IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AFCBKFHJJJKKFHIDAAKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AKKEHIECFCAAFIEBGIDAAEBFCB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECFCBKJDBFIJKFHIIDAAKKKKFC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FIDAFIEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\GIDAECGDAFBAAAAAECGI
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\HDAFBGIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIEHCFIDHIDGIDHJEHID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\0f9d11f6-af54-4c02-af28-b85eee20bccc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\30c902f5-1a5e-447f-a82b-37dcf54ea85b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\492518fb-8e66-4f71-848d-b19b40782ab0.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4b6bfd8b-bad4-41a2-b905-18f2faa09b04.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5472db0e-6bc8-4c9b-95d1-3cf385a97118.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8a7dba4e-7528-4fd0-98d8-8ca44f80efda.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9b286fc7-bbf8-4689-9f6d-1129dc81acff.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\f84d287f-0a97-4e1e-9953-7086adb9eda2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6722CCDA-1D64.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2719fdc4-e561-4cfa-9d72-d835d4a7b44e.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\30b6516b-c63d-4d6f-b97d-05030f66a273.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\35b01a33-0764-4476-b64d-8188aa54f8c8.tmp
ASCII text, with very long lines (17432), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\5083cc3a-ad07-425c-b54a-95f9f56c9e40.tmp
ASCII text, with very long lines (17267), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6d6624cd-f27a-4acb-b89f-29d6aa7651e6.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\838e3d47-9fff-4d69-83ab-7ba7efc00e8e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8cce7cfa-4b8f-40cb-a45e-c8d2023ca50c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF4c4f2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3b670.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3c44b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3d090.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\be1d6677-0f7e-4be9-be05-743a25942093.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e6946192-6cc7-4d35-b09d-c85ef4656414.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fcaee0e0-9b93-44c7-b98b-a46944c85666.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fdc1e167-236c-48bf-8e6f-1ca7fcdc759f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\ffbc3b75-26a3-4fe8-93a4-ffb2851b6d09.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3eaaf.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF43862.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4ad92.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3eb3c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF41970.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13374807516927625
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\0200c62e-5015-4188-914b-3c0c587aac0e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\33483c14-e762-49e4-8fcc-e5395c034b4b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\8c410c04-c8b5-40dd-aadb-8d6e76b60a4f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3c489.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3d090.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\cbde1024-a459-4177-9b34-ba6f60ee63b5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\dff3e7db-8076-4407-8ee8-72256cafd02d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a6f5eed3-12b9-4364-8771-5511aab342f4.tmp
ASCII text, with very long lines (17432), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\c61a30f6-1f8c-427b-b21b-2a40a2d05dac.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\e11b1125-0147-4135-bf75-d5e90b2bd037.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\efdbb206-2143-41e9-bab8-a7d4ad1e4f4c.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39aca.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39b66.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39cae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c3af.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3f790.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4ad72.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF50c0d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d849c40f-2502-4382-8f78-5751aa28a538.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\5fa47b49-b2d4-4cb3-b32a-7323ec07a72d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
dropped
C:\Users\user\AppData\Local\Temp\66f6f430-6886-4245-a6d1-670012da2ee9.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\8ef5d978-f5ff-42bd-9c30-5dc3fd8de8c5.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\a9073d04-9b73-447d-b80f-9c40379c7aa9.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\be4d0aed-500f-4a8d-9117-3c1fe43ab77a.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\c94d100d-46ea-4384-ab89-73d41cbcc7ec.tmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CC 2017 (Macintosh), datetime=2019:01:23 13:24:18], baseline, precision 8, 401x402, components 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\e2b39aca-164c-495f-aa14-83b4c7c5cbb1.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1736767561\8ef5d978-f5ff-42bd-9c30-5dc3fd8de8c5.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1736767561\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1736767561\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1736767561\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1736767561\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3700)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3705)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1934543303\e2b39aca-164c-495f-aa14-83b4c7c5cbb1.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 30 23:18:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 30 23:18:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 30 23:18:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 30 23:18:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 30 23:18:23 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 477
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 478
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 479
ASCII text, with very long lines (745)
downloaded
Chrome Cache Entry: 480
ASCII text
downloaded
Chrome Cache Entry: 481
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 482
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 483
SVG Scalable Vector Graphics image
downloaded
There are 285 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2744 --field-trial-handle=2476,i,630304271105429784,4614235616134142907,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2872 --field-trial-handle=2552,i,525046915237126550,6061750762854327539,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6824 --field-trial-handle=2552,i,525046915237126550,6061750762854327539,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6960 --field-trial-handle=2552,i,525046915237126550,6061750762854327539,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7208 --field-trial-handle=2552,i,525046915237126550,6061750762854327539,262144 /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2644 --field-trial-handle=2528,i,17589902044594162779,8070341503384849355,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.phpre
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://ntp.msn.cn/edge/ntp
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/?usp=installed_webapptx
unknown
https://docs.google.com/presentation/ogl
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://drive.google.com/?lfhs=2ation.Result
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dllr
unknown
https://docs.googl0
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmlB
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
23.218.232.158
https://permanently-removed.invalid/v1/issuetoken
unknown
http://anglebug.com/4722
unknown
https://assets.msn.com/statics/icons/favicon_newtabpage.png
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://drive-daily-4.c
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://185.215.113.206GCB
unknown
https://srtb.msn.cn/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://assets.msn.cn/resolver/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://browser.events.data.msn.com/
unknown
http://anglebug.com/5881&
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
https://docs.google.com/document/dogl
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1730333926497&w=0&anoncknm=app_anon&NoResponseBody=true
20.52.64.200
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://185.215.113.206/6c4adf523b719729.phpBrowser
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://ntp.msn.com/edge/ntp
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
http://unisolated.invalid/H
unknown
http://anglebug.com/5421E
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html?ls
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://anglebug.com/5430G
unknown
https://drive-daily-5.corp.go
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
http://anglebug.com/5430T
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
https://permanently-removed.invalid/MergeSession
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
https://lens.google.com/v3/upload
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.132
http://anglebug.com/3832
unknown
https://www.google.comAccess-Control-Allow-Credentials:
unknown
https://drive-daily-0.corp.google.com/
unknown
https://permanently-removed.invalid/Logout
unknown
https://drive.google.com/?lfhs=2ationinished
unknown
https://lens.google.com/upload
unknown
https://docs.google.com/document/?usp=installed_webapp
unknown
http://anglebug.com/6651
unknown
https://c.msn.com/
unknown
https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_20230918=
unknown
https://anglebug.com/4830
unknown
https://msn.com
unknown
https://www.youtube.com/:
unknown
https://mail.google.com/mail/
unknown
https://myaccount.google.com/shielded-email2B
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
172.64.41.3
plus.l.google.com
216.58.212.174
play.google.com
142.250.185.110
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.244.18.32
www.google.com
142.250.185.132
googlehosted.l.googleusercontent.com
142.250.186.65
sni1gl.wpc.nucdn.net
152.199.21.175
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
apis.google.com
unknown
api.msn.com
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
52.153.155.231
unknown
United States
23.198.7.181
unknown
United States
23.221.22.166
unknown
United States
108.156.211.31
unknown
United States
152.195.19.97
unknown
United States
23.47.194.65
unknown
United States
20.125.209.212
unknown
United States
162.159.61.3
unknown
United States
216.58.212.174
plus.l.google.com
United States
204.79.197.219
unknown
United States
104.40.82.182
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
20.52.64.200
unknown
United States
23.218.232.158
unknown
United States
13.107.246.57
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
18.244.18.32
sb.scorecardresearch.com
United States
142.250.185.132
www.google.com
United States
142.250.185.110
play.google.com
United States
184.25.237.99
unknown
United States
239.255.255.250
unknown
Reserved
20.96.153.111
unknown
United States
127.0.0.1
unknown
unknown
142.250.186.65
googlehosted.l.googleusercontent.com
United States
There are 16 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197716
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197716
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197716
WindowTabManagerFileMappingId
There are 95 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4FF0000
direct allocation
page read and write
malicious
A31000
unkown
page execute and read and write
malicious
119E000
heap
page read and write
malicious
1C08002A0000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
4F7C0024C000
trusted library allocation
page read and write
4A2E000
stack
page read and write
324B9FC000
stack
page read and write
1FDC00601000
trusted library allocation
page read and write
1D77B000
heap
page read and write
209030A8000
heap
page read and write
23A30000
trusted library allocation
page read and write
48AF000
stack
page read and write
15E4D0A7000
heap
page read and write
A40A7FE000
unkown
page readonly
1D87A000
heap
page read and write
F9C000
unkown
page execute and read and write
47AE000
stack
page read and write
32659FE000
stack
page read and write
349F000
stack
page read and write
1FDC00B10000
trusted library allocation
page read and write
1FDC00124000
trusted library allocation
page read and write
20901990000
trusted library section
page readonly
4F7C002D8000
trusted library allocation
page read and write
1FDC01FC8000
trusted library allocation
page read and write
209030A6000
heap
page read and write
1FDC01F30000
trusted library allocation
page read and write
1B9800280000
direct allocation
page read and write
1FDC01C28000
trusted library allocation
page read and write
10E000288000
trusted library allocation
page read and write
1FDC0034C000
trusted library allocation
page read and write
450000284000
trusted library allocation
page read and write
A41F7FE000
unkown
page readonly
1FDC01A94000
trusted library allocation
page read and write
45000040C000
trusted library allocation
page read and write
4B61000
heap
page read and write
15E4EFA2000
heap
page read and write
1FDC0038C000
trusted library allocation
page read and write
2E9F000
stack
page read and write
1FDC01B84000
trusted library allocation
page read and write
220400250000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
4F7C0037C000
trusted library allocation
page read and write
1FDC00CA0000
trusted library allocation
page read and write
15E4D0BF000
heap
page read and write
1FDC01FCD000
trusted library allocation
page read and write
450000360000
trusted library allocation
page read and write
439F000
stack
page read and write
61E01000
direct allocation
page execute read
4F7C00028000
trusted library allocation
page read and write
1253000
heap
page read and write
32471FE000
unkown
page readonly
1C08002C8000
trusted library allocation
page read and write
20908263000
trusted library section
page read and write
1FDC013C4000
trusted library allocation
page read and write
1FDC02954000
trusted library allocation
page read and write
1FDC01FE0000
trusted library allocation
page read and write
2204008F4000
trusted library allocation
page read and write
1FDC01D7C000
trusted library allocation
page read and write
1FDC0182C000
trusted library allocation
page read and write
4B61000
heap
page read and write
220400248000
trusted library allocation
page read and write
35DF000
stack
page read and write
A47A7FE000
unkown
page readonly
1FDC01821000
trusted library allocation
page read and write
1FDC019B8000
trusted library allocation
page read and write
A40F7FE000
unkown
page readonly
1FDC00300000
trusted library allocation
page read and write
1FDC0020C000
trusted library allocation
page read and write
4F7C001A8000
trusted library allocation
page read and write
A413FFD000
stack
page read and write
A4037FE000
unkown
page readonly
1FDC01968000
trusted library allocation
page read and write
1FDC00544000
trusted library allocation
page read and write
1D784000
heap
page read and write
A4227FE000
unkown
page readonly
1B9800303000
direct allocation
page read and write
1D785000
heap
page read and write
324E9FE000
stack
page read and write
1FDC0022C000
trusted library allocation
page read and write
1FDC000E0000
trusted library allocation
page read and write
15E4D0CB000
heap
page read and write
209030AA000
heap
page read and write
1D789000
heap
page read and write
1FDC01A20000
trusted library allocation
page read and write
1FDC00290000
trusted library allocation
page read and write
6F88E000
unkown
page read and write
1FDC01938000
trusted library allocation
page read and write
1FDC015DC000
trusted library allocation
page read and write
FA9000
unkown
page execute and write copy
209030B4000
heap
page read and write
1FDC00E28000
trusted library allocation
page read and write
4B61000
heap
page read and write
209019B3000
heap
page read and write
1FDC01659000
trusted library allocation
page read and write
10E0002B8000
trusted library allocation
page read and write
1FDC00D74000
trusted library allocation
page read and write
1FDC00801000
trusted library allocation
page read and write
15E4D065000
heap
page read and write
1FDC01F58000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
1FDC020E4000
trusted library allocation
page read and write
209036A1000
heap
page read and write
A421FFE000
stack
page read and write
1FDC01574000
trusted library allocation
page read and write
4F7C003BC000
trusted library allocation
page read and write
4984002AC000
direct allocation
page read and write
209082A6000
trusted library section
page read and write
20978ED8000
heap
page read and write
1FDC002A4000
trusted library allocation
page read and write
209035E6000
heap
page read and write
1FDC002A4000
trusted library allocation
page read and write
4F7C00394000
trusted library allocation
page read and write
209019B0000
heap
page read and write
1FDC0101C000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
209030AA000
heap
page read and write
10E0002D8000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC01E40000
trusted library allocation
page read and write
1FDC006EC000
trusted library allocation
page read and write
1FDC01E2C000
trusted library allocation
page read and write
1FDC00628000
trusted library allocation
page read and write
1FDC015E0000
trusted library allocation
page read and write
4F7C00258000
trusted library allocation
page read and write
1FDC006BC000
trusted library allocation
page read and write
A411FFE000
stack
page read and write
1D76A000
heap
page read and write
10E0002F8000
trusted library allocation
page read and write
1FDC00F40000
trusted library allocation
page read and write
1FDC012E4000
trusted library allocation
page read and write
A4237FE000
unkown
page readonly
2090364D000
heap
page read and write
1FDC01AD0000
trusted library allocation
page read and write
1FDC00934000
trusted library allocation
page read and write
1FDC00194000
trusted library allocation
page read and write
1D78C000
heap
page read and write
B16000
unkown
page execute and read and write
1FDC00540000
trusted library allocation
page read and write
2204006AC000
trusted library allocation
page read and write
15E4D052000
heap
page read and write
1FDC01A01000
trusted library allocation
page read and write
1FDC01B3C000
trusted library allocation
page read and write
20907834000
heap
page read and write
4F7C002D8000
trusted library allocation
page read and write
1FDC00BA8000
trusted library allocation
page read and write
1FDC01C60000
trusted library allocation
page read and write
4F7C002E4000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
209790A0000
heap
page read and write
1FDC00234000
trusted library allocation
page read and write
1FDC0200C000
trusted library allocation
page read and write
4F7C00054000
trusted library allocation
page read and write
4F7C001E4000
trusted library allocation
page read and write
1FDC00ADC000
trusted library allocation
page read and write
1D07F000
stack
page read and write
209030B4000
heap
page read and write
20909D50000
trusted library section
page read and write
1FDC01C10000
trusted library allocation
page read and write
1B9800230000
direct allocation
page read and write
1B9800270000
direct allocation
page read and write
15E4CF90000
trusted library allocation
page read and write
1FDC01560000
trusted library allocation
page read and write
1FDC00220000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
32661FE000
unkown
page readonly
1FDC01ABC000
trusted library allocation
page read and write
1FDC00CB8000
trusted library allocation
page read and write
1FDC0135C000
trusted library allocation
page read and write
A4057FE000
unkown
page readonly
1FDC0037C000
trusted library allocation
page read and write
1FDC014E0000
trusted library allocation
page read and write
4F7C0005A000
trusted library allocation
page read and write
1FDC01DAC000
trusted library allocation
page read and write
209082C2000
trusted library section
page read and write
20909CE1000
trusted library section
page read and write
1C08002A0000
trusted library allocation
page read and write
1D761000
heap
page read and write
4F7C003A4000
trusted library allocation
page read and write
4F7C00198000
trusted library allocation
page read and write
1FDC0160C000
trusted library allocation
page read and write
1FDC02069000
trusted library allocation
page read and write
4500003BC000
trusted library allocation
page read and write
1FDC00C9C000
trusted library allocation
page read and write
1FDC028B8000
trusted library allocation
page read and write
1FDC01170000
trusted library allocation
page read and write
1FDC02167000
trusted library allocation
page read and write
1FDC00075000
trusted library allocation
page read and write
4B61000
heap
page read and write
1D5AC000
stack
page read and write
220400840000
trusted library allocation
page read and write
1CF7E000
stack
page read and write
1D7A2000
heap
page read and write
2090A187000
unclassified section
page read and write
15E4D02C000
heap
page read and write
1FDC01540000
trusted library allocation
page read and write
1C08002E4000
trusted library allocation
page read and write
498400316000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
1FDC01C1C000
trusted library allocation
page read and write
4500003A0000
trusted library allocation
page read and write
32451FE000
unkown
page readonly
1FDC01AF8000
trusted library allocation
page read and write
1FDC02A01000
trusted library allocation
page read and write
1FDC00FC0000
trusted library allocation
page read and write
209036A5000
heap
page read and write
1276000
heap
page read and write
1C0800250000
trusted library allocation
page read and write
2204002F4000
trusted library allocation
page read and write
F6E000
unkown
page execute and read and write
6F892000
unkown
page readonly
1FDC01074000
trusted library allocation
page read and write
1FDC001B4000
trusted library allocation
page read and write
1FDC01948000
trusted library allocation
page read and write
1FDC01A78000
trusted library allocation
page read and write
1FDC01DB0000
trusted library allocation
page read and write
450000308000
trusted library allocation
page read and write
49840024C000
direct allocation
page read and write
4F7C001F4000
trusted library allocation
page read and write
4F7C000FC000
trusted library allocation
page read and write
1FDC01B9C000
trusted library allocation
page read and write
1FDC00BF8000
trusted library allocation
page read and write
1FDC01574000
trusted library allocation
page read and write
4B61000
heap
page read and write
209035F2000
heap
page read and write
1FDC01C01000
trusted library allocation
page read and write
119A000
heap
page read and write
4500003C4000
trusted library allocation
page read and write
1D785000
heap
page read and write
1FDC0183C000
trusted library allocation
page read and write
4F7C0021C000
trusted library allocation
page read and write
1FDC01A9C000
trusted library allocation
page read and write
1FDC00B2C000
trusted library allocation
page read and write
324C1FE000
unkown
page readonly
1FDC01E9C000
trusted library allocation
page read and write
1FDC005E4000
trusted library allocation
page read and write
1FDC00BF8000
trusted library allocation
page read and write
1D77B000
heap
page read and write
1FDC00300000
trusted library allocation
page read and write
1FDC01555000
trusted library allocation
page read and write
1FDC00CF4000
trusted library allocation
page read and write
1FDC01B74000
trusted library allocation
page read and write
1212000
heap
page read and write
1FDC01869000
trusted library allocation
page read and write
1FDC00588000
trusted library allocation
page read and write
1FDC01430000
trusted library allocation
page read and write
1FDC00DD0000
trusted library allocation
page read and write
1D752000
heap
page read and write
1D761000
heap
page read and write
1FDC00BA0000
trusted library allocation
page read and write
1FDC0153C000
trusted library allocation
page read and write
32419FE000
stack
page read and write
220400201000
trusted library allocation
page read and write
1FDC0220C000
trusted library allocation
page read and write
A47B7FE000
unkown
page readonly
498400290000
direct allocation
page read and write
1D36D000
stack
page read and write
1FDC00A60000
trusted library allocation
page read and write
2204007AC000
trusted library allocation
page read and write
1FDC000FC000
trusted library allocation
page read and write
1FDC01A64000
trusted library allocation
page read and write
1FDC00A3E000
trusted library allocation
page read and write
A402FFD000
stack
page read and write
1D78D000
heap
page read and write
1FDC02880000
trusted library allocation
page read and write
1FDC01E58000
trusted library allocation
page read and write
1FDC01314000
trusted library allocation
page read and write
A41DFFC000
stack
page read and write
4F7C003F8000
trusted library allocation
page read and write
1FDC008F8000
trusted library allocation
page read and write
4B61000
heap
page read and write
A476FFE000
stack
page read and write
1FDC0154C000
trusted library allocation
page read and write
1FDC029F3000
trusted library allocation
page read and write
1FDC02A88000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00588000
trusted library allocation
page read and write
4B61000
heap
page read and write
1D77A000
heap
page read and write
15E4D0DF000
heap
page read and write
4F7C00294000
trusted library allocation
page read and write
1D76A000
heap
page read and write
1FDC01B00000
trusted library allocation
page read and write
1FDC00D48000
trusted library allocation
page read and write
1FDC01F18000
trusted library allocation
page read and write
11F6000
heap
page read and write
1FDC00FC0000
trusted library allocation
page read and write
1FDC0292E000
trusted library allocation
page read and write
1C0800235000
trusted library allocation
page read and write
23920000
trusted library allocation
page read and write
1FDC00DBC000
trusted library allocation
page read and write
1FDC0153C000
trusted library allocation
page read and write
1D1BF000
stack
page read and write
4F7C002E4000
trusted library allocation
page read and write
95C000
stack
page read and write
1FDC0153C000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
23889000
heap
page read and write
A40E7FE000
unkown
page readonly
1FDC0129C000
trusted library allocation
page read and write
A41E7FE000
unkown
page readonly
20903683000
heap
page read and write
1FDC01558000
trusted library allocation
page read and write
450000304000
trusted library allocation
page read and write
20909F70000
trusted library section
page read and write
1FDC01324000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
4F7C0005E000
trusted library allocation
page read and write
4B70000
heap
page read and write
1FDC01A64000
trusted library allocation
page read and write
1FDC01B60000
trusted library allocation
page read and write
498400294000
direct allocation
page read and write
1FDC016B9000
trusted library allocation
page read and write
1C08002A0000
trusted library allocation
page read and write
1D760000
heap
page read and write
1FDC01E70000
trusted library allocation
page read and write
23BA0000
trusted library allocation
page read and write
4F7C0000C000
trusted library allocation
page read and write
1FDC001A0000
trusted library allocation
page read and write
10E000210000
trusted library allocation
page read and write
1FDC00530000
trusted library allocation
page read and write
4F7C001B8000
trusted library allocation
page read and write
1FDC00F4C000
trusted library allocation
page read and write
220400801000
trusted library allocation
page read and write
1FDC00B98000
trusted library allocation
page read and write
1FDC00F92000
trusted library allocation
page read and write
49840030A000
direct allocation
page read and write
3D5F000
stack
page read and write
1FDC01C5C000
trusted library allocation
page read and write
1C0800264000
trusted library allocation
page read and write
1C08002C0000
trusted library allocation
page read and write
A41BFFD000
stack
page read and write
1FDC02A2A000
trusted library allocation
page read and write
32439FE000
stack
page read and write
1FDC00B2C000
trusted library allocation
page read and write
1FDC00F98000
trusted library allocation
page read and write
2204008D8000
trusted library allocation
page read and write
1C0800230000
trusted library allocation
page read and write
1FDC02030000
trusted library allocation
page read and write
A4077FE000
unkown
page readonly
20907848000
heap
page read and write
1FDC00F4C000
trusted library allocation
page read and write
4F7C0026C000
trusted library allocation
page read and write
1FDC00B0C000
trusted library allocation
page read and write
1FDC004D8000
trusted library allocation
page read and write
1FDC02C04000
trusted library allocation
page read and write
1FDC01990000
trusted library allocation
page read and write
1FDC01F08000
trusted library allocation
page read and write
1C08002C0000
trusted library allocation
page read and write
A479FFC000
stack
page read and write
1FDC01E88000
trusted library allocation
page read and write
45000039C000
trusted library allocation
page read and write
1FDC00FA8000
trusted library allocation
page read and write
9A0000
heap
page read and write
1FDC012B8000
trusted library allocation
page read and write
10E000248000
trusted library allocation
page read and write
20909D02000
trusted library section
page read and write
1FDC00744000
trusted library allocation
page read and write
32591FE000
unkown
page readonly
1FDC00E68000
trusted library allocation
page read and write
1FDC002AA000
trusted library allocation
page read and write
1FDC00F3C000
trusted library allocation
page read and write
1FDC0287A000
trusted library allocation
page read and write
1FDC012DC000
trusted library allocation
page read and write
20909D0E000
trusted library section
page read and write
220400890000
trusted library allocation
page read and write
498400311000
direct allocation
page read and write
A4207FE000
unkown
page readonly
1D76A000
heap
page read and write
10E000264000
trusted library allocation
page read and write
1C0800260000
trusted library allocation
page read and write
1D778000
heap
page read and write
A5C000
unkown
page execute and read and write
1FDC019E4000
trusted library allocation
page read and write
2204008C4000
trusted library allocation
page read and write
4F7C00430000
trusted library allocation
page read and write
15E4EF29000
heap
page read and write
10E000238000
trusted library allocation
page read and write
A30000
unkown
page readonly
1FDC01300000
trusted library allocation
page read and write
1FDC00464000
trusted library allocation
page read and write
450000344000
trusted library allocation
page read and write
1FDC01874000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC01988000
trusted library allocation
page read and write
375E000
stack
page read and write
450000230000
trusted library allocation
page read and write
2F9F000
stack
page read and write
1FDC01DF0000
trusted library allocation
page read and write
20903900000
trusted library allocation
page read and write
1FDC021C4000
trusted library allocation
page read and write
15E4EF6B000
heap
page read and write
A4017FE000
unkown
page readonly
1FDC00D88000
trusted library allocation
page read and write
209035D0000
heap
page read and write
220400430000
trusted library allocation
page read and write
2FDE000
stack
page read and write
209036D0000
trusted library section
page read and write
1FDC01CB0000
trusted library allocation
page read and write
4F7C00274000
trusted library allocation
page read and write
1FDC014E8000
trusted library allocation
page read and write
10E000270000
trusted library allocation
page read and write
1FDC019BC000
trusted library allocation
page read and write
1FDC004BC000
trusted library allocation
page read and write
4B61000
heap
page read and write
4F7C00368000
trusted library allocation
page read and write
1FDC006E1000
trusted library allocation
page read and write
3C1F000
stack
page read and write
498400220000
direct allocation
page read and write
4F7C000D8000
trusted library allocation
page read and write
A4267FE000
unkown
page readonly
4F7C0023C000
trusted library allocation
page read and write
209036A9000
heap
page read and write
1FDC02001000
trusted library allocation
page read and write
1FDC019D0000
trusted library allocation
page read and write
1FDC002A4000
trusted library allocation
page read and write
339E000
stack
page read and write
4F7C000C0000
trusted library allocation
page read and write
1FDC001F4000
trusted library allocation
page read and write
220400230000
trusted library allocation
page read and write
4F7C0037C000
trusted library allocation
page read and write
1FDC009DC000
trusted library allocation
page read and write
1FDC0034C000
trusted library allocation
page read and write
1FDC00E0C000
trusted library allocation
page read and write
220400790000
trusted library allocation
page read and write
4B61000
heap
page read and write
A41AFFE000
stack
page read and write
15E4EF6B000
heap
page read and write
324D1FE000
unkown
page readonly
450000338000
trusted library allocation
page read and write
450000430000
trusted library allocation
page read and write
220400964000
trusted library allocation
page read and write
1FDC01FC3000
trusted library allocation
page read and write
1FDC01FBC000
trusted library allocation
page read and write
4500002D0000
trusted library allocation
page read and write
1FDC0001C000
trusted library allocation
page read and write
1FDC0051C000
trusted library allocation
page read and write
32481FE000
unkown
page readonly
A4027FE000
unkown
page readonly
1FDC01557000
trusted library allocation
page read and write
4F7C001D8000
trusted library allocation
page read and write
1FDC01924000
trusted library allocation
page read and write
1FDC012B0000
trusted library allocation
page read and write
20978E00000
heap
page read and write
4B61000
heap
page read and write
10E0002B4000
trusted library allocation
page read and write
1FDC029EC000
trusted library allocation
page read and write
1FDC02BF0000
trusted library allocation
page read and write
2090786D000
heap
page read and write
6C885000
unkown
page readonly
4B61000
heap
page read and write
1FDC01454000
trusted library allocation
page read and write
1FDC005B0000
trusted library allocation
page read and write
209030A8000
heap
page read and write
4B61000
heap
page read and write
1FDC01BBC000
trusted library allocation
page read and write
209036B6000
heap
page read and write
1FDC02913000
trusted library allocation
page read and write
2090784D000
heap
page read and write
1FDC01672000
trusted library allocation
page read and write
1FDC00718000
trusted library allocation
page read and write
A40AFFA000
stack
page read and write
2204002B8000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
1FDC013C4000
trusted library allocation
page read and write
15E4EF00000
heap
page read and write
A410FFE000
stack
page read and write
1FDC0061C000
trusted library allocation
page read and write
4F7C00250000
trusted library allocation
page read and write
2090783F000
heap
page read and write
1FDC01771000
trusted library allocation
page read and write
1FDC0086C000
trusted library allocation
page read and write
10E0002B4000
trusted library allocation
page read and write
10E0002A0000
trusted library allocation
page read and write
1FDC01484000
trusted library allocation
page read and write
1FDC01A2C000
trusted library allocation
page read and write
1FDC01AF0000
trusted library allocation
page read and write
1FDC0151C000
trusted library allocation
page read and write
A4117FE000
unkown
page readonly
1FDC02038000
trusted library allocation
page read and write
1FDC01B8C000
trusted library allocation
page read and write
15E4EF38000
heap
page read and write
1C08002A0000
trusted library allocation
page read and write
2D90000
heap
page read and write
A4047FE000
unkown
page readonly
2204002CC000
trusted library allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
4984002C0000
direct allocation
page read and write
4F7C00310000
trusted library allocation
page read and write
450000310000
trusted library allocation
page read and write
220400601000
trusted library allocation
page read and write
20909E70000
trusted library section
page read and write
1FDC01BF8000
trusted library allocation
page read and write
325F9FD000
stack
page read and write
1FDC01A74000
trusted library allocation
page read and write
4F7C002E4000
trusted library allocation
page read and write
1FDC014F0000
trusted library allocation
page read and write
1FDC01C64000
trusted library allocation
page read and write
1D778000
heap
page read and write
A41EFFE000
stack
page read and write
A405FFE000
stack
page read and write
1FDC0148C000
trusted library allocation
page read and write
1FDC01DE0000
trusted library allocation
page read and write
1D777000
heap
page read and write
325C1FE000
unkown
page readonly
220400424000
trusted library allocation
page read and write
4984002D8000
direct allocation
page read and write
1FDC020BC000
trusted library allocation
page read and write
A403FFA000
stack
page read and write
1FDC00214000
trusted library allocation
page read and write
20978D10000
heap
page read and write
1FDC0153C000
trusted library allocation
page read and write
A4107FE000
unkown
page readonly
1FDC0203C000
trusted library allocation
page read and write
1FDC02A78000
trusted library allocation
page read and write
BCB000
unkown
page execute and read and write
1FDC00300000
trusted library allocation
page read and write
498400260000
direct allocation
page read and write
2CFF000
stack
page read and write
1FDC00338000
trusted library allocation
page read and write
237EC000
heap
page read and write
4B61000
heap
page read and write
325B1FE000
unkown
page readonly
1FDC00E01000
trusted library allocation
page read and write
1FDC01B4C000
trusted library allocation
page read and write
1FDC020C8000
trusted library allocation
page read and write
209056C3000
heap
page read and write
1FDC01574000
trusted library allocation
page read and write
1FDC020A2000
trusted library allocation
page read and write
4500003C0000
trusted library allocation
page read and write
1FDC00B6C000
trusted library allocation
page read and write
1FDC0037C000
trusted library allocation
page read and write
22040082C000
trusted library allocation
page read and write
1FDC02BF0000
trusted library allocation
page read and write
4B61000
heap
page read and write
4FF0000
direct allocation
page read and write
1FDC01644000
trusted library allocation
page read and write
15E4EF3D000
heap
page read and write
10E000294000
trusted library allocation
page read and write
1FDC0106C000
trusted library allocation
page read and write
1FDC01C50000
trusted library allocation
page read and write
1FDC0291A000
trusted library allocation
page read and write
A41B7FE000
unkown
page readonly
1FDC00A0C000
trusted library allocation
page read and write
1C0800274000
trusted library allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
1FDC00B20000
trusted library allocation
page read and write
1FDC00A01000
trusted library allocation
page read and write
20903656000
heap
page read and write
23A20000
trusted library allocation
page read and write
220400880000
trusted library allocation
page read and write
4F7C00334000
trusted library allocation
page read and write
1FDC02ABC000
trusted library allocation
page read and write
1FDC0281A000
trusted library allocation
page read and write
1FDC00B6C000
trusted library allocation
page read and write
1FDC01C38000
trusted library allocation
page read and write
209030AA000
heap
page read and write
1D795000
heap
page read and write
1D772000
heap
page read and write
1FDC02061000
trusted library allocation
page read and write
20909D73000
trusted library section
page read and write
209030B0000
heap
page read and write
1D77B000
heap
page read and write
85C000
stack
page read and write
4B61000
heap
page read and write
A47AFF9000
stack
page read and write
10E0002A8000
trusted library allocation
page read and write
FA9000
unkown
page execute and read and write
1C08002B0000
trusted library allocation
page read and write
15E56FC0000
trusted library allocation
page read and write
1FDC019C0000
trusted library allocation
page read and write
22040071C000
trusted library allocation
page read and write
1FDC02129000
trusted library allocation
page read and write
1FDC00B0C000
trusted library allocation
page read and write
1FDC01553000
trusted library allocation
page read and write
15E4D12B000
heap
page read and write
1FDC00C90000
trusted library allocation
page read and write
220400878000
trusted library allocation
page read and write
15E4D130000
heap
page read and write
A4157FE000
unkown
page readonly
1FDC01B0C000
trusted library allocation
page read and write
1FDC01AA0000
trusted library allocation
page read and write
1FDC00FC0000
trusted library allocation
page read and write
4500003CC000
trusted library allocation
page read and write
15E4EF0F000
heap
page read and write
220400408000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
1FDC007C0000
trusted library allocation
page read and write
1FDC01500000
trusted library allocation
page read and write
1FDC012EB000
trusted library allocation
page read and write
1B9800294000
direct allocation
page read and write
1FDC009EC000
trusted library allocation
page read and write
209036A1000
heap
page read and write
1D790000
heap
page read and write
1FDC00B0C000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00FE0000
trusted library allocation
page read and write
220400894000
trusted library allocation
page read and write
209081AE000
trusted library section
page read and write
1FDC02054000
trusted library allocation
page read and write
1FDC014B0000
trusted library allocation
page read and write
1FDC00C0C000
trusted library allocation
page read and write
1FDC00E45000
trusted library allocation
page read and write
1FDC00144000
trusted library allocation
page read and write
1FDC00950000
trusted library allocation
page read and write
4B61000
heap
page read and write
2204006F0000
trusted library allocation
page read and write
1FDC00094000
trusted library allocation
page read and write
1D772000
heap
page read and write
517E000
stack
page read and write
22040085C000
trusted library allocation
page read and write
1FDC01A4C000
trusted library allocation
page read and write
1FDC01826000
trusted library allocation
page read and write
220400404000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
1D77B000
heap
page read and write
4F7C001F0000
trusted library allocation
page read and write
1FDC0200C000
trusted library allocation
page read and write
1FDC01A98000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
1D74D000
stack
page read and write
1FDC01E44000
trusted library allocation
page read and write
1FDC00224000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
2204006D4000
trusted library allocation
page read and write
15E4D051000
heap
page read and write
15E4EFA1000
heap
page read and write
4F7C00044000
trusted library allocation
page read and write
15E4CE50000
heap
page read and write
9B0000
heap
page read and write
1FDC01AC0000
trusted library allocation
page read and write
1FDC006E8000
trusted library allocation
page read and write
32631FE000
stack
page read and write
1FDC01E5C000
trusted library allocation
page read and write
15E4CF50000
heap
page read and write
45000031C000
trusted library allocation
page read and write
20978F8F000
heap
page read and write
4984002D0000
direct allocation
page read and write
1FDC00B84000
trusted library allocation
page read and write
A40EFFD000
stack
page read and write
1FDC001B4000
trusted library allocation
page read and write
1FDC01A50000
trusted library allocation
page read and write
23C4B000
heap
page read and write
1FDC001E8000
trusted library allocation
page read and write
209036C8000
heap
page read and write
1FDC01AD4000
trusted library allocation
page read and write
1FDC002A4000
trusted library allocation
page read and write
1FDC00F40000
trusted library allocation
page read and write
2090364E000
heap
page read and write
1FDC021E0000
trusted library allocation
page read and write
6C6A1000
unkown
page execute read
4B61000
heap
page read and write
4F7C00260000
trusted library allocation
page read and write
4B61000
heap
page read and write
1B9800234000
direct allocation
page read and write
1FDC01B30000
trusted library allocation
page read and write
1FDC012A4000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
1FDC00F0C000
trusted library allocation
page read and write
1FDC0034C000
trusted library allocation
page read and write
1246000
heap
page read and write
1FDC01E88000
trusted library allocation
page read and write
A424FFE000
stack
page read and write
1FDC029D1000
trusted library allocation
page read and write
20903300000
heap
page read and write
1FDC00D20000
trusted library allocation
page read and write
958000
stack
page read and write
1D7A2000
heap
page read and write
15E4D0C6000
heap
page read and write
501B000
direct allocation
page read and write
20978EE7000
heap
page read and write
2090365E000
heap
page read and write
209030B0000
heap
page read and write
1FDC01864000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
15E4CF70000
heap
page read and write
1FDC00DEC000
trusted library allocation
page read and write
1FDC01574000
trusted library allocation
page read and write
323F9FE000
stack
page read and write
1FDC0176C000
trusted library allocation
page read and write
1FDC01F20000
trusted library allocation
page read and write
220400920000
trusted library allocation
page read and write
1D77B000
heap
page read and write
A406FFE000
stack
page read and write
1FDC0060C000
trusted library allocation
page read and write
1FDC00BF8000
trusted library allocation
page read and write
1FDC0195C000
trusted library allocation
page read and write
209036A9000
heap
page read and write
323D9F3000
stack
page read and write
A4187FE000
unkown
page readonly
1FDC00164000
trusted library allocation
page read and write
1D756000
heap
page read and write
1FDC02B70000
trusted library allocation
page read and write
1FDC01304000
trusted library allocation
page read and write
A416FFD000
stack
page read and write
1FDC0084C000
trusted library allocation
page read and write
1FDC00654000
trusted library allocation
page read and write
4F7C00390000
trusted library allocation
page read and write
C9E000
unkown
page execute and read and write
4F7C002D8000
trusted library allocation
page read and write
1FDC01AA8000
trusted library allocation
page read and write
1FDC01C54000
trusted library allocation
page read and write
10E0002B4000
trusted library allocation
page read and write
1B98002DC000
direct allocation
page read and write
1FDC00E50000
trusted library allocation
page read and write
A418FFD000
stack
page read and write
1FDC00598000
trusted library allocation
page read and write
45000031C000
trusted library allocation
page read and write
20903659000
heap
page read and write
1FDC01F40000
trusted library allocation
page read and write
2204008EC000
trusted library allocation
page read and write
1FDC00C90000
trusted library allocation
page read and write
220400864000
trusted library allocation
page read and write
4F7C0029C000
trusted library allocation
page read and write
1D785000
heap
page read and write
B9E000
unkown
page execute and read and write
1FDC0034C000
trusted library allocation
page read and write
1C0800220000
trusted library allocation
page read and write
1FDC009ED000
trusted library allocation
page read and write
15E4D0A7000
heap
page read and write
1FDC008CC000
trusted library allocation
page read and write
1FDC002D0000
trusted library allocation
page read and write
1FDC0032C000
trusted library allocation
page read and write
1D774000
heap
page read and write
1FDC01BDC000
trusted library allocation
page read and write
1FDC00DA0000
trusted library allocation
page read and write
124D000
heap
page read and write
15E4D113000
heap
page read and write
209030B4000
heap
page read and write
20907C72000
trusted library allocation
page read and write
1FDC01A88000
trusted library allocation
page read and write
4B61000
heap
page read and write
15E4EFAC000
heap
page read and write
1FDC00B6C000
trusted library allocation
page read and write
1FDC00438000
trusted library allocation
page read and write
22040078C000
trusted library allocation
page read and write
2204008B8000
trusted library allocation
page read and write
4500003AC000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
4B61000
heap
page read and write
A4247FE000
unkown
page readonly
498400234000
direct allocation
page read and write
22040060C000
trusted library allocation
page read and write
A4087FE000
unkown
page readonly
1FDC00E5C000
trusted library allocation
page read and write
A4217FE000
unkown
page readonly
498400303000
direct allocation
page read and write
220400860000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
1FDC0180C000
trusted library allocation
page read and write
1FDC0180C000
trusted library allocation
page read and write
A420FFE000
stack
page read and write
4B61000
heap
page read and write
1C0800278000
trusted library allocation
page read and write
32421FE000
unkown
page readonly
209030B0000
heap
page read and write
1FDC02096000
trusted library allocation
page read and write
1FDC00588000
trusted library allocation
page read and write
34DE000
stack
page read and write
1FDC01AB8000
trusted library allocation
page read and write
1FDC0120C000
trusted library allocation
page read and write
4F7C00028000
trusted library allocation
page read and write
1FDC01810000
trusted library allocation
page read and write
1FDC00F80000
trusted library allocation
page read and write
4B61000
heap
page read and write
4F7C00264000
trusted library allocation
page read and write
1FDC00BF8000
trusted library allocation
page read and write
1FDC00C34000
trusted library allocation
page read and write
1FDC02948000
trusted library allocation
page read and write
1FDC01950000
trusted library allocation
page read and write
1FDC00B7C000
trusted library allocation
page read and write
32521FE000
unkown
page readonly
4F7C00114000
trusted library allocation
page read and write
48EE000
stack
page read and write
1FDC01BC0000
trusted library allocation
page read and write
1D792000
heap
page read and write
1234000
heap
page read and write
1FDC00BF8000
trusted library allocation
page read and write
15E4EFDC000
heap
page read and write
11E2000
heap
page read and write
1FDC0012C000
trusted library allocation
page read and write
1FDC01E94000
trusted library allocation
page read and write
4F7C002F0000
trusted library allocation
page read and write
429E000
stack
page read and write
1FDC0151C000
trusted library allocation
page read and write
1FDC0120C000
trusted library allocation
page read and write
49840021C000
direct allocation
page read and write
A4197FE000
unkown
page readonly
1FDC01621000
trusted library allocation
page read and write
209035F5000
heap
page read and write
1C08002C0000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
1FDC00EBC000
trusted library allocation
page read and write
1FDC01672000
trusted library allocation
page read and write
20909F7E000
trusted library section
page read and write
1FDC019D4000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
15E4D0A0000
heap
page read and write
1FDC01304000
trusted library allocation
page read and write
1FDC012E4000
trusted library allocation
page read and write
450000404000
trusted library allocation
page read and write
44E0000
heap
page read and write
1D783000
heap
page read and write
1FDC01FB8000
trusted library allocation
page read and write
2090368A000
heap
page read and write
1FDC01672000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
1C08002F4000
trusted library allocation
page read and write
20978E60000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
1FDC00540000
trusted library allocation
page read and write
4F7C00250000
trusted library allocation
page read and write
3ADF000
stack
page read and write
1FDC00638000
trusted library allocation
page read and write
325E000
stack
page read and write
20903760000
trusted library section
page read and write
15E4D0E4000
heap
page read and write
20903615000
heap
page read and write
498400201000
direct allocation
page read and write
1FDC00F80000
trusted library allocation
page read and write
1FDC0111C000
trusted library allocation
page read and write
23920000
heap
page read and write
1FDC0041C000
trusted library allocation
page read and write
450000320000
trusted library allocation
page read and write
4B61000
heap
page read and write
209036B6000
heap
page read and write
1FDC0043C000
trusted library allocation
page read and write
1FDC00218000
trusted library allocation
page read and write
15E4D160000
heap
page read and write
1FDC02A24000
trusted library allocation
page read and write
1FDC0038C000
trusted library allocation
page read and write
2204006E8000
trusted library allocation
page read and write
1B98002AC000
direct allocation
page read and write
1FDC017CC000
trusted library allocation
page read and write
A4007FE000
unkown
page readonly
A474FFE000
stack
page read and write
1FDC00AD0000
trusted library allocation
page read and write
1FDC00F98000
trusted library allocation
page read and write
4B61000
heap
page read and write
4984002D8000
direct allocation
page read and write
311E000
stack
page read and write
1CF3F000
stack
page read and write
1FDC01D60000
trusted library allocation
page read and write
1FDC00F40000
trusted library allocation
page read and write
209030B0000
heap
page read and write
1C0800288000
trusted library allocation
page read and write
450000380000
trusted library allocation
page read and write
1FDC028E0000
trusted library allocation
page read and write
4F7C0018C000
trusted library allocation
page read and write
B79000
unkown
page execute and read and write
1FDC01DC4000
trusted library allocation
page read and write
1FDC01E01000
trusted library allocation
page read and write
1FDC01EFC000
trusted library allocation
page read and write
1FDC0183C000
trusted library allocation
page read and write
4B61000
heap
page read and write
498400318000
direct allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
4F7C001DC000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
1FDC0027C000
trusted library allocation
page read and write
1FDC00F14000
trusted library allocation
page read and write
1FDC002F0000
trusted library allocation
page read and write
1FDC00D60000
trusted library allocation
page read and write
A417FFD000
stack
page read and write
15E4EE13000
heap
page read and write
1D77A000
heap
page read and write
1FDC00360000
trusted library allocation
page read and write
4F7C00290000
trusted library allocation
page read and write
A414FFD000
stack
page read and write
5190000
direct allocation
page execute and read and write
4F7C00214000
trusted library allocation
page read and write
32651FE000
unkown
page readonly
1FDC01934000
trusted library allocation
page read and write
43DE000
stack
page read and write
1FDC00C54000
trusted library allocation
page read and write
1FDC00CEC000
trusted library allocation
page read and write
452E000
stack
page read and write
15E4EF58000
heap
page read and write
1D76A000
heap
page read and write
A40C7FE000
unkown
page readonly
A47D7FE000
unkown
page readonly
32571FE000
unkown
page readonly
1FDC01618000
trusted library allocation
page read and write
1D4AD000
stack
page read and write
1D770000
heap
page read and write
1FDC01C20000
trusted library allocation
page read and write
118D000
stack
page read and write
476F000
stack
page read and write
1FDC01E68000
trusted library allocation
page read and write
45000032C000
trusted library allocation
page read and write
1FDC0154C000
trusted library allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
145E000
stack
page read and write
1FDC00CB8000
trusted library allocation
page read and write
32511FE000
unkown
page readonly
1FDC01B24000
trusted library allocation
page read and write
1C080020C000
trusted library allocation
page read and write
32449FE000
stack
page read and write
1FDC00F40000
trusted library allocation
page read and write
1FDC01574000
trusted library allocation
page read and write
22040087C000
trusted library allocation
page read and write
1FDC01A34000
trusted library allocation
page read and write
9B5000
heap
page read and write
4F7C00074000
trusted library allocation
page read and write
9C0000
heap
page read and write
325A1FE000
unkown
page readonly
1FDC016B9000
trusted library allocation
page read and write
1FDC0150C000
trusted library allocation
page read and write
220400220000
trusted library allocation
page read and write
1FDC01EC8000
trusted library allocation
page read and write
1FDC00798000
trusted library allocation
page read and write
1FDC00CB0000
trusted library allocation
page read and write
1FDC00C64000
trusted library allocation
page read and write
15E4D12B000
heap
page read and write
1FDC01B88000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
6CF71000
unkown
page execute read
1FDC01485000
trusted library allocation
page read and write
325C9FE000
stack
page read and write
20903692000
heap
page read and write
324A9FE000
stack
page read and write
1FDC0153C000
trusted library allocation
page read and write
10E000201000
trusted library allocation
page read and write
23C33000
heap
page read and write
209099DC000
trusted library section
page read and write
1D792000
heap
page read and write
1FDC01A58000
trusted library allocation
page read and write
1FDC00D14000
trusted library allocation
page read and write
1FDC01601000
trusted library allocation
page read and write
498400230000
direct allocation
page read and write
220400830000
trusted library allocation
page read and write
1FDC01140000
trusted library allocation
page read and write
1FDC00B10000
trusted library allocation
page read and write
450000401000
trusted library allocation
page read and write
6C6A0000
unkown
page readonly
1FDC00401000
trusted library allocation
page read and write
1FDC00B0C000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00E1C000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
1FDC02801000
trusted library allocation
page read and write
20909D40000
trusted library section
page read and write
2204002ED000
trusted library allocation
page read and write
220400248000
trusted library allocation
page read and write
15E4D130000
heap
page read and write
10E0002C8000
trusted library allocation
page read and write
1FDC01960000
trusted library allocation
page read and write
1FDC00F3C000
trusted library allocation
page read and write
20903692000
heap
page read and write
1B9800220000
direct allocation
page read and write
1FDC00304000
trusted library allocation
page read and write
4F7C00108000
trusted library allocation
page read and write
A31000
unkown
page execute and write copy
1FDC002A4000
trusted library allocation
page read and write
15E4D09C000
heap
page read and write
1FDC01BF0000
trusted library allocation
page read and write
1FDC01F00000
trusted library allocation
page read and write
10E000250000
trusted library allocation
page read and write
1D781000
heap
page read and write
450000300000
trusted library allocation
page read and write
32589FC000
stack
page read and write
1D760000
heap
page read and write
1FDC01C10000
trusted library allocation
page read and write
512F000
stack
page read and write
1D792000
heap
page read and write
1FDC01B50000
trusted library allocation
page read and write
4F7C000AD000
trusted library allocation
page read and write
A4067FE000
unkown
page readonly
2090367A000
heap
page read and write
4B50000
direct allocation
page read and write
2D9E000
heap
page read and write
1FDC01644000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
1FDC014F0000
trusted library allocation
page read and write
450000418000
trusted library allocation
page read and write
4F7C002A0000
trusted library allocation
page read and write
1FDC015DC000
trusted library allocation
page read and write
1FDC00970000
trusted library allocation
page read and write
15E4FBC0000
unkown
page read and write
1FDC0032C000
trusted library allocation
page read and write
209030AC000
heap
page read and write
4B50000
direct allocation
page read and write
1FDC015DC000
trusted library allocation
page read and write
1B9800250000
direct allocation
page read and write
1FDC019DC000
trusted library allocation
page read and write
A4777FE000
unkown
page readonly
220400898000
trusted library allocation
page read and write
1FDC00CA0000
trusted library allocation
page read and write
220400974000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
15E4D07E000
heap
page read and write
1FDC00B0C000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC005F4000
trusted library allocation
page read and write
2204006BC000
trusted library allocation
page read and write
32569FE000
stack
page read and write
1FDC01E98000
trusted library allocation
page read and write
4F7C002CC000
trusted library allocation
page read and write
A47CFFB000
stack
page read and write
1FDC01FEC000
trusted library allocation
page read and write
2204006C8000
trusted library allocation
page read and write
1FDC017E0000
trusted library allocation
page read and write
1FDC00438000
trusted library allocation
page read and write
1D76A000
heap
page read and write
1FDC00338000
trusted library allocation
page read and write
1FDC00444000
trusted library allocation
page read and write
4B61000
heap
page read and write
220400238000
trusted library allocation
page read and write
1B980024C000
direct allocation
page read and write
20903626000
heap
page read and write
1FDC00F80000
trusted library allocation
page read and write
4F7C00244000
trusted library allocation
page read and write
22040040C000
trusted library allocation
page read and write
2090368A000
heap
page read and write
A40DFFC000
stack
page read and write
1FDC01650000
trusted library allocation
page read and write
6CFD1000
unkown
page readonly
1FDC00077000
trusted library allocation
page read and write
209030A8000
heap
page read and write
1FDC009D0000
trusted library allocation
page read and write
1FDC01F54000
trusted library allocation
page read and write
1FDC00CB0000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
1FDC002A8000
trusted library allocation
page read and write
1FDC02AA4000
trusted library allocation
page read and write
4F7C00220000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
1B9800290000
direct allocation
page read and write
1FDC01E64000
trusted library allocation
page read and write
15E4EF51000
heap
page read and write
1190000
heap
page read and write
2204007D4000
trusted library allocation
page read and write
4B61000
heap
page read and write
4F7C00248000
trusted library allocation
page read and write
1FDC02970000
trusted library allocation
page read and write
1FDC0196C000
trusted library allocation
page read and write
1FDC0198C000
trusted library allocation
page read and write
1FDC01DB4000
trusted library allocation
page read and write
1FDC02BF0000
trusted library allocation
page read and write
1FDC02024000
trusted library allocation
page read and write
4F7C00340000
trusted library allocation
page read and write
15E4EE02000
heap
page read and write
1FDC01FC1000
trusted library allocation
page read and write
E91000
unkown
page execute and read and write
220400418000
trusted library allocation
page read and write
20978F6A000
heap
page read and write
32479FE000
stack
page read and write
15E4D0FE000
heap
page read and write
2D9B000
heap
page read and write
A4147FE000
unkown
page readonly
1FDC00338000
trusted library allocation
page read and write
1FDC00210000
trusted library allocation
page read and write
1FDC0112C000
trusted library allocation
page read and write
4F7C00201000
trusted library allocation
page read and write
1FDC002B4000
trusted library allocation
page read and write
498400215000
direct allocation
page read and write
1FDC02024000
trusted library allocation
page read and write
1FDC00CF4000
trusted library allocation
page read and write
1FDC00794000
trusted library allocation
page read and write
1FDC00791000
trusted library allocation
page read and write
1FDC019D8000
trusted library allocation
page read and write
324B1FE000
unkown
page readonly
1FDC01964000
trusted library allocation
page read and write
1FDC00FD5000
trusted library allocation
page read and write
4F7C00238000
trusted library allocation
page read and write
1FDC00F5C000
trusted library allocation
page read and write
1FDC00588000
trusted library allocation
page read and write
4F7C002A4000
trusted library allocation
page read and write
462F000
stack
page read and write
2090360D000
heap
page read and write
A4787FE000
unkown
page readonly
1FDC00BF8000
trusted library allocation
page read and write
1FDC01560000
trusted library allocation
page read and write
1FDC010AC000
trusted library allocation
page read and write
1FDC00734000
trusted library allocation
page read and write
4B30000
heap
page read and write
1FDC01CA4000
trusted library allocation
page read and write
1FDC01084000
trusted library allocation
page read and write
1FDC01C34000
trusted library allocation
page read and write
32501FE000
unkown
page readonly
1FDC00D7C000
trusted library allocation
page read and write
1FDC02121000
trusted library allocation
page read and write
1FDC01786000
trusted library allocation
page read and write
6C83F000
unkown
page readonly
10E0002B4000
trusted library allocation
page read and write
20978F66000
heap
page read and write
BD7000
unkown
page execute and read and write
1FDC00A90000
trusted library allocation
page read and write
1C0800248000
trusted library allocation
page read and write
1FDC002F0000
trusted library allocation
page read and write
1FDC021BE000
trusted library allocation
page read and write
1D77A000
heap
page read and write
4984002D0000
direct allocation
page read and write
1FDC01556000
trusted library allocation
page read and write
209030B2000
heap
page read and write
1FDC0076C000
trusted library allocation
page read and write
A47FFFE000
stack
page read and write
6C87F000
unkown
page write copy
209035D4000
heap
page read and write
1FDC00201000
trusted library allocation
page read and write
498400328000
direct allocation
page read and write
1FDC0159D000
trusted library allocation
page read and write
45000020C000
trusted library allocation
page read and write
220400401000
trusted library allocation
page read and write
4F7C00380000
trusted library allocation
page read and write
2090360D000
heap
page read and write
1FDC00F3C000
trusted library allocation
page read and write
1FDC01500000
trusted library allocation
page read and write
1FDC001D8000
trusted library allocation
page read and write
2204007E4000
trusted library allocation
page read and write
1FDC0021C000
trusted library allocation
page read and write
32491FE000
unkown
page readonly
450000350000
trusted library allocation
page read and write
1FDC00124000
trusted library allocation
page read and write
1FDC01924000
trusted library allocation
page read and write
1FDC001EC000
trusted library allocation
page read and write
1FDC00358000
trusted library allocation
page read and write
1FDC016C4000
trusted library allocation
page read and write
3C5E000
stack
page read and write
20905680000
trusted library allocation
page read and write
32619FE000
stack
page read and write
209030A3000
heap
page read and write
1FDC00300000
trusted library allocation
page read and write
20903676000
heap
page read and write
39DE000
stack
page read and write
20907A20000
heap
page read and write
325B9FC000
stack
page read and write
32519FE000
stack
page read and write
1FDC01FE0000
trusted library allocation
page read and write
4F7C00334000
trusted library allocation
page read and write
10E000235000
trusted library allocation
page read and write
A40D7FE000
unkown
page readonly
1D77D000
heap
page read and write
61ED4000
direct allocation
page readonly
1FDC00228000
trusted library allocation
page read and write
1FDC01574000
trusted library allocation
page read and write
1C08002D8000
trusted library allocation
page read and write
22040081C000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
1FDC016D9000
trusted library allocation
page read and write
4F7C00218000
trusted library allocation
page read and write
1D750000
heap
page read and write
1FDC019A4000
trusted library allocation
page read and write
1D781000
heap
page read and write
1FDC01BD8000
trusted library allocation
page read and write
498400308000
direct allocation
page read and write
1D783000
heap
page read and write
1FDC0038C000
trusted library allocation
page read and write
2204002F0000
trusted library allocation
page read and write
1D77B000
heap
page read and write
321F000
stack
page read and write
1B9800210000
direct allocation
page read and write
2204008F0000
trusted library allocation
page read and write
1FDC00B0C000
trusted library allocation
page read and write
4F7C00314000
trusted library allocation
page read and write
113C000
unkown
page execute and read and write
2204007E0000
trusted library allocation
page read and write
1FDC01F1C000
trusted library allocation
page read and write
1FDC00FD4000
trusted library allocation
page read and write
1FDC00A0C000
trusted library allocation
page read and write
1FDC00068000
trusted library allocation
page read and write
1240000
heap
page read and write
1D7A2000
heap
page read and write
1FDC0038C000
trusted library allocation
page read and write
1FDC01801000
trusted library allocation
page read and write
1FDC00D40000
trusted library allocation
page read and write
4F7C002F0000
trusted library allocation
page read and write
4F7C002AC000
trusted library allocation
page read and write
1D787000
heap
page read and write
4F7C002B0000
trusted library allocation
page read and write
1FDC010C4000
trusted library allocation
page read and write
10E0002B4000
trusted library allocation
page read and write
1D76A000
heap
page read and write
1FDC01EDC000
trusted library allocation
page read and write
15E4D085000
heap
page read and write
1D870000
trusted library allocation
page read and write
1FDC01001000
trusted library allocation
page read and write
1FDC01550000
trusted library allocation
page read and write
1B9800244000
direct allocation
page read and write
4F7C0017C000
trusted library allocation
page read and write
10E000274000
trusted library allocation
page read and write
4B61000
heap
page read and write
4B2F000
stack
page read and write
1FDC007E0000
trusted library allocation
page read and write
1FDC01C3C000
trusted library allocation
page read and write
4F7C000E8000
trusted library allocation
page read and write
1FDC0020C000
trusted library allocation
page read and write
BDA000
unkown
page execute and read and write
1FDC00F40000
trusted library allocation
page read and write
1FDC00433000
trusted library allocation
page read and write
1FDC01B20000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
1FDC01718000
trusted library allocation
page read and write
49EF000
stack
page read and write
401E000
stack
page read and write
209035FC000
heap
page read and write
1FDC0077C000
trusted library allocation
page read and write
1FDC00A68000
trusted library allocation
page read and write
450000364000
trusted library allocation
page read and write
1C0800270000
trusted library allocation
page read and write
1FDC01EF0000
trusted library allocation
page read and write
209030B0000
heap
page read and write
1FDC02AB0000
trusted library allocation
page read and write
A40B7FE000
unkown
page readonly
1FDC01BE0000
trusted library allocation
page read and write
1C08002F8000
trusted library allocation
page read and write
1FDC01B24000
trusted library allocation
page read and write
1C0800201000
trusted library allocation
page read and write
4F7C001E0000
trusted library allocation
page read and write
2204007A0000
trusted library allocation
page read and write
4500002D8000
trusted library allocation
page read and write
32649FE000
unkown
page readonly
1FDC00588000
trusted library allocation
page read and write
4F7C001E8000
trusted library allocation
page read and write
1FDC00ED8000
trusted library allocation
page read and write
1FDC0078C000
trusted library allocation
page read and write
A47DFFC000
stack
page read and write
1D64E000
stack
page read and write
1FDC006CC000
trusted library allocation
page read and write
BAB000
unkown
page execute and read and write
1C0800238000
trusted library allocation
page read and write
1FDC009A4000
trusted library allocation
page read and write
1FDC02024000
trusted library allocation
page read and write
15E4D07A000
heap
page read and write
1FDC0203C000
trusted library allocation
page read and write
1FDC005C4000
trusted library allocation
page read and write
A423FFC000
stack
page read and write
1FDC00ED1000
trusted library allocation
page read and write
1FDC002B8000
trusted library allocation
page read and write
1FDC002A4000
trusted library allocation
page read and write
1FDC01EE0000
trusted library allocation
page read and write
1D792000
heap
page read and write
1FDC00A50000
trusted library allocation
page read and write
1FDC01F2C000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC002A4000
trusted library allocation
page read and write
335F000
stack
page read and write
22040084C000
trusted library allocation
page read and write
1FDC00EF4000
trusted library allocation
page read and write
1FDC02818000
trusted library allocation
page read and write
15E4D084000
heap
page read and write
1FDC01470000
trusted library allocation
page read and write
498400244000
direct allocation
page read and write
A2E000
stack
page read and write
1FDC00480000
trusted library allocation
page read and write
1FDC0034C000
trusted library allocation
page read and write
1FDC01130000
trusted library allocation
page read and write
1FDC02B4C000
trusted library allocation
page read and write
325E1FE000
unkown
page readonly
1C0800294000
trusted library allocation
page read and write
209036A7000
heap
page read and write
1FDC00B08000
trusted library allocation
page read and write
113D000
unkown
page execute and write copy
20903651000
heap
page read and write
4F7C002C0000
trusted library allocation
page read and write
1FDC00588000
trusted library allocation
page read and write
1FDC0223C000
trusted library allocation
page read and write
450000250000
trusted library allocation
page read and write
1FDC012C4000
trusted library allocation
page read and write
466E000
stack
page read and write
2204007BC000
trusted library allocation
page read and write
A472FFE000
unkown
page read and write
1D76A000
heap
page read and write
209036A5000
heap
page read and write
1FDC006BC000
trusted library allocation
page read and write
A478FF8000
stack
page read and write
1FDC00338000
trusted library allocation
page read and write
1FDC00EF4000
trusted library allocation
page read and write
1FDC01ED8000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
4B61000
heap
page read and write
A4757FE000
unkown
page readonly
209030B4000
heap
page read and write
4F7C00324000
trusted library allocation
page read and write
1FDC02063000
trusted library allocation
page read and write
15E4D0A9000
heap
page read and write
1FDC0087C000
trusted library allocation
page read and write
15E4EF84000
heap
page read and write
1FDC01D60000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
450000408000
trusted library allocation
page read and write
10E000294000
trusted library allocation
page read and write
1FDC01A0C000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC01430000
trusted library allocation
page read and write
1FDC016B9000
trusted library allocation
page read and write
15E4CF30000
heap
page readonly
A47BFFB000
stack
page read and write
361E000
stack
page read and write
1FDC01E48000
trusted library allocation
page read and write
2D4E000
stack
page read and write
1FDC00C01000
trusted library allocation
page read and write
2090309A000
heap
page read and write
23C41000
heap
page read and write
1FDC01ED4000
trusted library allocation
page read and write
1D77A000
heap
page read and write
1FDC020F0000
trusted library allocation
page read and write
1B9800217000
direct allocation
page read and write
1FDC02B68000
trusted library allocation
page read and write
4F7C003F0000
trusted library allocation
page read and write
4F7C00080000
trusted library allocation
page read and write
1FDC0112C000
trusted library allocation
page read and write
1FDC02A44000
trusted library allocation
page read and write
209030B2000
heap
page read and write
1FDC00FC0000
trusted library allocation
page read and write
2090A1BE000
trusted library section
page read and write
1FDC00154000
trusted library allocation
page read and write
1FDC00F5C000
trusted library allocation
page read and write
1FDC0183C000
trusted library allocation
page read and write
1FDC00CB8000
trusted library allocation
page read and write
1FDC013C4000
trusted library allocation
page read and write
4F7C00254000
trusted library allocation
page read and write
1FDC01B08000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
6D019000
unkown
page readonly
1FDC00E98000
trusted library allocation
page read and write
325A9FE000
stack
page read and write
30DF000
stack
page read and write
1C08002A4000
trusted library allocation
page read and write
1FDC01190000
trusted library allocation
page read and write
1FDC01718000
trusted library allocation
page read and write
1D77B000
heap
page read and write
2090309A000
heap
page read and write
4984002EC000
direct allocation
page read and write
10E0002B8000
trusted library allocation
page read and write
389E000
stack
page read and write
1FDC00CA0000
trusted library allocation
page read and write
1FDC0154C000
trusted library allocation
page read and write
15E4D166000
heap
page read and write
1FDC01430000
trusted library allocation
page read and write
1C08002A0000
trusted library allocation
page read and write
4F7C00001000
trusted library allocation
page read and write
209030A8000
heap
page read and write
2204006E0000
trusted library allocation
page read and write
1FDC0154C000
trusted library allocation
page read and write
1B9800284000
direct allocation
page read and write
15E4EF6F000
heap
page read and write
1FDC001B4000
trusted library allocation
page read and write
4500002A4000
trusted library allocation
page read and write
1FDC01FC4000
trusted library allocation
page read and write
1FDC00D04000
trusted library allocation
page read and write
6C87E000
unkown
page read and write
1FDC01AF4000
trusted library allocation
page read and write
20907839000
heap
page read and write
1FDC008D8000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC0133C000
trusted library allocation
page read and write
2D8C000
stack
page read and write
1FDC0165A000
trusted library allocation
page read and write
1FDC01998000
trusted library allocation
page read and write
1FDC00CF4000
trusted library allocation
page read and write
1FDC00D94000
trusted library allocation
page read and write
2090365B000
heap
page read and write
1FDC00184000
trusted library allocation
page read and write
2204008A8000
trusted library allocation
page read and write
32469FE000
stack
page read and write
4F7C00270000
trusted library allocation
page read and write
1FDC0082C000
trusted library allocation
page read and write
1FDC01B40000
trusted library allocation
page read and write
1FDC001E0000
trusted library allocation
page read and write
1FDC00CB0000
trusted library allocation
page read and write
450000390000
trusted library allocation
page read and write
1FDC00CC8000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
1FDC01304000
trusted library allocation
page read and write
209030A3000
heap
page read and write
1FDC001F0000
trusted library allocation
page read and write
1D772000
heap
page read and write
1FDC0183C000
trusted library allocation
page read and write
1FDC00F0C000
trusted library allocation
page read and write
10E0002FC000
trusted library allocation
page read and write
1FDC01401000
trusted library allocation
page read and write
1D790000
heap
page read and write
5180000
direct allocation
page execute and read and write
2204002B0000
trusted library allocation
page read and write
1FDC0038C000
trusted library allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
1B9800260000
direct allocation
page read and write
1FDC00F40000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC0140C000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
F93000
unkown
page execute and read and write
209056D7000
unclassified section
page read and write
220400210000
trusted library allocation
page read and write
1FDC00054000
trusted library allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
1FDC014F0000
trusted library allocation
page read and write
1FDC010A2000
trusted library allocation
page read and write
45000025C000
trusted library allocation
page read and write
2204006AC000
trusted library allocation
page read and write
22040020C000
trusted library allocation
page read and write
1D21E000
stack
page read and write
1FDC0160C000
trusted library allocation
page read and write
15E4EF35000
heap
page read and write
209030AC000
heap
page read and write
1FDC01A70000
trusted library allocation
page read and write
1FDC01638000
trusted library allocation
page read and write
4F7C00124000
trusted library allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
1FDC002A8000
trusted library allocation
page read and write
10E000230000
trusted library allocation
page read and write
2090AF90000
unkown
page readonly
1FDC01668000
trusted library allocation
page read and write
220400884000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00FD4000
trusted library allocation
page read and write
1FDC0200C000
trusted library allocation
page read and write
1FDC00CA0000
trusted library allocation
page read and write
1FDC00E34000
trusted library allocation
page read and write
1FDC000EC000
trusted library allocation
page read and write
20907879000
heap
page read and write
1FDC00124000
trusted library allocation
page read and write
2090365E000
heap
page read and write
20903097000
heap
page read and write
4F7C00228000
trusted library allocation
page read and write
20978DF0000
heap
page readonly
4B80000
heap
page read and write
44DF000
stack
page read and write
1D7A2000
heap
page read and write
A400FFE000
stack
page read and write
1FDC01AFC000
trusted library allocation
page read and write
498400284000
direct allocation
page read and write
1FDC02E04000
trusted library allocation
page read and write
10E000210000
trusted library allocation
page read and write
20978E30000
heap
page read and write
1FDC00BE4000
trusted library allocation
page read and write
20903070000
heap
page read and write
1FDC01430000
trusted library allocation
page read and write
A4137FE000
unkown
page readonly
1FDC029D3000
trusted library allocation
page read and write
15E4D0C4000
heap
page read and write
1FDC00D2C000
trusted library allocation
page read and write
1FDC01E8C000
trusted library allocation
page read and write
A471FEF000
stack
page read and write
15E55BF0000
trusted library allocation
page read and write
1FDC0203C000
trusted library allocation
page read and write
A408FFB000
stack
page read and write
1FDC00A0C000
trusted library allocation
page read and write
209083C7000
unclassified section
page read and write
1FDC010C0000
trusted library allocation
page read and write
1FDC00678000
trusted library allocation
page read and write
4F7C003C0000
trusted library allocation
page read and write
4F7C00240000
trusted library allocation
page read and write
4500002F1000
trusted library allocation
page read and write
22040080C000
trusted library allocation
page read and write
1FDC00E20000
trusted library allocation
page read and write
1FDC01F28000
trusted library allocation
page read and write
4F7C003E0000
trusted library allocation
page read and write
450000238000
trusted library allocation
page read and write
1FDC00A18000
trusted library allocation
page read and write
1FDC00994000
trusted library allocation
page read and write
1FDC014E0000
trusted library allocation
page read and write
4F7C00401000
trusted library allocation
page read and write
220400788000
trusted library allocation
page read and write
399F000
stack
page read and write
1C08002C0000
trusted library allocation
page read and write
A41D7FE000
unkown
page readonly
2204006C8000
trusted library allocation
page read and write
2204007C0000
trusted library allocation
page read and write
209036A3000
heap
page read and write
1FDC01F24000
trusted library allocation
page read and write
1FDC01B78000
trusted library allocation
page read and write
4F7C003D0000
trusted library allocation
page read and write
1FDC01580000
trusted library allocation
page read and write
20978F79000
heap
page read and write
1FDC01B1C000
trusted library allocation
page read and write
1FDC002A4000
trusted library allocation
page read and write
1D75F000
heap
page read and write
1B98002E4000
direct allocation
page read and write
1FDC021E2000
trusted library allocation
page read and write
1FDC01A38000
trusted library allocation
page read and write
32531FE000
unkown
page readonly
1FDC009BC000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
1FDC00F14000
trusted library allocation
page read and write
15E4CFC0000
trusted library section
page readonly
209030B0000
heap
page read and write
20903080000
heap
page read and write
1FDC01622000
trusted library allocation
page read and write
4F7C00278000
trusted library allocation
page read and write
1FDC012F0000
trusted library allocation
page read and write
1FDC017E4000
trusted library allocation
page read and write
6F800000
unkown
page readonly
220400818000
trusted library allocation
page read and write
A401FF4000
stack
page read and write
1B98002EC000
direct allocation
page read and write
20908332000
trusted library section
page read and write
1D775000
heap
page read and write
1FDC00001000
trusted library allocation
page read and write
952000
stack
page read and write
1FDC000C4000
trusted library allocation
page read and write
1FDC0005F000
trusted library allocation
page read and write
A4767FE000
unkown
page readonly
20908370000
trusted library section
page read and write
4F7C0015C000
trusted library allocation
page read and write
2204002FC000
trusted library allocation
page read and write
23940000
heap
page read and write
1FDC01C88000
trusted library allocation
page read and write
20978EEE000
heap
page read and write
15E4D000000
heap
page read and write
20909CD0000
trusted library section
page read and write
220400828000
trusted library allocation
page read and write
1FDC01C74000
trusted library allocation
page read and write
4B61000
heap
page read and write
1D784000
heap
page read and write
1FDC01E78000
trusted library allocation
page read and write
4B61000
heap
page read and write
220400948000
trusted library allocation
page read and write
2090367A000
heap
page read and write
20902400000
unkown
page read and write
23B8F000
stack
page read and write
15E4D09C000
heap
page read and write
4F7C00314000
trusted library allocation
page read and write
220400848000
trusted library allocation
page read and write
1FDC00898000
trusted library allocation
page read and write
4F7C002F0000
trusted library allocation
page read and write
1FDC01BCC000
trusted library allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
32621FE000
unkown
page readonly
1FDC00F14000
trusted library allocation
page read and write
1FDC0000C000
trusted library allocation
page read and write
4F7C0028C000
trusted library allocation
page read and write
20903624000
heap
page read and write
15E4D102000
heap
page read and write
1FDC01EA0000
trusted library allocation
page read and write
4B61000
heap
page read and write
1B980020C000
direct allocation
page read and write
61ECC000
direct allocation
page read and write
4B61000
heap
page read and write
209035F1000
heap
page read and write
4B61000
heap
page read and write
450000358000
trusted library allocation
page read and write
A40CFFC000
stack
page read and write
4F7C0002C000
trusted library allocation
page read and write
498400250000
direct allocation
page read and write
3B1E000
stack
page read and write
1FDC00FEC000
trusted library allocation
page read and write
1FDC01A54000
trusted library allocation
page read and write
1FDC02034000
trusted library allocation
page read and write
1FDC02204000
trusted library allocation
page read and write
32601FE000
unkown
page readonly
1FDC002F3000
trusted library allocation
page read and write
220400918000
trusted library allocation
page read and write
1FDC01B38000
trusted library allocation
page read and write
450000210000
trusted library allocation
page read and write
4F7C003E0000
trusted library allocation
page read and write
4F7C001C4000
trusted library allocation
page read and write
A4127FE000
unkown
page readonly
1FDC01304000
trusted library allocation
page read and write
4F7C00150000
trusted library allocation
page read and write
15E4D054000
heap
page read and write
220400960000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00CA0000
trusted library allocation
page read and write
20978F95000
heap
page read and write
1FDC01EEC000
trusted library allocation
page read and write
1B9800215000
direct allocation
page read and write
1FDC01F50000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
1FDC00EA4000
trusted library allocation
page read and write
450000288000
trusted library allocation
page read and write
2090A3C0000
trusted library section
page read and write
1FDC00C64000
trusted library allocation
page read and write
A41FFFE000
stack
page read and write
4500002B0000
trusted library allocation
page read and write
4B61000
heap
page read and write
10E000294000
trusted library allocation
page read and write
1FDC0129C000
trusted library allocation
page read and write
450000424000
trusted library allocation
page read and write
220400844000
trusted library allocation
page read and write
1FDC00338000
trusted library allocation
page read and write
20903676000
heap
page read and write
22040039C000
trusted library allocation
page read and write
323E9FE000
unkown
page read and write
2204006F4000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00D58000
trusted library allocation
page read and write
15E4D013000
heap
page read and write
209036B9000
heap
page read and write
1FDC0034C000
trusted library allocation
page read and write
1FDC02066000
trusted library allocation
page read and write
1FDC01C58000
trusted library allocation
page read and write
4F7C00224000
trusted library allocation
page read and write
A412FFB000
stack
page read and write
4B50000
direct allocation
page read and write
1FDC00230000
trusted library allocation
page read and write
209030B4000
heap
page read and write
1FDC00A48000
trusted library allocation
page read and write
4F7C00424000
trusted library allocation
page read and write
1D787000
heap
page read and write
1FDC01560000
trusted library allocation
page read and write
1FDC0111C000
trusted library allocation
page read and write
1FDC0176C000
trusted library allocation
page read and write
220400904000
trusted library allocation
page read and write
1FDC012D0000
trusted library allocation
page read and write
1FDC00AB8000
trusted library allocation
page read and write
10E0002B4000
trusted library allocation
page read and write
1FDC01574000
trusted library allocation
page read and write
1FDC02A98000
trusted library allocation
page read and write
6C880000
unkown
page read and write
325E9FC000
stack
page read and write
2D97000
heap
page read and write
4B50000
direct allocation
page read and write
450000201000
trusted library allocation
page read and write
1FDC01E0C000
trusted library allocation
page read and write
123B000
heap
page read and write
4B61000
heap
page read and write
1FDC01E0C000
trusted library allocation
page read and write
1D7A2000
heap
page read and write
A41C7FE000
unkown
page readonly
1D0BE000
stack
page read and write
1D76A000
heap
page read and write
1FDC014A4000
trusted library allocation
page read and write
4B60000
heap
page read and write
A40FFFB000
stack
page read and write
15E4EF40000
heap
page read and write
20903658000
heap
page read and write
A4097FE000
unkown
page readonly
450000220000
trusted library allocation
page read and write
1FDC00540000
trusted library allocation
page read and write
1C08002C0000
trusted library allocation
page read and write
1FDC00CB6000
trusted library allocation
page read and write
4500002F4000
trusted library allocation
page read and write
15E4EFD3000
heap
page read and write
1FDC02A7C000
trusted library allocation
page read and write
1FDC01DC8000
trusted library allocation
page read and write
1FDC002FB000
trusted library allocation
page read and write
1FDC00EE8000
trusted library allocation
page read and write
4F7C000F8000
trusted library allocation
page read and write
1FDC00C80000
trusted library allocation
page read and write
4F7C00254000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00A2C000
trusted library allocation
page read and write
1FDC0120C000
trusted library allocation
page read and write
1FDC0101C000
trusted library allocation
page read and write
1FDC01BF4000
trusted library allocation
page read and write
1FDC003A0000
trusted library allocation
page read and write
2204008C8000
trusted library allocation
page read and write
1FDC02147000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
1FDC02404000
trusted library allocation
page read and write
1C08002A4000
trusted library allocation
page read and write
4F7C002D8000
trusted library allocation
page read and write
498400210000
direct allocation
page read and write
1D783000
heap
page read and write
1FDC0180C000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
209035FC000
heap
page read and write
371F000
stack
page read and write
1FDC0140C000
trusted library allocation
page read and write
1FDC00CB0000
trusted library allocation
page read and write
1FDC002A4000
trusted library allocation
page read and write
4F7C002C0000
trusted library allocation
page read and write
1FDC01B44000
trusted library allocation
page read and write
23A8D000
stack
page read and write
1FDC01638000
trusted library allocation
page read and write
325D9FE000
stack
page read and write
3E9F000
stack
page read and write
20908570000
trusted library section
page read and write
15E4D0A0000
heap
page read and write
1FDC006F8000
trusted library allocation
page read and write
1FDC002A8000
trusted library allocation
page read and write
1FDC01A30000
trusted library allocation
page read and write
15E4EF6B000
heap
page read and write
1D76A000
heap
page read and write
1FDC014F0000
trusted library allocation
page read and write
1FDC01864000
trusted library allocation
page read and write
1FDC00C4C000
trusted library allocation
page read and write
1D772000
heap
page read and write
2090A1B0000
trusted library section
page read and write
415E000
stack
page read and write
1FDC01094000
trusted library allocation
page read and write
A4737FE000
unkown
page readonly
1FDC01639000
trusted library allocation
page read and write
1FDC01FB8000
trusted library allocation
page read and write
32529FE000
stack
page read and write
23C3B000
heap
page read and write
20978E50000
trusted library allocation
page read and write
325D1FE000
unkown
page readonly
1D77B000
heap
page read and write
1FDC01E90000
trusted library allocation
page read and write
1FDC01B48000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
4B61000
heap
page read and write
4F7C0016C000
trusted library allocation
page read and write
1FDC0098B000
trusted library allocation
page read and write
3FDF000
stack
page read and write
1FDC001E4000
trusted library allocation
page read and write
1FDC01EC4000
trusted library allocation
page read and write
15E4EF9B000
heap
page read and write
220400868000
trusted library allocation
page read and write
324C9FD000
stack
page read and write
4F7C000A0000
trusted library allocation
page read and write
1D777000
heap
page read and write
20903626000
heap
page read and write
4F7C00210000
trusted library allocation
page read and write
1FDC0009C000
trusted library allocation
page read and write
1FDC01778000
trusted library allocation
page read and write
1FDC0133C000
trusted library allocation
page read and write
2204002E4000
trusted library allocation
page read and write
1FDC01BC8000
trusted library allocation
page read and write
1FDC00F5C000
trusted library allocation
page read and write
1FDC01184000
trusted library allocation
page read and write
45000027C000
trusted library allocation
page read and write
22040039C000
trusted library allocation
page read and write
1FDC02840000
trusted library allocation
page read and write
A40BFFB000
stack
page read and write
49840031C000
direct allocation
page read and write
1FDC01DD4000
trusted library allocation
page read and write
1FDC00CC8000
trusted library allocation
page read and write
498400280000
direct allocation
page read and write
32441FE000
unkown
page readonly
4F7C00028000
trusted library allocation
page read and write
1FDC0280C000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
15E4D127000
heap
page read and write
4984002E0000
direct allocation
page read and write
15E4D0A0000
heap
page read and write
1FDC014D0000
trusted library allocation
page read and write
4F7C003E3000
trusted library allocation
page read and write
1FDC01038000
trusted library allocation
page read and write
1FDC00914000
trusted library allocation
page read and write
2090782E000
heap
page read and write
4F7C001EC000
trusted library allocation
page read and write
1FDC000D4000
trusted library allocation
page read and write
A47C7FE000
unkown
page readonly
4B61000
heap
page read and write
1FDC019A8000
trusted library allocation
page read and write
A41A7FE000
unkown
page readonly
411F000
stack
page read and write
450000248000
trusted library allocation
page read and write
4F7C00064000
trusted library allocation
page read and write
2204008AC000
trusted library allocation
page read and write
10E000294000
trusted library allocation
page read and write
1FDC01AE0000
trusted library allocation
page read and write
1FDC01388000
trusted library allocation
page read and write
15E4EF55000
heap
page read and write
1FDC01994000
trusted library allocation
page read and write
22040027C000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
15E4D01E000
heap
page read and write
1256000
heap
page read and write
4984002A8000
direct allocation
page read and write
10E0002B4000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
1FDC0075C000
trusted library allocation
page read and write
1FDC01E3C000
trusted library allocation
page read and write
2090309F000
heap
page read and write
3D9E000
stack
page read and write
425E000
stack
page read and write
1FDC02040000
trusted library allocation
page read and write
1FDC01DD0000
trusted library allocation
page read and write
1FDC00CA0000
trusted library allocation
page read and write
2204002D4000
trusted library allocation
page read and write
1FDC00F80000
trusted library allocation
page read and write
20909D61000
trusted library section
page read and write
C98000
unkown
page execute and read and write
1FDC0150C000
trusted library allocation
page read and write
498400212000
direct allocation
page read and write
4F7C00140000
trusted library allocation
page read and write
1FDC01C4C000
trusted library allocation
page read and write
4F7C00230000
trusted library allocation
page read and write
1FDC014C8000
trusted library allocation
page read and write
1FDC01500000
trusted library allocation
page read and write
A475FFE000
stack
page read and write
1B9800274000
direct allocation
page read and write
1D788000
heap
page read and write
1FDC029AF000
trusted library allocation
page read and write
1FDC00EF4000
trusted library allocation
page read and write
4F7C00090000
trusted library allocation
page read and write
A409FFB000
stack
page read and write
1FDC006DA000
trusted library allocation
page read and write
1D78C000
heap
page read and write
2090833D000
trusted library section
page read and write
1D764000
heap
page read and write
10E0002E4000
trusted library allocation
page read and write
1D789000
heap
page read and write
6F87D000
unkown
page readonly
20903530000
trusted library section
page read and write
1D785000
heap
page read and write
1FDC00300000
trusted library allocation
page read and write
209790A5000
heap
page read and write
4F7C00418000
trusted library allocation
page read and write
1FDC00F41000
trusted library allocation
page read and write
1FDC016B8000
trusted library allocation
page read and write
1FDC001D0000
trusted library allocation
page read and write
1FDC029B5000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00CDC000
trusted library allocation
page read and write
1FDC01AA4000
trusted library allocation
page read and write
1FDC01038000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC01864000
trusted library allocation
page read and write
1FDC00F40000
trusted library allocation
page read and write
498400270000
direct allocation
page read and write
1FDC004D6000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC0080C000
trusted library allocation
page read and write
209099D0000
trusted library section
page read and write
1C08002A0000
trusted library allocation
page read and write
1FDC00CF4000
trusted library allocation
page read and write
1FDC00B6C000
trusted library allocation
page read and write
1C08002A4000
trusted library allocation
page read and write
15E4EFC3000
heap
page read and write
4F7C002CC000
trusted library allocation
page read and write
1FDC01E1C000
trusted library allocation
page read and write
10E0002A8000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
2090309F000
heap
page read and write
1FDC0109C000
trusted library allocation
page read and write
4F7C0020C000
trusted library allocation
page read and write
1FDC00F8C000
trusted library allocation
page read and write
1FDC001DC000
trusted library allocation
page read and write
A407FFC000
stack
page read and write
1FDC028CD000
trusted library allocation
page read and write
1FDC02160000
trusted library allocation
page read and write
22040095C000
trusted library allocation
page read and write
1FDC0186D000
trusted library allocation
page read and write
1FDC00F04000
trusted library allocation
page read and write
15E57002000
heap
page read and write
4F7C001F8000
trusted library allocation
page read and write
1FDC01DA0000
trusted library allocation
page read and write
1FDC01F5C000
trusted library allocation
page read and write
1D777000
heap
page read and write
220400700000
trusted library allocation
page read and write
1FDC01438000
trusted library allocation
page read and write
32599FC000
stack
page read and write
1FDC0194C000
trusted library allocation
page read and write
1FDC00A0C000
trusted library allocation
page read and write
A4797FE000
unkown
page readonly
1FDC00338000
trusted library allocation
page read and write
4F7C002A8000
trusted library allocation
page read and write
1FDC001D4000
trusted library allocation
page read and write
15E4EF2B000
heap
page read and write
1FDC00300000
trusted library allocation
page read and write
1FDC01AC4000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC0100C000
trusted library allocation
page read and write
1D31F000
stack
page read and write
1FDC0042C000
trusted library allocation
page read and write
1C08002F0000
trusted library allocation
page read and write
1FDC01F1C000
trusted library allocation
page read and write
4F7C0037C000
trusted library allocation
page read and write
A4167FE000
unkown
page readonly
1FDC00CA0000
trusted library allocation
page read and write
1FDC00F5C000
trusted library allocation
page read and write
1FDC01771000
trusted library allocation
page read and write
1FDC01BB0000
trusted library allocation
page read and write
1D76A000
heap
page read and write
22040070C000
trusted library allocation
page read and write
1FDC004AC000
trusted library allocation
page read and write
6D017000
unkown
page read and write
4F7C0048C000
trusted library allocation
page read and write
B44000
unkown
page execute and read and write
15E4D040000
heap
page read and write
324F9FD000
stack
page read and write
6F801000
unkown
page execute read
15E4EF51000
heap
page read and write
4B50000
direct allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1D792000
heap
page read and write
1FDC0085C000
trusted library allocation
page read and write
C78000
unkown
page execute and read and write
20903624000
heap
page read and write
1D77B000
heap
page read and write
1FDC00CF4000
trusted library allocation
page read and write
1FDC01B34000
trusted library allocation
page read and write
4B61000
heap
page read and write
4F7C00368000
trusted library allocation
page read and write
2204006E8000
trusted library allocation
page read and write
1FDC01EB0000
trusted library allocation
page read and write
15E57000000
heap
page read and write
4B61000
heap
page read and write
1FDC01EB8000
trusted library allocation
page read and write
4F7C00298000
trusted library allocation
page read and write
1C08002C0000
trusted library allocation
page read and write
4F7C002FC000
trusted library allocation
page read and write
1FDC01EB4000
trusted library allocation
page read and write
1FDC01FB8000
trusted library allocation
page read and write
1FDC001A8000
trusted library allocation
page read and write
1B98002A8000
direct allocation
page read and write
1FDC01C40000
trusted library allocation
page read and write
4F7C00234000
trusted library allocation
page read and write
1FDC00E74000
trusted library allocation
page read and write
A4177FE000
unkown
page readonly
1FDC0203C000
trusted library allocation
page read and write
1FDC02877000
trusted library allocation
page read and write
1FDC01B70000
trusted library allocation
page read and write
1FDC019E0000
trusted library allocation
page read and write
1FDC01F68000
trusted library allocation
page read and write
1C08002B0000
trusted library allocation
page read and write
1FDC01478000
trusted library allocation
page read and write
220400850000
trusted library allocation
page read and write
1FDC01E88000
trusted library allocation
page read and write
1FDC01E20000
trusted library allocation
page read and write
A41CFFA000
stack
page read and write
A419FFD000
stack
page read and write
32629FE000
stack
page read and write
1FDC008AC000
trusted library allocation
page read and write
1D784000
heap
page read and write
20905697000
unclassified section
page read and write
1FDC01314000
trusted library allocation
page read and write
1FDC01324000
trusted library allocation
page read and write
4F7C00268000
trusted library allocation
page read and write
1FDC02145000
trusted library allocation
page read and write
1FDC0180C000
trusted library allocation
page read and write
1FDC01B04000
trusted library allocation
page read and write
1FDC01E74000
trusted library allocation
page read and write
1D780000
heap
page read and write
1FDC003B0000
trusted library allocation
page read and write
209056C0000
heap
page read and write
32489FD000
stack
page read and write
2204006AC000
trusted library allocation
page read and write
20978ED0000
heap
page read and write
1FDC01201000
trusted library allocation
page read and write
502C000
stack
page read and write
1FDC01551000
trusted library allocation
page read and write
1FDC01BC4000
trusted library allocation
page read and write
209035F5000
heap
page read and write
1FDC008E4000
trusted library allocation
page read and write
2090A9D0000
trusted library section
page read and write
220400728000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
15E4CE30000
heap
page read and write
A47E7FE000
unkown
page readonly
A422FFD000
stack
page read and write
1FDC01F04000
trusted library allocation
page read and write
1FDC0129C000
trusted library allocation
page read and write
1232000
heap
page read and write
1D77B000
heap
page read and write
10E000260000
trusted library allocation
page read and write
A4257FE000
unkown
page readonly
6CF70000
unkown
page readonly
1FDC013C4000
trusted library allocation
page read and write
1FDC00340000
trusted library allocation
page read and write
A30000
unkown
page read and write
1FDC01C24000
trusted library allocation
page read and write
1FDC02204000
trusted library allocation
page read and write
1D784000
heap
page read and write
22040079C000
trusted library allocation
page read and write
4F7C002CC000
trusted library allocation
page read and write
1D79E000
heap
page read and write
239C6000
heap
page read and write
15E4D0A7000
heap
page read and write
209030AA000
heap
page read and write
10E0002B4000
trusted library allocation
page read and write
20909F37000
unclassified section
page read and write
1D792000
heap
page read and write
23C43000
heap
page read and write
450000284000
trusted library allocation
page read and write
1FDC0036C000
trusted library allocation
page read and write
498400217000
direct allocation
page read and write
1D7A2000
heap
page read and write
1FDC0154C000
trusted library allocation
page read and write
22040025C000
trusted library allocation
page read and write
1FDC01A1C000
trusted library allocation
page read and write
1C08002A0000
trusted library allocation
page read and write
450000374000
trusted library allocation
page read and write
10E000278000
trusted library allocation
page read and write
209081A2000
trusted library section
page read and write
1FDC01726000
trusted library allocation
page read and write
1FDC0297C000
trusted library allocation
page read and write
22040091C000
trusted library allocation
page read and write
1D78A000
heap
page read and write
1FDC0100C000
trusted library allocation
page read and write
4B61000
heap
page read and write
1FDC00D38000
trusted library allocation
page read and write
498400274000
direct allocation
page read and write
1FDC001F8000
trusted library allocation
page read and write
1FDC02A88000
trusted library allocation
page read and write
1FDC01E70000
trusted library allocation
page read and write
1FDC00C44000
trusted library allocation
page read and write
1D784000
heap
page read and write
1FDC02A88000
trusted library allocation
page read and write
1FDC002C4000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
4F7C0040C000
trusted library allocation
page read and write
209036A3000
heap
page read and write
220400288000
trusted library allocation
page read and write
1FDC00588000
trusted library allocation
page read and write
45000032C000
trusted library allocation
page read and write
4F7C003B0000
trusted library allocation
page read and write
1FDC00CD0000
trusted library allocation
page read and write
1FDC0101C000
trusted library allocation
page read and write
220400778000
trusted library allocation
page read and write
2204007D0000
trusted library allocation
page read and write
1FDC01630000
trusted library allocation
page read and write
15E4D158000
heap
page read and write
10E0002F0000
trusted library allocation
page read and write
4B61000
heap
page read and write
4B50000
direct allocation
page read and write
4500003A8000
trusted library allocation
page read and write
10E000220000
trusted library allocation
page read and write
A404FFE000
stack
page read and write
1FDC00174000
trusted library allocation
page read and write
1FDC0197C000
trusted library allocation
page read and write
1FDC00CF4000
trusted library allocation
page read and write
450000290000
trusted library allocation
page read and write
209030A4000
heap
page read and write
10E000294000
trusted library allocation
page read and write
1D792000
heap
page read and write
2204008E4000
trusted library allocation
page read and write
1FDC00698000
trusted library allocation
page read and write
1FDC00BF8000
trusted library allocation
page read and write
1FDC00A0C000
trusted library allocation
page read and write
4F7C00134000
trusted library allocation
page read and write
4F7C001CC000
trusted library allocation
page read and write
4500002C4000
trusted library allocation
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
1D46D000
stack
page read and write
20903683000
heap
page read and write
1B9800201000
direct allocation
page read and write
1FDC0030C000
trusted library allocation
page read and write
325F1FE000
unkown
page readonly
1FDC0040C000
trusted library allocation
page read and write
1FDC02834000
trusted library allocation
page read and write
FAA000
unkown
page execute and write copy
1FDC01574000
trusted library allocation
page read and write
1FDC02893000
trusted library allocation
page read and write
15E4D0A0000
heap
page read and write
A415FFD000
stack
page read and write
4F7C00288000
trusted library allocation
page read and write
209082CD000
trusted library section
page read and write
1FDC01A48000
trusted library allocation
page read and write
1FDC01FCF000
trusted library allocation
page read and write
1FDC00CA0000
trusted library allocation
page read and write
1FDC00300000
trusted library allocation
page read and write
209036C8000
heap
page read and write
2204008E8000
trusted library allocation
page read and write
1FDC0160C000
trusted library allocation
page read and write
1FDC01C0C000
trusted library allocation
page read and write
1FDC00588000
trusted library allocation
page read and write
1FDC01BA0000
trusted library allocation
page read and write
220400874000
trusted library allocation
page read and write
1FDC02188000
trusted library allocation
page read and write
23960000
heap
page read and write
4B61000
heap
page read and write
D1A000
unkown
page execute and read and write
3EDE000
stack
page read and write
1FDC01E90000
trusted library allocation
page read and write
209077F0000
heap
page read and write
1B98002D0000
direct allocation
page read and write
209030A3000
heap
page read and write
10E0002B8000
trusted library allocation
page read and write
1FDC01C78000
trusted library allocation
page read and write
A473FFF000
stack
page read and write
209030A7000
heap
page read and write
385F000
stack
page read and write
1FDC00588000
trusted library allocation
page read and write
15E4D0CD000
heap
page read and write
1FDC0140C000
trusted library allocation
page read and write
1FDC01B98000
trusted library allocation
page read and write
4F7C00354000
trusted library allocation
page read and write
324F1FE000
unkown
page readonly
32509FE000
stack
page read and write
1FDC01DCC000
trusted library allocation
page read and write
1FDC01928000
trusted library allocation
page read and write
15E4D0A7000
heap
page read and write
209036A7000
heap
page read and write
1FDC00CA0000
trusted library allocation
page read and write
1FDC028A5000
trusted library allocation
page read and write
1FDC014B8000
trusted library allocation
page read and write
4FF0000
direct allocation
page read and write
1FDC002A4000
trusted library allocation
page read and write
1FDC001C4000
trusted library allocation
page read and write
1FDC004A4000
trusted library allocation
page read and write
1FDC00324000
trusted library allocation
page read and write
4F7C002B0000
trusted library allocation
page read and write
A425FFE000
stack
page read and write
1FDC01E60000
trusted library allocation
page read and write
2090780B000
heap
page read and write
15E4D09C000
heap
page read and write
A477FFD000
stack
page read and write
4F7C0022C000
trusted library allocation
page read and write
15E4D0F5000
heap
page read and write
There are 2073 hidden memdumps, click here to show them.