IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BGIJEGCGDGHDHIDHDGCBGIJKFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFIIIJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CGCFCFBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\DGIJEGHDAECAKECAFCAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FBKJKEHIJECGCBFIJEGI
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\IIJDBGDGCGDAKFIDGIDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJEHJKJEBGHJJKEBGIECAAFIJK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\2af1cdad-ca6a-474c-a954-5532e594480e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4607310a-9a68-4eb0-bcf8-edba25e4483b.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\468bef88-cb48-4b7e-8e63-82e88f9e2179.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\557473d9-504a-4bc3-a9cb-8dd6be4a174b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\760c3cc0-cf59-47a9-93aa-6ee766ecbb4c.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\938d8f07-966b-44b9-965e-e243420827fe.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\6cad9243-090c-4f4d-acea-d8707c976570.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-672079B7-1D80.pma
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2048.000000, slope 17753217332035315519916605440.000000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\15b04ea3-5486-4ede-a121-25a70c315705.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\28f72541-6e2b-45f2-ac01-00c9078a824a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6079f9e4-ec83-4bd7-93a3-aa41f402bca7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7853b2ef-800d-4ed7-8199-9e2610bcf4f8.tmp
ASCII text, with very long lines (17363), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\816e2ff2-8599-47f4-9183-ec8f19f97ece.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8a563490-8db0-4f9e-93c2-86f920869ae9.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\13bc3916-5ae6-4f98-9540-234d2176b9a2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\51395177-b70b-4c2a-9823-160c4e4d70b2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\77ca3ad5-e730-447b-8506-90df5dbe767f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3850f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF39665.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF39914.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a5377354-d396-47bd-9e47-318f5063fe60.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c67cd1dd-2566-4ae9-8886-0508bdaa5edc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e7e06714-29c6-4b50-99f0-fffb565dcbfd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3c332.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF41152.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF48682.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3e540.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF3f212.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13374655161808921
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1c4cb097-3fb7-49a1-91ef-e1070935e677.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1e33b428-7d7c-45b7-8aac-a9b353b5f0d4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\2258793d-64cb-4de8-a4ab-6ae3cc0d0a62.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\58099258-e4f8-4748-bb42-d87c5ee00d6f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF39675.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF39914.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\cfdd26ac-3946-4f49-9742-e03195756a12.tmp
ASCII text, with very long lines (17528), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d89cef01-f15a-4141-88d8-f6d5bcebee44.tmp
ASCII text, with very long lines (17528), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fe946cdd-ea20-47a6-89da-4a9cc8761d83.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF371b6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3735c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3759e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39c51.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3d310.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF48653.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4e7cc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bb869a37-6275-484c-bb93-08eb124783c6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\fd1152d1-72cd-4987-a252-b8b762b7e034.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\24380fd3-6b2a-4df7-b660-3fecdd76d851.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\2e0e8d74-9419-4c44-a361-1153837ca4a5.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\591664e3-327c-4d3b-9721-917d084bbacb.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\65047dee-2838-4e16-9cab-726ed26f1cf5.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\d5009af4-a8eb-47e4-8415-e4001c34a145.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
dropped
C:\Users\user\AppData\Local\Temp\d6d14c9f-cfe3-47c5-8c4e-9057a6b2ad97.tmp
PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\dda18aaf-83d6-46e9-b717-d046aacb7570.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\591664e3-327c-4d3b-9721-917d084bbacb.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3700)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1038148922\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3705)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1834582241\65047dee-2838-4e16-9cab-726ed26f1cf5.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1834582241\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1834582241\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1834582241\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7552_1834582241\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 04:59:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 04:59:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 04:59:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 04:59:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 04:59:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 467
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 468
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 469
ASCII text, with very long lines (799)
downloaded
Chrome Cache Entry: 470
ASCII text
downloaded
Chrome Cache Entry: 471
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 472
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 473
SVG Scalable Vector Graphics image
downloaded
There are 281 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2576 --field-trial-handle=2456,i,13850268372312283209,17815345528296934824,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2028,i,5845511922812751212,18091894062939200481,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6328 --field-trial-handle=2028,i,5845511922812751212,18091894062939200481,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6592 --field-trial-handle=2028,i,5845511922812751212,18091894062939200481,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=1120 --field-trial-handle=2028,i,5845511922812751212,18091894062939200481,262144 /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 --field-trial-handle=2296,i,8722204721377479828,3000916601433608745,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com/-
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
https://google-ohttp-relay-join.fastly-edge.com/0
unknown
https://google-ohttp-relay-join.fastly-edge.com/7
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dlll
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/:
unknown
https://docs.google.com/document/installwebapp?usp=chrome_defaultnjb
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1730181571272&w=0&anoncknm=app_anon&NoResponseBody=true
20.42.73.31
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://docs.google.com/presentation/ogl
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://drive.google.com/?lfhs=2ation.Result
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Z
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bz
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1730181571259&w=0&anoncknm=app_anon&NoResponseBody=true
20.42.73.31
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dll?
unknown
http://polymer.github.io/PATENTS.txt
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dll:
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://c.msn.com/c.gif?rnd=1730181570259&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=bfe00f3163ab4b7d893198e3cbe5ca88&activityId=bfe00f3163ab4b7d893198e3cbe5ca88&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0&ctsa=mr&CtsSyncId=80EA2B33978444B08900C350AC4F446D&MUID=082392D97AE764340DA987FE7BEF6550
20.125.209.212
https://docs.google.com/spreadsheets/
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://sb.scorecardresearch.com/b2?rn=1730181570259&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=082392D97AE764340DA987FE7BEF6550&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null
108.156.211.31
https://www.youtube.com/s/notifications/manifest/cr_install.htmllt
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.186.142
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://assets.msn.com/statics/icons/favicon_newtabpage.png
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://chromewebstore.google.com/
unknown
https://www.youtube.com/?feature=ytcaogl
unknown
http://185.215.113.206KKF
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://anglebug.com/7279O
unknown
https://chrome.google.com/webstore/
unknown
https://google-ohttp-relay-join.fastly-edge.com/#
unknown
https://clients4.google.com/chrome-sync
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
plus.l.google.com
142.250.186.142
play.google.com
142.250.186.46
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.244.18.27
www.google.com
142.250.184.196
googlehosted.l.googleusercontent.com
142.250.185.193
sni1gl.wpc.nucdn.net
152.199.21.175
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
apis.google.com
unknown
api.msn.com
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.186.46
play.google.com
United States
20.1.248.118
unknown
United States
184.31.0.196
unknown
United States
108.156.211.31
unknown
United States
152.195.19.97
unknown
United States
104.93.21.160
unknown
United States
18.244.18.27
sb.scorecardresearch.com
United States
20.125.209.212
unknown
United States
162.159.61.3
chrome.cloudflare-dns.com
United States
204.79.197.219
unknown
United States
104.40.82.182
unknown
United States
172.64.41.3
unknown
United States
142.250.184.196
www.google.com
United States
104.93.21.152
unknown
United States
13.107.246.57
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
23.55.178.242
unknown
United States
142.250.185.193
googlehosted.l.googleusercontent.com
United States
239.255.255.250
unknown
Reserved
142.250.186.142
plus.l.google.com
United States
127.0.0.1
unknown
unknown
20.42.73.31
unknown
United States
There are 14 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197774
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197774
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197774
WindowTabManagerFileMappingId
There are 133 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DD1000
unkown
page execute and read and write
malicious
4EA0000
direct allocation
page read and write
malicious
B6E000
heap
page read and write
malicious
7AA401D5C000
trusted library allocation
page read and write
7AA400720000
trusted library allocation
page read and write
7AA401928000
trusted library allocation
page read and write
7AA401EE4000
trusted library allocation
page read and write
1BBB7FBB000
heap
page read and write
7AA401088000
trusted library allocation
page read and write
9EC00230000
trusted library allocation
page read and write
22C000220000
trusted library allocation
page read and write
2658008E4000
trusted library allocation
page read and write
7AA4013D0000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA400AE4000
trusted library allocation
page read and write
7AA40279D000
trusted library allocation
page read and write
7AA4005B0000
trusted library allocation
page read and write
23833000
heap
page read and write
2658008AC000
trusted library allocation
page read and write
7AA4009D0000
trusted library allocation
page read and write
3F8000250000
direct allocation
page read and write
7AA401E68000
trusted library allocation
page read and write
9CE000
heap
page read and write
25C38166000
heap
page read and write
7AA4001B4000
trusted library allocation
page read and write
7AA401FC4000
trusted library allocation
page read and write
7AA401890000
trusted library allocation
page read and write
22C000264000
trusted library allocation
page read and write
7AA401B18000
trusted library allocation
page read and write
4A20000
heap
page read and write
25C34680000
heap
page read and write
7AA400118000
trusted library allocation
page read and write
854000C2000
trusted library allocation
page read and write
7AA400401000
trusted library allocation
page read and write
1BBB60ED000
heap
page read and write
AF217FE000
unkown
page readonly
7AA401F24000
trusted library allocation
page read and write
4A21000
heap
page read and write
6F0400250000
direct allocation
page read and write
AF31FFA000
stack
page read and write
3F8000244000
direct allocation
page read and write
7AA401430000
trusted library allocation
page read and write
9EC00424000
trusted library allocation
page read and write
7AA401840000
trusted library allocation
page read and write
8540037C000
trusted library allocation
page read and write
25C3E0A0000
trusted library section
page read and write
7AA4014C4000
trusted library allocation
page read and write
7AA400118000
trusted library allocation
page read and write
6F0400270000
direct allocation
page read and write
7AA400C7C000
trusted library allocation
page read and write
7AA4009F4000
trusted library allocation
page read and write
1BBB6078000
heap
page read and write
7AA401D34000
trusted library allocation
page read and write
265800401000
trusted library allocation
page read and write
7AA4028D8000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
85400224000
trusted library allocation
page read and write
7AA400E01000
trusted library allocation
page read and write
6C661FE000
stack
page read and write
2BF400288000
trusted library allocation
page read and write
1D5F7000
heap
page read and write
7AA40277A000
trusted library allocation
page read and write
7AA400EB8000
trusted library allocation
page read and write
7AA400FDC000
trusted library allocation
page read and write
1D6F2000
heap
page read and write
7AA40012C000
trusted library allocation
page read and write
1BBB7FA1000
heap
page read and write
9EC003BC000
trusted library allocation
page read and write
7AA401828000
trusted library allocation
page read and write
47DE000
stack
page read and write
AEE000
stack
page read and write
7AA400D00000
trusted library allocation
page read and write
7AA4016CC000
trusted library allocation
page read and write
25C3A55F000
heap
page read and write
375F000
stack
page read and write
7AA4010C0000
trusted library allocation
page read and write
7AA400EF4000
trusted library allocation
page read and write
7AA400478000
trusted library allocation
page read and write
22C0002B4000
trusted library allocation
page read and write
AF1DFFD000
stack
page read and write
7AA401704000
trusted library allocation
page read and write
7AA401DB4000
trusted library allocation
page read and write
7AA402714000
trusted library allocation
page read and write
AF1AFFE000
stack
page read and write
1BBB7E02000
heap
page read and write
1D607000
heap
page read and write
85400401000
trusted library allocation
page read and write
7AA401E90000
trusted library allocation
page read and write
8540010C000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA401ADC000
trusted library allocation
page read and write
7AA400B40000
trusted library allocation
page read and write
7AA40191C000
trusted library allocation
page read and write
7AA401E50000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
AF307FE000
unkown
page readonly
4FE0000
direct allocation
page execute and read and write
1BBB6130000
heap
page read and write
7AA401801000
trusted library allocation
page read and write
7AA400218000
trusted library allocation
page read and write
7AA402910000
trusted library allocation
page read and write
7AA401430000
trusted library allocation
page read and write
7AA4002A8000
trusted library allocation
page read and write
7AA401DD0000
trusted library allocation
page read and write
7AA4010C0000
trusted library allocation
page read and write
7AA401330000
trusted library allocation
page read and write
AF0AFFE000
stack
page read and write
7AA40062C000
trusted library allocation
page read and write
7AA4008E4000
trusted library allocation
page read and write
AF21FFB000
stack
page read and write
4A21000
heap
page read and write
7AA400F60000
trusted library allocation
page read and write
7AA400AC8000
trusted library allocation
page read and write
405E000
stack
page read and write
4A21000
heap
page read and write
85400220000
trusted library allocation
page read and write
1BBB60B0000
heap
page read and write
6C62E000
unkown
page read and write
1D5EA000
heap
page read and write
4A21000
heap
page read and write
6C671FE000
stack
page read and write
6F0400294000
direct allocation
page read and write
7AA401A44000
trusted library allocation
page read and write
7AA401AAC000
trusted library allocation
page read and write
7AA400DAC000
trusted library allocation
page read and write
1D5F0000
heap
page read and write
7AA401A78000
trusted library allocation
page read and write
2658008F4000
trusted library allocation
page read and write
854002EC000
trusted library allocation
page read and write
25C37C49000
heap
page read and write
1D5EA000
heap
page read and write
AF1EFFB000
stack
page read and write
7AA400488000
trusted library allocation
page read and write
7AA40284A000
trusted library allocation
page read and write
7AA400500000
trusted library allocation
page read and write
7AA401870000
trusted library allocation
page read and write
7AA40059C000
trusted library allocation
page read and write
AF2AFFE000
stack
page read and write
7AA4009F0000
trusted library allocation
page read and write
7AA401454000
trusted library allocation
page read and write
7AA400980000
trusted library allocation
page read and write
854002D4000
trusted library allocation
page read and write
265800948000
trusted library allocation
page read and write
AF37FFE000
stack
page read and write
7AA401DEC000
trusted library allocation
page read and write
85400278000
trusted library allocation
page read and write
7AA4019B0000
trusted library allocation
page read and write
85400254000
trusted library allocation
page read and write
25C3EF02000
trusted library section
page read and write
7AA4012FC000
trusted library allocation
page read and write
265800248000
trusted library allocation
page read and write
7AA401944000
trusted library allocation
page read and write
7AA401D54000
trusted library allocation
page read and write
AF1CFFA000
stack
page read and write
6F040030A000
direct allocation
page read and write
85400254000
trusted library allocation
page read and write
6F0400234000
direct allocation
page read and write
2BF4002F8000
trusted library allocation
page read and write
85400088000
trusted library allocation
page read and write
7AA401674000
trusted library allocation
page read and write
AF0A7FE000
unkown
page readonly
7AA401990000
trusted library allocation
page read and write
25C381D2000
heap
page read and write
7AA40147A000
trusted library allocation
page read and write
1D5FA000
heap
page read and write
25C3819E000
heap
page read and write
85400218000
trusted library allocation
page read and write
7AA40061C000
trusted library allocation
page read and write
4A21000
heap
page read and write
2BF4002E4000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
7AA400E0C000
trusted library allocation
page read and write
7AA401D44000
trusted library allocation
page read and write
6CB01000
unkown
page readonly
25C37C46000
heap
page read and write
7AA401DF0000
trusted library allocation
page read and write
EB6000
unkown
page execute and read and write
7AA40000C000
trusted library allocation
page read and write
7AA4018E4000
trusted library allocation
page read and write
7AA40033C000
trusted library allocation
page read and write
7AA4004A0000
trusted library allocation
page read and write
7AA4018F0000
trusted library allocation
page read and write
7AA4013A4000
trusted library allocation
page read and write
AF2F7FE000
unkown
page readonly
1D5FB000
heap
page read and write
9EC00290000
trusted library allocation
page read and write
22C000201000
trusted library allocation
page read and write
6C6D1FC000
stack
page read and write
25C3DCE6000
trusted library section
page read and write
7AA401EED000
trusted library allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
26580080C000
trusted library allocation
page read and write
AF0CFFD000
stack
page read and write
7AA400F04000
trusted library allocation
page read and write
AF0EFFB000
stack
page read and write
7AA400FA8000
trusted library allocation
page read and write
1BBB60F4000
heap
page read and write
23AC4000
heap
page read and write
7AA400174000
trusted library allocation
page read and write
7AA400054000
trusted library allocation
page read and write
AF12FFC000
stack
page read and write
7AA4002B4000
trusted library allocation
page read and write
7AA40147A000
trusted library allocation
page read and write
7AA401638000
trusted library allocation
page read and write
85400484000
trusted library allocation
page read and write
265800874000
trusted library allocation
page read and write
7AA401A3C000
trusted library allocation
page read and write
26580078C000
trusted library allocation
page read and write
3F1E000
stack
page read and write
7AA401658000
trusted library allocation
page read and write
7AA401B08000
trusted library allocation
page read and write
7AA401648000
trusted library allocation
page read and write
9EC0032C000
trusted library allocation
page read and write
7AA400EC8000
trusted library allocation
page read and write
9EC00308000
trusted library allocation
page read and write
3F8000210000
direct allocation
page read and write
23ACC000
heap
page read and write
7AA400EB8000
trusted library allocation
page read and write
7AA401894000
trusted library allocation
page read and write
8540023C000
trusted library allocation
page read and write
25C37C51000
heap
page read and write
7AA400304000
trusted library allocation
page read and write
1BBB6100000
heap
page read and write
7AA4012FC000
trusted library allocation
page read and write
7AA4019C0000
trusted library allocation
page read and write
7AA4002F0000
trusted library allocation
page read and write
7AA401E58000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
26580079C000
trusted library allocation
page read and write
1BBB7F8A000
heap
page read and write
25C37C39000
heap
page read and write
7AA4016BC000
trusted library allocation
page read and write
F4B000
unkown
page execute and read and write
7AA4015DC000
trusted library allocation
page read and write
1BBB7FD6000
heap
page read and write
23A30000
trusted library allocation
page read and write
2BF4002B0000
trusted library allocation
page read and write
7AA401A98000
trusted library allocation
page read and write
25C381AD000
heap
page read and write
22C0002A8000
trusted library allocation
page read and write
7AA401988000
trusted library allocation
page read and write
4A21000
heap
page read and write
9D0000
direct allocation
page read and write
7AA401E94000
trusted library allocation
page read and write
22C000294000
trusted library allocation
page read and write
23813000
heap
page read and write
7AA401F2C000
trusted library allocation
page read and write
7AA401731000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA400FB8000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
33DE000
stack
page read and write
7AA402004000
trusted library allocation
page read and write
7AA401AFC000
trusted library allocation
page read and write
25C38181000
heap
page read and write
7AA4013F4000
trusted library allocation
page read and write
1D5FB000
heap
page read and write
25C38151000
heap
page read and write
7AA40119C000
trusted library allocation
page read and write
AF1C7FE000
unkown
page readonly
AF1FFFE000
unkown
page readonly
4A21000
heap
page read and write
7AA401918000
trusted library allocation
page read and write
14F5000
unkown
page execute and read and write
25C37C44000
heap
page read and write
22C0002B4000
trusted library allocation
page read and write
7AA4009A8000
trusted library allocation
page read and write
25C38168000
heap
page read and write
265800850000
trusted library allocation
page read and write
1D612000
heap
page read and write
7AA400D01000
trusted library allocation
page read and write
1018000
unkown
page execute and read and write
7AA4004F4000
trusted library allocation
page read and write
7AA401430000
trusted library allocation
page read and write
1D609000
heap
page read and write
7AA4029AC000
trusted library allocation
page read and write
AF35FFD000
stack
page read and write
379E000
stack
page read and write
6F0400328000
direct allocation
page read and write
7AA4012C8000
trusted library allocation
page read and write
1D5FB000
heap
page read and write
25C347C0000
trusted library allocation
page read and write
3F8000201000
direct allocation
page read and write
1BBB60ED000
heap
page read and write
6C571FC000
stack
page read and write
800000
heap
page read and write
7AA400344000
trusted library allocation
page read and write
6F040031C000
direct allocation
page read and write
1D5F8000
heap
page read and write
25C38146000
heap
page read and write
C08000
heap
page read and write
7AA4010C0000
trusted library allocation
page read and write
C08000
heap
page read and write
854002C4000
trusted library allocation
page read and write
2658007D0000
trusted library allocation
page read and write
7AA4028CF000
trusted library allocation
page read and write
7AA401F28000
trusted library allocation
page read and write
AF08FFE000
stack
page read and write
94E000
stack
page read and write
1BBB7F92000
heap
page read and write
1D5E0000
heap
page read and write
1BBB6100000
heap
page read and write
7AA400D58000
trusted library allocation
page read and write
AF0FFFA000
stack
page read and write
7AA401F61000
trusted library allocation
page read and write
1D60D000
heap
page read and write
5A2000
stack
page read and write
6C669FE000
unkown
page readonly
AF18FFE000
stack
page read and write
85400234000
trusted library allocation
page read and write
4A21000
heap
page read and write
2658002E4000
trusted library allocation
page read and write
6C5F1FE000
stack
page read and write
7AA401974000
trusted library allocation
page read and write
9E0000
heap
page read and write
7AA400370000
trusted library allocation
page read and write
2BF4002A0000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
7AA400F04000
trusted library allocation
page read and write
4A21000
heap
page read and write
22C0002B8000
trusted library allocation
page read and write
C13000
heap
page read and write
9D0000
direct allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
1BBB6100000
heap
page read and write
2658008B8000
trusted library allocation
page read and write
7AA4018A4000
trusted library allocation
page read and write
1BBB7F39000
heap
page read and write
265800801000
trusted library allocation
page read and write
7AA4026DE000
trusted library allocation
page read and write
25C381A2000
heap
page read and write
7AA401A88000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
7AA400490000
trusted library allocation
page read and write
4A21000
heap
page read and write
389F000
stack
page read and write
7AA400FE0000
trusted library allocation
page read and write
6C5E1FE000
stack
page read and write
3F8000290000
direct allocation
page read and write
7AA401454000
trusted library allocation
page read and write
7AA4006D0000
trusted library allocation
page read and write
9EC00408000
trusted library allocation
page read and write
7AA4012BC000
trusted library allocation
page read and write
1D5FB000
heap
page read and write
265800918000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
9EC002F4000
trusted library allocation
page read and write
854002F8000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
7AA400210000
trusted library allocation
page read and write
7AA400084000
trusted library allocation
page read and write
F7A000
unkown
page execute and read and write
1D615000
heap
page read and write
7AA40120C000
trusted library allocation
page read and write
85400184000
trusted library allocation
page read and write
7AA4013B9000
trusted library allocation
page read and write
9EC00344000
trusted library allocation
page read and write
7AA400FB8000
trusted library allocation
page read and write
7AA402978000
trusted library allocation
page read and write
7AA4001D4000
trusted library allocation
page read and write
85400328000
trusted library allocation
page read and write
1BBB60A8000
heap
page read and write
7AA40115C000
trusted library allocation
page read and write
DD0000
unkown
page read and write
25C346CB000
heap
page read and write
7AA4001C4000
trusted library allocation
page read and write
7AA401DAC000
trusted library allocation
page read and write
7AA400390000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
6F0400316000
direct allocation
page read and write
7AA400D58000
trusted library allocation
page read and write
265800894000
trusted library allocation
page read and write
2BF4002F4000
trusted library allocation
page read and write
6C4B1FE000
unkown
page read and write
9EC00418000
trusted library allocation
page read and write
1D5F2000
heap
page read and write
415F000
stack
page read and write
7AA40195C000
trusted library allocation
page read and write
1BBB7F72000
heap
page read and write
2BF4002A0000
trusted library allocation
page read and write
C05000
heap
page read and write
1D5F2000
heap
page read and write
6F04002AC000
direct allocation
page read and write
238C0000
trusted library allocation
page read and write
AF177FE000
unkown
page readonly
85400240000
trusted library allocation
page read and write
85400368000
trusted library allocation
page read and write
1BBB7F23000
heap
page read and write
4A21000
heap
page read and write
7AA400120000
trusted library allocation
page read and write
AF167FE000
unkown
page readonly
7AA401B28000
trusted library allocation
page read and write
7AA400FA0000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
7AA401454000
trusted library allocation
page read and write
7AA4008B4000
trusted library allocation
page read and write
7AA401970000
trusted library allocation
page read and write
1D622000
heap
page read and write
1BBB7F76000
heap
page read and write
7AA400F04000
trusted library allocation
page read and write
9EC00404000
trusted library allocation
page read and write
265800904000
trusted library allocation
page read and write
7AA401B20000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
7AA400434000
trusted library allocation
page read and write
9EC00210000
trusted library allocation
page read and write
7AA4028FD000
trusted library allocation
page read and write
AF26FFC000
stack
page read and write
85400390000
trusted library allocation
page read and write
7AA40103A000
trusted library allocation
page read and write
7AA400482000
trusted library allocation
page read and write
7AA40260C000
trusted library allocation
page read and write
265800848000
trusted library allocation
page read and write
AF267FE000
unkown
page readonly
7AA401A74000
trusted library allocation
page read and write
1BBB6100000
heap
page read and write
7AA4003D0000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA4019F8000
trusted library allocation
page read and write
1BBB6102000
heap
page read and write
7AA401EE8000
trusted library allocation
page read and write
9EC00360000
trusted library allocation
page read and write
7AA4019D8000
trusted library allocation
page read and write
301E000
stack
page read and write
2658007AC000
trusted library allocation
page read and write
1357000
unkown
page execute and read and write
7AA40020C000
trusted library allocation
page read and write
6C5D9FE000
unkown
page readonly
9EC00364000
trusted library allocation
page read and write
85400248000
trusted library allocation
page read and write
237F0000
heap
page read and write
7AA400D54000
trusted library allocation
page read and write
7AA401306000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA4016A4000
trusted library allocation
page read and write
6C5A0000
unkown
page readonly
25C37C10000
heap
page read and write
265800868000
trusted library allocation
page read and write
7AA401EFB000
trusted library allocation
page read and write
4A21000
heap
page read and write
AF327FE000
unkown
page readonly
4A21000
heap
page read and write
8540000C000
trusted library allocation
page read and write
7AA4001F8000
trusted library allocation
page read and write
7AA401E54000
trusted library allocation
page read and write
7AA401B00000
trusted library allocation
page read and write
2658007A0000
trusted library allocation
page read and write
7AA401104000
trusted library allocation
page read and write
22C000294000
trusted library allocation
page read and write
7AA400090000
trusted library allocation
page read and write
1BBB60F2000
heap
page read and write
7AA4015C8000
trusted library allocation
page read and write
22C0002B8000
trusted library allocation
page read and write
1BBB62F0000
heap
page read and write
7AA400184000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
6C640000
unkown
page readonly
7AA40021C000
trusted library allocation
page read and write
7AA400304000
trusted library allocation
page read and write
265800210000
trusted library allocation
page read and write
7AA401F67000
trusted library allocation
page read and write
85400288000
trusted library allocation
page read and write
6C825000
unkown
page readonly
1D600000
heap
page read and write
9CB000
heap
page read and write
6C641FE000
stack
page read and write
854001F4000
trusted library allocation
page read and write
7AA4019A0000
trusted library allocation
page read and write
7AA400798000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
C20000
heap
page read and write
265800418000
trusted library allocation
page read and write
7AA40009C000
trusted library allocation
page read and write
265800238000
trusted library allocation
page read and write
7AA4009F6000
trusted library allocation
page read and write
7AA4010A4000
trusted library allocation
page read and write
7AA400478000
trusted library allocation
page read and write
7AA40020C000
trusted library allocation
page read and write
6F0400284000
direct allocation
page read and write
1D5EA000
heap
page read and write
7AA401324000
trusted library allocation
page read and write
4A21000
heap
page read and write
2BF4002A0000
trusted library allocation
page read and write
1D603000
heap
page read and write
315E000
stack
page read and write
6C509FE000
unkown
page readonly
7AA401399000
trusted library allocation
page read and write
7AA400BEC000
trusted library allocation
page read and write
7AA4013BA000
trusted library allocation
page read and write
7AA400CE0000
trusted library allocation
page read and write
7AA402872000
trusted library allocation
page read and write
7AA401898000
trusted library allocation
page read and write
7AA40033C000
trusted library allocation
page read and write
265800960000
trusted library allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
7AA402671000
trusted library allocation
page read and write
854002F8000
trusted library allocation
page read and write
7AA400350000
trusted library allocation
page read and write
1D5EA000
heap
page read and write
2370F000
heap
page read and write
6C5B9FE000
unkown
page readonly
7AA400230000
trusted library allocation
page read and write
7AA401820000
trusted library allocation
page read and write
7AA401DA8000
trusted library allocation
page read and write
3F80002EC000
direct allocation
page read and write
2658008F0000
trusted library allocation
page read and write
85400064000
trusted library allocation
page read and write
7AA401524000
trusted library allocation
page read and write
22C000294000
trusted library allocation
page read and write
7AA4014C0000
trusted library allocation
page read and write
7AA401650000
trusted library allocation
page read and write
7AA4014D0000
trusted library allocation
page read and write
23861000
heap
page read and write
25C3DCA0000
heap
page read and write
7AA4007C8000
trusted library allocation
page read and write
7AA4008A0000
trusted library allocation
page read and write
265800230000
trusted library allocation
page read and write
7AA401398000
trusted library allocation
page read and write
7AA401D24000
trusted library allocation
page read and write
22C000230000
trusted library allocation
page read and write
9EC003A8000
trusted library allocation
page read and write
7AA40192C000
trusted library allocation
page read and write
6C701FE000
stack
page read and write
1D605000
heap
page read and write
22C0002E4000
trusted library allocation
page read and write
1D1BF000
stack
page read and write
1D5DF000
heap
page read and write
85400230000
trusted library allocation
page read and write
7AA4019A4000
trusted library allocation
page read and write
25C380A0000
trusted library section
page read and write
7AA40173C000
trusted library allocation
page read and write
1D622000
heap
page read and write
7AA400768000
trusted library allocation
page read and write
7AA4014C0000
trusted library allocation
page read and write
7AA400F78000
trusted library allocation
page read and write
7AA400CB8000
trusted library allocation
page read and write
85400040000
trusted library allocation
page read and write
7AA40129C000
trusted library allocation
page read and write
7AA401D68000
trusted library allocation
page read and write
3A1E000
stack
page read and write
1BBB60BA000
heap
page read and write
1BBB60F4000
heap
page read and write
7AA401864000
trusted library allocation
page read and write
7AA401DA8000
trusted library allocation
page read and write
7AA4009F0000
trusted library allocation
page read and write
25C3A54D000
heap
page read and write
7AA402A0C000
trusted library allocation
page read and write
7AA400D68000
trusted library allocation
page read and write
25C348A0000
heap
page read and write
7AA400F00000
trusted library allocation
page read and write
22C000278000
trusted library allocation
page read and write
7AA4019EC000
trusted library allocation
page read and write
7AA401A94000
trusted library allocation
page read and write
6C4E1FE000
stack
page read and write
7AA401C0C000
trusted library allocation
page read and write
26580020C000
trusted library allocation
page read and write
25C34843000
heap
page read and write
7AA4013E6000
trusted library allocation
page read and write
7AA40183C000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA401FEC000
trusted library allocation
page read and write
1D622000
heap
page read and write
854002AC000
trusted library allocation
page read and write
7AA402938000
trusted library allocation
page read and write
1D601000
heap
page read and write
7AA401A54000
trusted library allocation
page read and write
25C3E820000
trusted library section
page read and write
7AA401E3C000
trusted library allocation
page read and write
7AA401D38000
trusted library allocation
page read and write
22C000274000
trusted library allocation
page read and write
7AA400564000
trusted library allocation
page read and write
7AA400220000
trusted library allocation
page read and write
BE3000
heap
page read and write
2BF400238000
trusted library allocation
page read and write
D9C000
stack
page read and write
4A21000
heap
page read and write
AF337FE000
unkown
page readonly
2658006C8000
trusted library allocation
page read and write
7AA4000EC000
trusted library allocation
page read and write
85400194000
trusted library allocation
page read and write
1BBB6102000
heap
page read and write
1BBB60ED000
heap
page read and write
85400304000
trusted library allocation
page read and write
7AA4012DC000
trusted library allocation
page read and write
7AA401B2C000
trusted library allocation
page read and write
AF07FFE000
unkown
page read and write
9E5000
heap
page read and write
1BBB7DF0000
heap
page read and write
7AA400494000
trusted library allocation
page read and write
1D612000
heap
page read and write
1D5EA000
heap
page read and write
25C3815D000
heap
page read and write
1BBB60B8000
heap
page read and write
7AA40022C000
trusted library allocation
page read and write
7AA401ABC000
trusted library allocation
page read and write
8540027C000
trusted library allocation
page read and write
854002E0000
trusted library allocation
page read and write
7AA400350000
trusted library allocation
page read and write
7AA401CF4000
trusted library allocation
page read and write
7AA4018C4000
trusted library allocation
page read and write
7AA401960000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA4012DC000
trusted library allocation
page read and write
2658002FC000
trusted library allocation
page read and write
1BBB7F0F000
heap
page read and write
25C346A3000
heap
page read and write
7AA40117C000
trusted library allocation
page read and write
7AA401AEC000
trusted library allocation
page read and write
7AA402827000
trusted library allocation
page read and write
6C5C1FD000
stack
page read and write
7AA400D9C000
trusted library allocation
page read and write
6C5C9FE000
unkown
page readonly
61ECD000
direct allocation
page readonly
3D9F000
stack
page read and write
7AA402958000
trusted library allocation
page read and write
7AA401074000
trusted library allocation
page read and write
7AA400C2C000
trusted library allocation
page read and write
7AA4027BF000
trusted library allocation
page read and write
9EC00250000
trusted library allocation
page read and write
7AA401EF9000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
7AA4013C8000
trusted library allocation
page read and write
7AA4006B0000
trusted library allocation
page read and write
7AA401454000
trusted library allocation
page read and write
2658008C8000
trusted library allocation
page read and write
85400100000
trusted library allocation
page read and write
6F0400274000
direct allocation
page read and write
6C549FE000
unkown
page readonly
7AA4015D4000
trusted library allocation
page read and write
85400130000
trusted library allocation
page read and write
1BBB5FD0000
heap
page read and write
1BBB7FAA000
heap
page read and write
7AA400790000
trusted library allocation
page read and write
1BBB7F53000
heap
page read and write
AF347FE000
unkown
page readonly
7AA401658000
trusted library allocation
page read and write
AF0D7FE000
unkown
page readonly
854000C0000
trusted library allocation
page read and write
9C7000
heap
page read and write
7AA4018BC000
trusted library allocation
page read and write
AF0F7FE000
unkown
page readonly
7AA400793000
trusted library allocation
page read and write
1BBB60A3000
heap
page read and write
2BF400264000
trusted library allocation
page read and write
854002EC000
trusted library allocation
page read and write
C1A000
heap
page read and write
1D5FA000
heap
page read and write
25C3EC00000
trusted library section
page read and write
7AA400874000
trusted library allocation
page read and write
7AA4016B8000
trusted library allocation
page read and write
AF25FFB000
stack
page read and write
7AA4006E0000
trusted library allocation
page read and write
7AA400E64000
trusted library allocation
page read and write
7AA400C9C000
trusted library allocation
page read and write
854002A4000
trusted library allocation
page read and write
7AA4014C0000
trusted library allocation
page read and write
265800880000
trusted library allocation
page read and write
2658006E8000
trusted library allocation
page read and write
7AA400DDC000
trusted library allocation
page read and write
1D612000
heap
page read and write
7AA401331000
trusted library allocation
page read and write
7AA401838000
trusted library allocation
page read and write
1357000
unkown
page execute and write copy
F77000
unkown
page execute and read and write
265800878000
trusted library allocation
page read and write
6C5A9FE000
unkown
page readonly
7AA4019CC000
trusted library allocation
page read and write
854000D0000
trusted library allocation
page read and write
1BBB6030000
heap
page read and write
5A8000
stack
page read and write
1D622000
heap
page read and write
8540005C000
trusted library allocation
page read and write
7AA401324000
trusted library allocation
page read and write
1D610000
heap
page read and write
7AA401A7C000
trusted library allocation
page read and write
7AA400FA0000
trusted library allocation
page read and write
39DF000
stack
page read and write
3F8000230000
direct allocation
page read and write
9D0000
direct allocation
page read and write
1BBB5FF0000
heap
page read and write
7AA4012F0000
trusted library allocation
page read and write
AF1E7FE000
unkown
page readonly
265800404000
trusted library allocation
page read and write
7AA400330000
trusted library allocation
page read and write
25C3EB90000
trusted library section
page read and write
7AA400390000
trusted library allocation
page read and write
25C3EF40000
trusted library section
page read and write
7AA400CC8000
trusted library allocation
page read and write
9EC0025C000
trusted library allocation
page read and write
AF227FE000
unkown
page readonly
2BF400235000
trusted library allocation
page read and write
AF147FE000
unkown
page readonly
7AA400F40000
trusted library allocation
page read and write
4A21000
heap
page read and write
AF28FFD000
stack
page read and write
854003A8000
trusted library allocation
page read and write
7AA401FD2000
trusted library allocation
page read and write
237B0000
trusted library allocation
page read and write
25C37C4B000
heap
page read and write
25C3E2AC000
trusted library section
page read and write
7AA4005C4000
trusted library allocation
page read and write
AF287FE000
unkown
page readonly
85400258000
trusted library allocation
page read and write
1340000
unkown
page execute and read and write
7AA4013B0000
trusted library allocation
page read and write
25C38120000
heap
page read and write
AF27FFE000
stack
page read and write
265800864000
trusted library allocation
page read and write
2658007D4000
trusted library allocation
page read and write
AF2EFFD000
stack
page read and write
7AA400344000
trusted library allocation
page read and write
7AA401E2C000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
1D5F4000
heap
page read and write
7AA401EE4000
trusted library allocation
page read and write
8540040F000
trusted library allocation
page read and write
465F000
stack
page read and write
7AA400E0C000
trusted library allocation
page read and write
2BF4002C0000
trusted library allocation
page read and write
9EC0027C000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
7AA4006DB000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA400D10000
trusted library allocation
page read and write
854001C0000
trusted library allocation
page read and write
7AA401DB0000
trusted library allocation
page read and write
7AA4001E0000
trusted library allocation
page read and write
854004A8000
trusted library allocation
page read and write
1BBB612B000
heap
page read and write
7AA400E94000
trusted library allocation
page read and write
7AA40115C000
trusted library allocation
page read and write
2BF400278000
trusted library allocation
page read and write
7AA401D88000
trusted library allocation
page read and write
7AA4001F4000
trusted library allocation
page read and write
7AA4009F0000
trusted library allocation
page read and write
7AA400330000
trusted library allocation
page read and write
7AA401E78000
trusted library allocation
page read and write
85400310000
trusted library allocation
page read and write
7AA400D54000
trusted library allocation
page read and write
22C0002F8000
trusted library allocation
page read and write
7AA400304000
trusted library allocation
page read and write
25C38181000
heap
page read and write
1D5FB000
heap
page read and write
265800890000
trusted library allocation
page read and write
85400244000
trusted library allocation
page read and write
7AA401359000
trusted library allocation
page read and write
6C81F000
unkown
page write copy
1D601000
heap
page read and write
7AA401D3C000
trusted library allocation
page read and write
854001A8000
trusted library allocation
page read and write
25C37C48000
heap
page read and write
7AA4002F3000
trusted library allocation
page read and write
7AA401074000
trusted library allocation
page read and write
7AA401948000
trusted library allocation
page read and write
85400348000
trusted library allocation
page read and write
7AA40002C000
trusted library allocation
page read and write
1D605000
heap
page read and write
85400304000
trusted library allocation
page read and write
7AA4002B4000
trusted library allocation
page read and write
7AA401904000
trusted library allocation
page read and write
7AA4002B4000
trusted library allocation
page read and write
7AA4001B4000
trusted library allocation
page read and write
AF2D7FE000
unkown
page readonly
6CAA0000
unkown
page readonly
7AA4001B4000
trusted library allocation
page read and write
7AA400E0C000
trusted library allocation
page read and write
AF33FFE000
stack
page read and write
7AA4028EB000
trusted library allocation
page read and write
7AA40105C000
trusted library allocation
page read and write
854002A8000
trusted library allocation
page read and write
25C346D1000
heap
page read and write
7AA40140C000
trusted library allocation
page read and write
7AA4009E0000
trusted library allocation
page read and write
441E000
stack
page read and write
AF30FFE000
stack
page read and write
1D622000
heap
page read and write
2BF400201000
trusted library allocation
page read and write
26580091C000
trusted library allocation
page read and write
7AA400A01000
trusted library allocation
page read and write
9EC00390000
trusted library allocation
page read and write
854002D4000
trusted library allocation
page read and write
7AA400F04000
trusted library allocation
page read and write
1D2FC000
stack
page read and write
1BBB6102000
heap
page read and write
7AA400498000
trusted library allocation
page read and write
2BF400250000
trusted library allocation
page read and write
265800250000
trusted library allocation
page read and write
7AA400990000
trusted library allocation
page read and write
7AA400778000
trusted library allocation
page read and write
1BBB6158000
heap
page read and write
7AA401980000
trusted library allocation
page read and write
1D622000
heap
page read and write
1D5EA000
heap
page read and write
7AA401024000
trusted library allocation
page read and write
25C3EC33000
trusted library section
page read and write
7AA401D90000
trusted library allocation
page read and write
7AA4014C0000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
25C37C3E000
heap
page read and write
7AA401E64000
trusted library allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
7AA4010A4000
trusted library allocation
page read and write
7AA400A0C000
trusted library allocation
page read and write
7AA40050C000
trusted library allocation
page read and write
7AA400C0C000
trusted library allocation
page read and write
4A21000
heap
page read and write
25C3A52A000
heap
page read and write
7AA4018D8000
trusted library allocation
page read and write
7AA401051000
trusted library allocation
page read and write
7AA400478000
trusted library allocation
page read and write
7AA4013E5000
trusted library allocation
page read and write
265800201000
trusted library allocation
page read and write
1349000
unkown
page execute and read and write
85400238000
trusted library allocation
page read and write
1BBB602C000
heap
page read and write
85400328000
trusted library allocation
page read and write
9EC00350000
trusted library allocation
page read and write
9EC002D0000
trusted library allocation
page read and write
1BBB60F4000
heap
page read and write
7AA401050000
trusted library allocation
page read and write
4A21000
heap
page read and write
1BBB6167000
heap
page read and write
7AA400EAC000
trusted library allocation
page read and write
2D9F000
stack
page read and write
7AA4001E8000
trusted library allocation
page read and write
AF1A7FE000
unkown
page readonly
4A30000
heap
page read and write
6C691FE000
stack
page read and write
6C5E9FE000
unkown
page readonly
455E000
stack
page read and write
7AA401088000
trusted library allocation
page read and write
25C38170000
heap
page read and write
7AA4010FC000
trusted library allocation
page read and write
7AA401704000
trusted library allocation
page read and write
7AA401DDC000
trusted library allocation
page read and write
1BBB7FDA000
heap
page read and write
1BBB7F8F000
heap
page read and write
7AA4001EC000
trusted library allocation
page read and write
25C381F1000
heap
page read and write
7AA400D54000
trusted library allocation
page read and write
7AA400824000
trusted library allocation
page read and write
7AA400228000
trusted library allocation
page read and write
7AA400201000
trusted library allocation
page read and write
7AA400224000
trusted library allocation
page read and write
AF0BFFE000
stack
page read and write
7AA400C94000
trusted library allocation
page read and write
3F800020C000
direct allocation
page read and write
7AA40048A000
trusted library allocation
page read and write
7AA40140C000
trusted library allocation
page read and write
6C7DF000
unkown
page readonly
23ADA000
heap
page read and write
7AA401B40000
trusted library allocation
page read and write
265800844000
trusted library allocation
page read and write
7AA4014C0000
trusted library allocation
page read and write
85400054000
trusted library allocation
page read and write
2658002F0000
trusted library allocation
page read and write
1D60C000
heap
page read and write
7AA4001D8000
trusted library allocation
page read and write
25C3E7F7000
unclassified section
page read and write
4A21000
heap
page read and write
7AA400688000
trusted library allocation
page read and write
8540040C000
trusted library allocation
page read and write
AF13FFE000
stack
page read and write
7AA401310000
trusted library allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
7AA400EAC000
trusted library allocation
page read and write
1CF3F000
stack
page read and write
2658006AC000
trusted library allocation
page read and write
2658008D8000
trusted library allocation
page read and write
7AA401AB0000
trusted library allocation
page read and write
7AA401A9C000
trusted library allocation
page read and write
2BF4002C8000
trusted library allocation
page read and write
2658008E8000
trusted library allocation
page read and write
9EC0039C000
trusted library allocation
page read and write
7AA4002C0000
trusted library allocation
page read and write
1D5E1000
heap
page read and write
4A21000
heap
page read and write
7AA4017F0000
trusted library allocation
page read and write
7AA401524000
trusted library allocation
page read and write
7AA401E24000
trusted library allocation
page read and write
AF0E7FE000
unkown
page readonly
6F0400311000
direct allocation
page read and write
7AA400694000
trusted library allocation
page read and write
25C3E82E000
trusted library section
page read and write
419E000
stack
page read and write
7AA4018D4000
trusted library allocation
page read and write
7AA400364000
trusted library allocation
page read and write
7AA4001F0000
trusted library allocation
page read and write
7AA401A8C000
trusted library allocation
page read and write
85400030000
trusted library allocation
page read and write
25C3E5FE000
trusted library section
page read and write
AF15FFE000
stack
page read and write
AF29FFD000
stack
page read and write
C03000
heap
page read and write
123F000
unkown
page execute and read and write
61E01000
direct allocation
page execute read
7AA4019C8000
trusted library allocation
page read and write
AF1BFFE000
stack
page read and write
7AA401A0C000
trusted library allocation
page read and write
1BBB6100000
heap
page read and write
7AA400DD0000
trusted library allocation
page read and write
265800790000
trusted library allocation
page read and write
7AA401D40000
trusted library allocation
page read and write
AF2BFFC000
stack
page read and write
DC0000
direct allocation
page execute and read and write
25C34570000
heap
page read and write
6C579FE000
unkown
page readonly
4A21000
heap
page read and write
361F000
stack
page read and write
7AA4001D0000
trusted library allocation
page read and write
BC8000
heap
page read and write
7AA4016DC000
trusted library allocation
page read and write
AF1F7FC000
stack
page read and write
7AA401398000
trusted library allocation
page read and write
7AA401588000
trusted library allocation
page read and write
7AA401301000
trusted library allocation
page read and write
7AA401E20000
trusted library allocation
page read and write
1D612000
heap
page read and write
1D5FA000
heap
page read and write
3F80002D0000
direct allocation
page read and write
B30000
heap
page read and write
7AA4029B8000
trusted library allocation
page read and write
7AA401094000
trusted library allocation
page read and write
7AA401D98000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
3C9E000
stack
page read and write
7AA401984000
trusted library allocation
page read and write
6C6E1FE000
stack
page read and write
854003A4000
trusted library allocation
page read and write
8540013C000
trusted library allocation
page read and write
1BBB605E000
heap
page read and write
F19000
unkown
page execute and read and write
7AA40047D000
trusted library allocation
page read and write
25C37C49000
heap
page read and write
2BF400274000
trusted library allocation
page read and write
1CF7E000
stack
page read and write
7AA401AE8000
trusted library allocation
page read and write
7AA401034000
trusted library allocation
page read and write
7AA400970000
trusted library allocation
page read and write
4A21000
heap
page read and write
25C37C49000
heap
page read and write
7AA400D54000
trusted library allocation
page read and write
25C3469D000
heap
page read and write
7AA401EF0000
trusted library allocation
page read and write
7AA40116C000
trusted library allocation
page read and write
25C3EF0D000
trusted library section
page read and write
4A21000
heap
page read and write
EE4000
unkown
page execute and read and write
265800220000
trusted library allocation
page read and write
854002F8000
trusted library allocation
page read and write
AF387FE000
unkown
page readonly
9EC0020C000
trusted library allocation
page read and write
85400270000
trusted library allocation
page read and write
25C3E5F0000
trusted library section
page read and write
4A34000
heap
page read and write
365E000
stack
page read and write
7AA400937000
trusted library allocation
page read and write
7AA400A58000
trusted library allocation
page read and write
22C0002A0000
trusted library allocation
page read and write
7AA40172C000
trusted library allocation
page read and write
6C4A1F3000
stack
page read and write
7AA40273C000
trusted library allocation
page read and write
7AA400432000
trusted library allocation
page read and write
7AA4013A4000
trusted library allocation
page read and write
9EC0032C000
trusted library allocation
page read and write
85400174000
trusted library allocation
page read and write
7AA400290000
trusted library allocation
page read and write
6F0400220000
direct allocation
page read and write
7AA401454000
trusted library allocation
page read and write
7AA400DAC000
trusted library allocation
page read and write
23853000
heap
page read and write
26580025C000
trusted library allocation
page read and write
22C000260000
trusted library allocation
page read and write
7AA401074000
trusted library allocation
page read and write
7AA4007A8000
trusted library allocation
page read and write
1D5EA000
heap
page read and write
854002B8000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
7AA401534000
trusted library allocation
page read and write
7AA4016B8000
trusted library allocation
page read and write
7AA4002D0000
trusted library allocation
page read and write
7AA400FDC000
trusted library allocation
page read and write
26580040C000
trusted library allocation
page read and write
7AA401A90000
trusted library allocation
page read and write
22C000210000
trusted library allocation
page read and write
6C519FE000
unkown
page readonly
7AA400F74000
trusted library allocation
page read and write
7AA40190C000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA401CE4000
trusted library allocation
page read and write
1BBB6044000
heap
page read and write
1D5F2000
heap
page read and write
22C000288000
trusted library allocation
page read and write
7AA4018C0000
trusted library allocation
page read and write
9EC003A0000
trusted library allocation
page read and write
85400430000
trusted library allocation
page read and write
265800430000
trusted library allocation
page read and write
1D60C000
heap
page read and write
1BBB7E13000
heap
page read and write
7AA401303000
trusted library allocation
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
1D5F5000
heap
page read and write
7AA4019F4000
trusted library allocation
page read and write
1D33E000
stack
page read and write
6F04002D8000
direct allocation
page read and write
9D0000
direct allocation
page read and write
26580039C000
trusted library allocation
page read and write
7AA40140C000
trusted library allocation
page read and write
7AA401CD8000
trusted library allocation
page read and write
2BF400270000
trusted library allocation
page read and write
25C37C43000
heap
page read and write
1D5FB000
heap
page read and write
7AA401201000
trusted library allocation
page read and write
2392E000
stack
page read and write
7AA402848000
trusted library allocation
page read and write
7AA4018F4000
trusted library allocation
page read and write
7AA400601000
trusted library allocation
page read and write
7AA401B04000
trusted library allocation
page read and write
1BBB60BD000
heap
page read and write
2658007E4000
trusted library allocation
page read and write
1BBB6130000
heap
page read and write
4A21000
heap
page read and write
AF367FE000
unkown
page readonly
2658007C0000
trusted library allocation
page read and write
1D0BE000
stack
page read and write
1D5E4000
heap
page read and write
7AA400FA0000
trusted library allocation
page read and write
6C699FE000
unkown
page readonly
7AA400AB8000
trusted library allocation
page read and write
7AA401854000
trusted library allocation
page read and write
42DE000
stack
page read and write
6C5A1FD000
stack
page read and write
AF17FFA000
stack
page read and write
4A21000
heap
page read and write
7AA401454000
trusted library allocation
page read and write
7AA401330000
trusted library allocation
page read and write
22C0002B4000
trusted library allocation
page read and write
6CB49000
unkown
page readonly
4A21000
heap
page read and write
25C3EBA1000
trusted library section
page read and write
25C3E5C7000
unclassified section
page read and write
7AA400900000
trusted library allocation
page read and write
2658002B8000
trusted library allocation
page read and write
1D622000
heap
page read and write
8540021C000
trusted library allocation
page read and write
6C511FE000
stack
page read and write
7AA400C0C000
trusted library allocation
page read and write
7AA400E48000
trusted library allocation
page read and write
25C37C47000
heap
page read and write
85400201000
trusted library allocation
page read and write
854003B8000
trusted library allocation
page read and write
1D605000
heap
page read and write
25C381E2000
heap
page read and write
7AA400FA8000
trusted library allocation
page read and write
25C37C49000
heap
page read and write
3B5E000
stack
page read and write
7AA401001000
trusted library allocation
page read and write
7AA400B74000
trusted library allocation
page read and write
7AA401B50000
trusted library allocation
page read and write
4A40000
heap
page read and write
7AA402204000
trusted library allocation
page read and write
9B0000
heap
page read and write
7AA4001E4000
trusted library allocation
page read and write
25C3C3C2000
trusted library allocation
page read and write
1BBB7F2D000
heap
page read and write
8540026C000
trusted library allocation
page read and write
7AA401824000
trusted library allocation
page read and write
7AA402781000
trusted library allocation
page read and write
7AA4009F0000
trusted library allocation
page read and write
7AA400FDC000
trusted library allocation
page read and write
7AA401430000
trusted library allocation
page read and write
103E000
unkown
page execute and read and write
854002EC000
trusted library allocation
page read and write
479F000
stack
page read and write
6C6B1FE000
stack
page read and write
6C6C1FE000
stack
page read and write
7AA400DD2000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
1D6F0000
trusted library allocation
page read and write
22C0002B4000
trusted library allocation
page read and write
7AA401850000
trusted library allocation
page read and write
6CAA1000
unkown
page execute read
7AA401860000
trusted library allocation
page read and write
7AA400A8C000
trusted library allocation
page read and write
22C000248000
trusted library allocation
page read and write
3B1F000
stack
page read and write
6F04002D0000
direct allocation
page read and write
7AA40182C000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA402643000
trusted library allocation
page read and write
25C3E2A0000
trusted library section
page read and write
6F0400260000
direct allocation
page read and write
7AA40264C000
trusted library allocation
page read and write
7AA400CA8000
trusted library allocation
page read and write
854003E4000
trusted library allocation
page read and write
25C38153000
heap
page read and write
7AA400801000
trusted library allocation
page read and write
1BBB7F40000
heap
page read and write
25C3EE42000
trusted library section
page read and write
7AA400304000
trusted library allocation
page read and write
25C381F7000
heap
page read and write
7AA400EAC000
trusted library allocation
page read and write
7AA400CFC000
trusted library allocation
page read and write
854002B0000
trusted library allocation
page read and write
1D5EA000
heap
page read and write
237B0000
trusted library allocation
page read and write
7AA400704000
trusted library allocation
page read and write
7AA400E0C000
trusted library allocation
page read and write
7AA402645000
trusted library allocation
page read and write
7AA401668000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
6F04002C0000
direct allocation
page read and write
7AA400478000
trusted library allocation
page read and write
AF14FFE000
stack
page read and write
8540028C000
trusted library allocation
page read and write
25C37C3E000
heap
page read and write
22C0002B4000
trusted library allocation
page read and write
7AA400C58000
trusted library allocation
page read and write
7AA40120C000
trusted library allocation
page read and write
7AA400390000
trusted library allocation
page read and write
7AA400344000
trusted library allocation
page read and write
1BBB60CC000
heap
page read and write
3F80002E4000
direct allocation
page read and write
4FDF000
stack
page read and write
25C381EF000
heap
page read and write
491E000
stack
page read and write
26580039C000
trusted library allocation
page read and write
7AA401D04000
trusted library allocation
page read and write
7AA401EE4000
trusted library allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
22C0002C8000
trusted library allocation
page read and write
AF157FE000
unkown
page readonly
7AA401A48000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
2658006E0000
trusted library allocation
page read and write
6F04002D0000
direct allocation
page read and write
7AA4012B0000
trusted library allocation
page read and write
9EC00358000
trusted library allocation
page read and write
7AA401810000
trusted library allocation
page read and write
7AA400C74000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
7AA40080C000
trusted library allocation
page read and write
7AA400304000
trusted library allocation
page read and write
7AA400380000
trusted library allocation
page read and write
7AA400478000
trusted library allocation
page read and write
25C37C20000
heap
page read and write
1BBB6102000
heap
page read and write
25C347F0000
trusted library section
page readonly
325F000
stack
page read and write
7AA401330000
trusted library allocation
page read and write
1D603000
heap
page read and write
9EC003C0000
trusted library allocation
page read and write
7AA40288C000
trusted library allocation
page read and write
B2E000
stack
page read and write
85400214000
trusted library allocation
page read and write
2FDF000
stack
page read and write
AF20FFC000
stack
page read and write
5000000
direct allocation
page execute and read and write
6C689FE000
unkown
page readonly
7AA4006D5000
trusted library allocation
page read and write
D5E000
stack
page read and write
1BBB7F60000
heap
page read and write
265800860000
trusted library allocation
page read and write
AF09FFE000
stack
page read and write
7AA402944000
trusted library allocation
page read and write
B6A000
heap
page read and write
854002B4000
trusted library allocation
page read and write
351E000
stack
page read and write
4A21000
heap
page read and write
25C348A5000
heap
page read and write
4A21000
heap
page read and write
7AA401FA8000
trusted library allocation
page read and write
1BBB6000000
heap
page read and write
854001DC000
trusted library allocation
page read and write
7AA400390000
trusted library allocation
page read and write
7AA4000DC000
trusted library allocation
page read and write
7AA401704000
trusted library allocation
page read and write
85400304000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
6C81E000
unkown
page read and write
1BBC0402000
heap
page read and write
25C3DD17000
unclassified section
page read and write
7AA400850000
trusted library allocation
page read and write
22C000238000
trusted library allocation
page read and write
6F0400217000
direct allocation
page read and write
7AA40120C000
trusted library allocation
page read and write
265800408000
trusted library allocation
page read and write
9EC00320000
trusted library allocation
page read and write
7AA400DB9000
trusted library allocation
page read and write
9EC00284000
trusted library allocation
page read and write
7AA401A01000
trusted library allocation
page read and write
2658002CC000
trusted library allocation
page read and write
7AA400FE5000
trusted library allocation
page read and write
7AA4013F4000
trusted library allocation
page read and write
265800828000
trusted library allocation
page read and write
6F0400212000
direct allocation
page read and write
7AA401D00000
trusted library allocation
page read and write
1CE3E000
stack
page read and write
AF2DFFD000
stack
page read and write
7AA40033C000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
6F0400244000
direct allocation
page read and write
7AA401E60000
trusted library allocation
page read and write
AF207FE000
unkown
page readonly
7AA40033C000
trusted library allocation
page read and write
6F040024C000
direct allocation
page read and write
2658002D4000
trusted library allocation
page read and write
6F0400308000
direct allocation
page read and write
22C0002B4000
trusted library allocation
page read and write
AF2B7FE000
unkown
page readonly
7AA400380000
trusted library allocation
page read and write
265800920000
trusted library allocation
page read and write
AF0B7FE000
unkown
page readonly
7AA4008D4000
trusted library allocation
page read and write
7AA400DAC000
trusted library allocation
page read and write
22C000294000
trusted library allocation
page read and write
7AA4026AC000
trusted library allocation
page read and write
25C3A4E1000
heap
page read and write
7AA401074000
trusted library allocation
page read and write
85400439000
trusted library allocation
page read and write
1BBB60AE000
heap
page read and write
1D4CD000
stack
page read and write
7AA400164000
trusted library allocation
page read and write
1D604000
heap
page read and write
4A21000
heap
page read and write
7AA401E40000
trusted library allocation
page read and write
469E000
stack
page read and write
4A21000
heap
page read and write
7AA4027B8000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
854002C0000
trusted library allocation
page read and write
7AA401A38000
trusted library allocation
page read and write
26580084C000
trusted library allocation
page read and write
1D5EA000
heap
page read and write
8E0000
heap
page read and write
7AA4002A8000
trusted library allocation
page read and write
1BBB60F4000
heap
page read and write
265800424000
trusted library allocation
page read and write
25C346C9000
heap
page read and write
7AA401AD4000
trusted library allocation
page read and write
8540011C000
trusted library allocation
page read and write
AF197FE000
unkown
page readonly
6C639FE000
unkown
page readonly
7AA401E0C000
trusted library allocation
page read and write
7AA400E28000
trusted library allocation
page read and write
7AA400F14000
trusted library allocation
page read and write
25C34850000
heap
page read and write
9EC002A4000
trusted library allocation
page read and write
7AA40093C000
trusted library allocation
page read and write
7AA401FAA000
trusted library allocation
page read and write
8540012C000
trusted library allocation
page read and write
9EC00288000
trusted library allocation
page read and write
22C0002B4000
trusted library allocation
page read and write
2658002F4000
trusted library allocation
page read and write
2658006AC000
trusted library allocation
page read and write
2BF4002A0000
trusted library allocation
page read and write
237B0000
heap
page read and write
25C3814D000
heap
page read and write
7AA401EEF000
trusted library allocation
page read and write
7AA401684000
trusted library allocation
page read and write
25C34840000
heap
page read and write
7AA401350000
trusted library allocation
page read and write
7AA400A34000
trusted library allocation
page read and write
6F04002A8000
direct allocation
page read and write
9EC00300000
trusted library allocation
page read and write
1D622000
heap
page read and write
7AA400FA8000
trusted library allocation
page read and write
7AA401F0C000
trusted library allocation
page read and write
7AA40139A000
trusted library allocation
page read and write
9EC00380000
trusted library allocation
page read and write
7AA400CB0000
trusted library allocation
page read and write
3F800024C000
direct allocation
page read and write
7AA400DAC000
trusted library allocation
page read and write
7AA401018000
trusted library allocation
page read and write
85400434000
trusted library allocation
page read and write
1BBB7F4E000
heap
page read and write
1358000
unkown
page execute and write copy
1BBB7FAE000
heap
page read and write
AF10FFC000
stack
page read and write
26580081C000
trusted library allocation
page read and write
6C501FE000
stack
page read and write
7AA400B40000
trusted library allocation
page read and write
85400158000
trusted library allocation
page read and write
7AA40180C000
trusted library allocation
page read and write
854003D4000
trusted library allocation
page read and write
25C37C43000
heap
page read and write
7AA4012B0000
trusted library allocation
page read and write
7AA401A28000
trusted library allocation
page read and write
7AA4018AC000
trusted library allocation
page read and write
7AA401EF4000
trusted library allocation
page read and write
7AA4013D0000
trusted library allocation
page read and write
3F8000215000
direct allocation
page read and write
7AA400C8C000
trusted library allocation
page read and write
9EC00310000
trusted library allocation
page read and write
1BBB6102000
heap
page read and write
7AA400578000
trusted library allocation
page read and write
7AA400EF4000
trusted library allocation
page read and write
6F0400303000
direct allocation
page read and write
6F0400210000
direct allocation
page read and write
6C5B1FC000
stack
page read and write
AF22FFD000
stack
page read and write
7AA400FEC000
trusted library allocation
page read and write
AF247FE000
unkown
page readonly
7AA401668000
trusted library allocation
page read and write
25C37C4F000
heap
page read and write
7AA400DAC000
trusted library allocation
page read and write
2BF4002A0000
trusted library allocation
page read and write
7AA4016B8000
trusted library allocation
page read and write
22C0002B8000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
9EC00220000
trusted library allocation
page read and write
7AA401B3C000
trusted library allocation
page read and write
1BBB60ED000
heap
page read and write
7AA4012A8000
trusted library allocation
page read and write
2BF4002A4000
trusted library allocation
page read and write
7AA400B54000
trusted library allocation
page read and write
1D5FA000
heap
page read and write
6C61D000
unkown
page readonly
2658002B0000
trusted library allocation
page read and write
9EC002F1000
trusted library allocation
page read and write
25C38176000
heap
page read and write
7AA400E0C000
trusted library allocation
page read and write
265800778000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
7AA401908000
trusted library allocation
page read and write
6C541FE000
stack
page read and write
7AA400D74000
trusted library allocation
page read and write
7AA40172C000
trusted library allocation
page read and write
854001F8000
trusted library allocation
page read and write
1D603000
heap
page read and write
7AA400EDC000
trusted library allocation
page read and write
1BBB6127000
heap
page read and write
2658006AC000
trusted library allocation
page read and write
7AA400A50000
trusted library allocation
page read and write
7AA400D54000
trusted library allocation
page read and write
7AA402898000
trusted library allocation
page read and write
2BF40020C000
trusted library allocation
page read and write
2E9F000
stack
page read and write
7AA4009F0000
trusted library allocation
page read and write
6C632000
unkown
page readonly
854002EC000
trusted library allocation
page read and write
7AA4013DC000
trusted library allocation
page read and write
7AA401542000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA400E70000
trusted library allocation
page read and write
7AA401E8C000
trusted library allocation
page read and write
23AD2000
heap
page read and write
7AA40006A000
trusted library allocation
page read and write
7AA401AC0000
trusted library allocation
page read and write
1D1FD000
stack
page read and write
7AA4002C9000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
7AA401C01000
trusted library allocation
page read and write
7AA4018A8000
trusted library allocation
page read and write
22C0002A8000
trusted library allocation
page read and write
7AA4011C8000
trusted library allocation
page read and write
7AA401094000
trusted library allocation
page read and write
DB0000
direct allocation
page execute and read and write
7AA402748000
trusted library allocation
page read and write
7AA401401000
trusted library allocation
page read and write
7AA400E0C000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
1BBB6161000
heap
page read and write
7AA4002F0000
trusted library allocation
page read and write
85400168000
trusted library allocation
page read and write
1BBB7F53000
heap
page read and write
7AA40133C000
trusted library allocation
page read and write
5AC000
stack
page read and write
7AA401F3C000
trusted library allocation
page read and write
AF237FE000
unkown
page readonly
25C37C4F000
heap
page read and write
1BBB7F90000
heap
page read and write
7AA4013DC000
trusted library allocation
page read and write
7AA40147A000
trusted library allocation
page read and write
14F6000
unkown
page execute and write copy
854000B4000
trusted library allocation
page read and write
854002BC000
trusted library allocation
page read and write
7AA400E17000
trusted library allocation
page read and write
25C3EE4E000
trusted library section
page read and write
2658006BC000
trusted library allocation
page read and write
7AA400E0D000
trusted library allocation
page read and write
7AA40060C000
trusted library allocation
page read and write
4ECB000
direct allocation
page read and write
854001E0000
trusted library allocation
page read and write
451F000
stack
page read and write
1BBB6100000
heap
page read and write
1D5D0000
heap
page read and write
6C631FE000
stack
page read and write
3F8000303000
direct allocation
page read and write
7AA400478000
trusted library allocation
page read and write
7AA400E15000
trusted library allocation
page read and write
4A21000
heap
page read and write
1D43D000
stack
page read and write
2EDE000
stack
page read and write
9EC00401000
trusted library allocation
page read and write
7AA401330000
trusted library allocation
page read and write
1D5FD000
heap
page read and write
10BA000
unkown
page execute and read and write
265800288000
trusted library allocation
page read and write
4A21000
heap
page read and write
1BBB7F8B000
heap
page read and write
4A21000
heap
page read and write
25C381F3000
heap
page read and write
1D622000
heap
page read and write
7AA40042D000
trusted library allocation
page read and write
7AA401F54000
trusted library allocation
page read and write
1BBB60B7000
heap
page read and write
6C6A1FE000
stack
page read and write
1BBB60A3000
heap
page read and write
8540041C000
trusted library allocation
page read and write
7AA400B00000
trusted library allocation
page read and write
7AA40147A000
trusted library allocation
page read and write
6C709FE000
unkown
page readonly
7AA401A24000
trusted library allocation
page read and write
22C000294000
trusted library allocation
page read and write
2BF400248000
trusted library allocation
page read and write
6C589FE000
unkown
page readonly
9EC00430000
trusted library allocation
page read and write
854001E4000
trusted library allocation
page read and write
2BF4002A0000
trusted library allocation
page read and write
1BBB60F5000
heap
page read and write
85400348000
trusted library allocation
page read and write
7AA400EEC000
trusted library allocation
page read and write
7AA4005F4000
trusted library allocation
page read and write
22C0002B4000
trusted library allocation
page read and write
7AA40100C000
trusted library allocation
page read and write
7AA401620000
trusted library allocation
page read and write
1D5CD000
stack
page read and write
7AA401398000
trusted library allocation
page read and write
22C000210000
trusted library allocation
page read and write
7AA4007E8000
trusted library allocation
page read and write
1D5F7000
heap
page read and write
3F80002DC000
direct allocation
page read and write
1D5FB000
heap
page read and write
38DE000
stack
page read and write
7AA40033C000
trusted library allocation
page read and write
26580027C000
trusted library allocation
page read and write
F3E000
unkown
page execute and read and write
854001D0000
trusted library allocation
page read and write
7AA400F78000
trusted library allocation
page read and write
1BBB60A8000
heap
page read and write
DFC000
unkown
page execute and read and write
1CDFF000
stack
page read and write
85400280000
trusted library allocation
page read and write
1D5E0000
heap
page read and write
1D07E000
stack
page read and write
7AA400308000
trusted library allocation
page read and write
7AA400482000
trusted library allocation
page read and write
854001B4000
trusted library allocation
page read and write
7AA400AA4000
trusted library allocation
page read and write
7AA401DC0000
trusted library allocation
page read and write
7AA401F1A000
trusted library allocation
page read and write
7AA401190000
trusted library allocation
page read and write
401F000
stack
page read and write
7AA400350000
trusted library allocation
page read and write
1D604000
heap
page read and write
85400354000
trusted library allocation
page read and write
2658006F0000
trusted library allocation
page read and write
99E000
stack
page read and write
22C0002D8000
trusted library allocation
page read and write
6F0400290000
direct allocation
page read and write
3DDE000
stack
page read and write
7AA40186C000
trusted library allocation
page read and write
7AA401AC4000
trusted library allocation
page read and write
7AA401454000
trusted library allocation
page read and write
4EDC000
stack
page read and write
26580071C000
trusted library allocation
page read and write
7AA4002FB000
trusted library allocation
page read and write
7AA401DB8000
trusted library allocation
page read and write
AF0DFF8000
stack
page read and write
1D5F2000
heap
page read and write
2BF4002B0000
trusted library allocation
page read and write
AF127FE000
unkown
page readonly
AF117FE000
unkown
page readonly
2658006C8000
trusted library allocation
page read and write
3F8000220000
direct allocation
page read and write
1D622000
heap
page read and write
4A21000
heap
page read and write
1BBB612B000
heap
page read and write
7AA401880000
trusted library allocation
page read and write
34DF000
stack
page read and write
8540029C000
trusted library allocation
page read and write
7AA401E1C000
trusted library allocation
page read and write
7AA401601000
trusted library allocation
page read and write
7AA4009C0000
trusted library allocation
page read and write
9EC003C4000
trusted library allocation
page read and write
7AA40198C000
trusted library allocation
page read and write
25C37C47000
heap
page read and write
25C3EC10000
trusted library section
page read and write
7AA401E28000
trusted library allocation
page read and write
7AA400430000
trusted library allocation
page read and write
25C3A4D0000
heap
page read and write
22C0002FC000
trusted library allocation
page read and write
4A21000
heap
page read and write
AF257FE000
unkown
page readonly
22C000270000
trusted library allocation
page read and write
7AA400FA8000
trusted library allocation
page read and write
AF377FE000
unkown
page readonly
1BBB7F4C000
heap
page read and write
7AA4010A4000
trusted library allocation
page read and write
9EC002B0000
trusted library allocation
page read and write
AF2FFFD000
stack
page read and write
3C5F000
stack
page read and write
7AA401648000
trusted library allocation
page read and write
7AA400144000
trusted library allocation
page read and write
7AA400D48000
trusted library allocation
page read and write
265800884000
trusted library allocation
page read and write
AF19FFE000
stack
page read and write
9EC00238000
trusted library allocation
page read and write
23AD2000
heap
page read and write
85400250000
trusted library allocation
page read and write
7AA4019E8000
trusted library allocation
page read and write
1BBB6102000
heap
page read and write
9D0000
direct allocation
page read and write
6F0400318000
direct allocation
page read and write
7AA400C18000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA40033C000
trusted library allocation
page read and write
7AA4013A4000
trusted library allocation
page read and write
85400424000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
7AA400FB8000
trusted library allocation
page read and write
6F040021C000
direct allocation
page read and write
2BF4002A0000
trusted library allocation
page read and write
7AA40066C000
trusted library allocation
page read and write
AF11FFB000
stack
page read and write
6C6A9FE000
unkown
page readonly
4A21000
heap
page read and write
7AA401D10000
trusted library allocation
page read and write
1D5FB000
heap
page read and write
C0E000
heap
page read and write
7AA400D58000
trusted library allocation
page read and write
9EC00374000
trusted library allocation
page read and write
7AA40033C000
trusted library allocation
page read and write
265800898000
trusted library allocation
page read and write
6C4B9FE000
unkown
page readonly
48DF000
stack
page read and write
6F0400201000
direct allocation
page read and write
311F000
stack
page read and write
25C345C0000
heap
page read and write
4A21000
heap
page read and write
7AA400D3C000
trusted library allocation
page read and write
7AA4016D0000
trusted library allocation
page read and write
1BBBF070000
trusted library allocation
page read and write
7AA400E54000
trusted library allocation
page read and write
7AA401454000
trusted library allocation
page read and write
7AA400001000
trusted library allocation
page read and write
7AA400044000
trusted library allocation
page read and write
7AA400013000
trusted library allocation
page read and write
6C6E9FE000
unkown
page readonly
C0D000
heap
page read and write
7AA4011B4000
trusted library allocation
page read and write
AF1B7FE000
unkown
page readonly
25C3A559000
heap
page read and write
1D5D6000
heap
page read and write
7AA401CBC000
trusted library allocation
page read and write
1BBB7FBD000
heap
page read and write
25C3A514000
heap
page read and write
2658008EC000
trusted library allocation
page read and write
1BBB60D1000
heap
page read and write
7AA400DE8000
trusted library allocation
page read and write
2BF400294000
trusted library allocation
page read and write
7AA400478000
trusted library allocation
page read and write
8540024C000
trusted library allocation
page read and write
3F8000294000
direct allocation
page read and write
265800248000
trusted library allocation
page read and write
7AA401AC8000
trusted library allocation
page read and write
25C3A4E8000
heap
page read and write
854002A0000
trusted library allocation
page read and write
6C6B9FE000
unkown
page readonly
6CB47000
unkown
page read and write
7AA40282C000
trusted library allocation
page read and write
23665000
heap
page read and write
7AA4015C0000
trusted library allocation
page read and write
854002E0000
trusted library allocation
page read and write
7AA400430000
trusted library allocation
page read and write
7AA400154000
trusted library allocation
page read and write
85400284000
trusted library allocation
page read and write
854000F0000
trusted library allocation
page read and write
AF34FFE000
stack
page read and write
265800840000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
4A21000
heap
page read and write
9D0000
direct allocation
page read and write
7AA40027C000
trusted library allocation
page read and write
25C347B0000
trusted library allocation
page read and write
9EC0031C000
trusted library allocation
page read and write
7AA400D9C000
trusted library allocation
page read and write
1D605000
heap
page read and write
7AA400E10000
trusted library allocation
page read and write
7AA401674000
trusted library allocation
page read and write
AF357FE000
unkown
page readonly
6C4C1FF000
stack
page read and write
7AA401E5C000
trusted library allocation
page read and write
7AA400344000
trusted library allocation
page read and write
6C5D1FE000
stack
page read and write
1BBB7F34000
heap
page read and write
8540040C000
trusted library allocation
page read and write
238B0000
trusted library allocation
page read and write
6C581FC000
stack
page read and write
AF2A7FE000
unkown
page readonly
7AA40279F000
trusted library allocation
page read and write
7AA400074000
trusted library allocation
page read and write
85400484000
trusted library allocation
page read and write
2BF4002A4000
trusted library allocation
page read and write
7AA401CBC000
trusted library allocation
page read and write
25C34590000
heap
page read and write
6C6C9FE000
unkown
page readonly
7AA402720000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA401B60000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
1BBB60BC000
heap
page read and write
2BF4002D8000
trusted library allocation
page read and write
AF2CFFE000
stack
page read and write
7AA400CF1000
trusted library allocation
page read and write
F6B000
unkown
page execute and read and write
4A21000
heap
page read and write
8540020C000
trusted library allocation
page read and write
AF297FE000
unkown
page readonly
7AA401308000
trusted library allocation
page read and write
7AA4004D0000
trusted library allocation
page read and write
7AA400C7C000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA400E0C000
trusted library allocation
page read and write
7AA401A10000
trusted library allocation
page read and write
7AA40129C000
trusted library allocation
page read and write
8540049C000
trusted library allocation
page read and write
4A21000
heap
page read and write
2658008C4000
trusted library allocation
page read and write
7AA40019C000
trusted library allocation
page read and write
25C38174000
heap
page read and write
AF1D7FE000
unkown
page readonly
7AA4014E5000
trusted library allocation
page read and write
7AA401DB0000
trusted library allocation
page read and write
4A21000
heap
page read and write
1BBB7FD4000
heap
page read and write
3F80002A8000
direct allocation
page read and write
7AA400E38000
trusted library allocation
page read and write
7AA40139E000
trusted library allocation
page read and write
6C6D9FE000
unkown
page readonly
9EC00248000
trusted library allocation
page read and write
25C36DD0000
unkown
page read and write
85400390000
trusted library allocation
page read and write
2658006D4000
trusted library allocation
page read and write
7AA400EAC000
trusted library allocation
page read and write
85400260000
trusted library allocation
page read and write
AF16FFD000
stack
page read and write
2BF4002C0000
trusted library allocation
page read and write
7AA402A01000
trusted library allocation
page read and write
1D622000
heap
page read and write
6F0400280000
direct allocation
page read and write
AF0C7FE000
unkown
page readonly
1BBB60ED000
heap
page read and write
2BF4002C0000
trusted library allocation
page read and write
1D5FB000
heap
page read and write
BB4000
heap
page read and write
2BF400220000
trusted library allocation
page read and write
7AA400838000
trusted library allocation
page read and write
7AA400B6C000
trusted library allocation
page read and write
1D5FB000
heap
page read and write
9EC0040C000
trusted library allocation
page read and write
265800818000
trusted library allocation
page read and write
7AA401B4C000
trusted library allocation
page read and write
7AA401B0C000
trusted library allocation
page read and write
7AA400A3C000
trusted library allocation
page read and write
AF23FFC000
stack
page read and write
7AA400D1C000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
7AA401D58000
trusted library allocation
page read and write
7AA401A60000
trusted library allocation
page read and write
7AA40073C000
trusted library allocation
page read and write
7AA400E84000
trusted library allocation
page read and write
7AA40067C000
trusted library allocation
page read and write
25C37C3E000
heap
page read and write
85400228000
trusted library allocation
page read and write
1BBB7F46000
heap
page read and write
339F000
stack
page read and write
1D60A000
heap
page read and write
7AA40147A000
trusted library allocation
page read and write
25C38186000
heap
page read and write
1BBB7F00000
heap
page read and write
7AA4015A4000
trusted library allocation
page read and write
7AA400D9C000
trusted library allocation
page read and write
AF36FFC000
stack
page read and write
7AA400C01000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
7AA4001B4000
trusted library allocation
page read and write
25C3B820000
trusted library allocation
page read and write
AF06FEF000
stack
page read and write
1D604000
heap
page read and write
1BBB7F44000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
7AA4014C0000
trusted library allocation
page read and write
7AA401668000
trusted library allocation
page read and write
7AA4017EC000
trusted library allocation
page read and write
7AA402925000
trusted library allocation
page read and write
237D0000
heap
page read and write
7AA4018E0000
trusted library allocation
page read and write
7AA400BAC000
trusted library allocation
page read and write
7AA400E20000
trusted library allocation
page read and write
7AA402699000
trusted library allocation
page read and write
7AA400350000
trusted library allocation
page read and write
1D61E000
heap
page read and write
265800974000
trusted library allocation
page read and write
1038000
unkown
page execute and read and write
7AA401618000
trusted library allocation
page read and write
7AA402601000
trusted library allocation
page read and write
6C649FE000
unkown
page readonly
854000A4000
trusted library allocation
page read and write
7AA400118000
trusted library allocation
page read and write
7AA401044000
trusted library allocation
page read and write
25C381DA000
heap
page read and write
B60000
heap
page read and write
7AA401E01000
trusted library allocation
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
8540025C000
trusted library allocation
page read and write
854000D8000
trusted library allocation
page read and write
7AA4012B0000
trusted library allocation
page read and write
7AA40194C000
trusted library allocation
page read and write
85400390000
trusted library allocation
page read and write
1D5E1000
heap
page read and write
85400210000
trusted library allocation
page read and write
1D609000
heap
page read and write
9EC0031C000
trusted library allocation
page read and write
1BBB7F42000
heap
page read and write
854000E4000
trusted library allocation
page read and write
329E000
stack
page read and write
6F04002E0000
direct allocation
page read and write
4A21000
heap
page read and write
7AA4008F0000
trusted library allocation
page read and write
7AA401B1C000
trusted library allocation
page read and write
85400258000
trusted library allocation
page read and write
7AA4002C4000
trusted library allocation
page read and write
25C3816A000
heap
page read and write
7AA401078000
trusted library allocation
page read and write
6C4E9FE000
unkown
page readonly
3F8000270000
direct allocation
page read and write
4A21000
heap
page read and write
25C34580000
heap
page readonly
25C3C8E7000
unclassified section
page read and write
9EC00201000
trusted library allocation
page read and write
2658007E0000
trusted library allocation
page read and write
1BBB62D0000
heap
page readonly
1D622000
heap
page read and write
7AA4016A4000
trusted library allocation
page read and write
25C381FE000
heap
page read and write
1D604000
heap
page read and write
7AA4018B0000
trusted library allocation
page read and write
1BBB60AE000
heap
page read and write
26580087C000
trusted library allocation
page read and write
265800728000
trusted library allocation
page read and write
7AA400478000
trusted library allocation
page read and write
7AA400194000
trusted library allocation
page read and write
7AA402864000
trusted library allocation
page read and write
7AA400D8C000
trusted library allocation
page read and write
25C345F7000
heap
page read and write
25C3DE20000
trusted library section
page read and write
6F0400215000
direct allocation
page read and write
AF107FE000
unkown
page readonly
25C37C4F000
heap
page read and write
4A21000
heap
page read and write
7AA40160C000
trusted library allocation
page read and write
2658006E8000
trusted library allocation
page read and write
25C34684000
heap
page read and write
7AA400F20000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA4006F9000
trusted library allocation
page read and write
7AA401E7C000
trusted library allocation
page read and write
3F8000260000
direct allocation
page read and write
7AA401A40000
trusted library allocation
page read and write
1BBB7F42000
heap
page read and write
8540022C000
trusted library allocation
page read and write
9EC003AC000
trusted library allocation
page read and write
265800700000
trusted library allocation
page read and write
7AA401DE0000
trusted library allocation
page read and write
429E000
stack
page read and write
25C3C9C0000
heap
page read and write
AF24FFD000
stack
page read and write
7AA401940000
trusted library allocation
page read and write
7AA400300000
trusted library allocation
page read and write
7AA402870000
trusted library allocation
page read and write
43DF000
stack
page read and write
7AA401D18000
trusted library allocation
page read and write
1D612000
heap
page read and write
7AA400B40000
trusted library allocation
page read and write
265800601000
trusted library allocation
page read and write
85400324000
trusted library allocation
page read and write
7AA40265F000
trusted library allocation
page read and write
25C345E0000
heap
page read and write
3EDF000
stack
page read and write
9EC00338000
trusted library allocation
page read and write
1D608000
heap
page read and write
1BBB8BF0000
unkown
page read and write
7AA401F64000
trusted library allocation
page read and write
7AA400868000
trusted library allocation
page read and write
25C381F5000
heap
page read and write
25C37C4F000
heap
page read and write
85400020000
trusted library allocation
page read and write
7AA401630000
trusted library allocation
page read and write
2658006F4000
trusted library allocation
page read and write
85400078000
trusted library allocation
page read and write
9D0000
direct allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
7AA4000B4000
trusted library allocation
page read and write
9C0000
heap
page read and write
7AA400214000
trusted library allocation
page read and write
1BBBAFF0000
trusted library section
page readonly
AF2E7FE000
unkown
page readonly
26580070C000
trusted library allocation
page read and write
22C000250000
trusted library allocation
page read and write
2658007BC000
trusted library allocation
page read and write
7AA40129C000
trusted library allocation
page read and write
7AA4006C0000
trusted library allocation
page read and write
1BBC0400000
heap
page read and write
6F04002D8000
direct allocation
page read and write
6F0400230000
direct allocation
page read and write
7AA4009F1000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA4001C8000
trusted library allocation
page read and write
85400490000
trusted library allocation
page read and write
7AA401A14000
trusted library allocation
page read and write
26580060C000
trusted library allocation
page read and write
25C345FE000
heap
page read and write
7AA400C7A000
trusted library allocation
page read and write
7AA401074000
trusted library allocation
page read and write
7AA400DC4000
trusted library allocation
page read and write
25C38169000
heap
page read and write
7AA4028D3000
trusted library allocation
page read and write
7AA40067C000
trusted library allocation
page read and write
3F8000274000
direct allocation
page read and write
7AA401D70000
trusted library allocation
page read and write
25C37C43000
heap
page read and write
7AA400B4C000
trusted library allocation
page read and write
AF32FFC000
stack
page read and write
7AA4019F0000
trusted library allocation
page read and write
1BBB6013000
heap
page read and write
7AA402A9C000
trusted library allocation
page read and write
DD1000
unkown
page execute and write copy
854001F0000
trusted library allocation
page read and write
AF317FE000
unkown
page readonly
1BBB7F4A000
heap
page read and write
9EC002D8000
trusted library allocation
page read and write
854002E0000
trusted library allocation
page read and write
2BF4002A4000
trusted library allocation
page read and write
7AA40033C000
trusted library allocation
page read and write
7AA400304000
trusted library allocation
page read and write
22C0002F0000
trusted library allocation
page read and write
6C820000
unkown
page read and write
7AA401D6C000
trusted library allocation
page read and write
7AA401310000
trusted library allocation
page read and write
AF137FE000
unkown
page readonly
7AA401A64000
trusted library allocation
page read and write
7AA40099F000
trusted library allocation
page read and write
7AA401088000
trusted library allocation
page read and write
6C681FE000
stack
page read and write
3F8000217000
direct allocation
page read and write
25C345E8000
heap
page read and write
7AA4003B4000
trusted library allocation
page read and write
25C3EC21000
trusted library section
page read and write
7AA4027E0000
trusted library allocation
page read and write
7AA40040C000
trusted library allocation
page read and write
25C3C8B7000
unclassified section
page read and write
2BF400230000
trusted library allocation
page read and write
4A1F000
stack
page read and write
7AA4017EC000
trusted library allocation
page read and write
4A21000
heap
page read and write
265800964000
trusted library allocation
page read and write
85400338000
trusted library allocation
page read and write
2BF4002C0000
trusted library allocation
page read and write
3F80002AC000
direct allocation
page read and write
7AA401F94000
trusted library allocation
page read and write
7AA400948000
trusted library allocation
page read and write
7AA400588000
trusted library allocation
page read and write
1D5F8000
heap
page read and write
7AA400C3C000
trusted library allocation
page read and write
7AA40033C000
trusted library allocation
page read and write
7AA40035C000
trusted library allocation
page read and write
1D604000
heap
page read and write
4A21000
heap
page read and write
7AA4019C4000
trusted library allocation
page read and write
8540037C000
trusted library allocation
page read and write
7AA4001DC000
trusted library allocation
page read and write
3F8000234000
direct allocation
page read and write
854001EC000
trusted library allocation
page read and write
7AA401074000
trusted library allocation
page read and write
7AA401E30000
trusted library allocation
page read and write
1BBBF070000
trusted library allocation
page read and write
7AA400F78000
trusted library allocation
page read and write
7AA401DBC000
trusted library allocation
page read and write
7AA401868000
trusted library allocation
page read and write
7AA4015D5000
trusted library allocation
page read and write
1D612000
heap
page read and write
2658008A8000
trusted library allocation
page read and write
6C679FE000
unkown
page readonly
1D622000
heap
page read and write
7AA4026FA000
trusted library allocation
page read and write
85400394000
trusted library allocation
page read and write
AF187FE000
unkown
page readonly
7AA401CE0000
trusted library allocation
page read and write
23A2F000
stack
page read and write
4A21000
heap
page read and write
7AA401CDC000
trusted library allocation
page read and write
1D5F7000
heap
page read and write
7AA401D14000
trusted library allocation
page read and write
1BBB8010000
trusted library allocation
page read and write
7AA4026E6000
trusted library allocation
page read and write
7AA400344000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA4016CC000
trusted library allocation
page read and write
7AA400D28000
trusted library allocation
page read and write
1BBB60F4000
heap
page read and write
7AA4000FC000
trusted library allocation
page read and write
AF087FE000
unkown
page readonly
6C5F9FE000
unkown
page readonly
7AA401930000
trusted library allocation
page read and write
1BBB607C000
heap
page read and write
4A21000
heap
page read and write
85400264000
trusted library allocation
page read and write
7AA4019A8000
trusted library allocation
page read and write
6C5A1000
unkown
page execute read
265800788000
trusted library allocation
page read and write
2658002ED000
trusted library allocation
page read and write
85400148000
trusted library allocation
page read and write
4A21000
heap
page read and write
7AA401D80000
trusted library allocation
page read and write
7AA402801000
trusted library allocation
page read and write
265800830000
trusted library allocation
page read and write
3F8000280000
direct allocation
page read and write
26580095C000
trusted library allocation
page read and write
1D607000
heap
page read and write
7AA40033C000
trusted library allocation
page read and write
7AA400748000
trusted library allocation
page read and write
1BBB6113000
heap
page read and write
1D610000
heap
page read and write
7AA400494000
trusted library allocation
page read and write
7AA4019DC000
trusted library allocation
page read and write
2BF4002C0000
trusted library allocation
page read and write
7AA4019AC000
trusted library allocation
page read and write
9EC00284000
trusted library allocation
page read and write
7AA401D94000
trusted library allocation
page read and write
4AC000
stack
page read and write
7AA4013E6000
trusted library allocation
page read and write
22C000235000
trusted library allocation
page read and write
85400268000
trusted library allocation
page read and write
85400001000
trusted library allocation
page read and write
3F8000284000
direct allocation
page read and write
DD0000
unkown
page readonly
1BBB60BC000
heap
page read and write
7AA4013D0000
trusted library allocation
page read and write
7AA401AD8000
trusted library allocation
page read and write
1CCFE000
stack
page read and write
7AA401B24000
trusted library allocation
page read and write
25C37C4F000
heap
page read and write
7AA401430000
trusted library allocation
page read and write
7AA401D84000
trusted library allocation
page read and write
2BF400260000
trusted library allocation
page read and write
7AA400EAC000
trusted library allocation
page read and write
7AA4001A8000
trusted library allocation
page read and write
7AA4012B1000
trusted library allocation
page read and write
7AA400FA0000
trusted library allocation
page read and write
131B000
unkown
page execute and read and write
7AA400C74000
trusted library allocation
page read and write
1BBB609F000
heap
page read and write
7AA400EB8000
trusted library allocation
page read and write
1BBB7F48000
heap
page read and write
1D5EA000
heap
page read and write
7AA402684000
trusted library allocation
page read and write
AF277FE000
unkown
page readonly
7AA401E18000
trusted library allocation
page read and write
7AA401658000
trusted library allocation
page read and write
26580085C000
trusted library allocation
page read and write
2BF4002C0000
trusted library allocation
page read and write
1BBB60C7000
heap
page read and write
9EC002C4000
trusted library allocation
page read and write
25C383B0000
trusted library section
page read and write
7AA400910000
trusted library allocation
page read and write
25C38220000
trusted library section
page read and write
7AA4016CC000
trusted library allocation
page read and write
854003C4000
trusted library allocation
page read and write
AF2C7FE000
unkown
page readonly
1BBB7FC5000
heap
page read and write
7AA401330000
trusted library allocation
page read and write
2BF4002F0000
trusted library allocation
page read and write
7AA4005E0000
trusted library allocation
page read and write
25C3C9C3000
heap
page read and write
7AA400D58000
trusted library allocation
page read and write
7AA401FD0000
trusted library allocation
page read and write
7AA4002A4000
trusted library allocation
page read and write
6C641000
unkown
page execute read
7AA40041C000
trusted library allocation
page read and write
7AA400310000
trusted library allocation
page read and write
26580082C000
trusted library allocation
page read and write
854003D0000
trusted library allocation
page read and write
7AA4010A4000
trusted library allocation
page read and write
7AA400328000
trusted library allocation
page read and write
7AA4010F4000
trusted library allocation
page read and write
7AA4003A4000
trusted library allocation
page read and write
1D612000
heap
page read and write
7AA400B7C000
trusted library allocation
page read and write
7AA4018DC000
trusted library allocation
page read and write
6F04002EC000
direct allocation
page read and write
7AA401958000
trusted library allocation
page read and write
There are 1995 hidden memdumps, click here to show them.