IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
modified
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DocumentsAKKEGHJDHD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAKEGIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BAEBGHCFCAAFIECAFIII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CBGHCAKKFBGDHJJJKECFBKKECG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBFBFBGDBKJJKFIEHJDB
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\EBKKKEGIDBGHIDGDHDBFHDAKJJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HJJEHJJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\HJJJDAEGIDHCBFHJJJEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9ec07c9018.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\1f62175b-7ad4-43b1-9883-d3aee7c6335e.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\46c8aba6-65ad-40f8-8bb1-a985c0248444.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7200a24c-0f7d-4a00-802c-16d5882b2811.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\92488227-3e35-4be8-b31a-81b1318e7a8f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9704bcf1-2b05-4aa9-a67e-168c034af17e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\995b92ed-20d0-4935-a7b5-60e7c3ae63d3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\9c943bf6-0032-44b1-8d2a-c95397b1c951.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\d61daa71-0186-4ffb-96ac-46586943044d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6732525C-1EB8.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0de80c87-9918-4142-b989-1658a4e6dec5.tmp
Unicode text, UTF-8 text, with very long lines (14729), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1cfe3b48-3e65-4940-aa4f-9f6471ffda63.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1d492615-df51-4ea5-a56b-8b99d7567c51.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\48a1f685-d04c-47e3-a6a2-cac3f5f857ee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4aeb813c-f794-40d5-8044-8d65d18efaf2.tmp
Unicode text, UTF-8 text, with very long lines (14729), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\58f87116-68b2-4e31-9769-4cfeb201d282.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\016f81ff-9b81-4432-91e6-1e3005cb7b51.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\36234e85-94a2-4a47-badc-00be5c8d43cf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\472c9c71-ef78-42f5-b525-d36ecd17b450.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\4f62b5fa-e5b1-43d9-815e-c0182b19b5b8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\71bdb6b5-f492-4fe5-8ddc-426215b0e60b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8bbcd959-1062-41e6-9016-8dca5506cecb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF375ae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF38fed.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF39387.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF45252.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries~RF47933.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a1c0d53a-1e0d-464f-91a1-1617aa3835fa.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f4ffcbdd-5507-4113-9e39-def5cfecd09e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3af9a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3fa6e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF422a7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF46f9e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3b23a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF3d4d5.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13375824735094312
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\0320a4aa-bb90-4402-98ca-e1b8a2621a55.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\0685870c-dc4f-41cc-8d6d-29bd81d3a87f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\680e92de-a5ea-4ccd-9c7a-33582c57af75.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3906a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF39387.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF45252.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries~RF47933.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\b2e19193-636f-4413-a47c-43a5af62de51.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\c2ac4d68-2d0f-4627-b0e0-4e91e0739e7c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\d1f6ef20-275b-43ee-9bc8-d2a41bf69f39.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\e999862d-994b-4117-8893-d38b80b6d320.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\e0dca72e-1b68-4c7b-b0e5-ce7c64af5744.tmp
Unicode text, UTF-8 text, with very long lines (14564), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f749d76c-64b1-4536-9459-745643c7a9dc.tmp
Unicode text, UTF-8 text, with very long lines (14564), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fc0f8221-fa5f-4c86-b340-f3109df440cc.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35cd7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35ce6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35e9c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3855e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF46f60.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4cd10.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\0d3eb779-666a-4e56-9fdd-400bcbe39d4d.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\28e60fd9-4af2-4a47-b644-122a96ebabe9.tmp
PNG image data, 400 x 400, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\62004b9b-67f3-4cb6-99c1-66607a46763a.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\9aa2c959-cffb-49a4-8095-5bcb51cd792d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
dropped
C:\Users\user\AppData\Local\Temp\c81c9b95-66da-4b4f-92f6-76556c2d38ab.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\d58818cd-d8c2-4ed9-af5a-9c03e3b84fae.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\e56d1eb7-7ae4-4e03-be0b-1e032c8c1219.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_1671093424\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_1671093424\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_1671093424\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_1671093424\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_1671093424\c81c9b95-66da-4b4f-92f6-76556c2d38ab.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\0d3eb779-666a-4e56-9fdd-400bcbe39d4d.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3700)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7864_324219990\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3705)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 11 17:52:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 11 17:52:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 11 17:52:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 11 17:52:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 11 17:52:05 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 483
ASCII text, with very long lines (2557)
downloaded
Chrome Cache Entry: 484
ASCII text
downloaded
Chrome Cache Entry: 485
ASCII text, with very long lines (2586)
downloaded
Chrome Cache Entry: 486
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 487
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 488
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 489
SVG Scalable Vector Graphics image
downloaded
There are 291 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2164,i,15898123494483601464,15029883802132799241,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2432 --field-trial-handle=2176,i,4830028604527488115,10037130413237682482,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2988 --field-trial-handle=2076,i,5968905137283756732,12874145520682871177,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=5236 --field-trial-handle=2076,i,5968905137283756732,12874145520682871177,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=7032 --field-trial-handle=2076,i,5968905137283756732,12874145520682871177,262144 /prefetch:8
malicious
C:\Users\user\DocumentsAKKEGHJDHD.exe
"C:\Users\user\DocumentsAKKEGHJDHD.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1005596001\5912d4444a.exe
"C:\Users\user\AppData\Local\Temp\1005596001\5912d4444a.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6316 --field-trial-handle=2076,i,5968905137283756732,12874145520682871177,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1005597001\b84e35a556.exe
"C:\Users\user\AppData\Local\Temp\1005597001\b84e35a556.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2988 --field-trial-handle=2076,i,5968905137283756732,12874145520682871177,262144 /prefetch:3
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005599001\9ec07c9018.exe
"C:\Users\user\AppData\Local\Temp\1005599001\9ec07c9018.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005596001\5912d4444a.exe
"C:\Users\user\AppData\Local\Temp\1005596001\5912d4444a.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005597001\b84e35a556.exe
"C:\Users\user\AppData\Local\Temp\1005597001\b84e35a556.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005599001\9ec07c9018.exe
"C:\Users\user\AppData\Local\Temp\1005599001\9ec07c9018.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005596001\5912d4444a.exe
"C:\Users\user\AppData\Local\Temp\1005596001\5912d4444a.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005597001\b84e35a556.exe
"C:\Users\user\AppData\Local\Temp\1005597001\b84e35a556.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\DocumentsAKKEGHJDHD.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=g9lbYg_WDvLO&l=e
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=h6HMV-M6cfAX&a
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=f9Xv_dG_70Ca&l=english
unknown
https://ntp.msn.com/0
unknown
https://community.fastly.steamst
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ntp.msn.cn/edge/ntp
unknown
http://185.215.113.16/luma/random.exef-
unknown
https://navygenerayk.store:443/api
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
https://aefd.nelreports.net/api/report?cat=bingcsp
unknown
http://185.215.113.16/steam/random.exe6eG
unknown
https://deff.nelreports.net/api/report
unknown
https://docs.google.com/
unknown
fadehairucw.store
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://deff.nelreports.net/api/report?cat=msnw
unknown
https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=1Zpka7DM_TWk&l=english
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=ij4Q-MLeHxnJ&l=engl
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
founpiuer.store
http://185.215.113.206/6.
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
http://185.215.113.206/c4becf79229cb002.phpT.
unknown
http://185.215.113.206k
unknown
https://steamcommunity.com/profiles/76561199724331900
23.192.247.89
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=fK65ckRAjZr-&
unknown
http://185.215.113.206/Local
unknown
https://drive-daily-2.corp.google.com/
unknown
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=1vfyNnvUqkgy&l=engl
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://www.youtube.com/
unknown
http://185.215.113.206/c4becf79229cb002.phpsb
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=f9;S
unknown
http://185.215.113.206/c4becf79229cb002.phpSI
unknown
https://drive-daily-5.corp.google.com/
unknown
https://marshal-zhukov.com/api~r
unknown
https://plus.google.com
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.185.78
https://store.steampoweW
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://185.215.113.43/Zu7JuNko/index.phpded
unknown
https://chromewebstore.google.com/
unknown
http://185.215.113.206/68b591d6548ec281/msvcp140.dllS
unknown
http://185.215.113.16/luma/random.exelencoded
unknown
https://drive-preprod.corp.google.com/
unknown
https://srtb.msn.cn/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://msn.comXIDv10
unknown
http://185.215.113.16/off/def.exe
unknown
https://chrome.google.com/webstore/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=g2Zx7e0yBV_M&l=english
unknown
https://assets.msn.cn/resolver/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.fas
unknown
http://185.215.113.43/Zu7JuNko/index.phpV
unknown
https://browser.events.data.msn.com/
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
https://help.steampowered.com/en/
unknown
http://185.215.113.206/c4becf79229cb002.phpg
unknown
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ntp.msn.com/edge/ntp
unknown
https://assets.msn.com/resolver/
unknown
https://marshal-zhukov.com/apii
unknown
presticitpo.store
https://marshal-zhukov.com/O7
unknown
http://185.215.113.206/c4becf79229cb002.phpp
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php)S.
unknown
https://recaptcha.net/recaptcha/;
unknown
https://ntp.msn.com
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=ftiDdX_V0QeB&l=englis
unknown
http://185.215.113.206/c4becf79229cb002.phpx
unknown
http://185.215.113.206/c4becf79229cb002.phpu
unknown
https://marshal-zhukov.com/apis
unknown
http://185.215.113.206/c4becf79229cb002.phpy
unknown
http://185.215.113.206/Microsoft
unknown
https://c.msn.com/c.gif?rnd=1731351140832&udc=true&pg.n=default&pg.t=dhp&pg.c=547&pg.p=anaheim&rf=&tp=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2520tab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp&cvs=Browser&di=340&st.dpt=&st.sdpt=antp&subcvs=homepage&lng=en-us&rid=dd40ff516ac54a66b0e25d85eb9c3226&activityId=dd40ff516ac54a66b0e25d85eb9c3226&d.imd=false&scr=1280x1024&anoncknm=app_anon&issso=&aadState=0&ctsa=mr&CtsSyncId=0A49129BE96840A293F384488AC697A4&MUID=11F7061775776D430B031323746E6C70
20.110.205.119
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
steamcommunity.com
23.192.247.89
plus.l.google.com
142.250.185.78
play.google.com
142.250.186.110
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.65.39.28
www.google.com
142.250.184.228
marshal-zhukov.com
188.114.97.3
googlehosted.l.googleusercontent.com
142.250.186.129
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
navygenerayk.store
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
presticitpo.store
unknown
founpiuer.store
unknown
scriptyprefej.store
unknown
thumbystriw.store
unknown
necklacedmny.store
unknown
apis.google.com
unknown
api.msn.com
unknown
crisiwarny.store
unknown
fadehairucw.store
unknown
There are 14 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
malicious
185.215.113.206
unknown
Portugal
malicious
13.107.246.40
unknown
United States
23.200.88.35
unknown
United States
23.192.247.89
steamcommunity.com
United States
104.126.116.11
unknown
United States
162.159.61.3
chrome.cloudflare-dns.com
United States
104.126.116.17
unknown
United States
142.250.186.110
play.google.com
United States
20.110.205.119
unknown
United States
142.250.184.228
www.google.com
United States
108.139.47.108
unknown
United States
13.91.96.185
unknown
United States
239.255.255.250
unknown
Reserved
188.114.97.3
marshal-zhukov.com
European Union
20.96.153.111
unknown
United States
127.0.0.1
unknown
unknown
142.250.185.78
plus.l.google.com
United States
23.57.90.111
unknown
United States
152.195.19.97
unknown
United States
20.42.73.27
unknown
United States
204.79.197.219
unknown
United States
172.64.41.3
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
142.250.186.129
googlehosted.l.googleusercontent.com
United States
18.65.39.28
sb.scorecardresearch.com
United States
There are 18 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
5912d4444a.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
b84e35a556.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9ec07c9018.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197762
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197762
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197762
WindowTabManagerFileMappingId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 68 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A91000
unkown
page execute and read and write
malicious
5C71000
trusted library allocation
page execute and read and write
malicious
74E000
heap
page read and write
malicious
5650000
direct allocation
page read and write
malicious
A01000
unkown
page execute and read and write
malicious
4CF0000
direct allocation
page read and write
malicious
80D0000
direct allocation
page read and write
malicious
CB1000
unkown
page execute and read and write
malicious
5E1000
unkown
page execute and read and write
malicious
8D8000
heap
page read and write
malicious
5360000
direct allocation
page read and write
malicious
CB1000
unkown
page execute and read and write
malicious
172B000
heap
page read and write
malicious
A91000
unkown
page execute and read and write
malicious
A91000
unkown
page execute and read and write
malicious
154B000
heap
page read and write
malicious
4F30000
direct allocation
page read and write
malicious
CB1000
unkown
page execute and read and write
malicious
B2D000
heap
page read and write
malicious
D3C000
unkown
page execute and write copy
3EFF000
stack
page read and write
55C9000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
5A70000
direct allocation
page read and write
3F7F000
stack
page read and write
934000
heap
page read and write
908000
heap
page read and write
4F90000
direct allocation
page execute and read and write
59BB000
trusted library allocation
page read and write
4990000
heap
page read and write
3C0E000
stack
page read and write
3D3E000
stack
page read and write
1854000
heap
page read and write
574000
heap
page read and write
1720000
heap
page read and write
1335000
heap
page read and write
4D01000
heap
page read and write
A90000
unkown
page readonly
5980000
trusted library allocation
page read and write
574000
heap
page read and write
4E1E000
stack
page read and write
479F000
stack
page read and write
1D46F000
heap
page read and write
55CC000
trusted library allocation
page read and write
4EAA000
trusted library allocation
page execute and read and write
1CE8F000
stack
page read and write
F56000
unkown
page execute and read and write
5566000
trusted library allocation
page read and write
35CE000
stack
page read and write
5565000
trusted library allocation
page read and write
48F0000
direct allocation
page execute and read and write
C80000
unkown
page execute and write copy
4ECF000
stack
page read and write
1524000
heap
page read and write
2F8F000
stack
page read and write
4C0000
heap
page read and write
59C4000
trusted library allocation
page read and write
44AE000
stack
page read and write
940000
heap
page read and write
52B9000
trusted library allocation
page read and write
1854000
heap
page read and write
3D4E000
stack
page read and write
55A4000
trusted library allocation
page read and write
1D451000
heap
page read and write
574000
heap
page read and write
F26000
unkown
page execute and write copy
59C7000
trusted library allocation
page read and write
5574000
trusted library allocation
page read and write
3ACF000
stack
page read and write
574000
heap
page read and write
1199000
unkown
page execute and read and write
6F0F000
stack
page read and write
5550000
trusted library allocation
page read and write
944000
unkown
page execute and read and write
1193000
unkown
page execute and read and write
7E4000
heap
page read and write
640F000
stack
page read and write
CDB000
unkown
page execute and write copy
1D93C000
stack
page read and write
4E4B000
stack
page read and write
F7C000
unkown
page execute and write copy
4861000
heap
page read and write
59D1000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
D79000
unkown
page execute and write copy
5594000
trusted library allocation
page read and write
48E0000
remote allocation
page read and write
1024000
unkown
page execute and read and write
4991000
heap
page read and write
57F0000
direct allocation
page execute and read and write
5CA7000
trusted library allocation
page execute and read and write
5598000
trusted library allocation
page read and write
1DB000
stack
page read and write
4AB1000
heap
page read and write
9E0000
direct allocation
page read and write
642000
unkown
page execute and read and write
6B4000
heap
page read and write
4AB1000
heap
page read and write
1D560000
trusted library allocation
page read and write
298E000
stack
page read and write
6B4000
heap
page read and write
A0F000
unkown
page execute and read and write
3E7E000
stack
page read and write
1524000
heap
page read and write
D86000
unkown
page execute and write copy
4AB1000
heap
page read and write
E36000
heap
page read and write
1D46E000
heap
page read and write
8B1C000
stack
page read and write
386E000
stack
page read and write
574000
heap
page read and write
1D489000
heap
page read and write
5260000
direct allocation
page execute and read and write
EE3000
unkown
page execute and read and write
8DF000
unkown
page execute and write copy
51B1000
heap
page read and write
9E0000
direct allocation
page read and write
30B0000
direct allocation
page read and write
CB0000
unkown
page readonly
9B9000
unkown
page execute and write copy
557C000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
59A4000
trusted library allocation
page read and write
455E000
stack
page read and write
C54000
heap
page read and write
31EE000
stack
page read and write
45BF000
stack
page read and write
59DB000
trusted library allocation
page read and write
CE9000
unkown
page execute and write copy
575000
heap
page read and write
1854000
heap
page read and write
348E000
stack
page read and write
4AB1000
heap
page read and write
154E000
stack
page read and write
55BE000
trusted library allocation
page read and write
410F000
stack
page read and write
5A06000
trusted library allocation
page read and write
36EE000
stack
page read and write
4AB1000
heap
page read and write
40EE000
stack
page read and write
36FE000
stack
page read and write
51B1000
heap
page read and write
5558000
trusted library allocation
page read and write
51B1000
heap
page read and write
5380000
direct allocation
page execute and read and write
94E000
heap
page read and write
4D51000
heap
page read and write
51B1000
heap
page read and write
5576000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4DB5000
trusted library allocation
page read and write
9C0000
unkown
page execute and read and write
4E8E000
stack
page read and write
51B1000
heap
page read and write
4ED1000
heap
page read and write
3B0000
heap
page read and write
2DEF000
stack
page read and write
2A8F000
stack
page read and write
CB0000
unkown
page read and write
284B000
stack
page read and write
58DD000
trusted library allocation
page read and write
407E000
stack
page read and write
CE8000
unkown
page execute and read and write
1854000
heap
page read and write
1854000
heap
page read and write
4D51000
heap
page read and write
6B4000
heap
page read and write
1524000
heap
page read and write
3D2E000
stack
page read and write
1524000
heap
page read and write
7F8E000
stack
page read and write
A37000
unkown
page execute and read and write
2370D000
heap
page read and write
9F1000
unkown
page execute and read and write
3FEE000
stack
page read and write
4EA0000
direct allocation
page read and write
1524000
heap
page read and write
AF0000
direct allocation
page read and write
49CF000
stack
page read and write
1A7F000
stack
page read and write
510E000
stack
page read and write
4ED1000
heap
page read and write
2750000
direct allocation
page read and write
3A7F000
stack
page read and write
D72000
unkown
page execute and read and write
30B0000
direct allocation
page read and write
840000
direct allocation
page read and write
10D0000
heap
page read and write
1D14E000
stack
page read and write
1D05E000
stack
page read and write
1524000
heap
page read and write
1854000
heap
page read and write
324C000
stack
page read and write
1524000
heap
page read and write
D07000
unkown
page execute and write copy
15C0000
direct allocation
page read and write
574000
heap
page read and write
398F000
stack
page read and write
556D000
trusted library allocation
page read and write
574000
heap
page read and write
428E000
stack
page read and write
38FE000
stack
page read and write
D86000
unkown
page execute and write copy
1D00E000
stack
page read and write
5500000
direct allocation
page execute and read and write
1D45B000
heap
page read and write
58D8000
trusted library allocation
page read and write
358F000
stack
page read and write
52E0000
direct allocation
page execute and read and write
D90000
heap
page read and write
5390000
direct allocation
page execute and read and write
30CF000
stack
page read and write
380F000
stack
page read and write
6B4000
heap
page read and write
143F000
heap
page read and write
E58000
heap
page read and write
58D7000
trusted library allocation
page read and write
498E000
stack
page read and write
4ED1000
heap
page read and write
1D46D000
heap
page read and write
D60000
direct allocation
page execute and read and write
55E2000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
1615000
heap
page read and write
36EE000
stack
page read and write
56D1000
trusted library allocation
page read and write
392F000
stack
page read and write
1D483000
heap
page read and write
5250000
direct allocation
page execute and read and write
D9E000
unkown
page execute and read and write
7E4000
heap
page read and write
9E3000
unkown
page execute and write copy
33BF000
stack
page read and write
51D9000
trusted library allocation
page read and write
334F000
stack
page read and write
332E000
stack
page read and write
810000
heap
page read and write
6B4000
heap
page read and write
47AC000
stack
page read and write
5588000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
2D0B000
stack
page read and write
15C0000
direct allocation
page read and write
AF0000
direct allocation
page read and write
287F000
stack
page read and write
1D473000
heap
page read and write
4AB1000
heap
page read and write
1854000
heap
page read and write
3E6E000
stack
page read and write
6B4000
heap
page read and write
C54000
heap
page read and write
930000
heap
page read and write
CB0000
unkown
page read and write
13B7000
heap
page read and write
7E4000
heap
page read and write
4D40000
trusted library allocation
page read and write
4861000
heap
page read and write
2F2F000
stack
page read and write
4E50000
direct allocation
page read and write
A66000
unkown
page execute and read and write
574000
heap
page read and write
C80000
unkown
page execute and write copy
575000
heap
page read and write
9C7000
unkown
page execute and read and write
6269000
heap
page read and write
9FE000
heap
page read and write
5A0B000
trusted library allocation
page read and write
424F000
stack
page read and write
5592000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
CE2000
unkown
page execute and read and write
4481000
heap
page read and write
55B2000
trusted library allocation
page read and write
4AB1000
heap
page read and write
6159000
trusted library allocation
page execute and read and write
1D467000
heap
page read and write
15C0000
direct allocation
page read and write
4A60000
direct allocation
page execute and read and write
5565000
trusted library allocation
page read and write
3F7F000
stack
page read and write
342F000
stack
page read and write
4D01000
heap
page read and write
E3E000
stack
page read and write
574000
heap
page read and write
5575000
trusted library allocation
page read and write
794E000
stack
page read and write
2F2F000
stack
page read and write
574000
heap
page read and write
4EB1000
heap
page read and write
1167000
unkown
page execute and read and write
3AAE000
stack
page read and write
803000
unkown
page execute and write copy
5650000
direct allocation
page read and write
5860000
heap
page read and write
8D8000
heap
page read and write
10C0000
direct allocation
page read and write
43AE000
stack
page read and write
10C0000
direct allocation
page read and write
5360000
direct allocation
page execute and read and write
E33000
heap
page read and write
DCE000
heap
page read and write
625E000
stack
page read and write
D20000
unkown
page execute and read and write
930000
heap
page read and write
1D483000
heap
page read and write
574000
heap
page read and write
1524000
heap
page read and write
8DF000
unkown
page execute and write copy
347E000
stack
page read and write
59CE000
stack
page read and write
FCB000
unkown
page execute and read and write
4F90000
direct allocation
page execute and read and write
5598000
trusted library allocation
page read and write
E2E000
heap
page read and write
840000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
5A1F000
trusted library allocation
page read and write
4AB1000
heap
page read and write
575000
heap
page read and write
92F000
heap
page read and write
945000
heap
page read and write
4D51000
heap
page read and write
981000
unkown
page execute and write copy
354E000
stack
page read and write
383E000
stack
page read and write
574000
heap
page read and write
5360000
direct allocation
page execute and read and write
574000
heap
page read and write
8A9000
unkown
page execute and read and write
555C000
trusted library allocation
page read and write
1D47A000
heap
page read and write
55C4000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
2357E000
heap
page read and write
45F1000
heap
page read and write
4AB1000
heap
page read and write
5989000
trusted library allocation
page read and write
1430000
heap
page read and write
574000
heap
page read and write
2CE0000
heap
page read and write
5260000
direct allocation
page execute and read and write
15C0000
direct allocation
page read and write
29BF000
stack
page read and write
1524000
heap
page read and write
3FBE000
stack
page read and write
574000
heap
page read and write
42D0000
direct allocation
page read and write
384F000
stack
page read and write
48AF000
stack
page read and write
D71000
unkown
page execute and write copy
4D01000
heap
page read and write
31EE000
stack
page read and write
7B6000
unkown
page write copy
15C0000
direct allocation
page read and write
91A000
heap
page read and write
A90000
unkown
page readonly
42E1000
heap
page read and write
7E4000
heap
page read and write
558E000
trusted library allocation
page read and write
1167000
unkown
page execute and read and write
1D58E000
stack
page read and write
1137000
heap
page read and write
519F000
stack
page read and write
1199000
unkown
page execute and read and write
5988000
trusted library allocation
page read and write
CB2000
unkown
page execute and read and write
5B5E000
trusted library allocation
page read and write
3D4F000
stack
page read and write
4920000
direct allocation
page execute and read and write
496F000
stack
page read and write
D9F000
unkown
page execute and write copy
993000
unkown
page execute and read and write
44DF000
stack
page read and write
5B3F000
trusted library allocation
page read and write
382F000
stack
page read and write
5590000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
559E000
trusted library allocation
page read and write
C54000
heap
page read and write
58DD000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
4AB1000
heap
page read and write
334E000
stack
page read and write
145D000
heap
page read and write
59EC000
trusted library allocation
page read and write
7E7000
heap
page read and write
4EA0000
direct allocation
page read and write
FD7000
unkown
page execute and read and write
521D000
stack
page read and write
5650000
direct allocation
page read and write
704F000
stack
page read and write
426E000
stack
page read and write
30B0000
direct allocation
page read and write
1D483000
heap
page read and write
32EF000
stack
page read and write
4EB1000
heap
page read and write
5586000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
1854000
heap
page read and write
8090000
trusted library allocation
page read and write
51B0000
heap
page read and write
5A90000
direct allocation
page read and write
2C6F000
stack
page read and write
996000
unkown
page execute and read and write
4D51000
heap
page read and write
DE6000
heap
page read and write
1006000
unkown
page execute and write copy
4C10000
heap
page read and write
2366D000
heap
page read and write
C54000
heap
page read and write
FF7000
heap
page read and write
CA1000
unkown
page execute and read and write
1694000
heap
page read and write
4D51000
heap
page read and write
AF0000
direct allocation
page read and write
4AAF000
stack
page read and write
164E000
heap
page read and write
9B6000
unkown
page execute and write copy
7D5000
unkown
page execute and write copy
1854000
heap
page read and write
58DD000
trusted library allocation
page read and write
945000
unkown
page execute and write copy
8D8000
heap
page read and write
1764000
heap
page read and write
AF9000
unkown
page write copy
4D51000
heap
page read and write
5A14000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
51B1000
heap
page read and write
142E000
stack
page read and write
C85000
unkown
page execute and write copy
45F1000
heap
page read and write
2850000
direct allocation
page read and write
4861000
heap
page read and write
303E000
stack
page read and write
1524000
heap
page read and write
4D6D000
stack
page read and write
5550000
trusted library allocation
page read and write
42D0000
direct allocation
page read and write
1524000
heap
page read and write
4E6E000
stack
page read and write
3557000
heap
page read and write
1854000
heap
page read and write
1D483000
heap
page read and write
39FF000
stack
page read and write
5569000
trusted library allocation
page read and write
3FAE000
stack
page read and write
43CE000
stack
page read and write
5575000
trusted library allocation
page read and write
B0A000
heap
page read and write
2D4E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
52B4000
trusted library allocation
page read and write
346E000
stack
page read and write
E36000
heap
page read and write
849000
heap
page read and write
5280000
heap
page read and write
92D000
heap
page read and write
42E1000
heap
page read and write
C54000
heap
page read and write
257F000
stack
page read and write
388E000
stack
page read and write
5565000
trusted library allocation
page read and write
5A17000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
9D0000
unkown
page execute and read and write
422E000
stack
page read and write
162E000
heap
page read and write
940000
heap
page read and write
5BD000
stack
page read and write
4EB0000
heap
page read and write
2A7E000
stack
page read and write
E58000
heap
page read and write
59B7000
trusted library allocation
page read and write
4ED1000
heap
page read and write
1854000
heap
page read and write
6210000
heap
page read and write
D59000
unkown
page execute and read and write
58DF000
trusted library allocation
page read and write
FCB000
unkown
page execute and read and write
48E0000
remote allocation
page read and write
4A60000
direct allocation
page execute and read and write
1051000
unkown
page execute and write copy
556C000
trusted library allocation
page read and write
1D48B000
heap
page read and write
58D8000
trusted library allocation
page read and write
820000
heap
page read and write
5360000
direct allocation
page execute and read and write
574000
heap
page read and write
4AB1000
heap
page read and write
635F000
stack
page read and write
5190000
direct allocation
page execute and read and write
49CE000
stack
page read and write
75CE000
stack
page read and write
6B4000
heap
page read and write
16AA000
heap
page read and write
7E4E000
stack
page read and write
58D3000
trusted library allocation
page read and write
2E3E000
stack
page read and write
4AB1000
heap
page read and write
4770000
direct allocation
page read and write
4D51000
heap
page read and write
6F7000
stack
page read and write
557C000
trusted library allocation
page read and write
4ED1000
heap
page read and write
556A000
trusted library allocation
page read and write
C54000
heap
page read and write
664F000
stack
page read and write
52B0000
direct allocation
page read and write
4AED000
stack
page read and write
9DE000
unkown
page execute and write copy
1D475000
heap
page read and write
1175000
heap
page read and write
5D0000
direct allocation
page read and write
D9E000
unkown
page execute and write copy
4861000
heap
page read and write
4EB1000
heap
page read and write
5A70000
direct allocation
page read and write
287F000
stack
page read and write
438E000
stack
page read and write
8D6000
heap
page read and write
4AB1000
heap
page read and write
7B2000
unkown
page execute and read and write
7E4000
heap
page read and write
6C8D5000
unkown
page readonly
1D46D000
heap
page read and write
382E000
stack
page read and write
C54000
heap
page read and write
9F0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
59AA000
trusted library allocation
page read and write
945000
heap
page read and write
D0D000
unkown
page execute and read and write
E3E000
heap
page read and write
55C2000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
8220000
direct allocation
page execute and read and write
D8F000
unkown
page execute and write copy
A18000
unkown
page execute and write copy
D60000
unkown
page read and write
397E000
stack
page read and write
23640000
heap
page read and write
3FBE000
stack
page read and write
4EA0000
direct allocation
page read and write
7F1000
unkown
page execute and read and write
2BEE000
stack
page read and write
C54000
heap
page read and write
5A02000
trusted library allocation
page read and write
45EE000
stack
page read and write
59F8000
trusted library allocation
page read and write
6B4000
heap
page read and write
1524000
heap
page read and write
5554000
trusted library allocation
page read and write
92B000
unkown
page execute and write copy
30AE000
stack
page read and write
574000
heap
page read and write
4AB1000
heap
page read and write
64B000
unkown
page execute and read and write
3BEF000
stack
page read and write
4D51000
heap
page read and write
5546000
trusted library allocation
page read and write
1024000
unkown
page execute and read and write
C54000
heap
page read and write
1854000
heap
page read and write
1D46C000
heap
page read and write
DC7000
unkown
page execute and write copy
380F000
stack
page read and write
5290000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
FB8000
unkown
page execute and write copy
1068000
unkown
page execute and read and write
4EF0000
heap
page read and write
10C0000
direct allocation
page read and write
4A80000
direct allocation
page read and write
2E2E000
stack
page read and write
855000
heap
page read and write
5575000
trusted library allocation
page read and write
574000
heap
page read and write
94E000
unkown
page execute and write copy
1D479000
heap
page read and write
758E000
stack
page read and write
FD4000
unkown
page execute and write copy
51B1000
heap
page read and write
44BE000
stack
page read and write
236A2000
heap
page read and write
2DEF000
stack
page read and write
1058000
unkown
page execute and write copy
2C0E000
stack
page read and write
8BD000
heap
page read and write
D9E000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
E0E000
heap
page read and write
5566000
trusted library allocation
page read and write
6411000
trusted library allocation
page read and write
FD7000
unkown
page execute and read and write
1D47A000
heap
page read and write
1524000
heap
page read and write
888E000
stack
page read and write
1230000
heap
page read and write
5D0000
direct allocation
page read and write
307F000
stack
page read and write
4AB1000
heap
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
422E000
stack
page read and write
4AB1000
heap
page read and write
8B8E000
heap
page read and write
7A8E000
stack
page read and write
4F90000
direct allocation
page execute and read and write
943000
heap
page read and write
D5F000
unkown
page execute and read and write
134B000
unkown
page execute and write copy
4B00000
direct allocation
page execute and read and write
7E0F000
stack
page read and write
52B9000
trusted library allocation
page read and write
51B1000
heap
page read and write
C54000
heap
page read and write
596B000
trusted library allocation
page read and write
1524000
heap
page read and write
11AA000
unkown
page execute and write copy
3BFE000
stack
page read and write
867000
unkown
page execute and read and write
4EB1000
heap
page read and write
166B000
heap
page read and write
336E000
stack
page read and write
58D5000
trusted library allocation
page read and write
C80000
unkown
page execute and write copy
2FFF000
stack
page read and write
4D51000
heap
page read and write
4760000
remote allocation
page read and write
1524000
heap
page read and write
7E4000
heap
page read and write
389F000
stack
page read and write
C54000
heap
page read and write
51B1000
heap
page read and write
C54000
heap
page read and write
5554000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
4D51000
heap
page read and write
4ED1000
heap
page read and write
8250000
direct allocation
page execute and read and write
4481000
heap
page read and write
5177000
trusted library allocation
page execute and read and write
4CF0000
direct allocation
page read and write
557E000
trusted library allocation
page read and write
7BA000
unkown
page execute and write copy
7E4000
heap
page read and write
15C0000
direct allocation
page read and write
5CFE000
trusted library allocation
page execute and read and write
178E000
stack
page read and write
D89000
unkown
page execute and write copy
2BAF000
stack
page read and write
4861000
heap
page read and write
FB8000
unkown
page execute and write copy
2770000
heap
page read and write
574000
heap
page read and write
7E4000
heap
page read and write
10C0000
direct allocation
page read and write
4F4F000
stack
page read and write
5A1F000
stack
page read and write
5370000
direct allocation
page execute and read and write
5790000
trusted library allocation
page read and write
943000
heap
page read and write
1854000
heap
page read and write
8C1000
unkown
page execute and write copy
9B9000
unkown
page execute and write copy
52E7000
trusted library allocation
page read and write
86C000
heap
page read and write
1830000
heap
page read and write
DB9000
unkown
page write copy
AF2000
unkown
page execute and write copy
FFE000
unkown
page execute and read and write
1524000
heap
page read and write
3ABE000
stack
page read and write
30DF000
stack
page read and write
AF9000
unkown
page write copy
35AE000
stack
page read and write
85E000
heap
page read and write
36AF000
stack
page read and write
5D6D000
stack
page read and write
8B2000
heap
page read and write
55C4000
trusted library allocation
page read and write
4C60000
heap
page read and write
15C0000
direct allocation
page read and write
5A6E000
stack
page read and write
5586000
trusted library allocation
page read and write
1854000
heap
page read and write
1051000
unkown
page execute and write copy
8EE000
unkown
page execute and read and write
11A9000
unkown
page execute and read and write
574000
heap
page read and write
CC4000
unkown
page execute and read and write
59B4000
trusted library allocation
page read and write
58DA000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
80D000
heap
page read and write
6B4000
heap
page read and write
574000
heap
page read and write
E2E000
heap
page read and write
4BB0000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
52B0000
direct allocation
page read and write
7E4000
heap
page read and write
4AB1000
heap
page read and write
4AB1000
heap
page read and write
58D8000
trusted library allocation
page read and write
AF9000
unkown
page write copy
4C40000
heap
page read and write
4EB1000
heap
page read and write
574000
heap
page read and write
5360000
direct allocation
page execute and read and write
ABE000
stack
page read and write
801000
unkown
page execute and write copy
FB8000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
5773000
trusted library allocation
page read and write
D46000
unkown
page execute and read and write
575000
heap
page read and write
56D1000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
1D491000
heap
page read and write
1051000
unkown
page execute and write copy
754F000
stack
page read and write
550B000
stack
page read and write
237EB000
heap
page read and write
AF0000
direct allocation
page read and write
574000
heap
page read and write
B53000
heap
page read and write
1854000
heap
page read and write
4B9E000
stack
page read and write
574000
heap
page read and write
FE0000
unkown
page execute and read and write
50AF000
stack
page read and write
4861000
heap
page read and write
6B4000
heap
page read and write
758E000
stack
page read and write
460F000
stack
page read and write
1D46F000
heap
page read and write
EFC000
unkown
page execute and read and write
C8C000
unkown
page execute and read and write
E0E000
heap
page read and write
834000
heap
page read and write
9D0000
unkown
page execute and read and write
4C70000
direct allocation
page execute and read and write
1854000
heap
page read and write
1240000
heap
page read and write
5FC0000
heap
page read and write
55C9000
trusted library allocation
page read and write
55CA000
trusted library allocation
page read and write
297F000
stack
page read and write
4A60000
direct allocation
page execute and read and write
4861000
heap
page read and write
30B0000
direct allocation
page read and write
3E8E000
stack
page read and write
4AB1000
heap
page read and write
1D990000
heap
page read and write
3DBF000
stack
page read and write
338E000
stack
page read and write
526E000
stack
page read and write
D60000
direct allocation
page execute and read and write
1854000
heap
page read and write
A91000
unkown
page execute and write copy
E90000
heap
page read and write
484F000
stack
page read and write
51D0000
heap
page read and write
5598000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
931000
heap
page read and write
5BA5000
trusted library allocation
page read and write
4861000
heap
page read and write
4840000
heap
page read and write
1D45A000
heap
page read and write
4F90000
direct allocation
page execute and read and write
F4C000
unkown
page execute and read and write
4E50000
direct allocation
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
3EDE000
stack
page read and write
642000
unkown
page execute and write copy
13DC000
stack
page read and write
D8F000
unkown
page execute and write copy
4ED1000
heap
page read and write
1524000
heap
page read and write
109A000
unkown
page execute and read and write
A7E000
stack
page read and write
59A4000
trusted library allocation
page read and write
4D01000
heap
page read and write
2850000
direct allocation
page read and write
BE0000
heap
page read and write
55A4000
trusted library allocation
page read and write
1854000
heap
page read and write
D8F000
unkown
page execute and write copy
5566000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
1854000
heap
page read and write
58DB000
trusted library allocation
page read and write
1524000
heap
page read and write
A58000
unkown
page execute and write copy
11A9000
unkown
page execute and write copy
32FF000
stack
page read and write
840000
direct allocation
page read and write
AF2000
unkown
page execute and write copy
44AF000
stack
page read and write
5160000
trusted library allocation
page read and write
4D51000
heap
page read and write
4861000
heap
page read and write
574000
heap
page read and write
55B4000
trusted library allocation
page read and write
B67000
unkown
page execute and read and write
9B8000
unkown
page execute and read and write
4861000
heap
page read and write
3FCE000
stack
page read and write
943000
heap
page read and write
11A2000
heap
page read and write
E0E000
heap
page read and write
9AA000
unkown
page execute and write copy
D8C000
unkown
page execute and read and write
6BE9000
heap
page read and write
5B10000
trusted library allocation
page read and write
1854000
heap
page read and write
4A3F000
stack
page read and write
4CFE000
stack
page read and write
6B4000
heap
page read and write
4C30000
direct allocation
page read and write
2850000
direct allocation
page read and write
2FDE000
stack
page read and write
D3D000
unkown
page execute and read and write
4AB1000
heap
page read and write
F53000
unkown
page execute and read and write
3C0000
heap
page read and write
3AAE000
stack
page read and write
4861000
heap
page read and write
5575000
trusted library allocation
page read and write
574000
heap
page read and write
3F6F000
stack
page read and write
58DC000
trusted library allocation
page read and write
5B6C000
stack
page read and write
574000
heap
page read and write
7E4000
heap
page read and write
273E000
stack
page read and write
4D51000
heap
page read and write
1854000
heap
page read and write
4C30000
direct allocation
page read and write
7BA000
unkown
page execute and read and write
1854000
heap
page read and write
1204000
heap
page read and write
4F6E000
stack
page read and write
574000
heap
page read and write
574000
heap
page read and write
4A90000
direct allocation
page execute and read and write
C54000
heap
page read and write
4D01000
heap
page read and write
7B6000
unkown
page write copy
511E000
stack
page read and write
52C3000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
8C8000
heap
page read and write
558F000
trusted library allocation
page read and write
96B000
unkown
page execute and read and write
58D4000
trusted library allocation
page read and write
F40000
unkown
page execute and read and write
9E0000
direct allocation
page read and write
4AB1000
heap
page read and write
1524000
heap
page read and write
9E0000
direct allocation
page read and write
3FAE000
stack
page read and write
574000
heap
page read and write
C54000
heap
page read and write
9D1000
unkown
page execute and write copy
4861000
heap
page read and write
43E0000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
92B000
unkown
page execute and write copy
D3D000
unkown
page execute and read and write
44D1000
heap
page read and write
2F7E000
stack
page read and write
23682000
heap
page read and write
161A000
heap
page read and write
5566000
trusted library allocation
page read and write
59BA000
trusted library allocation
page read and write
6C8D0000
unkown
page read and write
9E8000
unkown
page execute and read and write
464E000
stack
page read and write
2CBF000
stack
page read and write
5586000
trusted library allocation
page read and write
2A7F000
stack
page read and write
E9E000
heap
page read and write
AFB000
unkown
page execute and write copy
1524000
heap
page read and write
517D000
stack
page read and write
4A0E000
stack
page read and write
AFB000
unkown
page execute and write copy
55C4000
trusted library allocation
page read and write
434F000
stack
page read and write
51B1000
heap
page read and write
D3E000
unkown
page execute and read and write
C54000
heap
page read and write
1854000
heap
page read and write
4861000
heap
page read and write
D9E000
unkown
page execute and write copy
557C000
trusted library allocation
page read and write
574000
heap
page read and write
D79000
unkown
page execute and write copy
5D0000
direct allocation
page read and write
134A000
unkown
page execute and read and write
792000
heap
page read and write
92E000
heap
page read and write
898000
heap
page read and write
E3E000
heap
page read and write
184F000
stack
page read and write
A8F000
stack
page read and write
CE8000
unkown
page execute and read and write
558D000
trusted library allocation
page read and write
342F000
stack
page read and write
237F9000
heap
page read and write
869000
heap
page read and write
CA1000
unkown
page execute and read and write
429E000
stack
page read and write
10C0000
direct allocation
page read and write
4AB1000
heap
page read and write
4ED1000
heap
page read and write
197E000
stack
page read and write
54EE000
stack
page read and write
C80000
heap
page read and write
9C1000
unkown
page execute and write copy
F90000
unkown
page execute and read and write
4E70000
direct allocation
page execute and read and write
55D4000
trusted library allocation
page read and write
529E000
trusted library allocation
page read and write
1D479000
heap
page read and write
4C8E000
stack
page read and write
4F9D000
stack
page read and write
4D51000
heap
page read and write
33CE000
stack
page read and write
1018000
unkown
page execute and write copy
EE8000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
C54000
heap
page read and write
58D8000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
40EF000
stack
page read and write
48F0000
direct allocation
page execute and read and write
1524000
heap
page read and write
C54000
heap
page read and write
6B4000
heap
page read and write
10C0000
direct allocation
page read and write
564B000
trusted library allocation
page read and write
5A07000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
4D51000
heap
page read and write
5270000
direct allocation
page execute and read and write
A4D000
unkown
page execute and write copy
4FC0000
direct allocation
page read and write
A68000
unkown
page execute and write copy
1799000
heap
page read and write
1525000
heap
page read and write
52C9000
trusted library allocation
page read and write
D60000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
FA8000
unkown
page execute and read and write
1854000
heap
page read and write
4D10000
heap
page read and write
7B3000
unkown
page execute and write copy
3E9F000
stack
page read and write
574000
heap
page read and write
574000
heap
page read and write
4D51000
heap
page read and write
F68000
unkown
page execute and read and write
4E00000
remote allocation
page read and write
11CA000
heap
page read and write
52B6000
trusted library allocation
page read and write
321F000
stack
page read and write
CEE000
unkown
page execute and read and write
5550000
trusted library allocation
page read and write
3ACE000
stack
page read and write
885000
heap
page read and write
1D46C000
heap
page read and write
11EF000
heap
page read and write
5541000
trusted library allocation
page read and write
1D48D000
heap
page read and write
1053000
unkown
page execute and write copy
4861000
heap
page read and write
4D51000
heap
page read and write
5566000
trusted library allocation
page read and write
91F000
heap
page read and write
4991000
heap
page read and write
1447000
heap
page read and write
1D46C000
heap
page read and write
1058000
unkown
page execute and write copy
2DBE000
stack
page read and write
F51000
unkown
page execute and write copy
7B0000
unkown
page readonly
11AA000
unkown
page execute and write copy
500D000
trusted library allocation
page execute and read and write
604B000
trusted library allocation
page execute and read and write
58D0000
trusted library allocation
page read and write
1854000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
3D9F000
stack
page read and write
558C000
trusted library allocation
page read and write
1D475000
heap
page read and write
348F000
stack
page read and write
2E2F000
stack
page read and write
1524000
heap
page read and write
840000
direct allocation
page read and write
4D51000
heap
page read and write
B68000
heap
page read and write
52B0000
direct allocation
page read and write
4AB1000
heap
page read and write
4D51000
heap
page read and write
113D000
stack
page read and write
574000
heap
page read and write
2B3E000
stack
page read and write
4C00000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
1D97F000
stack
page read and write
1524000
heap
page read and write
1069000
unkown
page execute and write copy
574000
heap
page read and write
51B1000
heap
page read and write
42D0000
direct allocation
page read and write
447F000
stack
page read and write
5598000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
6CE0000
heap
page read and write
1524000
heap
page read and write
DFE000
stack
page read and write
574000
heap
page read and write
1058000
unkown
page execute and write copy
D17000
unkown
page execute and read and write
574000
heap
page read and write
FD0000
heap
page read and write
6B4000
heap
page read and write
1854000
heap
page read and write
370E000
stack
page read and write
1524000
heap
page read and write
1051000
unkown
page execute and write copy
484F000
stack
page read and write
800000
heap
page read and write
C63000
unkown
page execute and write copy
42D0000
direct allocation
page read and write
4D51000
heap
page read and write
10DB000
heap
page read and write
1524000
heap
page read and write
23620000
trusted library allocation
page read and write
574000
heap
page read and write
4AB1000
heap
page read and write
946000
heap
page read and write
34CE000
stack
page read and write
4E34000
trusted library allocation
page read and write
51B1000
heap
page read and write
1D440000
heap
page read and write
5BE000
stack
page read and write
5993000
trusted library allocation
page read and write
4861000
heap
page read and write
5569000
trusted library allocation
page read and write
49AE000
stack
page read and write
60AF000
stack
page read and write
5548000
trusted library allocation
page read and write
1D475000
heap
page read and write
EF9000
unkown
page execute and write copy
1D48C000
heap
page read and write
4C41000
heap
page read and write
6C6F1000
unkown
page execute read
42D0000
direct allocation
page read and write
92D000
heap
page read and write
52E6000
trusted library allocation
page read and write
432F000
stack
page read and write
D80000
heap
page read and write
59BA000
trusted library allocation
page read and write
23676000
heap
page read and write
878E000
stack
page read and write
6B4000
heap
page read and write
7E4000
heap
page read and write
574000
heap
page read and write
C54000
heap
page read and write
4AAF000
stack
page read and write
473E000
stack
page read and write
AF0000
direct allocation
page read and write
4AB1000
heap
page read and write
31EF000
stack
page read and write
4D51000
heap
page read and write
1310000
heap
page read and write
5575000
trusted library allocation
page read and write
3E8F000
stack
page read and write
3BC000
stack
page read and write
436E000
stack
page read and write
46F0000
trusted library allocation
page read and write
CC4000
unkown
page execute and read and write
D60000
unkown
page readonly
558C000
trusted library allocation
page read and write
A90000
unkown
page read and write
E80000
heap
page read and write
574000
heap
page read and write
7F4F000
stack
page read and write
574000
heap
page read and write
1854000
heap
page read and write
116F000
heap
page read and write
35CF000
stack
page read and write
559D000
trusted library allocation
page read and write
F40000
unkown
page execute and read and write
4C30000
direct allocation
page read and write
1D38D000
stack
page read and write
FC1000
unkown
page execute and read and write
6CCE000
stack
page read and write
FC9000
unkown
page execute and write copy
55E8000
trusted library allocation
page read and write
F84000
unkown
page execute and write copy
5160000
direct allocation
page execute and read and write
1166000
heap
page read and write
469E000
stack
page read and write
55F4000
trusted library allocation
page read and write
3D4E000
stack
page read and write
414E000
stack
page read and write
8B0000
heap
page read and write
6FB000
stack
page read and write
C54000
heap
page read and write
108B000
unkown
page execute and read and write
3A6F000
stack
page read and write
1D491000
heap
page read and write
E34000
heap
page read and write
4C9F000
stack
page read and write
564C000
trusted library allocation
page read and write
1524000
heap
page read and write
450E000
stack
page read and write
10DD000
heap
page read and write
1CDAE000
stack
page read and write
5430000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
A84000
unkown
page execute and read and write
398E000
stack
page read and write
5A22000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
D1C000
stack
page read and write
574000
heap
page read and write
DE8000
heap
page read and write
59D9000
trusted library allocation
page read and write
44E0000
heap
page read and write
E58000
heap
page read and write
1C7F000
stack
page read and write
101A000
unkown
page execute and read and write
5554000
trusted library allocation
page read and write
30AC000
stack
page read and write
55D3000
trusted library allocation
page read and write
51B1000
heap
page read and write
398E000
stack
page read and write
347E000
stack
page read and write
428E000
stack
page read and write
4D51000
heap
page read and write
1D477000
heap
page read and write
1854000
heap
page read and write
59DB000
trusted library allocation
page read and write
1854000
heap
page read and write
277F000
stack
page read and write
424E000
stack
page read and write
399F000
stack
page read and write
32BE000
stack
page read and write
4861000
heap
page read and write
3D8E000
stack
page read and write
308F000
stack
page read and write
13FB000
stack
page read and write
B82000
heap
page read and write
51B1000
heap
page read and write
10C0000
direct allocation
page read and write
4D51000
heap
page read and write
4AB1000
heap
page read and write
940000
heap
page read and write
31EE000
stack
page read and write
461F000
stack
page read and write
280F000
stack
page read and write
5DA0000
heap
page read and write
356F000
stack
page read and write
53D000
stack
page read and write
58D3000
trusted library allocation
page read and write
4C3C000
trusted library allocation
page read and write
1524000
heap
page read and write
FE0000
unkown
page execute and read and write
7B6000
unkown
page write copy
556D000
trusted library allocation
page read and write
4C41000
heap
page read and write
498F000
stack
page read and write
4D51000
heap
page read and write
460E000
stack
page read and write
348E000
stack
page read and write
1167000
unkown
page execute and read and write
AF2000
unkown
page execute and read and write
4D51000
heap
page read and write
54C0000
direct allocation
page execute and read and write
5594000
trusted library allocation
page read and write
522D000
stack
page read and write
D79000
unkown
page execute and write copy
5AA8000
trusted library allocation
page read and write
CE9000
unkown
page execute and write copy
7C4000
heap
page read and write
959000
unkown
page execute and read and write
5A2E000
stack
page read and write
4EB1000
heap
page read and write
1524000
heap
page read and write
44D0000
heap
page read and write
6C8F000
stack
page read and write
58D4000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
1524000
heap
page read and write
1854000
heap
page read and write
103C000
stack
page read and write
1D45B000
heap
page read and write
4AB0000
heap
page read and write
6B4000
heap
page read and write
995000
unkown
page execute and write copy
6B4000
heap
page read and write
5340000
direct allocation
page execute and read and write
E3E000
heap
page read and write
7D0E000
stack
page read and write
AFB000
unkown
page execute and write copy
559E000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
419E000
stack
page read and write
4861000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
26BC000
stack
page read and write
34FF000
stack
page read and write
1D68F000
stack
page read and write
1D483000
heap
page read and write
5570000
trusted library allocation
page read and write
333E000
stack
page read and write
574000
heap
page read and write
7BA000
unkown
page execute and write copy
4FC0000
direct allocation
page read and write
5260000
direct allocation
page execute and read and write
482F000
stack
page read and write
4AB1000
heap
page read and write
342F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
D86000
unkown
page execute and write copy
438E000
stack
page read and write
AB5000
unkown
page execute and read and write
4E3E000
stack
page read and write
FFE000
unkown
page execute and read and write
4ED1000
heap
page read and write
4960000
trusted library allocation
page read and write
478E000
stack
page read and write
4880000
heap
page read and write
4ED1000
heap
page read and write
2DFF000
stack
page read and write
320F000
stack
page read and write
52B0000
direct allocation
page read and write
236E5000
heap
page read and write
1854000
heap
page read and write
311E000
stack
page read and write
1524000
heap
page read and write
3C5E000
stack
page read and write
C5C000
stack
page read and write
540000
heap
page read and write
59A6000
trusted library allocation
page read and write
1524000
heap
page read and write
1D483000
heap
page read and write
2E8E000
stack
page read and write
11A9000
unkown
page execute and write copy
332E000
stack
page read and write
FC9000
unkown
page execute and write copy
56A2000
trusted library allocation
page read and write
CDB000
unkown
page execute and write copy
574000
heap
page read and write
5190000
trusted library allocation
page read and write
236C2000
heap
page read and write
3C9E000
stack
page read and write
4ED1000
heap
page read and write
4861000
heap
page read and write
D8C000
unkown
page execute and read and write
78E000
heap
page read and write
7B0000
unkown
page read and write
574000
heap
page read and write
5CC000
stack
page read and write
3C5F000
stack
page read and write
4D01000
heap
page read and write
1854000
heap
page read and write
574000
heap
page read and write
5A17000
trusted library allocation
page read and write
7270000
heap
page read and write
950000
unkown
page execute and write copy
52C8000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
350B000
stack
page read and write
3A8F000
stack
page read and write
3E2F000
stack
page read and write
5A3D000
trusted library allocation
page read and write
1524000
heap
page read and write
23760000
trusted library allocation
page read and write
130E000
stack
page read and write
344F000
stack
page read and write
58DB000
trusted library allocation
page read and write
1CD6F000
stack
page read and write
984000
unkown
page execute and write copy
363F000
stack
page read and write
61EB7000
direct allocation
page readonly
4C60000
direct allocation
page execute and read and write
4D51000
heap
page read and write
451E000
stack
page read and write
4CF0000
direct allocation
page read and write
4D51000
heap
page read and write
557D000
trusted library allocation
page read and write
11A7000
heap
page read and write
10C0000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
343F000
stack
page read and write
554F000
trusted library allocation
page read and write
2CFE000
stack
page read and write
3CFF000
stack
page read and write
4EB1000
heap
page read and write
1524000
heap
page read and write
5D0000
direct allocation
page read and write
4F3D000
stack
page read and write
4ED1000
heap
page read and write
1040000
unkown
page execute and write copy
D8F000
unkown
page execute and write copy
C85000
unkown
page execute and write copy
1524000
heap
page read and write
5EA8000
trusted library allocation
page execute and read and write
438F000
stack
page read and write
1CD8E000
stack
page read and write
929000
unkown
page execute and read and write
1524000
heap
page read and write
1D46B000
heap
page read and write
177D000
heap
page read and write
9CF000
unkown
page execute and write copy
2CAE000
stack
page read and write
7D0000
unkown
page execute and write copy
324E000
stack
page read and write
1524000
heap
page read and write
C54000
heap
page read and write
5586000
trusted library allocation
page read and write
8EE000
unkown
page execute and write copy
40AF000
stack
page read and write
4A80000
direct allocation
page execute and read and write
949000
heap
page read and write
4FD0000
heap
page read and write
44CE000
stack
page read and write
AF0000
direct allocation
page read and write
539E000
stack
page read and write
5D0000
direct allocation
page read and write
10CE000
stack
page read and write
371F000
stack
page read and write
51CC000
stack
page read and write
4C41000
heap
page read and write
42E1000
heap
page read and write
372E000
stack
page read and write
F40000
unkown
page execute and read and write
1854000
heap
page read and write
7B0000
unkown
page readonly
2A6F000
stack
page read and write
1854000
heap
page read and write
3FCF000
stack
page read and write
58D3000
trusted library allocation
page read and write
51E0000
trusted library allocation
page execute and read and write
4BBF000
stack
page read and write
1854000
heap
page read and write
1D7FD000
stack
page read and write
649000
unkown
page write copy
7F4000
heap
page read and write
2BBE000
stack
page read and write
6B4000
heap
page read and write
740F000
stack
page read and write
2850000
direct allocation
page read and write
1524000
heap
page read and write
D40000
direct allocation
page execute and read and write
924000
heap
page read and write
1BC0000
heap
page read and write
A90000
unkown
page read and write
C54000
heap
page read and write
512E000
stack
page read and write
2EBE000
stack
page read and write
4E33000
trusted library allocation
page execute and read and write
58D5000
trusted library allocation
page read and write
AF9000
unkown
page write copy
7E2000
heap
page read and write
574000
heap
page read and write
6B4000
heap
page read and write
4ED1000
heap
page read and write
D7A000
heap
page read and write
574000
heap
page read and write
4AB1000
heap
page read and write
4D51000
heap
page read and write
55D2000
trusted library allocation
page read and write
3E3F000
stack
page read and write
D8F000
unkown
page execute and write copy
1D46E000
heap
page read and write
4AB1000
heap
page read and write
D59000
unkown
page execute and read and write
40CF000
stack
page read and write
6B4000
heap
page read and write
F51000
unkown
page execute and write copy
3BBF000
stack
page read and write
1D46B000
heap
page read and write
44D1000
heap
page read and write
574000
heap
page read and write
61ECD000
direct allocation
page readonly
85D000
unkown
page execute and read and write
F7D000
unkown
page execute and read and write
E36000
heap
page read and write
1D479000
heap
page read and write
A68000
unkown
page execute and write copy
39DF000
stack
page read and write
59AA000
trusted library allocation
page read and write
7B2000
unkown
page execute and write copy
30B0000
direct allocation
page read and write
D1B000
stack
page read and write
4FB0000
direct allocation
page execute and read and write
1524000
heap
page read and write
6F4E000
stack
page read and write
496F000
stack
page read and write
4D51000
heap
page read and write
A0D000
unkown
page execute and write copy
D86000
unkown
page execute and write copy
D60000
unkown
page read and write
C54000
heap
page read and write
45F1000
heap
page read and write
574000
heap
page read and write
5A29000
trusted library allocation
page read and write
2F6E000
stack
page read and write
1D475000
heap
page read and write
41EF000
stack
page read and write
4481000
heap
page read and write
2850000
direct allocation
page read and write
1854000
heap
page read and write
574000
heap
page read and write
E45000
heap
page read and write
A91000
unkown
page execute and write copy
5586000
trusted library allocation
page read and write
488F000
stack
page read and write
3D3E000
stack
page read and write
574000
heap
page read and write
C54000
heap
page read and write
1854000
heap
page read and write
40EE000
stack
page read and write
574000
heap
page read and write
489F000
stack
page read and write
5E6D000
stack
page read and write
807000
heap
page read and write
4FF0000
trusted library allocation
page read and write
58D5000
trusted library allocation
page read and write
1D475000
heap
page read and write
2DFF000
stack
page read and write
3D8E000
stack
page read and write
4861000
heap
page read and write
4D51000
heap
page read and write
5299000
trusted library allocation
page read and write
4861000
heap
page read and write
8D4000
heap
page read and write
840000
direct allocation
page read and write
4D2C000
stack
page read and write
557D000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
44CE000
stack
page read and write
6C88F000
unkown
page readonly
4ED1000
heap
page read and write
4861000
heap
page read and write
574000
heap
page read and write
42D0000
direct allocation
page read and write
4D51000
heap
page read and write
410E000
stack
page read and write
39DE000
stack
page read and write
498F000
stack
page read and write
4AB1000
heap
page read and write
DB9000
unkown
page write copy
30C7000
heap
page read and write
55C4000
trusted library allocation
page read and write
1D46C000
heap
page read and write
4CF0000
direct allocation
page read and write
C80000
unkown
page execute and write copy
51B1000
heap
page read and write
6C651000
unkown
page execute read
C4C000
unkown
page execute and read and write
375E000
stack
page read and write
574000
heap
page read and write
1007000
unkown
page execute and read and write
52B0000
direct allocation
page read and write
7B1000
unkown
page execute and read and write
54B0000
direct allocation
page execute and read and write
365F000
stack
page read and write
61D4000
trusted library allocation
page read and write
6B4000
heap
page read and write
4ED1000
heap
page read and write
7E4000
heap
page read and write
4D51000
heap
page read and write
D88000
unkown
page execute and read and write
5586000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
3FAF000
stack
page read and write
D60000
unkown
page readonly
2850000
direct allocation
page read and write
92E000
heap
page read and write
4861000
heap
page read and write
8D6000
unkown
page execute and write copy
E5B000
heap
page read and write
446F000
stack
page read and write
730E000
stack
page read and write
58DB000
trusted library allocation
page read and write
4C30000
direct allocation
page read and write
8230000
direct allocation
page execute and read and write
96E000
stack
page read and write
4AB1000
heap
page read and write
330F000
stack
page read and write
4D51000
heap
page read and write
549F000
stack
page read and write
424F000
stack
page read and write
8B9B000
heap
page read and write
4AB1000
heap
page read and write
8D8000
unkown
page execute and read and write
944000
unkown
page execute and read and write
45A000
stack
page read and write
5DA6000
heap
page read and write
D20000
unkown
page execute and read and write
35AE000
stack
page read and write
1006000
unkown
page execute and write copy
9E1000
unkown
page execute and read and write
1D467000
heap
page read and write
55AB000
trusted library allocation
page read and write
5003000
trusted library allocation
page execute and read and write
893000
heap
page read and write
10C0000
direct allocation
page read and write
1D47A000
heap
page read and write
1D491000
heap
page read and write
4861000
heap
page read and write
367E000
stack
page read and write
48E0000
remote allocation
page read and write
1854000
heap
page read and write
55BC000
trusted library allocation
page read and write
4E80000
heap
page read and write
5975000
trusted library allocation
page read and write
1D475000
heap
page read and write
574000
heap
page read and write
554A000
trusted library allocation
page read and write
164C000
heap
page read and write
5586000
trusted library allocation
page read and write
357F000
stack
page read and write
1524000
heap
page read and write
16F5000
stack
page read and write
6B4000
heap
page read and write
4ED1000
heap
page read and write
4770000
direct allocation
page read and write
556F000
trusted library allocation
page read and write
23679000
heap
page read and write
423E000
stack
page read and write
4DD0000
heap
page read and write
574000
heap
page read and write
A19000
unkown
page execute and read and write
4C2E000
trusted library allocation
page read and write
2FCF000
stack
page read and write
DB9000
unkown
page write copy
AFB000
unkown
page execute and read and write
3AAF000
stack
page read and write
2F3F000
stack
page read and write
1CC6E000
stack
page read and write
1068000
unkown
page execute and write copy
F23000
unkown
page execute and read and write
1854000
heap
page read and write
1854000
heap
page read and write
110B000
heap
page read and write
4A70000
direct allocation
page execute and read and write
43DF000
stack
page read and write
57CD000
stack
page read and write
1854000
heap
page read and write
D86000
unkown
page execute and write copy
4861000
heap
page read and write
4E2F000
stack
page read and write
51B1000
heap
page read and write
5295000
trusted library allocation
page read and write
4AB1000
heap
page read and write
96B000
unkown
page execute and read and write
4D51000
heap
page read and write
4861000
heap
page read and write
1854000
heap
page read and write
30EE000
stack
page read and write
DBB000
unkown
page execute and read and write
1524000
heap
page read and write
15B9000
heap
page read and write
4D40000
heap
page read and write
86C000
heap
page read and write
4870000
heap
page read and write
AF2000
unkown
page execute and read and write
4991000
heap
page read and write
51B8000
heap
page read and write
382E000
stack
page read and write
12CF000
stack
page read and write
5582000
trusted library allocation
page read and write
7E4000
heap
page read and write
995000
unkown
page execute and write copy
59A8000
trusted library allocation
page read and write
555C000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
4C4F000
stack
page read and write
330F000
stack
page read and write
1D483000
heap
page read and write
574000
heap
page read and write
5A70000
direct allocation
page read and write
1D491000
heap
page read and write
11A2000
heap
page read and write
DBB000
unkown
page execute and read and write
45CF000
stack
page read and write
10C0000
direct allocation
page read and write
574000
heap
page read and write
8F4000
heap
page read and write
E2F000
heap
page read and write
830000
heap
page read and write
7BF000
stack
page read and write
ACC000
unkown
page execute and read and write
40AF000
stack
page read and write
332E000
stack
page read and write
CEE000
unkown
page execute and read and write
964000
unkown
page execute and write copy
50E0000
direct allocation
page read and write
574000
heap
page read and write
4AB1000
heap
page read and write
4991000
heap
page read and write
9FA000
unkown
page execute and read and write
2CEF000
stack
page read and write
FBE000
unkown
page execute and read and write
52D1000
trusted library allocation
page read and write
236C0000
heap
page read and write
F7D000
unkown
page execute and read and write
42E1000
heap
page read and write
5D0000
direct allocation
page read and write
4D51000
heap
page read and write
4861000
heap
page read and write
4580000
trusted library allocation
page read and write
EFC000
unkown
page execute and read and write
CC4000
unkown
page execute and read and write
134F000
stack
page read and write
4481000
heap
page read and write
5A70000
direct allocation
page read and write
95A000
unkown
page execute and write copy
AF2000
unkown
page execute and read and write
45F1000
heap
page read and write
7B2000
unkown
page execute and write copy
49DF000
stack
page read and write
1524000
heap
page read and write
92F000
heap
page read and write
1043000
unkown
page execute and write copy
9E0000
direct allocation
page read and write
4B20000
direct allocation
page execute and read and write
2E9F000
stack
page read and write
571A000
trusted library allocation
page read and write
4D0000
heap
page read and write
4D51000
heap
page read and write
954000
unkown
page execute and write copy
D46000
unkown
page execute and read and write
A01000
unkown
page execute and write copy
42E1000
heap
page read and write
CB0000
unkown
page readonly
517B000
trusted library allocation
page execute and read and write
37FF000
stack
page read and write
6C8CF000
unkown
page write copy
5554000
trusted library allocation
page read and write
7B0000
unkown
page read and write
555B000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
52C0000
direct allocation
page execute and read and write
2F6F000
stack
page read and write
2C3F000
stack
page read and write
5A70000
direct allocation
page read and write
4C30000
direct allocation
page read and write
943000
heap
page read and write
6A4E000
stack
page read and write
424E000
stack
page read and write
1117000
heap
page read and write
36BF000
stack
page read and write
30AF000
stack
page read and write
72CF000
stack
page read and write
493B000
stack
page read and write
4C30000
direct allocation
page read and write
820F000
stack
page read and write
4861000
heap
page read and write
91A000
heap
page read and write
5A70000
direct allocation
page read and write
8EB000
heap
page read and write
52DF000
trusted library allocation
page read and write
9AA000
unkown
page execute and write copy
1058000
unkown
page execute and write copy
1524000
heap
page read and write
496F000
stack
page read and write
138E000
stack
page read and write
52C3000
trusted library allocation
page read and write
840000
direct allocation
page read and write
9E0000
direct allocation
page read and write
574000
heap
page read and write
FE9000
unkown
page execute and read and write
4D51000
heap
page read and write
554E000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
50DD000
stack
page read and write
4CF0000
direct allocation
page read and write
429F000
stack
page read and write
15C0000
direct allocation
page read and write
4861000
heap
page read and write
F67000
unkown
page execute and write copy
C54000
heap
page read and write
6B4000
heap
page read and write
574000
heap
page read and write
5984000
trusted library allocation
page read and write
C54000
heap
page read and write
346E000
stack
page read and write
F4C000
unkown
page execute and read and write
1043000
unkown
page execute and write copy
1790000
heap
page read and write
3A8F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
417F000
stack
page read and write
4ED1000
heap
page read and write
4A1E000
stack
page read and write
470F000
stack
page read and write
924000
heap
page read and write
45AF000
stack
page read and write
61ED3000
direct allocation
page read and write
4C41000
heap
page read and write
35BE000
stack
page read and write
1D15D000
stack
page read and write
15C0000
direct allocation
page read and write
4B7D000
stack
page read and write
C54000
heap
page read and write
39CE000
stack
page read and write
55C2000
trusted library allocation
page read and write
4861000
heap
page read and write
54F0000
direct allocation
page execute and read and write
415E000
stack
page read and write
4D01000
heap
page read and write
1BBF000
stack
page read and write
810E000
stack
page read and write
1524000
heap
page read and write
1D483000
heap
page read and write
396E000
stack
page read and write
338E000
stack
page read and write
5583000
trusted library allocation
page read and write
9C0000
unkown
page execute and read and write
1D472000
heap
page read and write
CA0000
heap
page read and write
15BE000
stack
page read and write
5541000
trusted library allocation
page read and write
1D451000
heap
page read and write
140A000
heap
page read and write
940000
heap
page read and write
52B1000
trusted library allocation
page read and write
7E4000
heap
page read and write
55EF000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
5E0000
unkown
page readonly
31CF000
stack
page read and write
5993000
trusted library allocation
page read and write
2F3F000
stack
page read and write
31AF000
stack
page read and write
51B1000
heap
page read and write
55A0000
trusted library allocation
page read and write
9E8000
unkown
page execute and read and write
134B000
unkown
page execute and write copy
132E000
stack
page read and write
23620000
heap
page read and write
1854000
heap
page read and write
3E8F000
stack
page read and write
49A5000
trusted library allocation
page read and write
D3E000
unkown
page execute and read and write
C80000
unkown
page execute and read and write
76CE000
stack
page read and write
A8E000
stack
page read and write
1524000
heap
page read and write
DED000
heap
page read and write
4FAE000
stack
page read and write
51B1000
heap
page read and write
5D1F000
trusted library allocation
page execute and read and write
9F2000
unkown
page execute and write copy
D04000
unkown
page execute and write copy
3B1E000
stack
page read and write
556F000
trusted library allocation
page read and write
850000
heap
page read and write
5C70000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
5D0000
direct allocation
page read and write
5AA6000
trusted library allocation
page read and write
5568000
trusted library allocation
page read and write
1524000
heap
page read and write
465F000
stack
page read and write
4D01000
heap
page read and write
5A6F000
trusted library allocation
page read and write
432F000
stack
page read and write
55CC000
trusted library allocation
page read and write
1D2EE000
stack
page read and write
51B1000
heap
page read and write
55B5000
trusted library allocation
page read and write
CF8000
unkown
page execute and read and write
58D2000
trusted library allocation
page read and write
F56000
unkown
page execute and read and write
4861000
heap
page read and write
92E000
heap
page read and write
C54000
heap
page read and write
1854000
heap
page read and write
A58000
unkown
page execute and write copy
59AD000
trusted library allocation
page read and write
885000
heap
page read and write
1CECE000
stack
page read and write
574000
heap
page read and write
120E000
stack
page read and write
1D491000
heap
page read and write
1D46F000
heap
page read and write
1524000
heap
page read and write
3F3E000
stack
page read and write
83F000
heap
page read and write
D15000
unkown
page execute and write copy
574000
heap
page read and write
4861000
heap
page read and write
4B10000
direct allocation
page execute and read and write
6B8E000
stack
page read and write
486E000
stack
page read and write
13B0000
heap
page read and write
D17000
unkown
page execute and read and write
48FD000
stack
page read and write
596E000
trusted library allocation
page read and write
CB1000
unkown
page execute and write copy
E2E000
heap
page read and write
AF2000
unkown
page execute and write copy
41EF000
stack
page read and write
4D51000
heap
page read and write
2E27000
heap
page read and write
1D10E000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
434F000
stack
page read and write
4AB1000
heap
page read and write
A19000
unkown
page execute and read and write
59A8000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4D51000
heap
page read and write
436E000
stack
page read and write
E9A000
heap
page read and write
55CF000
trusted library allocation
page read and write
2E7E000
stack
page read and write
1854000
heap
page read and write
D61000
unkown
page execute and write copy
52E7000
trusted library allocation
page read and write
44CF000
stack
page read and write
574000
heap
page read and write
CB1000
unkown
page execute and write copy
4AC7000
heap
page read and write
45F0000
heap
page read and write
3E6E000
stack
page read and write
1007000
unkown
page execute and read and write
4D51000
heap
page read and write
5572000
trusted library allocation
page read and write
1854000
heap
page read and write
1D6FE000
stack
page read and write
3E3F000
stack
page read and write
1D45B000
heap
page read and write
57B0000
direct allocation
page execute and read and write
4B09000
trusted library allocation
page read and write
3D0F000
stack
page read and write
574000
heap
page read and write
1130000
heap
page read and write
554B000
trusted library allocation
page read and write
1854000
heap
page read and write
1058000
unkown
page execute and write copy
55BD000
trusted library allocation
page read and write
4861000
heap
page read and write
FD7000
unkown
page execute and read and write
C54000
heap
page read and write
864B000
stack
page read and write
982000
unkown
page execute and read and write
933000
heap
page read and write
2F4F000
stack
page read and write
5CAD000
stack
page read and write
59CC000
trusted library allocation
page read and write
1D45D000
heap
page read and write
AFB000
unkown
page execute and read and write
D15000
unkown
page execute and write copy
6B4000
heap
page read and write
4C30000
direct allocation
page read and write
D79000
unkown
page execute and write copy
1DB2D000
stack
page read and write
554A000
trusted library allocation
page read and write
4C41000
heap
page read and write
574000
heap
page read and write
3B5E000
stack
page read and write
1524000
heap
page read and write
394F000
stack
page read and write
58DB000
trusted library allocation
page read and write
134A000
unkown
page execute and read and write
4861000
heap
page read and write
CE3000
unkown
page execute and write copy
313F000
stack
page read and write
FA8000
unkown
page execute and read and write
1854000
heap
page read and write
4481000
heap
page read and write
1CF0E000
stack
page read and write
1069000
unkown
page execute and write copy
A4F000
unkown
page execute and write copy
2E3E000
stack
page read and write
2F8E000
stack
page read and write
CEE000
unkown
page execute and read and write
3DDE000
stack
page read and write
535F000
stack
page read and write
405E000
stack
page read and write
4AB1000
heap
page read and write
5ACE000
trusted library allocation
page read and write
3E6E000
stack
page read and write
3A1E000
stack
page read and write
AF2000
unkown
page execute and write copy
4480000
heap
page read and write
447F000
stack
page read and write
574000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4E00000
remote allocation
page read and write
5984000
trusted library allocation
page read and write
479E000
stack
page read and write
8240000
direct allocation
page execute and read and write
B50000
heap
page read and write
4C0F000
stack
page read and write
2860000
heap
page read and write
4AB1000
heap
page read and write
E45000
heap
page read and write
33FE000
stack
page read and write
574000
heap
page read and write
42E1000
heap
page read and write
58D8000
trusted library allocation
page read and write
422F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
23663000
heap
page read and write
574000
heap
page read and write
7FE000
stack
page read and write
48F0000
direct allocation
page execute and read and write
D86000
unkown
page execute and write copy
4EB1000
heap
page read and write
31FE000
stack
page read and write
8D8000
heap
page read and write
36BF000
stack
page read and write
7E4000
heap
page read and write
1854000
heap
page read and write
718F000
stack
page read and write
1524000
heap
page read and write
F3C000
stack
page read and write
42D0000
direct allocation
page read and write
E0E000
heap
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
4861000
heap
page read and write
34CF000
stack
page read and write
3AEE000
stack
page read and write
1854000
heap
page read and write
4861000
heap
page read and write
51B1000
heap
page read and write
1524000
heap
page read and write
574000
heap
page read and write
11A9000
unkown
page execute and read and write
1647000
heap
page read and write
52B0000
direct allocation
page read and write
482F000
stack
page read and write
5C0000
heap
page read and write
436F000
stack
page read and write
236D9000
heap
page read and write
4C50000
direct allocation
page execute and read and write
412E000
stack
page read and write
802000
unkown
page execute and read and write
F23000
unkown
page execute and read and write
1D479000
heap
page read and write
EB7000
unkown
page execute and read and write
82E000
stack
page read and write
CB1000
unkown
page execute and write copy
6B4000
heap
page read and write
4ED1000
heap
page read and write
FF0000
heap
page read and write
574000
heap
page read and write
5D0000
direct allocation
page read and write
4D51000
heap
page read and write
74A000
heap
page read and write
DC7000
unkown
page execute and write copy
A68000
unkown
page execute and write copy
23665000
heap
page read and write
F23000
unkown
page execute and read and write
D3D000
unkown
page execute and read and write
1D19E000
stack
page read and write
61F5000
trusted library allocation
page read and write
2EC0000
heap
page read and write
2BCF000
stack
page read and write
D72000
unkown
page execute and read and write
4F66000
direct allocation
page read and write
5565000
trusted library allocation
page read and write
E2E000
heap
page read and write
51B1000
heap
page read and write
32EF000
stack
page read and write
52B0000
direct allocation
page execute and read and write
3E2F000
stack
page read and write
107E000
stack
page read and write
92D000
heap
page read and write
108B000
unkown
page execute and read and write
385F000
stack
page read and write
D60000
direct allocation
page execute and read and write
E2E000
heap
page read and write
84F000
heap
page read and write
574000
heap
page read and write
4C30000
direct allocation
page read and write
D61000
unkown
page execute and write copy
61EF000
stack
page read and write
1068000
unkown
page execute and read and write
61ED0000
direct allocation
page read and write
FCB000
unkown
page execute and read and write
5EBC000
trusted library allocation
page execute and read and write
44EE000
stack
page read and write
5390000
trusted library allocation
page read and write
9D3000
unkown
page execute and read and write
89E000
heap
page read and write
5547000
trusted library allocation
page read and write
4861000
heap
page read and write
348F000
stack
page read and write
4AB1000
heap
page read and write
4A7D000
stack
page read and write
4D51000
heap
page read and write
574000
heap
page read and write
4ED1000
heap
page read and write
5614000
trusted library allocation
page read and write
46EF000
stack
page read and write
4D51000
heap
page read and write
4EA0000
direct allocation
page read and write
919000
heap
page read and write
C54000
heap
page read and write
5565000
trusted library allocation
page read and write
CB1000
unkown
page execute and write copy
58DF000
trusted library allocation
page read and write
37EF000
stack
page read and write
AF0000
direct allocation
page read and write
52E9000
trusted library allocation
page read and write
1053000
unkown
page execute and write copy
CF6000
unkown
page execute and write copy
574000
heap
page read and write
8B5000
heap
page read and write
3D9E000
stack
page read and write
F7C000
unkown
page execute and write copy
950000
unkown
page execute and write copy
59F5000
trusted library allocation
page read and write
5D0000
direct allocation
page read and write
7BA000
unkown
page execute and read and write
A68000
unkown
page execute and write copy
D86000
unkown
page execute and write copy
30B0000
direct allocation
page read and write
FBE000
unkown
page execute and read and write
536F000
stack
page read and write
5575000
trusted library allocation
page read and write
CE2000
unkown
page execute and read and write
574000
heap
page read and write
1524000
heap
page read and write
4D51000
heap
page read and write
51B1000
heap
page read and write
2E00000
direct allocation
page execute and read and write
574000
heap
page read and write
6E0E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
D3C000
unkown
page execute and write copy
1524000
heap
page read and write
4D51000
heap
page read and write
3A6F000
stack
page read and write
E3E000
heap
page read and write
945000
unkown
page execute and write copy
53C0000
direct allocation
page execute and read and write
553F000
stack
page read and write
1524000
heap
page read and write
1D446000
heap
page read and write
FDE000
unkown
page execute and write copy
5565000
trusted library allocation
page read and write
83E000
unkown
page execute and read and write
4EB1000
heap
page read and write
4D30000
heap
page read and write
4D2F000
stack
page read and write
4861000
heap
page read and write
2867000
heap
page read and write
572A000
trusted library allocation
page read and write
58D7000
trusted library allocation
page read and write
51B1000
heap
page read and write
4C40000
direct allocation
page execute and read and write
1DAED000
stack
page read and write
4EBB000
trusted library allocation
page execute and read and write
4D01000
heap
page read and write
1193000
unkown
page execute and read and write
377F000
stack
page read and write
7280000
heap
page read and write
CE7000
unkown
page execute and read and write
4C2E000
stack
page read and write
7C6000
unkown
page execute and write copy
55AC000
trusted library allocation
page read and write
4ED1000
heap
page read and write
320F000
stack
page read and write
9E0000
direct allocation
page read and write
6B4000
heap
page read and write
9FA000
unkown
page execute and read and write
95A000
unkown
page execute and write copy
37BE000
stack
page read and write
1D469000
heap
page read and write
1D491000
heap
page read and write
C61000
unkown
page execute and read and write
EF9000
unkown
page execute and read and write
4760000
remote allocation
page read and write
11A9000
unkown
page execute and read and write
82B000
unkown
page execute and write copy
4CA0000
direct allocation
page execute and read and write
41FF000
stack
page read and write
678F000
stack
page read and write
1D45A000
heap
page read and write
4D92000
trusted library allocation
page read and write
282F000
stack
page read and write
2CE7000
heap
page read and write
1854000
heap
page read and write
D8C000
unkown
page execute and read and write
1D48D000
heap
page read and write
52B0000
direct allocation
page read and write
5592000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
482F000
stack
page read and write
578F000
stack
page read and write
4B0E000
stack
page read and write
574000
heap
page read and write
5586000
trusted library allocation
page read and write
1D29C000
stack
page read and write
11A9000
unkown
page execute and write copy
857000
unkown
page execute and write copy
DEE000
stack
page read and write
5984000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
4861000
heap
page read and write
D06000
unkown
page execute and read and write
2BBC000
stack
page read and write
11F7000
heap
page read and write
1D87E000
stack
page read and write
F4C000
unkown
page execute and write copy
4D51000
heap
page read and write
4D51000
heap
page read and write
4481000
heap
page read and write
2A33B000
stack
page read and write
8B5000
heap
page read and write
51B1000
heap
page read and write
CF8000
unkown
page execute and read and write
574000
heap
page read and write
4B36000
trusted library allocation
page read and write
559D000
trusted library allocation
page read and write
2AAE000
stack
page read and write
D5F000
unkown
page execute and read and write
9AB000
unkown
page execute and read and write
12FD000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4ACF000
stack
page read and write
D9F000
unkown
page execute and write copy
396F000
stack
page read and write
4D51000
heap
page read and write
574000
heap
page read and write
61D2000
trusted library allocation
page read and write
574F000
stack
page read and write
39CE000
stack
page read and write
1854000
heap
page read and write
1D461000
heap
page read and write
59B2000
trusted library allocation
page read and write
574000
heap
page read and write
DA6000
heap
page read and write
55D5000
trusted library allocation
page read and write
384E000
stack
page read and write
58D2000
trusted library allocation
page read and write
3EAE000
stack
page read and write
15C0000
direct allocation
page read and write
4481000
heap
page read and write
564F000
stack
page read and write
824E000
stack
page read and write
1854000
heap
page read and write
D70000
heap
page read and write
4A5E000
stack
page read and write
5048000
trusted library allocation
page read and write
F4C000
unkown
page execute and write copy
4991000
heap
page read and write
4900000
direct allocation
page execute and read and write
23720000
trusted library allocation
page read and write
3ACF000
stack
page read and write
5586000
trusted library allocation
page read and write
52B0000
direct allocation
page read and write
52B9000
trusted library allocation
page read and write
150F000
stack
page read and write
2A360000
heap
page read and write
35AE000
stack
page read and write
DBB000
unkown
page execute and write copy
F54000
unkown
page execute and write copy
4C30000
direct allocation
page read and write
5555000
trusted library allocation
page read and write
DBB000
unkown
page execute and write copy
CB0000
unkown
page readonly
3ECE000
stack
page read and write
343F000
stack
page read and write
556D000
trusted library allocation
page read and write
4ED1000
heap
page read and write
42D0000
direct allocation
page read and write
575000
heap
page read and write
78DE000
stack
page read and write
4C9A000
trusted library allocation
page read and write
668E000
stack
page read and write
45EE000
stack
page read and write
86C000
heap
page read and write
4930000
direct allocation
page execute and read and write
503E000
stack
page read and write
7B8F000
stack
page read and write
392F000
stack
page read and write
1524000
heap
page read and write
8C9000
unkown
page execute and write copy
4861000
heap
page read and write
4861000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
8E2000
heap
page read and write
53BE000
stack
page read and write
FA9000
unkown
page execute and write copy
AF9000
unkown
page write copy
52B0000
direct allocation
page read and write
E42000
heap
page read and write
A58000
unkown
page execute and write copy
1330000
heap
page read and write
F7C000
unkown
page execute and write copy
2E2B000
heap
page read and write
574000
heap
page read and write
506F000
stack
page read and write
1D46D000
heap
page read and write
52E9000
trusted library allocation
page read and write
4861000
heap
page read and write
D04000
unkown
page execute and write copy
4AB1000
heap
page read and write
D17000
unkown
page execute and read and write
10C0000
direct allocation
page read and write
4861000
heap
page read and write
574000
heap
page read and write
4481000
heap
page read and write
4861000
heap
page read and write
AF0000
direct allocation
page read and write
574000
heap
page read and write
1199000
unkown
page execute and read and write
109B000
unkown
page execute and write copy
932000
heap
page read and write
5290000
direct allocation
page execute and read and write
4861000
heap
page read and write
15C0000
direct allocation
page read and write
53A0000
direct allocation
page execute and read and write
1524000
heap
page read and write
1069000
unkown
page execute and write copy
45CF000
stack
page read and write
4EAE000
stack
page read and write
4C30000
direct allocation
page read and write
885000
heap
page read and write
C75000
unkown
page execute and read and write
7DC000
unkown
page execute and read and write
357F000
stack
page read and write
2850000
direct allocation
page read and write
2367F000
heap
page read and write
574000
heap
page read and write
472E000
stack
page read and write
474E000
stack
page read and write
1524000
heap
page read and write
574000
heap
page read and write
95B000
unkown
page execute and read and write
1D6CF000
stack
page read and write
B8E000
stack
page read and write
E5F000
heap
page read and write
5A1E000
trusted library allocation
page read and write
144E000
heap
page read and write
4D51000
heap
page read and write
50EE000
stack
page read and write
9DE000
unkown
page execute and write copy
AF0000
direct allocation
page read and write
6B4000
heap
page read and write
36EF000
stack
page read and write
3BCF000
stack
page read and write
790F000
stack
page read and write
32FF000
stack
page read and write
916000
heap
page read and write
1524000
heap
page read and write
5090000
direct allocation
page execute and read and write
1052000
unkown
page execute and read and write
6DCF000
stack
page read and write
1854000
heap
page read and write
EE9000
unkown
page execute and read and write
4D51000
heap
page read and write
1D46D000
heap
page read and write
574000
heap
page read and write
4AB1000
heap
page read and write
75D0000
heap
page execute and read and write
494C000
trusted library allocation
page read and write
4AB1000
heap
page read and write
AF2000
unkown
page execute and write copy
A4F000
unkown
page execute and write copy
7E4000
heap
page read and write
CF8000
unkown
page execute and read and write
394F000
stack
page read and write
58D4000
trusted library allocation
page read and write
64B000
unkown
page execute and write copy
4F1F000
stack
page read and write
511E000
stack
page read and write
4BD0000
direct allocation
page execute and read and write
1524000
heap
page read and write
1854000
heap
page read and write
A91000
unkown
page execute and write copy
D61000
unkown
page execute and read and write
6127000
trusted library allocation
page execute and read and write
51E0000
direct allocation
page read and write
42BF000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
3B1F000
stack
page read and write
4D51000
heap
page read and write
554A000
trusted library allocation
page read and write
306F000
stack
page read and write
947000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
5565000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
1D475000
heap
page read and write
5546000
trusted library allocation
page read and write
574000
heap
page read and write
9BE000
stack
page read and write
568E000
stack
page read and write
4D00000
heap
page read and write
574000
heap
page read and write
119E000
stack
page read and write
6B4000
heap
page read and write
574000
heap
page read and write
F56000
unkown
page execute and read and write
9F2000
unkown
page execute and write copy
6C8CE000
unkown
page read and write
877000
heap
page read and write
36EE000
stack
page read and write
847000
heap
page read and write
52D2000
trusted library allocation
page read and write
4ED1000
heap
page read and write
5260000
direct allocation
page execute and read and write
92E000
heap
page read and write
5586000
trusted library allocation
page read and write
334F000
stack
page read and write
4D51000
heap
page read and write
574000
heap
page read and write
525E000
stack
page read and write
401E000
stack
page read and write
4E44000
trusted library allocation
page read and write
1006000
unkown
page execute and write copy
932000
heap
page read and write
AFB000
unkown
page execute and read and write
5A90000
direct allocation
page read and write
5A70000
direct allocation
page read and write
414E000
stack
page read and write
5A70000
direct allocation
page read and write
5547000
trusted library allocation
page read and write
1058000
unkown
page execute and write copy
5597000
trusted library allocation
page read and write
334E000
stack
page read and write
437E000
stack
page read and write
6BE0000
heap
page read and write
5ADB000
trusted library allocation
page read and write
1524000
heap
page read and write
44AE000
stack
page read and write
1D467000
heap
page read and write
59A4000
trusted library allocation
page read and write
E12000
heap
page read and write
574000
heap
page read and write
8FE000
stack
page read and write
410F000
stack
page read and write
4D01000
heap
page read and write
44D1000
heap
page read and write
690E000
stack
page read and write
1854000
heap
page read and write
4C00000
direct allocation
page execute and read and write
335F000
stack
page read and write
2E3E000
stack
page read and write
397E000
stack
page read and write
1D451000
heap
page read and write
CE9000
unkown
page execute and write copy
7E4000
heap
page read and write
396E000
stack
page read and write
4AB1000
heap
page read and write
832000
unkown
page execute and read and write
5682000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
574000
heap
page read and write
4D51000
heap
page read and write
2ACE000
stack
page read and write
D07000
unkown
page execute and write copy
9AB000
unkown
page execute and read and write
4AB1000
heap
page read and write
937000
heap
page read and write
1854000
heap
page read and write
840000
direct allocation
page read and write
5014000
trusted library allocation
page read and write
FBF000
unkown
page execute and write copy
51B1000
heap
page read and write
932000
heap
page read and write
4C30000
direct allocation
page read and write
46FF000
stack
page read and write
4F80000
direct allocation
page execute and read and write
D1E000
unkown
page execute and write copy
F26000
unkown
page execute and write copy
840000
direct allocation
page read and write
F26000
unkown
page execute and write copy
4B5F000
stack
page read and write
148B000
heap
page read and write
5566000
trusted library allocation
page read and write
4ED1000
heap
page read and write
349F000
stack
page read and write
36CF000
stack
page read and write
55C4000
trusted library allocation
page read and write
4861000
heap
page read and write
1524000
heap
page read and write
10C0000
direct allocation
page read and write
31AF000
stack
page read and write
CDB000
unkown
page execute and write copy
2850000
direct allocation
page read and write
3BFE000
stack
page read and write
53D0000
direct allocation
page execute and read and write
432F000
stack
page read and write
236BB000
heap
page read and write
8C2000
unkown
page execute and read and write
2F7E000
stack
page read and write
360E000
stack
page read and write
438F000
stack
page read and write
1854000
heap
page read and write
1D46F000
heap
page read and write
D89000
unkown
page execute and write copy
3BEE000
stack
page read and write
3E6E000
stack
page read and write
1854000
heap
page read and write
403F000
stack
page read and write
465E000
stack
page read and write
57A0000
direct allocation
page execute and read and write
A91000
unkown
page execute and write copy
4BC000
stack
page read and write
40BF000
stack
page read and write
C54000
heap
page read and write
36AF000
stack
page read and write
108B000
unkown
page execute and read and write
2CCF000
stack
page read and write
5722000
trusted library allocation
page read and write
4ED0000
heap
page read and write
3F1E000
stack
page read and write
8E3000
heap
page read and write
1854000
heap
page read and write
599A000
trusted library allocation
page read and write
E45000
heap
page read and write
574000
heap
page read and write
34B000
stack
page read and write
5D0000
direct allocation
page read and write
D9E000
unkown
page execute and write copy
5300000
direct allocation
page execute and read and write
C54000
heap
page read and write
680000
heap
page read and write
4AB1000
heap
page read and write
4DDF000
stack
page read and write
4ED1000
heap
page read and write
FFD000
unkown
page execute and write copy
5B44000
trusted library allocation
page read and write
2850000
direct allocation
page read and write
4ED1000
heap
page read and write
6B4000
heap
page read and write
32EF000
stack
page read and write
1435000
heap
page read and write
D59000
unkown
page execute and read and write
10B0000
heap
page read and write
4FA000
stack
page read and write
E0E000
heap
page read and write
55EF000
trusted library allocation
page read and write
237FE000
heap
page read and write
FA8000
unkown
page execute and read and write
6B4F000
stack
page read and write
111E000
stack
page read and write
59BB000
trusted library allocation
page read and write
1854000
heap
page read and write
5982000
trusted library allocation
page read and write
40FE000
stack
page read and write
FDE000
unkown
page execute and write copy
4AB1000
heap
page read and write
FA4000
unkown
page execute and write copy
574000
heap
page read and write
1D491000
heap
page read and write
D71000
unkown
page execute and write copy
848000
unkown
page execute and read and write
379E000
stack
page read and write
D7E000
heap
page read and write
2FAE000
stack
page read and write
1020000
heap
page read and write
4AB1000
heap
page read and write
4D01000
heap
page read and write
6B4000
heap
page read and write
4861000
heap
page read and write
DEE000
heap
page read and write
3C0F000
stack
page read and write
6C6E2000
unkown
page readonly
1D470000
heap
page read and write
5A17000
trusted library allocation
page read and write
574000
heap
page read and write
4D01000
heap
page read and write
943000
heap
page read and write
3BBF000
stack
page read and write
E36000
heap
page read and write
DEF000
heap
page read and write
50A0000
direct allocation
page execute and read and write
63E0000
trusted library allocation
page read and write
554A000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
4ED1000
heap
page read and write
4ED1000
heap
page read and write
2E20000
heap
page read and write
1B7E000
stack
page read and write
964000
unkown
page execute and write copy
77DE000
stack
page read and write
937000
heap
page read and write
877000
heap
page read and write
558C000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
F7D000
unkown
page execute and read and write
D5F000
unkown
page execute and read and write
48D0000
direct allocation
page execute and read and write
55B3000
trusted library allocation
page read and write
1D474000
heap
page read and write
393F000
stack
page read and write
40FE000
stack
page read and write
51B1000
heap
page read and write
FFD000
unkown
page execute and write copy
3BAF000
stack
page read and write
574000
heap
page read and write
4AB1000
heap
page read and write
4D51000
heap
page read and write
1040000
unkown
page execute and write copy
3BEE000
stack
page read and write
55C4000
trusted library allocation
page read and write
3CEF000
stack
page read and write
55A4000
trusted library allocation
page read and write
1D475000
heap
page read and write
4EB1000
heap
page read and write
557D000
trusted library allocation
page read and write
52B0000
direct allocation
page read and write
306F000
stack
page read and write
35EE000
stack
page read and write
657000
unkown
page execute and write copy
8BD000
heap
page read and write
9F7000
heap
page read and write
830000
heap
page read and write
51B1000
heap
page read and write
E36000
heap
page read and write
EE8000
unkown
page execute and read and write
58D8000
trusted library allocation
page read and write
4C43000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
1D52F000
stack
page read and write
559D000
trusted library allocation
page read and write
C54000
heap
page read and write
7FA000
heap
page read and write
CB3000
unkown
page execute and write copy
5DA5000
heap
page read and write
5593000
trusted library allocation
page read and write
294F000
stack
page read and write
35BE000
stack
page read and write
4FAF000
stack
page read and write
3D5F000
stack
page read and write
9E0000
direct allocation
page read and write
574000
heap
page read and write
4B4E000
stack
page read and write
5548000
trusted library allocation
page read and write
52D9000
trusted library allocation
page read and write
9FB000
heap
page read and write
56F2000
trusted library allocation
page read and write
4EB1000
heap
page read and write
59EE000
trusted library allocation
page read and write
1854000
heap
page read and write
1D58F000
stack
page read and write
D61000
unkown
page execute and read and write
D61000
unkown
page execute and read and write
1524000
heap
page read and write
400E000
stack
page read and write
4CF0000
direct allocation
page read and write
DB9000
unkown
page write copy
6435000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
4861000
heap
page read and write
4E60000
direct allocation
page read and write
4AB1000
heap
page read and write
1182000
heap
page read and write
982000
unkown
page execute and read and write
2FCE000
stack
page read and write
37FF000
stack
page read and write
3D6E000
stack
page read and write
92D000
heap
page read and write
574000
heap
page read and write
6153000
trusted library allocation
page execute and read and write
839000
unkown
page execute and write copy
C80000
unkown
page execute and read and write
9F0000
unkown
page execute and write copy
924000
heap
page read and write
29FE000
stack
page read and write
4EA0000
direct allocation
page read and write
DB9000
unkown
page write copy
441E000
stack
page read and write
F4C000
unkown
page execute and read and write
1854000
heap
page read and write
15DB000
heap
page read and write
8EF000
unkown
page execute and write copy
6FA000
stack
page read and write
3550000
heap
page read and write
48E0000
direct allocation
page execute and read and write
59F2000
trusted library allocation
page read and write
FC1000
unkown
page execute and read and write
30CB000
heap
page read and write
5510000
direct allocation
page execute and read and write
52CB000
trusted library allocation
page read and write
6B4000
heap
page read and write
5396000
direct allocation
page read and write
34AE000
stack
page read and write
134B000
unkown
page execute and write copy
B00000
heap
page read and write
4ABE000
stack
page read and write
1D491000
heap
page read and write
5240000
direct allocation
page execute and read and write
51B1000
heap
page read and write
1D483000
heap
page read and write
3B0E000
stack
page read and write
CE7000
unkown
page execute and read and write
5170000
trusted library allocation
page read and write
6B0000
heap
page read and write
44D1000
heap
page read and write
574000
heap
page read and write
296F000
stack
page read and write
36AF000
stack
page read and write
52B0000
direct allocation
page read and write
1052000
unkown
page execute and read and write
115E000
heap
page read and write
94E000
heap
page read and write
4ED1000
heap
page read and write
51B1000
heap
page read and write
42D0000
direct allocation
page read and write
AF9000
unkown
page write copy
FA4000
unkown
page execute and write copy
4EB1000
heap
page read and write
5411000
trusted library allocation
page read and write
46EF000
stack
page read and write
23661000
heap
page read and write
2777000
heap
page read and write
5570000
trusted library allocation
page read and write
38BF000
stack
page read and write
4CF0000
direct allocation
page read and write
1524000
heap
page read and write
51B1000
heap
page read and write
58D9000
trusted library allocation
page read and write
51C0000
heap
page read and write
F51000
unkown
page execute and write copy
D15000
unkown
page execute and write copy
52D0000
direct allocation
page execute and read and write
52BC000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
4ED1000
heap
page read and write
CB0000
unkown
page read and write
865000
unkown
page execute and write copy
4FED000
stack
page read and write
1420000
heap
page read and write
1018000
unkown
page execute and write copy
475F000
stack
page read and write
4A40000
direct allocation
page execute and read and write
557D000
trusted library allocation
page read and write
5547000
trusted library allocation
page read and write
1D48A000
heap
page read and write
7E4000
heap
page read and write
A18000
unkown
page execute and write copy
A66000
unkown
page execute and read and write
5A70000
direct allocation
page read and write
7E4000
heap
page read and write
DED000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
7BCE000
stack
page read and write
4D60000
heap
page read and write
EF9000
stack
page read and write
3C1F000
stack
page read and write
51D1000
trusted library allocation
page read and write
4861000
heap
page read and write
574000
heap
page read and write
35AF000
stack
page read and write
4E00000
trusted library allocation
page read and write
574000
heap
page read and write
574000
heap
page read and write
5260000
direct allocation
page execute and read and write
4C10000
direct allocation
page execute and read and write
7CCF000
stack
page read and write
710000
heap
page read and write
393F000
stack
page read and write
51B1000
heap
page read and write
11AA000
unkown
page execute and write copy
6C6CD000
unkown
page readonly
1D48A000
heap
page read and write
42F1000
heap
page read and write
4BEF000
stack
page read and write
1D491000
heap
page read and write
174E000
stack
page read and write
59CB000
trusted library allocation
page read and write
4EB1000
heap
page read and write
51B1000
heap
page read and write
1400000
heap
page read and write
5605000
trusted library allocation
page read and write
51A0000
heap
page read and write
A00000
unkown
page readonly
4D51000
heap
page read and write
5592000
trusted library allocation
page read and write
317E000
stack
page read and write
55A2000
trusted library allocation
page read and write
2760000
direct allocation
page execute and read and write
5D06000
trusted library allocation
page execute and read and write
A7B000
stack
page read and write
5A16000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
1D442000
heap
page read and write
4D51000
heap
page read and write
4AB1000
heap
page read and write
3D2E000
stack
page read and write
1854000
heap
page read and write
A4F000
stack
page read and write
5004000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
4AB1000
heap
page read and write
877000
heap
page read and write
5300000
heap
page execute and read and write
931000
heap
page read and write
59C5000
stack
page read and write
1D46C000
heap
page read and write
4861000
heap
page read and write
9E0000
direct allocation
page read and write
4FD0000
trusted library allocation
page read and write
3BAF000
stack
page read and write
5360000
direct allocation
page read and write
57AE000
stack
page read and write
49AE000
stack
page read and write
574000
heap
page read and write
95B000
unkown
page execute and read and write
375F000
stack
page read and write
3DFE000
stack
page read and write
5180000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
1854000
heap
page read and write
5A17000
trusted library allocation
page read and write
3A7F000
stack
page read and write
1445000
stack
page read and write
D1E000
unkown
page execute and write copy
C80000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
4E40000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
A0D000
unkown
page execute and write copy
1D561000
heap
page read and write
4D70000
heap
page read and write
2DF0000
direct allocation
page read and write
42D0000
direct allocation
page read and write
30B0000
direct allocation
page read and write
30CF000
stack
page read and write
598A000
trusted library allocation
page read and write
AF0000
direct allocation
page read and write
7E4000
heap
page read and write
5360000
direct allocation
page read and write
1D475000
heap
page read and write
539E000
stack
page read and write
A91000
unkown
page execute and write copy
1D48F000
heap
page read and write
36FE000
stack
page read and write
1D9ED000
stack
page read and write
549E000
stack
page read and write
9E0000
direct allocation
page read and write
1D46C000
heap
page read and write
2850000
direct allocation
page read and write
472E000
stack
page read and write
6B4000
heap
page read and write
5565000
trusted library allocation
page read and write
486E000
stack
page read and write
5572000
trusted library allocation
page read and write
4B1F000
stack
page read and write
5D0000
direct allocation
page read and write
4A80000
direct allocation
page read and write
C7B000
stack
page read and write
8D6000
unkown
page execute and write copy
85A000
heap
page read and write
CB2000
unkown
page execute and read and write
4481000
heap
page read and write
574000
heap
page read and write
5E0000
unkown
page read and write
6B4000
heap
page read and write
1D44F000
heap
page read and write
1524000
heap
page read and write
FAE000
unkown
page execute and read and write
515E000
stack
page read and write
45FE000
stack
page read and write
FE9000
unkown
page execute and read and write
1051000
unkown
page execute and write copy
4A60000
direct allocation
page execute and read and write
200FF000
stack
page read and write
322E000
stack
page read and write
4861000
heap
page read and write
3B0E000
stack
page read and write
56D0000
trusted library allocation
page read and write
120D000
heap
page read and write
1854000
heap
page read and write
720000
heap
page read and write
1043000
unkown
page execute and write copy
FA0000
heap
page read and write
81B000
heap
page read and write
5B1F000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
2AFF000
stack
page read and write
28BE000
stack
page read and write
C63000
unkown
page execute and write copy
11AC000
heap
page read and write
4FEF000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
574000
heap
page read and write
E5F000
heap
page read and write
555A000
trusted library allocation
page read and write
370F000
stack
page read and write
940000
heap
page read and write
8E9000
heap
page read and write
2A3E000
stack
page read and write
E5F000
heap
page read and write
505F000
stack
page read and write
840000
direct allocation
page read and write
4CD0000
heap
page read and write
383E000
stack
page read and write
CF6000
unkown
page execute and write copy
4D01000
heap
page read and write
411F000
stack
page read and write
8BD000
heap
page read and write
574000
heap
page read and write
3E2F000
stack
page read and write
1854000
heap
page read and write
874C000
stack
page read and write
550000
heap
page read and write
4D51000
heap
page read and write
6F2000
stack
page read and write
C54000
heap
page read and write
3CEF000
stack
page read and write
8D9000
unkown
page execute and write copy
E45000
heap
page read and write
556F000
trusted library allocation
page read and write
361E000
stack
page read and write
4AB1000
heap
page read and write
1699000
heap
page read and write
332F000
stack
page read and write
134A000
unkown
page execute and read and write
55AE000
trusted library allocation
page read and write
574000
heap
page read and write
5586000
trusted library allocation
page read and write
45AE000
stack
page read and write
4AB1000
heap
page read and write
3EDF000
stack
page read and write
451F000
stack
page read and write
43DE000
stack
page read and write
1068000
unkown
page execute and write copy
1854000
heap
page read and write
1018000
unkown
page execute and write copy
1D4CC000
stack
page read and write
7B6000
unkown
page write copy
555B000
trusted library allocation
page read and write
4490000
heap
page read and write
2CB0000
heap
page read and write
42DE000
stack
page read and write
8106000
direct allocation
page read and write
1524000
heap
page read and write
94B000
heap
page read and write
55F5000
trusted library allocation
page read and write
4AB1000
heap
page read and write
5400000
direct allocation
page execute and read and write
320E000
stack
page read and write
E2C000
heap
page read and write
CA1000
unkown
page execute and read and write
4E50000
direct allocation
page read and write
5686000
direct allocation
page read and write
D30000
heap
page read and write
30B0000
direct allocation
page read and write
6B4000
heap
page read and write
554A000
trusted library allocation
page read and write
4AB1000
heap
page read and write
3A3E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
5D0000
direct allocation
page read and write
1D83D000
stack
page read and write
448F000
stack
page read and write
4EC0000
heap
page read and write
559B000
trusted library allocation
page read and write
37EF000
stack
page read and write
D79000
unkown
page execute and write copy
58DE000
trusted library allocation
page read and write
415F000
stack
page read and write
598D000
trusted library allocation
page read and write
1193000
unkown
page execute and read and write
4FC0000
direct allocation
page read and write
51B1000
heap
page read and write
4861000
heap
page read and write
FAE000
unkown
page execute and read and write
4C00000
direct allocation
page execute and read and write
52B6000
trusted library allocation
page read and write
77CF000
stack
page read and write
8B2000
heap
page read and write
3FAE000
stack
page read and write
4ED1000
heap
page read and write
30B0000
direct allocation
page read and write
4ED1000
heap
page read and write
4861000
heap
page read and write
1524000
heap
page read and write
3ECE000
stack
page read and write
48CE000
stack
page read and write
6B4000
heap
page read and write
5070000
direct allocation
page execute and read and write
558C000
trusted library allocation
page read and write
4EE0000
heap
page read and write
1D43D000
stack
page read and write
5968000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
51B1000
heap
page read and write
566A000
trusted library allocation
page read and write
C8C000
unkown
page execute and read and write
1D45B000
heap
page read and write
D71000
unkown
page execute and write copy
3E8E000
stack
page read and write
3F8F000
stack
page read and write
F84000
unkown
page execute and write copy
5570000
trusted library allocation
page read and write
3F6F000
stack
page read and write
6269000
heap
page read and write
D9E000
unkown
page execute and read and write
1854000
heap
page read and write
52B0000
direct allocation
page read and write
1D45B000
heap
page read and write
7E4000
heap
page read and write
574000
heap
page read and write
5566000
trusted library allocation
page read and write
40EE000
stack
page read and write
954000
unkown
page execute and write copy
30B0000
direct allocation
page read and write
1053000
unkown
page execute and write copy
754E000
stack
page read and write
F54000
unkown
page execute and write copy
E2E000
heap
page read and write
4AB1000
heap
page read and write
382E000
stack
page read and write
49A1000
heap
page read and write
92D000
heap
page read and write
84D000
heap
page read and write
30C0000
heap
page read and write
945000
heap
page read and write
1524000
heap
page read and write
531F000
stack
page read and write
4EA0000
direct allocation
page read and write
1854000
heap
page read and write
C75000
unkown
page execute and read and write
4991000
heap
page read and write
D8F000
unkown
page execute and write copy
5543000
trusted library allocation
page read and write
C54000
heap
page read and write
D9E000
unkown
page execute and write copy
4ED1000
heap
page read and write
C54000
heap
page read and write
5FAF000
stack
page read and write
9D1000
unkown
page execute and write copy
3ACE000
stack
page read and write
1D475000
heap
page read and write
929000
unkown
page execute and read and write
55E5000
trusted library allocation
page read and write
112F000
heap
page read and write
237F3000
heap
page read and write
306F000
stack
page read and write
1854000
heap
page read and write
446F000
stack
page read and write
C54000
heap
page read and write
333E000
stack
page read and write
D50000
direct allocation
page execute and read and write
93D000
heap
page read and write
D60000
unkown
page readonly
D61000
unkown
page execute and write copy
AF0000
direct allocation
page read and write
559B000
trusted library allocation
page read and write
E5F000
heap
page read and write
4D51000
heap
page read and write
4F5E000
stack
page read and write
574000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
950000
unkown
page execute and read and write
889000
heap
page read and write
540F000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
D3E000
stack
page read and write
4E10000
direct allocation
page read and write
D06000
unkown
page execute and read and write
1854000
heap
page read and write
725000
heap
page read and write
736D000
stack
page read and write
FBF000
unkown
page execute and write copy
F4C000
unkown
page execute and write copy
52B0000
direct allocation
page read and write
1D483000
heap
page read and write
389E000
stack
page read and write
4D51000
heap
page read and write
574000
heap
page read and write
15D0000
heap
page read and write
40AE000
stack
page read and write
2E0F000
stack
page read and write
31CF000
stack
page read and write
4861000
heap
page read and write
D60000
direct allocation
page execute and read and write
591E000
stack
page read and write
7F0000
unkown
page execute and write copy
649000
unkown
page write copy
51B1000
heap
page read and write
574000
heap
page read and write
1524000
heap
page read and write
4861000
heap
page read and write
433F000
stack
page read and write
556C000
trusted library allocation
page read and write
4D01000
heap
page read and write
58D9000
trusted library allocation
page read and write
57D0000
direct allocation
page execute and read and write
4D50000
heap
page read and write
1540000
heap
page read and write
D3C000
unkown
page execute and write copy
5548000
trusted library allocation
page read and write
F68000
unkown
page execute and read and write
4EB0000
trusted library allocation
page read and write
48F0000
direct allocation
page execute and read and write
D8F000
unkown
page execute and write copy
574000
heap
page read and write
1854000
heap
page read and write
30CE000
stack
page read and write
A00000
unkown
page read and write
574000
heap
page read and write
D9F000
unkown
page execute and write copy
16FD000
stack
page read and write
808F000
stack
page read and write
4AB1000
heap
page read and write
4C41000
heap
page read and write
1854000
heap
page read and write
4861000
heap
page read and write
55C4000
trusted library allocation
page read and write
4AB1000
heap
page read and write
574000
heap
page read and write
1854000
heap
page read and write
1D45B000
heap
page read and write
840000
direct allocation
page read and write
52B6000
trusted library allocation
page read and write
D5E000
stack
page read and write
2B7F000
stack
page read and write
1524000
heap
page read and write
D46000
unkown
page execute and read and write
C54000
heap
page read and write
4D51000
heap
page read and write
D06000
unkown
page execute and read and write
42E1000
heap
page read and write
58DF000
trusted library allocation
page read and write
9F0000
unkown
page execute and write copy
4991000
heap
page read and write
F90000
unkown
page execute and read and write
521B000
stack
page read and write
1854000
heap
page read and write
51E0000
direct allocation
page read and write
4D01000
heap
page read and write
9F1000
unkown
page execute and read and write
44CF000
stack
page read and write
31FE000
stack
page read and write
410E000
stack
page read and write
6C6DE000
unkown
page read and write
4720000
heap
page read and write
FC1000
unkown
page execute and read and write
7ED000
heap
page read and write
1524000
heap
page read and write
4CDE000
stack
page read and write
4ED1000
heap
page read and write
8B32000
heap
page read and write
509E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
59D9000
trusted library allocation
page read and write
3F8F000
stack
page read and write
4D51000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
42E0000
heap
page read and write
4F30000
heap
page read and write
5586000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
554E000
stack
page read and write
924000
heap
page read and write
1524000
heap
page read and write
7A4F000
stack
page read and write
5A4D000
trusted library allocation
page read and write
144E000
stack
page read and write
3E4F000
stack
page read and write
542C000
stack
page read and write
CE8000
unkown
page execute and read and write
491E000
stack
page read and write
60EE000
stack
page read and write
3FCF000
stack
page read and write
9E0000
direct allocation
page read and write
1524000
heap
page read and write
57C0000
direct allocation
page execute and read and write
D1E000
unkown
page execute and write copy
4DA7000
trusted library allocation
page read and write
51B1000
heap
page read and write
CB2000
unkown
page execute and read and write
5190000
heap
page execute and read and write
4D51000
heap
page read and write
D9E000
unkown
page execute and write copy
556C000
trusted library allocation
page read and write
9B8000
unkown
page execute and read and write
2850000
direct allocation
page read and write
59BE000
trusted library allocation
page read and write
9C1000
unkown
page execute and write copy
4E00000
remote allocation
page read and write
1D46D000
heap
page read and write
BA5000
heap
page read and write
46EF000
stack
page read and write
4861000
heap
page read and write
1854000
heap
page read and write
4EA0000
direct allocation
page read and write
1D46C000
heap
page read and write
574000
heap
page read and write
4A90000
direct allocation
page execute and read and write
FE7000
unkown
page execute and write copy
3E4F000
stack
page read and write
6A0F000
stack
page read and write
48C0000
heap
page read and write
993000
unkown
page execute and read and write
4EA0000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
3C4E000
stack
page read and write
D0D000
unkown
page execute and read and write
3D2F000
stack
page read and write
433F000
stack
page read and write
FE7000
unkown
page execute and write copy
FFE000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
2EBF000
stack
page read and write
55E000
heap
page read and write
4F20000
trusted library allocation
page execute and read and write
4AD0000
heap
page read and write
4A50000
direct allocation
page execute and read and write
744E000
stack
page read and write
3BAF000
stack
page read and write
2D7F000
stack
page read and write
353E000
stack
page read and write
45D0000
trusted library allocation
page read and write
2E6E000
stack
page read and write
422E000
stack
page read and write
556C000
trusted library allocation
page read and write
5D4E000
stack
page read and write
144E000
stack
page read and write
5A17000
trusted library allocation
page read and write
A90000
unkown
page readonly
574000
heap
page read and write
10C0000
direct allocation
page read and write
11B0000
heap
page read and write
488E000
stack
page read and write
4D51000
heap
page read and write
D5E000
stack
page read and write
FE7000
unkown
page execute and write copy
6C6F0000
unkown
page readonly
1D46C000
heap
page read and write
52A1000
trusted library allocation
page read and write
6B4000
heap
page read and write
5575000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
7A8000
heap
page read and write
1524000
heap
page read and write
448F000
stack
page read and write
325E000
stack
page read and write
7C6000
unkown
page execute and write copy
574000
heap
page read and write
327F000
stack
page read and write
35B000
stack
page read and write
727E000
heap
page read and write
42C0000
heap
page read and write
7B2000
unkown
page execute and read and write
58DC000
trusted library allocation
page read and write
7D0000
unkown
page execute and read and write
7E0000
heap
page read and write
15CF000
stack
page read and write
10C0000
direct allocation
page read and write
94A000
heap
page read and write
4D51000
heap
page read and write
4A60000
direct allocation
page execute and read and write
3C4E000
stack
page read and write
4991000
heap
page read and write
48DF000
stack
page read and write
574000
heap
page read and write
7E4000
heap
page read and write
FA9000
unkown
page execute and write copy
574000
heap
page read and write
52B2000
trusted library allocation
page read and write
877000
heap
page read and write
4760000
remote allocation
page read and write
1D3CD000
stack
page read and write
58CF000
stack
page read and write
3FDF000
stack
page read and write
4C80000
direct allocation
page execute and read and write
47DE000
stack
page read and write
5A20000
trusted library allocation
page read and write
4E7E000
stack
page read and write
140E000
heap
page read and write
5651000
trusted library allocation
page read and write
5572000
trusted library allocation
page read and write
1D42E000
stack
page read and write
370F000
stack
page read and write
59AF000
trusted library allocation
page read and write
4DCE000
stack
page read and write
574000
heap
page read and write
C61000
unkown
page execute and read and write
5280000
direct allocation
page execute and read and write
4C00000
direct allocation
page execute and read and write
3C0E000
stack
page read and write
574000
heap
page read and write
D3E000
unkown
page execute and read and write
31AF000
stack
page read and write
854000
unkown
page execute and write copy
38DE000
stack
page read and write
2B7F000
stack
page read and write
FA9000
unkown
page execute and write copy
6B4000
heap
page read and write
C75000
unkown
page execute and read and write
6B4000
heap
page read and write
1201000
heap
page read and write
750D000
stack
page read and write
392F000
stack
page read and write
1524000
heap
page read and write
42D0000
direct allocation
page read and write
5080000
direct allocation
page execute and read and write
355B000
heap
page read and write
5299000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
118C000
heap
page read and write
FD4000
unkown
page execute and write copy
780E000
stack
page read and write
4DA0000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
44D1000
heap
page read and write
4F90000
direct allocation
page execute and read and write
52F0000
trusted library allocation
page read and write
55EE000
stack
page read and write
9B6000
unkown
page execute and write copy
30AE000
stack
page read and write
1854000
heap
page read and write
CE3000
unkown
page execute and write copy
4C41000
heap
page read and write
1D48E000
heap
page read and write
52A1000
trusted library allocation
page read and write
1524000
heap
page read and write
559B000
trusted library allocation
page read and write
A4E000
unkown
page execute and read and write
40BF000
stack
page read and write
6B4000
heap
page read and write
4F1E000
stack
page read and write
6B4000
heap
page read and write
7271000
heap
page read and write
A0F000
unkown
page execute and read and write
CA0000
unkown
page execute and write copy
55C2000
trusted library allocation
page read and write
3CBE000
stack
page read and write
556F000
trusted library allocation
page read and write
310E000
stack
page read and write
B07000
unkown
page execute and write copy
1854000
heap
page read and write
4EA0000
direct allocation
page read and write
1659000
heap
page read and write
1854000
heap
page read and write
11A7000
heap
page read and write
55F0000
trusted library allocation
page read and write
4D8F000
stack
page read and write
4D51000
heap
page read and write
5575000
trusted library allocation
page read and write
5A70000
direct allocation
page read and write
486E000
stack
page read and write
88D000
unkown
page execute and read and write
FD4000
unkown
page execute and write copy
C63000
unkown
page execute and write copy
54E0000
direct allocation
page execute and read and write
71CE000
stack
page read and write
1163000
heap
page read and write
1524000
heap
page read and write
F54000
unkown
page execute and write copy
931000
heap
page read and write
45EF000
stack
page read and write
483F000
stack
page read and write
31BF000
stack
page read and write
5010000
trusted library allocation
page read and write
6B4000
heap
page read and write
833000
unkown
page execute and write copy
FC9000
unkown
page execute and write copy
5575000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
3B3F000
stack
page read and write
6414000
trusted library allocation
page read and write
CE3000
unkown
page execute and write copy
5A70000
direct allocation
page read and write
346F000
stack
page read and write
52C9000
trusted library allocation
page read and write
1D475000
heap
page read and write
855000
heap
page read and write
460E000
stack
page read and write
1854000
heap
page read and write
D60000
unkown
page read and write
86E000
unkown
page execute and write copy
E5F000
heap
page read and write
55F0000
trusted library allocation
page read and write
D88000
unkown
page execute and read and write
5D8E000
stack
page read and write
2F6E000
stack
page read and write
4E10000
direct allocation
page read and write
885000
heap
page read and write
1FF00000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
30BE000
stack
page read and write
3D0F000
stack
page read and write
530E000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
564E000
stack
page read and write
C54000
heap
page read and write
52B0000
direct allocation
page read and write
52E0000
trusted library allocation
page read and write
4AB1000
heap
page read and write
520F000
stack
page read and write
1850000
heap
page read and write
360E000
stack
page read and write
59CC000
trusted library allocation
page read and write
3FCE000
stack
page read and write
2A46C000
stack
page read and write
6169000
trusted library allocation
page execute and read and write
51B1000
heap
page read and write
5360000
direct allocation
page execute and read and write
51B1000
heap
page read and write
4D51000
heap
page read and write
4D51000
heap
page read and write
AF0000
direct allocation
page read and write
4861000
heap
page read and write
930000
heap
page read and write
E41000
heap
page read and write
6C650000
unkown
page readonly
1663000
heap
page read and write
945000
heap
page read and write
C54000
heap
page read and write
4CF0000
direct allocation
page read and write
1854000
heap
page read and write
51B1000
heap
page read and write
57D0000
direct allocation
page execute and read and write
118C000
heap
page read and write
55D5000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
52F4000
trusted library allocation
page read and write
5987000
trusted library allocation
page read and write
320E000
stack
page read and write
425F000
stack
page read and write
C54000
heap
page read and write
DC7000
unkown
page execute and write copy
E42000
heap
page read and write
5551000
trusted library allocation
page read and write
4D01000
heap
page read and write
1524000
heap
page read and write
401F000
stack
page read and write
10D7000
heap
page read and write
FE0000
unkown
page execute and read and write
650F000
stack
page read and write
CF6000
unkown
page execute and write copy
846000
unkown
page execute and write copy
176A000
heap
page read and write
39AE000
stack
page read and write
396E000
stack
page read and write
E12000
heap
page read and write
35CE000
stack
page read and write
4D51000
heap
page read and write
654E000
stack
page read and write
574000
heap
page read and write
5576000
trusted library allocation
page read and write
3AAE000
stack
page read and write
472E000
stack
page read and write
5E1000
unkown
page execute and write copy
1D2AF000
stack
page read and write
8D7000
heap
page read and write
1524000
heap
page read and write
2EC7000
heap
page read and write
F6E000
stack
page read and write
5554000
trusted library allocation
page read and write
4D51000
heap
page read and write
DBB000
unkown
page execute and write copy
4862000
heap
page read and write
8DC000
unkown
page execute and read and write
3ADF000
stack
page read and write
B6C000
stack
page read and write
120D000
heap
page read and write
A90000
unkown
page readonly
8260000
direct allocation
page execute and read and write
26FE000
stack
page read and write
51DE000
stack
page read and write
2E10000
direct allocation
page execute and read and write
48C0000
direct allocation
page execute and read and write
A90000
unkown
page readonly
1854000
heap
page read and write
4EB1000
heap
page read and write
5350000
direct allocation
page execute and read and write
5980000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
50E0000
direct allocation
page read and write
574000
heap
page read and write
2D2E000
stack
page read and write
4EB1000
heap
page read and write
1D28D000
stack
page read and write
1D80F000
stack
page read and write
9D0000
heap
page read and write
5558000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
B07000
unkown
page execute and write copy
1854000
heap
page read and write
513E000
stack
page read and write
578F000
stack
page read and write
59A8000
trusted library allocation
page read and write
A58000
unkown
page execute and write copy
51B1000
heap
page read and write
234D4000
heap
page read and write
4D51000
heap
page read and write
61ED4000
direct allocation
page readonly
94E000
heap
page read and write
FFD000
unkown
page execute and write copy
564B000
trusted library allocation
page read and write
5B55000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
68CF000
stack
page read and write
C54000
heap
page read and write
4AB1000
heap
page read and write
1854000
heap
page read and write
A66000
unkown
page execute and write copy
2750000
direct allocation
page read and write
FBE000
unkown
page execute and read and write
C85000
unkown
page execute and write copy
4D51000
heap
page read and write
1854000
heap
page read and write
11A0000
heap
page read and write
4861000
heap
page read and write
4D01000
heap
page read and write
C54000
heap
page read and write
8BA4000
heap
page read and write
768F000
stack
page read and write
840000
direct allocation
page read and write
5993000
trusted library allocation
page read and write
FFD000
heap
page read and write
4CF0000
direct allocation
page read and write
56E9000
trusted library allocation
page read and write
1854000
heap
page read and write
45AF000
stack
page read and write
67CE000
stack
page read and write
2E4E000
stack
page read and write
1052000
unkown
page execute and read and write
1D3EF000
stack
page read and write
F68000
unkown
page execute and read and write
8B27000
heap
page read and write
420F000
stack
page read and write
4481000
heap
page read and write
574000
heap
page read and write
9E0000
direct allocation
page read and write
4DFF000
stack
page read and write
DB9000
unkown
page write copy
4861000
heap
page read and write
2D0F000
stack
page read and write
559B000
trusted library allocation
page read and write
48DE000
stack
page read and write
4C2D000
stack
page read and write
3F6F000
stack
page read and write
940000
heap
page read and write
1D483000
heap
page read and write
59E2000
trusted library allocation
page read and write
1854000
heap
page read and write
4D51000
heap
page read and write
374E000
stack
page read and write
58DC000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
F84000
unkown
page execute and write copy
31BF000
stack
page read and write
869000
heap
page read and write
1854000
heap
page read and write
4991000
heap
page read and write
1524000
heap
page read and write
1CFCF000
stack
page read and write
3B7E000
stack
page read and write
899000
heap
page read and write
598E000
trusted library allocation
page read and write
9C7000
unkown
page execute and read and write
143D000
heap
page read and write
89E000
heap
page read and write
4BED000
stack
page read and write
4B0F000
stack
page read and write
3CEF000
stack
page read and write
58DC000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
474E000
stack
page read and write
4861000
heap
page read and write
4ED1000
heap
page read and write
1854000
heap
page read and write
568C000
stack
page read and write
D04000
unkown
page execute and write copy
2CFE000
stack
page read and write
CB1000
unkown
page execute and write copy
840000
direct allocation
page read and write
4EA0000
direct allocation
page read and write
5566000
trusted library allocation
page read and write
346E000
stack
page read and write
559E000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
E3E000
heap
page read and write
574000
heap
page read and write
8D6000
heap
page read and write
30A0000
heap
page read and write
1524000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4AB1000
heap
page read and write
1D6A0000
heap
page read and write
59B7000
trusted library allocation
page read and write
1524000
heap
page read and write
1524000
heap
page read and write
A66000
unkown
page execute and write copy
1228000
heap
page read and write
2850000
direct allocation
page read and write
1040000
unkown
page execute and write copy
574000
heap
page read and write
6B4000
heap
page read and write
4AB1000
heap
page read and write
339E000
stack
page read and write
4CF0000
direct allocation
page read and write
88C000
unkown
page execute and write copy
856000
unkown
page execute and read and write
FAE000
unkown
page execute and read and write
41FF000
stack
page read and write
1189000
heap
page read and write
5566000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
4D01000
heap
page read and write
3ABD000
stack
page read and write
4860000
heap
page read and write
4F90000
direct allocation
page execute and read and write
1068000
unkown
page execute and read and write
1ABE000
stack
page read and write
58D4000
trusted library allocation
page read and write
C54000
heap
page read and write
1520000
heap
page read and write
4AB1000
heap
page read and write
35CF000
stack
page read and write
2F9F000
stack
page read and write
356F000
stack
page read and write
1524000
heap
page read and write
307F000
stack
page read and write
EFC000
unkown
page execute and read and write
45EE000
stack
page read and write
4ED1000
heap
page read and write
CA0000
unkown
page execute and write copy
F53000
unkown
page execute and read and write
5A17000
trusted library allocation
page read and write
937000
heap
page read and write
996000
unkown
page execute and read and write
1D70D000
stack
page read and write
574000
heap
page read and write
4861000
heap
page read and write
6B4000
heap
page read and write
58D3000
trusted library allocation
page read and write
2830000
heap
page read and write
574000
heap
page read and write
1D475000
heap
page read and write
9E0000
direct allocation
page read and write
51B1000
heap
page read and write
4C64000
heap
page read and write
67E000
stack
page read and write
937000
heap
page read and write
F67000
unkown
page execute and write copy
A4E000
unkown
page execute and read and write
1024000
unkown
page execute and read and write
CA0000
unkown
page execute and write copy
574000
heap
page read and write
3C7F000
stack
page read and write
1D483000
heap
page read and write
F53000
unkown
page execute and read and write
575000
heap
page read and write
4EA0000
direct allocation
page read and write
2850000
direct allocation
page read and write
F67000
unkown
page execute and write copy
1854000
heap
page read and write
388E000
stack
page read and write
BE0000
heap
page read and write
5570000
trusted library allocation
page read and write
4AB1000
heap
page read and write
1524000
heap
page read and write
D72000
unkown
page execute and read and write
2850000
direct allocation
page read and write
42E1000
heap
page read and write
1007000
unkown
page execute and read and write
5A70000
direct allocation
page read and write
4D26000
direct allocation
page read and write
5D0000
direct allocation
page read and write
5D0000
direct allocation
page read and write
574000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
55BC000
trusted library allocation
page read and write
740000
heap
page read and write
840000
direct allocation
page read and write
41EF000
stack
page read and write
CE2000
unkown
page execute and read and write
984000
unkown
page execute and write copy
814000
unkown
page execute and read and write
15FF000
stack
page read and write
51C0000
heap
page read and write
1854000
heap
page read and write
D88000
unkown
page execute and read and write
C54000
heap
page read and write
730000
heap
page read and write
9D3000
unkown
page execute and read and write
5546000
trusted library allocation
page read and write
1D33D000
stack
page read and write
1524000
heap
page read and write
36CF000
stack
page read and write
4861000
heap
page read and write
437E000
stack
page read and write
48F0000
direct allocation
page execute and read and write
574000
heap
page read and write
55A0000
trusted library allocation
page read and write
4A1F000
stack
page read and write
1524000
heap
page read and write
C8C000
unkown
page execute and read and write
5586000
trusted library allocation
page read and write
358F000
stack
page read and write
CB1000
unkown
page execute and write copy
5586000
trusted library allocation
page read and write
574000
heap
page read and write
5570000
trusted library allocation
page read and write
5A70000
direct allocation
page read and write
3C2E000
stack
page read and write
9F0000
heap
page read and write
52EC000
stack
page read and write
574000
heap
page read and write
3C0F000
stack
page read and write
101A000
unkown
page execute and read and write
570000
heap
page read and write
4861000
heap
page read and write
7C5000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
FA4000
unkown
page execute and write copy
FE9000
unkown
page execute and read and write
5310000
trusted library allocation
page read and write
3E7E000
stack
page read and write
7280000
heap
page read and write
5546000
trusted library allocation
page read and write
423E000
stack
page read and write
1D475000
heap
page read and write
59BA000
trusted library allocation
page read and write
B0E000
heap
page read and write
344F000
stack
page read and write
4D51000
heap
page read and write
959000
unkown
page execute and read and write
5A17000
trusted library allocation
page read and write
D8F000
unkown
page execute and write copy
1189000
heap
page read and write
5430000
heap
page read and write
FDE000
unkown
page execute and write copy
4EB1000
heap
page read and write
CE7000
unkown
page execute and read and write
35DF000
stack
page read and write
EFA000
unkown
page execute and write copy
384F000
stack
page read and write
1524000
heap
page read and write
950000
unkown
page execute and read and write
4861000
heap
page read and write
9E3000
unkown
page execute and write copy
42D0000
direct allocation
page read and write
4861000
heap
page read and write
CDE000
stack
page read and write
4F60000
direct allocation
page execute and read and write
370E000
stack
page read and write
1854000
heap
page read and write
1DC2C000
stack
page read and write
4D01000
heap
page read and write
C50000
heap
page read and write
C80000
unkown
page execute and read and write
558B000
trusted library allocation
page read and write
3BEE000
stack
page read and write
356F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
2DF0000
direct allocation
page read and write
55D5000
trusted library allocation
page read and write
23667000
heap
page read and write
42D0000
direct allocation
page read and write
1854000
heap
page read and write
398F000
stack
page read and write
4EA0000
direct allocation
page read and write
CFF000
stack
page read and write
5A70000
direct allocation
page read and write
4D51000
heap
page read and write
58D9000
trusted library allocation
page read and write
575000
heap
page read and write
D07000
unkown
page execute and write copy
1245000
heap
page read and write
237F6000
heap
page read and write
1524000
heap
page read and write
4E90000
direct allocation
page execute and read and write
B7A000
stack
page read and write
54ED000
stack
page read and write
4C51000
trusted library allocation
page read and write
23620000
trusted library allocation
page read and write
557D000
trusted library allocation
page read and write
1854000
heap
page read and write
574000
heap
page read and write
10D0000
heap
page read and write
4861000
heap
page read and write
6B4000
heap
page read and write
B07000
unkown
page execute and write copy
159E000
heap
page read and write
920000
heap
page read and write
101E000
stack
page read and write
9CF000
unkown
page execute and write copy
BA0000
heap
page read and write
1D5CE000
stack
page read and write
D89000
unkown
page execute and write copy
168E000
stack
page read and write
4ED1000
heap
page read and write
4D51000
heap
page read and write
558C000
trusted library allocation
page read and write
4CBE000
stack
page read and write
1855000
heap
page read and write
574000
heap
page read and write
E45000
heap
page read and write
446F000
stack
page read and write
1524000
heap
page read and write
4ED1000
heap
page read and write
5558000
trusted library allocation
page read and write
574000
heap
page read and write
374E000
stack
page read and write
5586000
trusted library allocation
page read and write
5A1D000
trusted library allocation
page read and write
4AB1000
heap
page read and write
AFB000
unkown
page execute and write copy
557000
heap
page read and write
4AB1000
heap
page read and write
D86000
unkown
page execute and write copy
4AB1000
heap
page read and write
E7E000
stack
page read and write
945000
heap
page read and write
3D2E000
stack
page read and write
4861000
heap
page read and write
48F0000
direct allocation
page execute and read and write
55BA000
trusted library allocation
page read and write
521F000
stack
page read and write
AF0000
direct allocation
page read and write
D20000
unkown
page execute and read and write
505C000
stack
page read and write
AE0000
heap
page read and write
30B0000
direct allocation
page read and write
52AA000
trusted library allocation
page read and write
840000
direct allocation
page read and write
930000
heap
page read and write
101A000
unkown
page execute and read and write
34DE000
stack
page read and write
5566000
trusted library allocation
page read and write
1D472000
heap
page read and write
2EFE000
stack
page read and write
4E50000
trusted library allocation
page read and write
45F1000
heap
page read and write
94E000
unkown
page execute and write copy
6B4000
heap
page read and write
C38000
unkown
page execute and read and write
52F0000
direct allocation
page execute and read and write
8240000
direct allocation
page execute and read and write
DBB000
unkown
page execute and read and write
CB3000
unkown
page execute and write copy
7370000
heap
page read and write
596F000
stack
page read and write
1D00F000
stack
page read and write
51B1000
heap
page read and write
5330000
direct allocation
page execute and read and write
30B0000
direct allocation
page read and write
5BAE000
stack
page read and write
57E0000
direct allocation
page execute and read and write
3A6F000
stack
page read and write
A90000
unkown
page read and write
1854000
heap
page read and write
945000
heap
page read and write
CB3000
unkown
page execute and write copy
37EF000
stack
page read and write
5541000
trusted library allocation
page read and write
1524000
heap
page read and write
516A000
trusted library allocation
page execute and read and write
870000
unkown
page execute and read and write
8F5000
stack
page read and write
AFB000
unkown
page execute and write copy
1D471000
heap
page read and write
5614000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
2C7E000
stack
page read and write
1524000
heap
page read and write
1854000
heap
page read and write
C61000
unkown
page execute and read and write
D0D000
unkown
page execute and read and write
AF9000
unkown
page write copy
1854000
heap
page read and write
C3E000
stack
page read and write
4D2E000
stack
page read and write
11FF000
heap
page read and write
1524000
heap
page read and write
A4D000
unkown
page execute and write copy
932000
heap
page read and write
1D491000
heap
page read and write
DD0000
heap
page read and write
1105000
heap
page read and write
4AB1000
heap
page read and write
1D491000
heap
page read and write
11BB000
heap
page read and write
54E0000
direct allocation
page execute and read and write
1175000
heap
page read and write
23720000
trusted library allocation
page read and write
C4E000
stack
page read and write
59A3000
trusted library allocation
page read and write
1854000
heap
page read and write
420F000
stack
page read and write
947000
unkown
page execute and read and write
4D51000
heap
page read and write
61ECC000
direct allocation
page read and write
4A3D000
stack
page read and write
8210000
direct allocation
page execute and read and write
1524000
heap
page read and write
F90000
unkown
page execute and read and write
34CE000
stack
page read and write
54D0000
direct allocation
page execute and read and write
1051000
unkown
page execute and write copy
5550000
trusted library allocation
page read and write
FBF000
unkown
page execute and write copy
400E000
stack
page read and write
DF3000
heap
page read and write
4861000
heap
page read and write
5566000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
8E2000
heap
page read and write
436E000
stack
page read and write
1068000
unkown
page execute and write copy
838000
unkown
page execute and read and write
4861000
heap
page read and write
42E1000
heap
page read and write
4C30000
direct allocation
page read and write
488E000
stack
page read and write
2CBF000
stack
page read and write
9E1000
unkown
page execute and read and write
4AEE000
stack
page read and write
1D451000
heap
page read and write
1D24F000
stack
page read and write
4ED1000
heap
page read and write
5568000
trusted library allocation
page read and write
4D66000
heap
page read and write
8A1C000
stack
page read and write
3D4F000
stack
page read and write
1CEAE000
stack
page read and write
45F1000
heap
page read and write
1854000
heap
page read and write
4910000
direct allocation
page execute and read and write
5A6D000
stack
page read and write
76DE000
stack
page read and write
AF9000
unkown
page write copy
5546000
trusted library allocation
page read and write
1D475000
heap
page read and write
158A000
heap
page read and write
10F9000
stack
page read and write
574000
heap
page read and write
4BBE000
stack
page read and write
41BE000
stack
page read and write
5558000
trusted library allocation
page read and write
5A14000
trusted library allocation
page read and write
310E000
stack
page read and write
4D51000
heap
page read and write
1D475000
heap
page read and write
384E000
stack
page read and write
558F000
trusted library allocation
page read and write
5200000
heap
page read and write
D60000
direct allocation
page execute and read and write
599E000
trusted library allocation
page read and write
267F000
stack
page read and write
5970000
trusted library allocation
page read and write
2E4F000
stack
page read and write
42D0000
direct allocation
page read and write
44AE000
stack
page read and write
DDB000
unkown
page execute and read and write
30BE000
stack
page read and write
89E000
stack
page read and write
1524000
heap
page read and write
61E01000
direct allocation
page execute read
DC1000
heap
page read and write
1854000
heap
page read and write
4ED1000
heap
page read and write
1D491000
heap
page read and write
10AE000
stack
page read and write
57DE000
stack
page read and write
E2E000
heap
page read and write
5546000
trusted library allocation
page read and write
43CE000
stack
page read and write
559D000
trusted library allocation
page read and write
470F000
stack
page read and write
1854000
heap
page read and write
474F000
stack
page read and write
708E000
stack
page read and write
EE8000
unkown
page execute and read and write
40CE000
stack
page read and write
439F000
stack
page read and write
54C2000
trusted library allocation
page read and write
4A8F000
stack
page read and write
981000
unkown
page execute and write copy
58D3000
trusted library allocation
page read and write
58D6000
trusted library allocation
page read and write
55DA000
trusted library allocation
page read and write
1CC2F000
stack
page read and write
4861000
heap
page read and write
There are 3902 hidden memdumps, click here to show them.