000
unkown
page execute read
3F1000389000
trusted library allocation
page read and write
5DC0033C000
direct allocation
page read and write
24EAEF23000
heap
page read and write
12693C16000
heap
page read and write
69B000230000
trusted library allocation
page read and write
B8EC3FE000
stack
page read and write
24EAC4D3000
heap
page read and write
1CFA3427000
heap
page read and write
23F00013C000
trusted library allocation
page read and write
34DC00238000
trusted library allocation
page read and write
84D69FD000
stack
page read and write
7AF400238000
trusted library allocation
page read and write
191D923E000
heap
page read and write
225E6935000
heap
page read and write
84E41FE000
unkown
page readonly
23C8002BC000
trusted library allocation
page read and write
24EAF084000
heap
page read and write
1CFA6754000
heap
page read and write
7FF713E88000
unkown
page read and write
24EAEED0000
heap
page read and write
84E71FE000
unkown
page readonly
1CFA66F1000
heap
page read and write
24EABEE0000
heap
page read and write
12693BE9000
heap
page read and write
24EAEE7E000
heap
page read and write
5A6400220000
trusted library allocation
page read and write
1CFA18B1000
heap
page read and write
5DC00258000
direct allocation
page read and write
3F1000CB4000
trusted library allocation
page read and write
1CFA6584000
heap
page read and write
24EAA692000
heap
page read and write
24EAA723000
heap
page read and write
1CFA66EB000
heap
page read and write
23C8002F4000
trusted library allocation
page read and write
1CFA3416000
heap
page read and write
3F10003DC000
trusted library allocation
page read and write
23C8002E0000
trusted library allocation
page read and write
84E79FB000
stack
page read and write
12693EF4000
heap
page read and write
7FF713E73000
unkown
page read and write
1CFA345A000
heap
page read and write
1CFA6590000
heap
page read and write
3F1000D44000
trusted library allocation
page read and write
225E3B9C000
heap
page read and write
38340025C000
trusted library allocation
page read and write
694C00250000
trusted library allocation
page read and write
225E3BBC000
heap
page read and write
C7AA1FD000
stack
page read and write
1CFA18A8000
heap
page read and write
1CFA3380000
heap
page read and write
1CFA6774000
heap
page read and write
8DFF5FE000
unkown
page readonly
1CFA344F000
heap
page read and write
225E3B47000
heap
page read and write
1CFA18AF000
heap
page read and write
1CFA672A000
heap
page read and write
23F000024000
trusted library allocation
page read and write
1CFA67E1000
heap
page read and write
1CFA6527000
heap
page read and write
24EAC495000
heap
page read and write
75A0002EC000
direct allocation
page read and write
12693FA1000
heap
page read and write
12693BE9000
heap
page read and write
5D6800260000
trusted library allocation
page read and write
225E68AB000
heap
page read and write
1CFA6551000
heap
page read and write
3F10005AC000
trusted library allocation
page read and write
225E3BD2000
heap
page read and write
225E68AB000
heap
page read and write
24EAC499000
heap
page read and write
2199BFB0000
heap
page read and write
12693E8C000
heap
page read and write
1CFA18EA000
heap
page read and write
1440024C000
direct allocation
page read and write
2199DF0C000
heap
page read and write
24EAEF20000
heap
page read and write
225E68AD000
heap
page read and write
14400284000
direct allocation
page read and write
12691E2F000
heap
page read and write
16C0025C000
direct allocation
page read and write
3F1000158000
trusted library allocation
page read and write
24EAA6EF000
heap
page read and write
5628002AC000
trusted library allocation
page read and write
1CFA66D6000
heap
page read and write
2199DF56000
heap
page read and write
24EAF0D3000
heap
page read and write
69B0002C8000
trusted library allocation
page read and write
225E68C0000
heap
page read and write
12693FC4000
heap
page read and write
23F00014C000
trusted library allocation
page read and write
24EABF90000
heap
page read and write
1CFA6764000
heap
page read and write
84E89FC000
stack
page read and write
12691E3F000
heap
page read and write
24EAC505000
heap
page read and write
8D807FE000
unkown
page readonly
47E4000EC000
trusted library allocation
page read and write
54DC002BC000
direct allocation
page read and write
3F10002A6000
trusted library allocation
page read and write
23F000080000
trusted library allocation
page read and write
12693F9C000
heap
page read and write
225E1E60000
heap
page read and write
24EAEE95000
heap
page read and write
1CFA18B8000
heap
page read and write
23F000178000
trusted library allocation
page read and write
225E699A000
heap
page read and write
24EAC4EB000
heap
page read and write
1CFA67DF000
heap
page read and write
7FF695AFF000
unkown
page read and write
3F10002EC000
trusted library allocation
page read and write
24EAF037000
heap
page read and write
225E3BAB000
heap
page read and write
225E3BD1000
heap
page read and write
69B00028C000
trusted library allocation
page read and write
225E67F8000
heap
page read and write
225E3BCA000
heap
page read and write
2199DF56000
heap
page read and write
24EAC4DB000
heap
page read and write
5A6400238000
trusted library allocation
page read and write
225E67BD000
heap
page read and write
8DFFDFD000
stack
page read and write
3F1000F85000
trusted library allocation
page read and write
1CFA1893000
heap
page read and write
1CFA3423000
heap
page read and write
3F1000874000
trusted library allocation
page read and write
47E4000B4000
trusted library allocation
page read and write
225E67B4000
heap
page read and write
1CFA18F9000
heap
page read and write
694C00201000
trusted library allocation
page read and write
C7AA2FE000
stack
page read and write
225E3BC0000
heap
page read and write
225E67BC000
heap
page read and write
2199DF0A000
heap
page read and write
24EAEFBE000
heap
page read and write
1D082500000
heap
page read and write
24EAA729000
heap
page read and write
24EAA68A000
heap
page read and write
652000001000
trusted library allocation
page read and write
3F10001A0000
trusted library allocation
page read and write
1CFA192C000
heap
page read and write
5628002F0000
trusted library allocation
page read and write
1CFA65D9000
heap
page read and write
225E3B7B000
heap
page read and write
1CFA6775000
heap
page read and write
47E40005C000
trusted library allocation
page read and write
24EAC47E000
heap
page read and write
652000110000
trusted library allocation
page read and write
3F1000CA4000
trusted library allocation
page read and write
24EAEF08000
heap
page read and write
2199C0A7000
heap
page read and write
225E692C000
heap
page read and write
47E40006C000
trusted library allocation
page read and write
3F1000164000
trusted library allocation
page read and write
225E3B75000
heap
page read and write
3F1000CED000
trusted library allocation
page read and write
12691E4A000
heap
page read and write
1D0F5502000
heap
page read and write
12693BE9000
heap
page read and write
5DC00278000
direct allocation
page read and write
1D231900000
trusted library section
page readonly
24EAA664000
heap
page read and write
24EAF005000
heap
page read and write
225E1D60000
heap
page read and write
2BF8002CC000
trusted library allocation
page read and write
1D08261B000
heap
page read and write
84BF1FE000
unkown
page readonly
69B00028C000
trusted library allocation
page read and write
225E67DF000
heap
page read and write
210FE7A0000
heap
page read and write
8D827FE000
unkown
page readonly
2199C128000
heap
page read and write
225E6983000
heap
page read and write
2199C134000
heap
page read and write
23C800430000
trusted library allocation
page read and write
12696870000
heap
page read and write
1CFA342D000
heap
page read and write
23C80040C000
trusted library allocation
page read and write
24EAC4B0000
heap
page read and write
7AF40040C000
trusted library allocation
page read and write
225E68D0000
heap
page read and write
3F1000EB8000
trusted library allocation
page read and write
3F1000E01000
trusted library allocation
page read and write
3F1000CE8000
trusted library allocation
page read and write
75A000290000
direct allocation
page read and write
3F1000814000
trusted library allocation
page read and write
24EAC49D000
heap
page read and write
1CFA65D2000
heap
page read and write
12693BF1000
heap
page read and write
24EAEFEC000
heap
page read and write
3F10008A0000
trusted library allocation
page read and write
5A64002E0000
trusted library allocation
page read and write
23F000134000
trusted library allocation
page read and write
23F00013C000
trusted library allocation
page read and write
24EAEEB7000
heap
page read and write
7FF695ABF000
unkown
page read and write
1CFA18EC000
heap
page read and write
1D22CF30000
heap
page read and write
3F1000114000
trusted library allocation
page read and write
44991FE000
stack
page read and write
3F1000824000
trusted library allocation
page read and write
24EAA71B000
heap
page read and write
24EAEF09000
heap
page read and write
54DC00264000
direct allocation
page read and write
12693F9C000
heap
page read and write
84D61FE000
unkown
page readonly
75A0002A8000
direct allocation
page read and write
24EAA72E000
heap
page read and write
2199C05C000
heap
page read and write
1D0F52FF000
heap
page read and write
5628002E4000
trusted library allocation
page read and write
69B000274000
trusted library allocation
page read and write
24EAC499000
heap
page read and write
54DC00408000
direct allocation
page read and write
12693F0A000
heap
page read and write
3F1000194000
trusted library allocation
page read and write
225E3BDC000
heap
page read and write
3834002D8000
trusted library allocation
page read and write
23F000070000
trusted library allocation
page read and write
449F9FE000
unkown
page readonly
1CFA191E000
heap
page read and write
12693C07000
heap
page read and write
225E3BB1000
heap
page read and write
2373FFB000
stack
page read and write
24EAF10C000
heap
page read and write
225E3B9E000
heap
page read and write
1D0F522B000
heap
page read and write
5D6800337000
trusted library allocation
page read and write
54DC002A4000
direct allocation
page read and write
3F1000254000
trusted library allocation
page read and write
24EAC053000
heap
page read and write
12693BF9000
heap
page read and write
1D08264B000
heap
page read and write
24EAC478000
heap
page read and write
1CFA1933000
heap
page read and write
1CFA658D000
heap
page read and write
2199C129000
heap
page read and write
23739FB000
stack
page read and write
1CFA341C000
heap
page read and write
225E6331000
heap
page read and write
3F1000C5F000
trusted library allocation
page read and write
C7AA0FE000
stack
page read and write
5D68002A0000
trusted library allocation
page read and write
225E3BB7000
heap
page read and write
12693BE2000
heap
page read and write
3F1000B54000
trusted library allocation
page read and write
1CFA6711000
heap
page read and write
24EAEF19000
heap
page read and write
1CFA1A20000
heap
page read and write
1CFA18F5000
heap
page read and write
1CFA343B000
heap
page read and write
225E680E000
heap
page read and write
1D0F4FF0000
heap
page read and write
24EAEFF2000
heap
page read and write
225E691B000
heap
page read and write
12691DA3000
heap
page read and write
23F000270000
trusted library allocation
page read and write
54DC00250000
direct allocation
page read and write
3F100096C000
trusted library allocation
page read and write
AA22796000
stack
page read and write
225E3BB5000
heap
page read and write
16C00220000
direct allocation
page read and write
3F1000174000
trusted library allocation
page read and write
24EAEEAE000
heap
page read and write
84E69FB000
stack
page read and write
562800298000
trusted library allocation
page read and write
5A64002D4000
trusted library allocation
page read and write
12693BF5000
heap
page read and write
5628002C4000
trusted library allocation
page read and write
225E3BCF000
heap
page read and write
24EAEF00000
heap
page read and write
3F10003A3000
trusted library allocation
page read and write
7FF713EBD000
unkown
page readonly
225E6880000
heap
page read and write
694C00268000
trusted library allocation
page read and write
12693C2E000
heap
page read and write
84C09FE000
stack
page read and write
225E6903000
heap
page read and write
84D09FB000
stack
page read and write
1E49DA13000
heap
page read and write
1CFA6588000
heap
page read and write
24EAA6F6000
heap
page read and write
B8E8BFE000
unkown
page readonly
84C31FE000
unkown
page readonly
1CFA6722000
heap
page read and write
47E4000E3000
trusted library allocation
page read and write
24EAC0CD000
heap
page read and write
24EAC4EB000
heap
page read and write
3834002CC000
trusted library allocation
page read and write
694C00211000
trusted library allocation
page read and write
1CFA1859000
heap
page read and write
12693BEC000
heap
page read and write
B82FFE000
unkown
page readonly
562800230000
trusted library allocation
page read and write
144002B0000
direct allocation
page read and write
34DC002CC000
trusted library allocation
page read and write
3F1000310000
trusted library allocation
page read and write
449B1FB000
stack
page read and write
5628002C4000
trusted library allocation
page read and write
B8E53F6000
stack
page read and write
5DC00244000
direct allocation
page read and write
24EAC4AE000
heap
page read and write
694C002B0000
trusted library allocation
page read and write
2BF8002A4000
trusted library allocation
page read and write
1D082590000
unclassified section
page read and write
3F100021C000
trusted library allocation
page read and write
3F1000930000
trusted library allocation
page read and write
3F1000C18000
trusted library allocation
page read and write
1D0F5402000
heap
page read and write
7AF400408000
trusted library allocation
page read and write
225E3B81000
heap
page read and write
694C00418000
trusted library allocation
page read and write
2199C0B9000
heap
page read and write
24EAC494000
heap
page read and write
23C8002AC000
trusted library allocation
page read and write
24EAA702000
heap
page read and write
2BF800248000
trusted library allocation
page read and write
225E6355000
heap
page read and write
12693C37000
heap
page read and write
21082DC7000
unclassified section
page read and write
12691E33000
heap
page read and write
3F1000A3C000
trusted library allocation
page read and write
1CFA18AB000
heap
page read and write
24EAC4B4000
heap
page read and write
54DC00234000
direct allocation
page read and write
1D22D06C000
heap
page read and write
2199C128000
heap
page read and write
24EAEFE6000
heap
page read and write
3F1000A6C000
trusted library allocation
page read and write
24EAF0C0000
heap
page read and write
24EAC0C4000
heap
page read and write
B8EB3FE000
stack
page read and write
23F000094000
trusted library allocation
page read and write
1CFA656E000
heap
page read and write
449E1FE000
stack
page read and write
1D08261D000
heap
page read and write
5628002D4000
trusted library allocation
page read and write
1D0F524C000
heap
page read and write
1CFA6537000
heap
page read and write
1269402D000
heap
page read and write
84DC1FE000
unkown
page readonly
84E21FE000
unkown
page readonly
225E3BA5000
heap
page read and write
84D51FE000
unkown
page readonly
1CFA6639000
heap
page read and write
2BF800314000
trusted library allocation
page read and write
23F0001BB000
trusted library allocation
page read and write
3F100082E000
trusted library allocation
page read and write
3F100023D000
trusted library allocation
page read and write
3F1000201000
trusted library allocation
page read and write
75A0002C4000
direct allocation
page read and write
24EAA6D8000
heap
page read and write
3F1000C01000
trusted library allocation
page read and write
24EAC4E4000
heap
page read and write
24EAA6E6000
heap
page read and write
3508CFD000
stack
page read and write
1CFA18B7000
heap
page read and write
47E400171000
trusted library allocation
page read and write
3F100011C000
trusted library allocation
page read and write
1CFA657F000
heap
page read and write
225E3B91000
heap
page read and write
12693C57000
heap
page read and write
3F1000C7C000
trusted library allocation
page read and write
225E67F0000
heap
page read and write
2199DF56000
heap
page read and write
12691E2A000
heap
page read and write
1CFA1895000
heap
page read and write
1D08260A000
heap
page read and write
1CFA3457000
heap
page read and write
225E3C54000
heap
page read and write
694C00328000
trusted library allocation
page read and write
1CFA3402000
heap
page read and write
1CFA18A5000
heap
page read and write
24EAEEB2000
heap
page read and write
84D81FE000
unkown
page readonly
24EAF0EC000
heap
page read and write
12693710000
heap
page read and write
24EAC4A5000
heap
page read and write
14400290000
direct allocation
page read and write
23C800201000
trusted library allocation
page read and write
225E6927000
heap
page read and write
1CFA67D6000
heap
page read and write
1CFA6790000
heap
page read and write
225E67BE000
heap
page read and write
3F1000560000
trusted library allocation
page read and write
12693F2D000
heap
page read and write
2199DF56000
heap
page read and write
225E67B0000
heap
page read and write
24EAC4A5000
heap
page read and write
1CFA3474000
heap
page read and write
47E40019C000
trusted library allocation
page read and write
1CFA669A000
heap
page read and write
225E1EB2000
heap
page read and write
7AF40027C000
trusted library allocation
page read and write
47E400134000
trusted library allocation
page read and write
1CFA656A000
heap
page read and write
24EAEFEA000
heap
page read and write
84C89FB000
stack
page read and write
694C00237000
trusted library allocation
page read and write
2199DF56000
heap
page read and write
1CFA3412000
heap
page read and write
5D6800238000
trusted library allocation
page read and write
2199C128000
heap
page read and write
3F10009B0000
trusted library allocation
page read and write
652000024000
trusted library allocation
page read and write
23C80033F000
trusted library allocation
page read and write
5D68002D4000
trusted library allocation
page read and write
457E34E000
stack
page read and write
12693EC5000
heap
page read and write
23C800404000
trusted library allocation
page read and write
69B000264000
trusted library allocation
page read and write
1269402D000
heap
page read and write
1CFA343B000
heap
page read and write
1CFA6594000
heap
page read and write
24EAA684000
heap
page read and write
3F1000080000
trusted library allocation
page read and write
2199DE13000
heap
page read and write
5DC00330000
direct allocation
page read and write
1CFA6696000
heap
page read and write
24EAA6D8000
heap
page read and write
3F10001D0000
trusted library allocation
page read and write
47E400218000
trusted library allocation
page read and write
24EAC4D6000
heap
page read and write
225E6859000
heap
page read and write
24EAC4AA000
heap
page read and write
225E692B000
heap
page read and write
24EAC4C0000
heap
page read and write
225E680A000
heap
page read and write
7AF4002C4000
trusted library allocation
page read and write
1CFA344C000
heap
page read and write
12693C09000
heap
page read and write
24EAC4A9000
heap
page read and write
225E67AF000
heap
page read and write
3F10008B8000
trusted library allocation
page read and write
5A6400201000
trusted library allocation
page read and write
225E6804000
heap
page read and write
75A000230000
direct allocation
page read and write
54DC00201000
direct allocation
page read and write
7FF695A5A000
unkown
page readonly
225E6307000
heap
page read and write
24EAC4FD000
heap
page read and write
12696842000
heap
page read and write
12691D40000
heap
page read and write
12691E5B000
heap
page read and write
2199DF13000
heap
page read and write
1269688B000
heap
page read and write
694C00220000
trusted library allocation
page read and write
3F10008C0000
trusted library allocation
page read and write
3F100036C000
trusted library allocation
page read and write
225E694A000
heap
page read and write
12693F4B000
heap
page read and write
449D9FE000
unkown
page readonly
3F10009B8000
trusted library allocation
page read and write
5D680026C000
trusted library allocation
page read and write
3F1000401000
trusted library allocation
page read and write
1CFA65D7000
heap
page read and write
5D680028C000
trusted library allocation
page read and write
44999FE000
unkown
page readonly
1CFA341F000
heap
page read and write
225E6836000
heap
page read and write
24EAEE84000
heap
page read and write
24EAC4B9000
heap
page read and write
16C0027C000
direct allocation
page read and write
12693BFE000
heap
page read and write
12693C16000
heap
page read and write
2373306000
stack
page read and write
7FF695AAF000
unkown
page read and write
225E3B68000
heap
page read and write
2199C128000
heap
page read and write
23F0000E4000
trusted library allocation
page read and write
225E6949000
heap
page read and write
225E680A000
heap
page read and write
383400290000
trusted library allocation
page read and write
383400260000
trusted library allocation
page read and write
There are 2536 hidden memdumps, click here to show them.