IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DocumentsKKFHJJDHJE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBKFIECBGDHJKECAKFBG
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\DBKKFCBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\DGIJDAFCFHIEHJJKEHJKKJKFCG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHJDBAKEHDHDGCAKKJJECAEHIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIEBAECAKKFCBFIEGCBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJKJJKFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJKJJKFHIJKKFHJJECBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\0b7df35e6b.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\04da2633-f1fd-43e4-8a21-b8f4942722e5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\1ac0fe8b-98ac-425f-bd69-64d65b932708.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\24f6452a-daef-41b5-96fe-6352daa699a2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\36159153-ee90-4566-b35c-f96a0bedcb3d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7e428a19-c6b1-421a-a950-1e2ed5e17026.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\8eb900c7-cd19-442e-a8bf-1e5b7f336876.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6732C883-1DB4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\0eb9394e-ff4c-4db1-9138-3520b8cbfd10.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\27ae1031-e137-4fd4-8bdf-891360a9f509.tmp
Unicode text, UTF-8 text, with very long lines (17511), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2ade39e2-56e6-46a2-830c-ebdb7b4e00b2.tmp
Unicode text, UTF-8 text, with very long lines (17467), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\419d9886-bb13-4171-9ca0-6ef37c09b8a6.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\5419e88a-adc0-49ff-ae13-35268356226b.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\58232a9a-8a15-4a24-80b0-1483155d0606.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\6bb416aa-b70b-42ee-8fe5-9998a07a4818.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\83b169d2-2a6a-47b5-8dd5-f029f424e486.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000004.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old~RF635f7.TMP (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\57ecc085-f51b-4d60-91db-9344d37f81ee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\86278981-0dc7-49f2-aa0a-dba6dea470a7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8946ec99-768d-429d-875e-dea276ad77c4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\90b2b690-5f7d-40fb-8a65-3b8fd605cfb5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9dae5d05-9229-48c1-b8a7-e3bda2404416.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9f7b49e8-4b3a-4753-9e4f-da8c6ae105e0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3d40a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF4848e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3738b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF383a8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF388b9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\afe8f5e8-61b6-48df-a425-2e3021b4467c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e19c162c-e861-4cc4-9419-6b04a23a134e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3ae42.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3fbe5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF47135.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF569fc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3ae52.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF3de4b.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13375854982365863
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\4a4ae8bc-1477-46b5-bc57-58096c053fb6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\863e4bb3-cc68-4cb4-938d-177f402eaefb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\8ffb3307-2183-48bd-b6aa-547ddb9715bb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF3d40a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF383a8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF388a9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\c5383577-1235-4652-8be2-5e03dcdfd8b2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\d3804889-8959-4e2c-bc0b-5c4204879866.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\f58b0cc2-05c9-48b0-a20c-8a4b87e1c6b2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d9ae66fd-24f2-4309-8f18-358b20af71e8.tmp
Unicode text, UTF-8 text, with very long lines (17467), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fc9532fc-bb60-4184-affd-724a18325120.tmp
Unicode text, UTF-8 text, with very long lines (17302), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\uu_host_config
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35e6d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35e7c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF35fe4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF386c5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3b130.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF470f6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4cddb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Safe Browsing\ChromeExtMalware.store (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Safe Browsing\ChromeExtMalware.store_new
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b46f1cd4-89b7-4ef9-a0ea-b76a15e8e6c1.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cc5d34ef-4ef9-426d-b063-b1bbd231ccd1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d5ac020a-aebd-4d44-b262-b5bc4c66d6fb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\318e3f0d-5d75-4df0-a159-0f924ace2909.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\561d714d-8b73-46b8-a7a5-c0c6dec43cda.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
dropped
C:\Users\user\AppData\Local\Temp\8fe5c202-79f9-4cd6-abb9-1d9b4db7adc3.tmp
PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\a595c471-88e5-4ced-a044-47ab9b5db4fe.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\e184de20-023a-4b25-ac15-eb3fb9f57242.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\ef1dc176-401e-43e9-ad72-ea9c7a12ae32.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\fdf13ff5-b138-49fc-83a3-91a96cd2f256.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_1087970802\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_1087970802\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_1087970802\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_1087970802\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_1087970802\e184de20-023a-4b25-ac15-eb3fb9f57242.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\318e3f0d-5d75-4df0-a159-0f924ace2909.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3700)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7604_708265191\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3705)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 02:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 02:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 02:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 02:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 02:16:12 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 481
ASCII text, with very long lines (806)
downloaded
Chrome Cache Entry: 482
ASCII text
downloaded
Chrome Cache Entry: 483
ASCII text, with very long lines (2586)
downloaded
Chrome Cache Entry: 484
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 485
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 486
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 487
SVG Scalable Vector Graphics image
downloaded
There are 307 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2468,i,9010662023818967337,633821691604264158,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2384 --field-trial-handle=2272,i,4234674185998409260,14968440290585213701,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2956 --field-trial-handle=2372,i,11112093602853400698,17986808643466300241,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7268 --field-trial-handle=2372,i,11112093602853400698,17986808643466300241,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=5360 --field-trial-handle=2372,i,11112093602853400698,17986808643466300241,262144 /prefetch:8
malicious
C:\Users\user\DocumentsKKFHJJDHJE.exe
"C:\Users\user\DocumentsKKFHJJDHJE.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe
"C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7120 --field-trial-handle=2372,i,11112093602853400698,17986808643466300241,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe
"C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe
"C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe
"C:\Users\user\AppData\Local\Temp\1005680001\f0388bf2aa.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe
"C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe
"C:\Users\user\AppData\Local\Temp\1005682001\0b7df35e6b.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6316 --field-trial-handle=2372,i,11112093602853400698,17986808643466300241,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\DocumentsKKFHJJDHJE.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://edgeassetservice.azure
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
https://ntp.msn.com/0
unknown
https://ntp.msn.com/_default
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1731381392836&w=0&anoncknm=app_anon&NoResponseBody=true
20.189.173.16
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ntp.msn.cn/edge/ntp
unknown
http://185.215.113.206/ws
unknown
http://185.215.113.43/Zu7JuNko/index.phpnu
unknown
https://aefd.nelreports.net/api/report?cat=bingcsp
unknown
https://deff.nelreports.net/api/report
unknown
https://docs.google.com/
unknown
https://www.youtube.com
unknown
https://deff.nelreports.net/api/report?cat=msnw
unknown
https://mail.google.com
unknown
https://www.instagram.com
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
http://185.215.113.206;
unknown
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
https://outlook.office.com/mail/compose?isExtension=true
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
https://web.telegram.org/
unknown
https://drive-daily-2.corp.google.com/
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://drive-daily-5.corp.google.com/
unknown
https://plus.google.com
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
23.218.232.186
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
172.217.18.14
http://185.215.113.206/68b591d6548ec281/msvcp140.dlla
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://srtb.msn.cn/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://msn.comXIDv10
unknown
https://chrome.google.com/webstore/
unknown
https://bard.google.com/
unknown
https://assets.msn.cn/resolver/
unknown
https://www.officeplus.cn/?sid=shoreline&endpoint=OPPC&source=OPCNs
unknown
https://browser.events.data.msn.com/
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.phpT
unknown
https://www.office.com
unknown
https://outlook.live.com/mail/0/
unknown
http://185.215.113.43/Zu7JuNko/index.phpncoded?
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.phpe
unknown
https://ntp.msn.com/edge/ntp
unknown
http://185.215.113.206/c4becf79229cb002.phpk
unknown
https://assets.msn.com/resolver/
unknown
https://web.skype.com/?
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
https://tidal.com/
unknown
https://ntp.msn.com
unknown
http://185.215.113.206/c4becf79229cb002.phpu
unknown
http://185.215.113.206/c4becf79229cb002.phpy
unknown
https://gaana.com/
unknown
http://185.215.113.43/lfons
unknown
https://outlook.live.com/mail/compose?isExtension=true
unknown
http://185.215.113.206/J?
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
https://outlook.office.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true
unknown
https://apis.google.com
unknown
http://185.215.113.43/Zu7JuNko/index.php-
unknown
https://domains.google.com/suggest/flow
unknown
http://185.215.113.16/steam/random.exe61395d
unknown
https://latest.web.skype.com/?browsername=edge_canary_shoreline
unknown
https://word.new?from=EdgeM365Shoreline
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://mail.google.com/mail/mu/mp/266/#tl/Inbox
unknown
http://185.215.113.43/Zu7JuNko/index.phpnI
unknown
https://drive-autopush.corp.google.com/
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1731381393830&w=0&anoncknm=app_anon&NoResponseBody=true
20.189.173.16
http://185.215.113.16/steam/random.exe
185.215.113.16
https://outlook.office.com/mail/inbox?isExtension=true&sharedHeader=1&client_flight=outlookedge
unknown
http://185.215.113.206/SSC:
unknown
https://open.spotify.com
unknown
https://twitter.com/
unknown
https://m.vk.com/
unknown
http://185.215.113.43/Zu7JuNko/index.phpdedF
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.100
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://drive-daily-6.corp.google.com/
unknown
https://drive-daily-0.corp.google.com/
unknown
https://www.iheart.com/podcast/
unknown
https://music.yandex.com
unknown
http://185.215.113.43/Zu7JuNko/index.php2001
unknown
http://185.215.113.43/Zu7JuNko/index.phpc
unknown
https://clients2.googleusercontent.com
unknown
http://185.215.113.206/c4becf79229cb002.phpsoft
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
plus.l.google.com
172.217.18.14
play.google.com
172.217.18.14
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.244.18.38
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.185.100
googlehosted.l.googleusercontent.com
142.250.184.225
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
apis.google.com
unknown
api.msn.com
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
23.218.232.186
unknown
United States
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
142.250.185.100
www.google.com
United States
20.125.209.212
unknown
United States
162.159.61.3
chrome.cloudflare-dns.com
United States
142.250.184.225
googlehosted.l.googleusercontent.com
United States
104.40.82.182
unknown
United States
185.215.113.16
unknown
Portugal
18.244.18.38
sb.scorecardresearch.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
20.1.248.118
unknown
United States
23.198.7.182
unknown
United States
23.198.7.181
unknown
United States
172.217.18.14
plus.l.google.com
United States
152.195.19.97
unknown
United States
18.161.170.14
unknown
United States
20.189.173.16
unknown
United States
204.79.197.219
unknown
United States
172.64.41.3
unknown
United States
23.221.22.210
unknown
United States
23.47.50.115
unknown
United States
13.107.246.57
unknown
United States
23.198.7.174
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
There are 18 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
f0388bf2aa.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
0b7df35e6b.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197722
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197722
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197722
WindowTabManagerFileMappingId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 106 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8B1000
unkown
page execute and read and write
malicious
981000
unkown
page execute and read and write
malicious
194E000
heap
page read and write
malicious
16AB000
heap
page read and write
malicious
5330000
direct allocation
page read and write
malicious
138B000
heap
page read and write
malicious
981000
unkown
page execute and read and write
malicious
4EC0000
direct allocation
page read and write
malicious
981000
unkown
page execute and read and write
malicious
C61000
unkown
page execute and read and write
malicious
12FE000
heap
page read and write
malicious
5E1000
unkown
page execute and read and write
malicious
4FB0000
direct allocation
page read and write
malicious
5450000
direct allocation
page read and write
malicious
8B1000
unkown
page execute and read and write
malicious
1DA97000
heap
page read and write
11E4000
heap
page read and write
4CEE000
stack
page read and write
EF4000
heap
page read and write
3A8F000
stack
page read and write
1930000
direct allocation
page read and write
ABB000
unkown
page execute and write copy
D0E000
stack
page read and write
50AE000
stack
page read and write
1DABC000
heap
page read and write
398000
unkown
page execute and read and write
DEB000
heap
page read and write
AFC000
unkown
page execute and read and write
11E4000
heap
page read and write
2EFE000
stack
page read and write
1122000
unkown
page execute and read and write
1371000
heap
page read and write
4B10000
direct allocation
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
49CE000
stack
page read and write
546F000
stack
page read and write
3C7F000
stack
page read and write
11E4000
heap
page read and write
4FD1000
heap
page read and write
3D6E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
11E4000
heap
page read and write
1DAAD000
heap
page read and write
EF4000
heap
page read and write
8DF000
unkown
page execute and write copy
4A41000
heap
page read and write
47FE000
stack
page read and write
4D40000
heap
page read and write
4421000
heap
page read and write
4E80000
direct allocation
page read and write
2EB7000
heap
page read and write
330E000
stack
page read and write
1DB20000
heap
page read and write
136E000
stack
page read and write
32BE000
stack
page read and write
50B0000
trusted library allocation
page execute and read and write
50EF000
stack
page read and write
2E5E000
stack
page read and write
372E000
stack
page read and write
EF5000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
FD4000
heap
page read and write
D64000
heap
page read and write
54E0000
direct allocation
page execute and read and write
1554000
heap
page read and write
4A30000
direct allocation
page execute and read and write
513E000
stack
page read and write
2EA0000
direct allocation
page read and write
4E91000
heap
page read and write
1764000
heap
page read and write
1555000
heap
page read and write
31EF000
stack
page read and write
B25000
unkown
page execute and read and write
4FD1000
heap
page read and write
424000
unkown
page execute and write copy
7EE8000
heap
page read and write
EF4000
heap
page read and write
BC7000
unkown
page execute and write copy
4E91000
heap
page read and write
12BE000
stack
page read and write
1764000
heap
page read and write
1D3BF000
stack
page read and write
5360000
direct allocation
page execute and read and write
4421000
heap
page read and write
7FF000
unkown
page execute and read and write
EF5000
heap
page read and write
7EE0000
heap
page read and write
1554000
heap
page read and write
3FCE000
stack
page read and write
38BF000
stack
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
4B10000
direct allocation
page read and write
4B20000
heap
page read and write
50D0000
heap
page read and write
118B000
heap
page read and write
4B21000
heap
page read and write
D64000
heap
page read and write
B9A000
unkown
page execute and read and write
3B8F000
stack
page read and write
3E6000
unkown
page execute and write copy
A9C000
unkown
page execute and read and write
EF4000
heap
page read and write
1554000
heap
page read and write
4E91000
heap
page read and write
1370000
direct allocation
page read and write
4421000
heap
page read and write
4FD7000
heap
page read and write
D2E000
heap
page read and write
BA0000
unkown
page execute and write copy
CFA000
stack
page read and write
E81000
unkown
page execute and write copy
4B10000
direct allocation
page read and write
1DA99000
heap
page read and write
D64000
heap
page read and write
61E00000
direct allocation
page execute and read and write
103C000
unkown
page execute and read and write
E57000
heap
page read and write
1370000
direct allocation
page read and write
EF4000
heap
page read and write
41BE000
stack
page read and write
4DB0000
direct allocation
page execute and read and write
4E91000
heap
page read and write
43EF000
stack
page read and write
4A60000
heap
page read and write
1554000
heap
page read and write
11E4000
heap
page read and write
BCC000
unkown
page execute and read and write
8A0000
direct allocation
page read and write
11E4000
heap
page read and write
E72000
unkown
page execute and read and write
484F000
stack
page read and write
EF4000
heap
page read and write
1DAAE000
heap
page read and write
51C0000
direct allocation
page read and write
344E000
stack
page read and write
D64000
heap
page read and write
4A41000
heap
page read and write
1554000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
EF4000
heap
page read and write
1554000
heap
page read and write
FD4000
heap
page read and write
DE5000
heap
page read and write
4421000
heap
page read and write
1370000
direct allocation
page read and write
BA0000
unkown
page execute and write copy
12EE000
stack
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
174C000
stack
page read and write
410E000
stack
page read and write
1554000
heap
page read and write
DEB000
heap
page read and write
EF4000
heap
page read and write
4D90000
direct allocation
page execute and read and write
38FE000
stack
page read and write
1F0000
unkown
page readonly
4E91000
heap
page read and write
54D0000
direct allocation
page execute and read and write
61ED3000
direct allocation
page read and write
389000
unkown
page execute and write copy
470F000
stack
page read and write
4421000
heap
page read and write
1DA87000
heap
page read and write
1D38D000
stack
page read and write
4A41000
heap
page read and write
6B50000
heap
page read and write
4421000
heap
page read and write
474E000
stack
page read and write
1120000
direct allocation
page read and write
1D3FE000
stack
page read and write
BB8000
unkown
page execute and read and write
4B21000
heap
page read and write
B1C000
stack
page read and write
AB0000
unkown
page execute and write copy
919000
unkown
page write copy
4A3F000
stack
page read and write
35AF000
stack
page read and write
3407000
heap
page read and write
4421000
heap
page read and write
BAE000
unkown
page execute and write copy
1DABA000
heap
page read and write
5130000
heap
page execute and read and write
39EF000
stack
page read and write
EF4000
heap
page read and write
41CF000
stack
page read and write
46CF000
stack
page read and write
69DD000
heap
page read and write
3D5F000
stack
page read and write
4E91000
heap
page read and write
3D4E000
stack
page read and write
4B21000
heap
page read and write
EF4000
heap
page read and write
A7E000
unkown
page execute and read and write
4A1E000
stack
page read and write
470E000
stack
page read and write
3B1E000
stack
page read and write
335F000
stack
page read and write
642000
unkown
page execute and read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
4C60000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
397E000
stack
page read and write
11E4000
heap
page read and write
198E000
heap
page read and write
63FE000
stack
page read and write
34FF000
stack
page read and write
4B25000
heap
page read and write
4A41000
heap
page read and write
AB8000
unkown
page execute and write copy
3D4E000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
43AE000
stack
page read and write
1554000
heap
page read and write
414000
unkown
page execute and write copy
4FD1000
heap
page read and write
5350000
direct allocation
page execute and read and write
EF5000
heap
page read and write
51D1000
heap
page read and write
642000
unkown
page execute and write copy
EF4000
heap
page read and write
1DA99000
heap
page read and write
11CC000
stack
page read and write
1DAB9000
heap
page read and write
ABB000
unkown
page execute and write copy
412000
unkown
page execute and write copy
32FF000
stack
page read and write
1DABC000
heap
page read and write
AA9000
unkown
page execute and read and write
385F000
stack
page read and write
5480000
direct allocation
page execute and read and write
124E000
stack
page read and write
3B4000
unkown
page execute and write copy
4C84000
trusted library allocation
page read and write
2EA0000
direct allocation
page read and write
6B4E000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
1DA93000
heap
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
A16000
unkown
page execute and read and write
1554000
heap
page read and write
890000
heap
page read and write
3ED000
unkown
page execute and read and write
398E000
stack
page read and write
965000
stack
page read and write
4EA5000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
912000
unkown
page execute and write copy
4A80000
direct allocation
page execute and read and write
1554000
heap
page read and write
362E000
stack
page read and write
91B000
unkown
page execute and write copy
D64000
heap
page read and write
EF5000
heap
page read and write
812000
unkown
page execute and read and write
4B21000
heap
page read and write
3B5000
unkown
page execute and read and write
D64000
heap
page read and write
49DF000
stack
page read and write
2C6F000
stack
page read and write
3B7E000
stack
page read and write
4B21000
heap
page read and write
1DA99000
heap
page read and write
EF4000
heap
page read and write
EF5000
heap
page read and write
7EE4000
heap
page read and write
11BE000
stack
page read and write
38AF000
stack
page read and write
BA2000
unkown
page execute and write copy
1D48E000
stack
page read and write
E7E000
stack
page read and write
2C7E000
stack
page read and write
55F0000
heap
page read and write
3D6000
unkown
page execute and read and write
EF4000
heap
page read and write
3FAF000
stack
page read and write
3EEE000
stack
page read and write
1554000
heap
page read and write
EF5000
heap
page read and write
4FC4000
trusted library allocation
page read and write
35DF000
stack
page read and write
3F3E000
stack
page read and write
E68000
unkown
page execute and read and write
1554000
heap
page read and write
7C0000
unkown
page execute and read and write
475F000
stack
page read and write
1FA000
unkown
page execute and write copy
4A40000
heap
page read and write
EF4000
heap
page read and write
466F000
stack
page read and write
EF4000
heap
page read and write
2FEF000
stack
page read and write
6975000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
18AE000
stack
page read and write
36CE000
stack
page read and write
11E4000
heap
page read and write
1D90C000
stack
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
4E8C000
stack
page read and write
452F000
stack
page read and write
37FF000
stack
page read and write
8F5000
stack
page read and write
852000
unkown
page execute and write copy
BA2000
unkown
page execute and write copy
ACA000
unkown
page execute and write copy
EF4000
heap
page read and write
1DA7B000
heap
page read and write
1DA87000
heap
page read and write
EF4000
heap
page read and write
1DA9A000
heap
page read and write
453F000
stack
page read and write
4BDB000
stack
page read and write
1554000
heap
page read and write
35EF000
stack
page read and write
1554000
heap
page read and write
609E000
stack
page read and write
552E000
stack
page read and write
1DA93000
heap
page read and write
3EAF000
stack
page read and write
A16000
unkown
page execute and read and write
EF4000
heap
page read and write
1DA86000
heap
page read and write
3EFF000
stack
page read and write
4E80000
direct allocation
page read and write
EF4000
heap
page read and write
494000
unkown
page execute and write copy
AFC000
unkown
page execute and read and write
4B21000
heap
page read and write
11E4000
heap
page read and write
23C40000
heap
page read and write
1120000
direct allocation
page read and write
39FF000
stack
page read and write
4FD1000
heap
page read and write
343F000
stack
page read and write
396F000
stack
page read and write
1FA000
unkown
page execute and read and write
376000
unkown
page execute and read and write
4B21000
heap
page read and write
51A0000
heap
page read and write
4FD1000
heap
page read and write
4E91000
heap
page read and write
4432000
heap
page read and write
EF4000
heap
page read and write
2F40000
heap
page read and write
82C000
unkown
page execute and read and write
723D000
stack
page read and write
3AB000
unkown
page execute and read and write
51D1000
heap
page read and write
EF5000
heap
page read and write
1554000
heap
page read and write
2E97000
heap
page read and write
3AEE000
stack
page read and write
C60000
unkown
page read and write
8DE000
unkown
page execute and read and write
3F2E000
stack
page read and write
4FD1000
heap
page read and write
51D1000
heap
page read and write
1410000
heap
page read and write
1F2000
unkown
page execute and write copy
1554000
heap
page read and write
4A6000
unkown
page execute and write copy
1320000
heap
page read and write
380F000
stack
page read and write
1CF7E000
stack
page read and write
C13000
stack
page read and write
EF4000
heap
page read and write
980000
unkown
page readonly
DC7000
unkown
page execute and read and write
4E91000
heap
page read and write
B59000
unkown
page execute and write copy
41BE000
stack
page read and write
11E4000
heap
page read and write
1930000
direct allocation
page read and write
536E000
stack
page read and write
344F000
stack
page read and write
A9C000
unkown
page execute and write copy
1554000
heap
page read and write
4B21000
heap
page read and write
4E91000
heap
page read and write
A0E000
unkown
page execute and read and write
1554000
heap
page read and write
4B23000
heap
page read and write
4F90000
heap
page read and write
B5B000
unkown
page execute and read and write
5330000
direct allocation
page read and write
3BEF000
stack
page read and write
EF4000
heap
page read and write
1CEFF000
stack
page read and write
4A41000
heap
page read and write
2FAE000
stack
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
4A41000
heap
page read and write
4421000
heap
page read and write
4770000
direct allocation
page read and write
1554000
heap
page read and write
177F000
stack
page read and write
DD8000
heap
page read and write
11E5000
heap
page read and write
1764000
heap
page read and write
11E4000
heap
page read and write
EF4000
heap
page read and write
4E40000
direct allocation
page read and write
30F0000
direct allocation
page read and write
4860000
trusted library allocation
page read and write
EF4000
heap
page read and write
549B000
trusted library allocation
page execute and read and write
424E000
stack
page read and write
1110000
heap
page read and write
4E20000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
981000
unkown
page execute and write copy
1120000
direct allocation
page read and write
1D4FF000
stack
page read and write
4A6000
unkown
page execute and write copy
23D07000
heap
page read and write
4421000
heap
page read and write
4A41000
heap
page read and write
D8E000
stack
page read and write
303E000
stack
page read and write
1FA000
unkown
page execute and write copy
1554000
heap
page read and write
48EC000
stack
page read and write
412E000
stack
page read and write
46BE000
stack
page read and write
347E000
stack
page read and write
397000
unkown
page execute and write copy
494000
unkown
page execute and write copy
EF4000
heap
page read and write
404000
unkown
page execute and write copy
3E8000
unkown
page execute and read and write
494F000
stack
page read and write
48D000
unkown
page execute and write copy
433F000
stack
page read and write
1029000
unkown
page execute and write copy
43AF000
stack
page read and write
2A0E000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
4A6000
unkown
page execute and write copy
1DABA000
heap
page read and write
55E0000
direct allocation
page execute and read and write
1F6000
unkown
page write copy
4E91000
heap
page read and write
54B0000
direct allocation
page execute and read and write
4B21000
heap
page read and write
48B0000
direct allocation
page read and write
456E000
stack
page read and write
390F000
stack
page read and write
3BC000
unkown
page execute and write copy
6C651000
unkown
page execute read
5E0000
unkown
page readonly
2CE0000
heap
page read and write
B39000
unkown
page execute and read and write
B30000
unkown
page execute and write copy
1D7CD000
stack
page read and write
40CF000
stack
page read and write
11E4000
heap
page read and write
1764000
heap
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
EF4000
heap
page read and write
4D0F000
stack
page read and write
1764000
heap
page read and write
462F000
stack
page read and write
416F000
stack
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
1554000
heap
page read and write
40BF000
stack
page read and write
8A0000
direct allocation
page read and write
1D63E000
stack
page read and write
1370000
direct allocation
page read and write
1DAB8000
heap
page read and write
4421000
heap
page read and write
1DA7D000
heap
page read and write
42D000
unkown
page execute and write copy
4AA0000
direct allocation
page execute and read and write
EF4000
heap
page read and write
2E2F000
stack
page read and write
1554000
heap
page read and write
1DAAE000
heap
page read and write
8B0000
unkown
page read and write
3F3E000
stack
page read and write
1B3E000
stack
page read and write
11E4000
heap
page read and write
3AB000
unkown
page execute and read and write
4FCF000
stack
page read and write
E82000
unkown
page execute and write copy
D10000
heap
page read and write
5050000
direct allocation
page execute and read and write
AB1000
unkown
page execute and read and write
5486000
direct allocation
page read and write
4E91000
heap
page read and write
11F8000
heap
page read and write
8DE0000
heap
page read and write
32CF000
stack
page read and write
B20000
unkown
page execute and write copy
4B21000
heap
page read and write
1DB90000
trusted library allocation
page read and write
3EDE000
stack
page read and write
1991000
heap
page read and write
7B6E000
stack
page read and write
4ACE000
stack
page read and write
11E4000
heap
page read and write
A0E000
unkown
page execute and read and write
16AE000
stack
page read and write
1370000
direct allocation
page read and write
D64000
heap
page read and write
51D1000
heap
page read and write
23C40000
trusted library allocation
page read and write
EF4000
heap
page read and write
4A41000
heap
page read and write
548C000
stack
page read and write
1DA9F000
heap
page read and write
4FD1000
heap
page read and write
11E4000
heap
page read and write
1D7CD000
stack
page read and write
EF4000
heap
page read and write
BB9000
unkown
page execute and write copy
1339000
stack
page read and write
ACF000
unkown
page execute and read and write
BAE000
unkown
page execute and read and write
AB8000
unkown
page execute and write copy
4B21000
heap
page read and write
1FA000
unkown
page execute and read and write
4F90000
trusted library allocation
page read and write
1161000
unkown
page execute and write copy
5701000
trusted library allocation
page read and write
11E4000
heap
page read and write
1DA99000
heap
page read and write
EF4000
heap
page read and write
D64000
heap
page read and write
4C0E000
stack
page read and write
1554000
heap
page read and write
4421000
heap
page read and write
1550000
direct allocation
page read and write
CF9000
stack
page read and write
434F000
stack
page read and write
D64000
heap
page read and write
1DAAC000
heap
page read and write
D64000
heap
page read and write
4420000
heap
page read and write
8A0000
direct allocation
page read and write
1D2BE000
stack
page read and write
42F000
unkown
page execute and read and write
7AE000
unkown
page execute and read and write
11E4000
heap
page read and write
4E90000
heap
page read and write
3ACE000
stack
page read and write
4A30000
direct allocation
page execute and read and write
EF4000
heap
page read and write
3B6E000
stack
page read and write
426000
unkown
page execute and read and write
4FD1000
heap
page read and write
AB9000
unkown
page execute and read and write
EF4000
heap
page read and write
444F000
stack
page read and write
3BC000
unkown
page execute and write copy
13F8000
heap
page read and write
368000
unkown
page execute and write copy
6969000
heap
page read and write
EF4000
heap
page read and write
476E000
stack
page read and write
1930000
direct allocation
page read and write
11E4000
heap
page read and write
1F0000
unkown
page read and write
4DF0000
direct allocation
page execute and read and write
4B30000
heap
page read and write
49BE000
stack
page read and write
4FE6000
direct allocation
page read and write
83A000
unkown
page execute and write copy
23F5C000
heap
page read and write
5141000
trusted library allocation
page read and write
EAC000
unkown
page execute and read and write
3D2000
unkown
page execute and write copy
336F000
stack
page read and write
EF4000
heap
page read and write
D64000
heap
page read and write
3A8000
unkown
page execute and write copy
1DABA000
heap
page read and write
1F2000
unkown
page execute and write copy
EF4000
heap
page read and write
6701000
trusted library allocation
page read and write
63D5000
trusted library allocation
page read and write
23F50000
heap
page read and write
3B7E000
stack
page read and write
2FFF000
stack
page read and write
5130000
direct allocation
page execute and read and write
EF4000
heap
page read and write
4B21000
heap
page read and write
B39000
unkown
page execute and read and write
451E000
stack
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
452E000
stack
page read and write
1370000
direct allocation
page read and write
FD4000
heap
page read and write
8E7000
unkown
page execute and read and write
1554000
heap
page read and write
8E9000
unkown
page execute and write copy
1DB9D000
heap
page read and write
498F000
stack
page read and write
5340000
direct allocation
page execute and read and write
1764000
heap
page read and write
E03000
heap
page read and write
9B7000
unkown
page execute and read and write
3D6000
unkown
page execute and read and write
7CC000
unkown
page execute and read and write
78BE000
stack
page read and write
4E91000
heap
page read and write
558F000
stack
page read and write
EF4000
heap
page read and write
FD4000
heap
page read and write
1554000
heap
page read and write
8A0000
direct allocation
page read and write
6C6DE000
unkown
page read and write
1D46D000
stack
page read and write
4FB0000
direct allocation
page read and write
49EF000
stack
page read and write
4421000
heap
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
54A0000
direct allocation
page execute and read and write
7D9000
unkown
page execute and read and write
EF4000
heap
page read and write
3AA000
unkown
page execute and write copy
4421000
heap
page read and write
86A000
unkown
page execute and write copy
1162000
unkown
page execute and write copy
317E000
stack
page read and write
EF5000
heap
page read and write
402E000
stack
page read and write
3BBF000
stack
page read and write
7EB000
unkown
page execute and write copy
30FF000
stack
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
30F0000
direct allocation
page read and write
2C2F000
stack
page read and write
5304000
trusted library allocation
page read and write
39D000
unkown
page execute and read and write
3A9000
unkown
page execute and read and write
4E80000
direct allocation
page read and write
1554000
heap
page read and write
10BC000
stack
page read and write
BC7000
unkown
page execute and write copy
F65000
heap
page read and write
981000
unkown
page execute and write copy
4B21000
heap
page read and write
EF4000
heap
page read and write
534D000
stack
page read and write
3A8000
unkown
page execute and write copy
7E8000
unkown
page execute and write copy
EF4000
heap
page read and write
1764000
heap
page read and write
4E91000
heap
page read and write
FD4000
heap
page read and write
EF4000
heap
page read and write
1DABC000
heap
page read and write
2EAF000
stack
page read and write
D64000
heap
page read and write
D64000
heap
page read and write
60B0000
heap
page read and write
175F000
stack
page read and write
413000
unkown
page execute and read and write
1309000
unkown
page execute and write copy
4C0F000
stack
page read and write
33EE000
stack
page read and write
4421000
heap
page read and write
2E8F000
stack
page read and write
34AF000
stack
page read and write
53B1000
trusted library allocation
page read and write
320F000
stack
page read and write
EF4000
heap
page read and write
2EF7000
heap
page read and write
51C0000
direct allocation
page read and write
1308000
unkown
page execute and read and write
55A0000
direct allocation
page execute and read and write
13BE000
stack
page read and write
4790000
heap
page read and write
1F0000
unkown
page read and write
5330000
direct allocation
page read and write
5F0000
heap
page read and write
E00000
heap
page read and write
8F7000
unkown
page execute and write copy
5110000
direct allocation
page execute and read and write
63B4000
trusted library allocation
page read and write
12D0000
heap
page read and write
5130000
direct allocation
page execute and read and write
EF4000
heap
page read and write
BAF000
unkown
page execute and write copy
D64000
heap
page read and write
912000
unkown
page execute and read and write
2EEE000
stack
page read and write
11E4000
heap
page read and write
649000
unkown
page write copy
4421000
heap
page read and write
EF4000
heap
page read and write
FD4000
heap
page read and write
11E4000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4DC0000
direct allocation
page execute and read and write
1DAAD000
heap
page read and write
2DAE000
stack
page read and write
4B21000
heap
page read and write
536C000
stack
page read and write
EF4000
heap
page read and write
4E91000
heap
page read and write
1DA8B000
heap
page read and write
357F000
stack
page read and write
1D4FF000
stack
page read and write
4B21000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
3A2E000
stack
page read and write
EF4000
heap
page read and write
4A41000
heap
page read and write
1554000
heap
page read and write
3F8F000
stack
page read and write
313F000
stack
page read and write
3E4E000
stack
page read and write
44BE000
stack
page read and write
4B21000
heap
page read and write
CCF000
stack
page read and write
54B0000
trusted library allocation
page read and write
1764000
heap
page read and write
13C8000
heap
page read and write
394E000
stack
page read and write
11E4000
heap
page read and write
1554000
heap
page read and write
318F000
stack
page read and write
33F0000
direct allocation
page read and write
513E000
stack
page read and write
363F000
stack
page read and write
DD7000
heap
page read and write
1DA94000
heap
page read and write
AF7000
unkown
page execute and write copy
460E000
stack
page read and write
4FC3000
trusted library allocation
page execute and read and write
1120000
direct allocation
page read and write
1135000
heap
page read and write
44AF000
stack
page read and write
53A0000
heap
page execute and read and write
EF4000
heap
page read and write
5366000
direct allocation
page read and write
3DFE000
stack
page read and write
8B1000
unkown
page execute and write copy
EF4000
heap
page read and write
EF4000
heap
page read and write
4D4E000
stack
page read and write
360F000
stack
page read and write
4A6000
unkown
page execute and write copy
11E4000
heap
page read and write
D64000
heap
page read and write
530E000
stack
page read and write
4421000
heap
page read and write
4B21000
heap
page read and write
3E7E000
stack
page read and write
1DA9F000
heap
page read and write
461F000
stack
page read and write
EF4000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
D6E000
heap
page read and write
BB9000
unkown
page execute and write copy
4FD1000
heap
page read and write
442E000
stack
page read and write
15BD000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
45BF000
stack
page read and write
4A4000
unkown
page execute and write copy
D64000
heap
page read and write
B7F000
unkown
page execute and read and write
AE2000
unkown
page execute and read and write
39A000
unkown
page execute and write copy
EF4000
heap
page read and write
12FA000
heap
page read and write
8B1000
unkown
page execute and write copy
2F3E000
stack
page read and write
5060000
trusted library allocation
page read and write
441000
unkown
page execute and read and write
2D6E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
1930000
direct allocation
page read and write
1554000
heap
page read and write
4FD1000
heap
page read and write
6C8CE000
unkown
page read and write
1DA9D000
heap
page read and write
4421000
heap
page read and write
3C2E000
stack
page read and write
384000
unkown
page execute and write copy
4F80000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
4FE0000
heap
page read and write
4A41000
heap
page read and write
4421000
heap
page read and write
349F000
stack
page read and write
EF4000
heap
page read and write
5330000
direct allocation
page read and write
11E4000
heap
page read and write
480F000
stack
page read and write
1554000
heap
page read and write
397000
unkown
page execute and write copy
1DA0D000
stack
page read and write
4E80000
direct allocation
page read and write
AF7000
unkown
page execute and write copy
656B000
stack
page read and write
BAE000
unkown
page execute and read and write
4C4E000
stack
page read and write
4E60000
heap
page read and write
EF4000
heap
page read and write
3FB000
unkown
page execute and read and write
FB0000
heap
page read and write
52D0000
trusted library allocation
page read and write
4FD1000
heap
page read and write
11E4000
heap
page read and write
4421000
heap
page read and write
48B0000
direct allocation
page read and write
EF5000
heap
page read and write
507E000
stack
page read and write
4E91000
heap
page read and write
869000
unkown
page execute and read and write
31FF000
stack
page read and write
42AF000
stack
page read and write
3D0E000
stack
page read and write
4FFF000
stack
page read and write
4B10000
direct allocation
page read and write
5410000
trusted library allocation
page read and write
6C8D5000
unkown
page readonly
3D3E000
stack
page read and write
3C6F000
stack
page read and write
95E000
stack
page read and write
23D9E000
stack
page read and write
57E0000
heap
page read and write
2EA0000
direct allocation
page read and write
4781000
heap
page read and write
4A4000
unkown
page execute and write copy
FD4000
heap
page read and write
4E80000
direct allocation
page read and write
51C0000
direct allocation
page read and write
5330000
direct allocation
page read and write
1764000
heap
page read and write
EF4000
heap
page read and write
4B21000
heap
page read and write
1DABA000
heap
page read and write
EF4000
heap
page read and write
DE5000
heap
page read and write
4E91000
heap
page read and write
30F0000
direct allocation
page read and write
EF4000
heap
page read and write
423E000
stack
page read and write
4E91000
heap
page read and write
9B7000
unkown
page execute and read and write
11E4000
heap
page read and write
4B21000
heap
page read and write
44EF000
stack
page read and write
11B5000
stack
page read and write
6C6CD000
unkown
page readonly
33FF000
stack
page read and write
30DF000
stack
page read and write
B03000
unkown
page execute and read and write
473E000
stack
page read and write
1A1E000
heap
page read and write
3BC000
unkown
page execute and write copy
2D6F000
stack
page read and write
4E91000
heap
page read and write
484E000
stack
page read and write
1554000
heap
page read and write
4792000
heap
page read and write
4B21000
heap
page read and write
B2F000
unkown
page execute and read and write
DE9000
heap
page read and write
4A41000
heap
page read and write
3A8F000
stack
page read and write
417F000
stack
page read and write
1764000
heap
page read and write
1DA99000
heap
page read and write
1764000
heap
page read and write
EF4000
heap
page read and write
F4C000
stack
page read and write
88B000
unkown
page execute and read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4D4F000
stack
page read and write
4A41000
heap
page read and write
38AE000
stack
page read and write
889000
unkown
page execute and write copy
BAE000
unkown
page execute and write copy
1940000
heap
page read and write
E81000
unkown
page execute and read and write
B2C000
unkown
page execute and write copy
5590000
heap
page read and write
1554000
heap
page read and write
2EA0000
direct allocation
page read and write
EF4000
heap
page read and write
A16000
unkown
page execute and read and write
783D000
stack
page read and write
2E9B000
heap
page read and write
EF4000
heap
page read and write
AB1000
unkown
page execute and read and write
1F6000
unkown
page write copy
3D2F000
stack
page read and write
16A0000
heap
page read and write
8A0000
direct allocation
page read and write
B3A000
unkown
page execute and write copy
5330000
direct allocation
page read and write
EF4000
heap
page read and write
401E000
stack
page read and write
E10000
heap
page read and write
1FA000
unkown
page execute and write copy
CE4000
unkown
page execute and read and write
62BF000
stack
page read and write
4421000
heap
page read and write
4E91000
heap
page read and write
1DAAD000
heap
page read and write
448F000
stack
page read and write
4A50000
direct allocation
page execute and read and write
EF4000
heap
page read and write
2CC0000
heap
page read and write
E82000
unkown
page execute and write copy
D74000
heap
page read and write
141E000
stack
page read and write
EF4000
heap
page read and write
23C40000
trusted library allocation
page read and write
530D000
trusted library allocation
page execute and read and write
4E97000
heap
page read and write
1554000
heap
page read and write
4421000
heap
page read and write
3C0E000
stack
page read and write
980000
unkown
page read and write
413000
unkown
page execute and read and write
1FA000
unkown
page execute and write copy
4DEF000
stack
page read and write
493E000
stack
page read and write
4770000
direct allocation
page read and write
1554000
heap
page read and write
1120000
direct allocation
page read and write
A80000
unkown
page execute and write copy
402E000
stack
page read and write
142A000
heap
page read and write
4E91000
heap
page read and write
1554000
heap
page read and write
140E000
stack
page read and write
118E000
stack
page read and write
EF4000
heap
page read and write
98B000
stack
page read and write
543D000
stack
page read and write
4FD1000
heap
page read and write
EF4000
heap
page read and write
4B21000
heap
page read and write
EF4000
heap
page read and write
382F000
stack
page read and write
4FEE000
stack
page read and write
4421000
heap
page read and write
4E91000
heap
page read and write
4C94000
trusted library allocation
page read and write
1120000
direct allocation
page read and write
1D67E000
stack
page read and write
23C60000
heap
page read and write
85C000
unkown
page execute and write copy
11E4000
heap
page read and write
4FD1000
heap
page read and write
406000
unkown
page execute and read and write
441000
unkown
page execute and read and write
348E000
stack
page read and write
4421000
heap
page read and write
B58000
unkown
page execute and read and write
1554000
heap
page read and write
82E000
unkown
page execute and write copy
FC0000
heap
page read and write
EF4000
heap
page read and write
C61000
unkown
page execute and write copy
48D000
unkown
page execute and write copy
1F6000
unkown
page write copy
4B21000
heap
page read and write
35CE000
stack
page read and write
39D000
unkown
page execute and read and write
11E4000
heap
page read and write
B2C000
unkown
page execute and write copy
4A41000
heap
page read and write
47BF000
stack
page read and write
860000
unkown
page execute and write copy
1370000
direct allocation
page read and write
38A000
unkown
page execute and read and write
59C000
stack
page read and write
EF4000
heap
page read and write
2B2F000
stack
page read and write
EF4000
heap
page read and write
4FD1000
heap
page read and write
4FD1000
heap
page read and write
50EF000
stack
page read and write
3CFF000
stack
page read and write
DE2000
heap
page read and write
38BF000
stack
page read and write
3BCF000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4A41000
heap
page read and write
EF4000
heap
page read and write
56FE000
stack
page read and write
5390000
direct allocation
page execute and read and write
4B21000
heap
page read and write
7FE000
unkown
page execute and write copy
11E4000
heap
page read and write
3DED000
stack
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
919000
unkown
page write copy
CFC000
stack
page read and write
5100000
direct allocation
page execute and read and write
4B0E000
stack
page read and write
434E000
stack
page read and write
30AE000
stack
page read and write
2EC000
stack
page read and write
D64000
heap
page read and write
4421000
heap
page read and write
A2F000
unkown
page execute and read and write
166E000
stack
page read and write
11E4000
heap
page read and write
EF4000
heap
page read and write
1DABC000
heap
page read and write
8B1000
unkown
page execute and write copy
3BCE000
stack
page read and write
980000
unkown
page readonly
EF4000
heap
page read and write
FD4000
heap
page read and write
F0E000
stack
page read and write
443E000
stack
page read and write
4770000
direct allocation
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
39EE000
stack
page read and write
1F6000
unkown
page write copy
48D000
unkown
page execute and write copy
D64000
heap
page read and write
B22000
unkown
page execute and write copy
D60000
heap
page read and write
EF5000
heap
page read and write
7E0000
unkown
page execute and write copy
30AF000
stack
page read and write
11E4000
heap
page read and write
1DA9A000
heap
page read and write
EF5000
heap
page read and write
29CC000
stack
page read and write
42BF000
stack
page read and write
11E4000
heap
page read and write
417F000
stack
page read and write
EF4000
heap
page read and write
361E000
stack
page read and write
546E000
stack
page read and write
51D0000
heap
page read and write
53F0000
direct allocation
page execute and read and write
1554000
heap
page read and write
161F000
stack
page read and write
64B000
unkown
page execute and read and write
EF4000
heap
page read and write
BCC000
unkown
page execute and read and write
BCC000
unkown
page execute and read and write
1930000
direct allocation
page read and write
8A0000
direct allocation
page read and write
A90000
unkown
page execute and read and write
33AE000
stack
page read and write
4A41000
heap
page read and write
F30000
heap
page read and write
4A30000
direct allocation
page execute and read and write
BAE000
unkown
page execute and write copy
416E000
stack
page read and write
476F000
stack
page read and write
5320000
trusted library allocation
page read and write
13DD000
heap
page read and write
39DE000
stack
page read and write
4FE0000
direct allocation
page read and write
40CE000
stack
page read and write
BC7000
unkown
page execute and read and write
4E90000
heap
page read and write
4A10000
direct allocation
page execute and read and write
E81000
unkown
page execute and read and write
30F0000
direct allocation
page read and write
EF4000
heap
page read and write
4A6000
unkown
page execute and write copy
15F2000
heap
page read and write
1764000
heap
page read and write
366E000
stack
page read and write
EF4000
heap
page read and write
4E80000
direct allocation
page read and write
EF5000
heap
page read and write
5040000
direct allocation
page execute and read and write
AD0000
unkown
page execute and write copy
1554000
heap
page read and write
B22000
unkown
page execute and write copy
D64000
heap
page read and write
37BE000
stack
page read and write
DC5000
heap
page read and write
1F0000
unkown
page readonly
1DA95000
heap
page read and write
165F000
stack
page read and write
4FB0000
trusted library allocation
page read and write
48FF000
stack
page read and write
4E80000
direct allocation
page read and write
1D90D000
stack
page read and write
EF5000
heap
page read and write
4781000
heap
page read and write
855000
unkown
page execute and read and write
4E91000
heap
page read and write
919000
unkown
page write copy
1DA99000
heap
page read and write
2ABBC000
stack
page read and write
5380000
direct allocation
page execute and read and write
41C000
unkown
page execute and read and write
4770000
direct allocation
page read and write
6725000
trusted library allocation
page read and write
4A41000
heap
page read and write
4C70000
direct allocation
page read and write
4E80000
direct allocation
page read and write
1764000
heap
page read and write
3E0F000
stack
page read and write
3A7F000
stack
page read and write
2E1F000
stack
page read and write
4770000
direct allocation
page read and write
1DA72000
heap
page read and write
3E8000
unkown
page execute and read and write
EF5000
heap
page read and write
EF5000
heap
page read and write
1554000
heap
page read and write
4D3F000
stack
page read and write
E5C000
heap
page read and write
1554000
heap
page read and write
6B40000
heap
page read and write
376E000
stack
page read and write
189F000
stack
page read and write
840000
unkown
page execute and read and write
BB8000
unkown
page execute and read and write
23BAB000
heap
page read and write
AE2000
unkown
page execute and read and write
34AE000
stack
page read and write
368F000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
51C0000
direct allocation
page read and write
4770000
direct allocation
page read and write
5480000
direct allocation
page execute and read and write
3D9E000
stack
page read and write
3E3F000
stack
page read and write
5324000
trusted library allocation
page read and write
45FE000
stack
page read and write
1028000
unkown
page execute and read and write
EF4000
heap
page read and write
6C8CF000
unkown
page write copy
EF4000
heap
page read and write
326F000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
5180000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
AD0000
unkown
page execute and write copy
11E4000
heap
page read and write
4D41000
heap
page read and write
E14000
heap
page read and write
1120000
direct allocation
page read and write
E81000
unkown
page execute and write copy
4FD1000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
3F6000
unkown
page execute and write copy
8A0000
direct allocation
page read and write
EF4000
heap
page read and write
4B21000
heap
page read and write
42EE000
stack
page read and write
51D0000
direct allocation
page read and write
4C80000
direct allocation
page execute and read and write
4FD1000
heap
page read and write
3D2000
unkown
page execute and write copy
67AE000
stack
page read and write
1D3FE000
stack
page read and write
55C0000
direct allocation
page execute and read and write
1554000
heap
page read and write
332F000
stack
page read and write
11E4000
heap
page read and write
4E91000
heap
page read and write
11E4000
heap
page read and write
4FD1000
heap
page read and write
B03000
unkown
page execute and read and write
498F000
stack
page read and write
426F000
stack
page read and write
E0B000
heap
page read and write
3ACE000
stack
page read and write
EF5000
heap
page read and write
465E000
stack
page read and write
EF5000
heap
page read and write
EF4000
heap
page read and write
39AF000
stack
page read and write
1DA87000
heap
page read and write
43EE000
stack
page read and write
438E000
stack
page read and write
1D42C000
stack
page read and write
7C6E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
553D000
stack
page read and write
46FF000
stack
page read and write
EF4000
heap
page read and write
3E9000
unkown
page execute and write copy
EF4000
heap
page read and write
EF4000
heap
page read and write
B59000
unkown
page execute and write copy
4B10000
direct allocation
page read and write
12CB000
stack
page read and write
2EA0000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
11E4000
heap
page read and write
1DAA4000
heap
page read and write
49AF000
stack
page read and write
11E4000
heap
page read and write
1554000
heap
page read and write
51E0000
heap
page read and write
4D8E000
stack
page read and write
91B000
unkown
page execute and read and write
4ACF000
stack
page read and write
B3A000
unkown
page execute and write copy
2A67000
heap
page read and write
32FF000
stack
page read and write
429E000
stack
page read and write
5060000
direct allocation
page execute and read and write
13FE000
stack
page read and write
1370000
direct allocation
page read and write
4FD1000
heap
page read and write
4770000
direct allocation
page read and write
293F000
stack
page read and write
358F000
stack
page read and write
BA2000
unkown
page execute and write copy
11E4000
heap
page read and write
3D6000
unkown
page execute and read and write
F4E000
stack
page read and write
B30000
unkown
page execute and write copy
4B21000
heap
page read and write
EF4000
heap
page read and write
1080000
heap
page read and write
380F000
stack
page read and write
EF4000
heap
page read and write
1D77F000
stack
page read and write
4FD1000
heap
page read and write
8B0000
unkown
page readonly
412F000
stack
page read and write
1D24D000
stack
page read and write
2EA0000
direct allocation
page read and write
488E000
stack
page read and write
10A0000
heap
page read and write
1DA9A000
heap
page read and write
4A90000
direct allocation
page execute and read and write
3ED000
unkown
page execute and read and write
11E4000
heap
page read and write
D64000
heap
page read and write
11E4000
heap
page read and write
4EA0000
heap
page read and write
159C000
heap
page read and write
FD4000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
ACF000
unkown
page execute and read and write
4421000
heap
page read and write
5480000
trusted library allocation
page read and write
8C9000
unkown
page execute and write copy
1554000
heap
page read and write
7E1000
unkown
page execute and read and write
4A30000
direct allocation
page execute and read and write
EF4000
heap
page read and write
43D000
unkown
page execute and write copy
1370000
direct allocation
page read and write
2EA0000
direct allocation
page read and write
1D53E000
stack
page read and write
1F2000
unkown
page execute and write copy
64B000
unkown
page execute and write copy
1554000
heap
page read and write
1764000
heap
page read and write
EF4000
heap
page read and write
424000
unkown
page execute and write copy
2A20000
heap
page read and write
1DA87000
heap
page read and write
EF4000
heap
page read and write
96E000
stack
page read and write
4E91000
heap
page read and write
33F0000
direct allocation
page read and write
1764000
heap
page read and write
8E18000
heap
page read and write
8A0000
direct allocation
page read and write
BB9000
unkown
page execute and write copy
EF4000
heap
page read and write
EF4000
heap
page read and write
41AE000
stack
page read and write
5350000
direct allocation
page execute and read and write
EF5000
heap
page read and write
EF4000
heap
page read and write
384000
unkown
page execute and read and write
2A4E000
stack
page read and write
3C5E000
stack
page read and write
3A8E000
stack
page read and write
404000
unkown
page execute and write copy
498E000
stack
page read and write
EF5000
heap
page read and write
4421000
heap
page read and write
2FBF000
stack
page read and write
494000
unkown
page execute and write copy
11E4000
heap
page read and write
4BC0000
trusted library allocation
page read and write
4421000
heap
page read and write
43D000
unkown
page execute and write copy
E82000
unkown
page execute and write copy
3F6000
unkown
page execute and write copy
4421000
heap
page read and write
EF4000
heap
page read and write
42BF000
stack
page read and write
4E91000
heap
page read and write
403F000
stack
page read and write
11E4000
heap
page read and write
4B21000
heap
page read and write
11B5000
heap
page read and write
5030000
direct allocation
page execute and read and write
403F000
stack
page read and write
55B0000
direct allocation
page execute and read and write
340B000
heap
page read and write
11E4000
heap
page read and write
30F0000
direct allocation
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
412000
unkown
page execute and write copy
4421000
heap
page read and write
1554000
heap
page read and write
51D0000
direct allocation
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
3C6E000
stack
page read and write
108E000
stack
page read and write
40FE000
stack
page read and write
4E91000
heap
page read and write
5030000
direct allocation
page execute and read and write
4FD1000
heap
page read and write
426E000
stack
page read and write
54D0000
trusted library allocation
page read and write
B0A000
unkown
page execute and write copy
60B5000
heap
page read and write
4FD1000
heap
page read and write
4B21000
heap
page read and write
1554000
heap
page read and write
B57000
unkown
page execute and write copy
B35000
unkown
page execute and read and write
5E0000
unkown
page read and write
3C2F000
stack
page read and write
EF5000
heap
page read and write
4FD1000
heap
page read and write
13C4000
heap
page read and write
4A70000
direct allocation
page execute and read and write
4A8F000
stack
page read and write
321F000
stack
page read and write
420E000
stack
page read and write
4A41000
heap
page read and write
1DAB0000
heap
page read and write
1554000
heap
page read and write
1764000
heap
page read and write
A80000
unkown
page execute and write copy
1764000
heap
page read and write
11E4000
heap
page read and write
51C0000
direct allocation
page read and write
30BF000
stack
page read and write
4C10000
direct allocation
page read and write
EF4000
heap
page read and write
1120000
direct allocation
page read and write
4E4F000
stack
page read and write
420F000
stack
page read and write
1764000
heap
page read and write
1554000
heap
page read and write
4B21000
heap
page read and write
1DA9E000
heap
page read and write
11E4000
heap
page read and write
D90000
heap
page read and write
EF4000
heap
page read and write
2EA0000
direct allocation
page read and write
3AAF000
stack
page read and write
1600000
heap
page read and write
E68000
unkown
page execute and read and write
EF4000
heap
page read and write
1070000
heap
page read and write
5490000
direct allocation
page execute and read and write
3A9000
unkown
page execute and read and write
411F000
stack
page read and write
981000
unkown
page execute and write copy
4FE0000
direct allocation
page read and write
EF4000
heap
page read and write
4B21000
heap
page read and write
358E000
stack
page read and write
1554000
heap
page read and write
4E91000
heap
page read and write
4B21000
heap
page read and write
3FCE000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
497F000
stack
page read and write
5310000
heap
page read and write
4E91000
heap
page read and write
414000
unkown
page execute and write copy
1764000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1DAA1000
heap
page read and write
6165000
trusted library allocation
page read and write
1554000
heap
page read and write
1DAAE000
heap
page read and write
EF4000
heap
page read and write
4E91000
heap
page read and write
2FDE000
stack
page read and write
170E000
stack
page read and write
4FD1000
heap
page read and write
1D96E000
stack
page read and write
4B21000
heap
page read and write
4E91000
heap
page read and write
1DAAE000
heap
page read and write
EF4000
heap
page read and write
BC8000
unkown
page execute and write copy
EF4000
heap
page read and write
D64000
heap
page read and write
1764000
heap
page read and write
365000
unkown
page execute and read and write
BA0000
unkown
page execute and write copy
EF4000
heap
page read and write
1029000
unkown
page execute and write copy
8AF000
unkown
page execute and read and write
61EB4000
direct allocation
page read and write
ABC000
unkown
page execute and read and write
D64000
heap
page read and write
23CE1000
heap
page read and write
2F6F000
stack
page read and write
494000
unkown
page execute and write copy
2ABC0000
heap
page read and write
4E00000
direct allocation
page execute and read and write
AB0000
unkown
page execute and write copy
EF4000
heap
page read and write
3DAE000
stack
page read and write
1764000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
EF4000
heap
page read and write
1DA98000
heap
page read and write
4FD1000
heap
page read and write
E18000
heap
page read and write
39A000
unkown
page execute and write copy
1028000
unkown
page execute and read and write
4FD1000
heap
page read and write
1DA9A000
heap
page read and write
FD4000
heap
page read and write
47A0000
heap
page read and write
30EB000
stack
page read and write
EF4000
heap
page read and write
2A10000
heap
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
61ED4000
direct allocation
page readonly
51D1000
heap
page read and write
4F20000
heap
page read and write
1120000
direct allocation
page read and write
11E4000
heap
page read and write
1764000
heap
page read and write
1F0000
unkown
page read and write
A7E000
unkown
page execute and read and write
3AA000
unkown
page execute and write copy
49CE000
stack
page read and write
2B6F000
stack
page read and write
4E91000
heap
page read and write
1060000
heap
page read and write
919000
unkown
page write copy
E72000
unkown
page execute and read and write
4B21000
heap
page read and write
1554000
heap
page read and write
D64000
heap
page read and write
1764000
heap
page read and write
4B21000
heap
page read and write
1FA000
unkown
page execute and write copy
912000
unkown
page execute and read and write
4770000
direct allocation
page read and write
49EE000
stack
page read and write
376000
unkown
page execute and read and write
EF4000
heap
page read and write
DE5000
heap
page read and write
A9C000
unkown
page execute and write copy
4A46000
heap
page read and write
6704000
trusted library allocation
page read and write
23D40000
trusted library allocation
page read and write
3CBE000
stack
page read and write
283F000
stack
page read and write
327F000
stack
page read and write
2EA0000
direct allocation
page read and write
30F0000
direct allocation
page read and write
1DAA4000
heap
page read and write
DA0000
heap
page read and write
EF4000
heap
page read and write
2B3F000
stack
page read and write
D4E000
stack
page read and write
1120000
direct allocation
page read and write
11E4000
heap
page read and write
4E91000
heap
page read and write
2E4E000
stack
page read and write
1554000
heap
page read and write
4421000
heap
page read and write
BB9000
unkown
page execute and write copy
483F000
stack
page read and write
C18000
stack
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
135E000
heap
page read and write
4DFA000
trusted library allocation
page execute and read and write
488E000
stack
page read and write
3B5000
unkown
page execute and read and write
EF4000
heap
page read and write
33DF000
stack
page read and write
4A41000
heap
page read and write
B42000
unkown
page execute and read and write
EF4000
heap
page read and write
2AABC000
stack
page read and write
330F000
stack
page read and write
14FF000
stack
page read and write
12FD000
stack
page read and write
384000
unkown
page execute and read and write
680000
heap
page read and write
11E4000
heap
page read and write
340F000
stack
page read and write
EF4000
heap
page read and write
156A000
heap
page read and write
1420000
heap
page read and write
48DE000
stack
page read and write
54C0000
trusted library allocation
page execute and read and write
41C000
unkown
page execute and read and write
3DBF000
stack
page read and write
4A41000
heap
page read and write
3AB000
unkown
page execute and read and write
393F000
stack
page read and write
527D000
stack
page read and write
4421000
heap
page read and write
448F000
stack
page read and write
EF4000
heap
page read and write
302E000
stack
page read and write
4B1F000
stack
page read and write
11E4000
heap
page read and write
2D2E000
stack
page read and write
D7F000
heap
page read and write
1764000
heap
page read and write
424000
unkown
page execute and write copy
8D2000
unkown
page execute and write copy
33FE000
stack
page read and write
4E91000
heap
page read and write
4A4000
unkown
page execute and read and write
51C0000
direct allocation
page read and write
1764000
heap
page read and write
912000
unkown
page execute and write copy
4A41000
heap
page read and write
1554000
heap
page read and write
3F8E000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
4FD1000
heap
page read and write
2E9E000
stack
page read and write
18EE000
stack
page read and write
484F000
stack
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
8FE000
stack
page read and write
4AFE000
stack
page read and write
4FD1000
heap
page read and write
4B21000
heap
page read and write
4E80000
direct allocation
page read and write
4FD1000
heap
page read and write
4421000
heap
page read and write
4A41000
heap
page read and write
EF4000
heap
page read and write
112F000
stack
page read and write
4421000
heap
page read and write
6B0000
heap
page read and write
1DAA1000
heap
page read and write
3CBE000
stack
page read and write
2A27000
heap
page read and write
5150000
direct allocation
page execute and read and write
2EA0000
direct allocation
page read and write
D5C000
unkown
page execute and read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
EF4000
heap
page read and write
5590000
direct allocation
page execute and read and write
EF4000
heap
page read and write
486F000
stack
page read and write
308E000
stack
page read and write
54E0000
heap
page execute and read and write
1554000
heap
page read and write
437E000
stack
page read and write
51D1000
heap
page read and write
45CE000
stack
page read and write
4E91000
heap
page read and write
42D000
unkown
page execute and write copy
EF4000
heap
page read and write
367E000
stack
page read and write
4FD1000
heap
page read and write
30F0000
direct allocation
page read and write
B99000
unkown
page execute and write copy
4C10000
direct allocation
page read and write
1341000
heap
page read and write
F3B000
heap
page read and write
13E5000
heap
page read and write
3FB000
unkown
page execute and read and write
C60000
unkown
page readonly
441000
unkown
page execute and read and write
30F0000
direct allocation
page read and write
BAF000
unkown
page execute and write copy
1554000
heap
page read and write
3B5000
unkown
page execute and read and write
51D1000
heap
page read and write
EF4000
heap
page read and write
365000
unkown
page execute and read and write
4B21000
heap
page read and write
436F000
stack
page read and write
61ECD000
direct allocation
page readonly
EF4000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
12F0000
heap
page read and write
61ECC000
direct allocation
page read and write
887000
unkown
page execute and write copy
4B21000
heap
page read and write
B36000
unkown
page execute and write copy
EF4000
heap
page read and write
3D2000
unkown
page execute and write copy
7E9000
unkown
page execute and read and write
4B21000
heap
page read and write
A9C000
unkown
page execute and write copy
4D60000
direct allocation
page execute and read and write
69D1000
heap
page read and write
36EF000
stack
page read and write
11E4000
heap
page read and write
605E000
stack
page read and write
1D07F000
stack
page read and write
1DA97000
heap
page read and write
51D1000
heap
page read and write
1D1DF000
stack
page read and write
5320000
direct allocation
page execute and read and write
1DAAD000
heap
page read and write
D5C000
unkown
page execute and read and write
3E8000
unkown
page execute and read and write
EF4000
heap
page read and write
1560000
heap
page read and write
4E91000
heap
page read and write
1764000
heap
page read and write
DC1000
heap
page read and write
1DA9A000
heap
page read and write
3ED000
unkown
page execute and read and write
4E91000
heap
page read and write
4C90000
trusted library allocation
page read and write
EF4000
heap
page read and write
4D41000
heap
page read and write
23F5A000
heap
page read and write
4E00000
trusted library allocation
page read and write
EF4000
heap
page read and write
4FF0000
heap
page read and write
1DABC000
heap
page read and write
1554000
heap
page read and write
39AE000
stack
page read and write
38FE000
stack
page read and write
4A41000
heap
page read and write
EF4000
heap
page read and write
434F000
stack
page read and write
4421000
heap
page read and write
E42000
unkown
page execute and read and write
399F000
stack
page read and write
C1B000
stack
page read and write
1370000
direct allocation
page read and write
61E01000
direct allocation
page execute read
51D1000
heap
page read and write
B0A000
unkown
page execute and write copy
206000
unkown
page execute and write copy
91B000
unkown
page execute and write copy
406000
unkown
page execute and read and write
4E91000
heap
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
4E91000
heap
page read and write
AA9000
unkown
page execute and read and write
350F000
stack
page read and write
8B0000
unkown
page read and write
4E91000
heap
page read and write
4A41000
heap
page read and write
398000
unkown
page execute and read and write
548A000
trusted library allocation
page execute and read and write
EF4000
heap
page read and write
4FD1000
heap
page read and write
3E8E000
stack
page read and write
6142000
trusted library allocation
page read and write
1460000
heap
page read and write
1764000
heap
page read and write
2CE7000
heap
page read and write
FD4000
heap
page read and write
B10000
unkown
page execute and read and write
11E4000
heap
page read and write
1764000
heap
page read and write
51C0000
direct allocation
page read and write
4B10000
direct allocation
page read and write
EF4000
heap
page read and write
1DAA1000
heap
page read and write
4E9D000
stack
page read and write
EF4000
heap
page read and write
23D06000
heap
page read and write
980000
unkown
page read and write
4421000
heap
page read and write
4FD1000
heap
page read and write
EF4000
heap
page read and write
4D41000
heap
page read and write
4421000
heap
page read and write
339E000
stack
page read and write
1DA7E000
heap
page read and write
389000
unkown
page execute and write copy
EF4000
heap
page read and write
5060000
direct allocation
page execute and read and write
64FF000
stack
page read and write
5490000
trusted library allocation
page read and write
47AF000
stack
page read and write
394F000
stack
page read and write
4781000
heap
page read and write
4A41000
heap
page read and write
1DA87000
heap
page read and write
EF4000
heap
page read and write
520E000
stack
page read and write
10EE000
stack
page read and write
30F0000
direct allocation
page read and write
4FD1000
heap
page read and write
1D6CD000
stack
page read and write
407D000
stack
page read and write
4421000
heap
page read and write
316E000
stack
page read and write
5939000
heap
page read and write
386E000
stack
page read and write
1554000
heap
page read and write
30F0000
direct allocation
page read and write
7960000
heap
page execute and read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
3EFF000
stack
page read and write
11E4000
heap
page read and write
1130000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
A9C000
unkown
page execute and write copy
4A41000
heap
page read and write
363F000
stack
page read and write
4A41000
heap
page read and write
1F6000
unkown
page write copy
31CC000
stack
page read and write
2E6F000
stack
page read and write
36BF000
stack
page read and write
1DA93000
heap
page read and write
4C20000
heap
page read and write
912000
unkown
page execute and write copy
2EFB000
heap
page read and write
310B000
heap
page read and write
4A50000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
4E95000
heap
page read and write
E7E000
heap
page read and write
1764000
heap
page read and write
3DBF000
stack
page read and write
4B21000
heap
page read and write
851000
unkown
page execute and read and write
11E4000
heap
page read and write
11F6000
heap
page read and write
4421000
heap
page read and write
6C88F000
unkown
page readonly
11E4000
heap
page read and write
14EF000
stack
page read and write
1370000
direct allocation
page read and write
1DAA5000
heap
page read and write
EF4000
heap
page read and write
340E000
heap
page read and write
11D1000
heap
page read and write
39A000
unkown
page execute and write copy
51D1000
heap
page read and write
384E000
stack
page read and write
462E000
stack
page read and write
38EE000
stack
page read and write
3A3E000
stack
page read and write
E68000
unkown
page execute and read and write
D64000
heap
page read and write
11E4000
heap
page read and write
D64000
heap
page read and write
4770000
direct allocation
page read and write
63BF000
stack
page read and write
118F000
stack
page read and write
4B10000
direct allocation
page read and write
4770000
direct allocation
page read and write
4B21000
heap
page read and write
377F000
stack
page read and write
383E000
stack
page read and write
3A9000
unkown
page execute and read and write
AB9000
unkown
page execute and read and write
487E000
stack
page read and write
35EE000
stack
page read and write
11E4000
heap
page read and write
1554000
heap
page read and write
1D1DE000
stack
page read and write
3D0F000
stack
page read and write
4E91000
heap
page read and write
2E8E000
stack
page read and write
11E4000
heap
page read and write
4A41000
heap
page read and write
2EB0000
heap
page read and write
1D34C000
stack
page read and write
FD4000
heap
page read and write
1D2BE000
stack
page read and write
4FD1000
heap
page read and write
1993000
heap
page read and write
4FD1000
heap
page read and write
13B0000
heap
page read and write
EF4000
heap
page read and write
3E6000
unkown
page execute and write copy
4421000
heap
page read and write
44DF000
stack
page read and write
36CF000
stack
page read and write
304F000
stack
page read and write
30F0000
direct allocation
page read and write
DAB000
heap
page read and write
1554000
heap
page read and write
2D7F000
stack
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
BC7000
unkown
page execute and write copy
4E91000
heap
page read and write
3C7F000
stack
page read and write
3BFE000
stack
page read and write
353E000
stack
page read and write
1CF3E000
stack
page read and write
1760000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
E98000
unkown
page execute and read and write
63B2000
trusted library allocation
page read and write
EF4000
heap
page read and write
8B0000
unkown
page readonly
4421000
heap
page read and write
4E80000
direct allocation
page read and write
4421000
heap
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
B21000
unkown
page execute and read and write
6C6E2000
unkown
page readonly
53B0000
direct allocation
page execute and read and write
4B21000
heap
page read and write
23EB0000
trusted library allocation
page read and write
194A000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1F2000
unkown
page execute and read and write
23F54000
heap
page read and write
EF4000
heap
page read and write
4EB0000
heap
page read and write
1764000
heap
page read and write
4A41000
heap
page read and write
980000
unkown
page read and write
EF4000
heap
page read and write
4B21000
heap
page read and write
51C0000
direct allocation
page read and write
8A0000
direct allocation
page read and write
4A41000
heap
page read and write
2EA0000
direct allocation
page read and write
384000
unkown
page execute and write copy
4E91000
heap
page read and write
FD0000
heap
page read and write
336E000
stack
page read and write
333E000
stack
page read and write
1DAAE000
heap
page read and write
4A41000
heap
page read and write
3C7000
unkown
page execute and read and write
13A0000
heap
page read and write
5E1000
unkown
page execute and write copy
7A6F000
stack
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
4D90000
direct allocation
page execute and read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
30F0000
direct allocation
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
3F8F000
stack
page read and write
1D8CD000
stack
page read and write
4B21000
heap
page read and write
4A40000
direct allocation
page execute and read and write
4C70000
direct allocation
page read and write
F10000
heap
page read and write
368000
unkown
page execute and write copy
4EC0000
direct allocation
page read and write
BA0000
unkown
page execute and write copy
2E90000
heap
page read and write
3CAE000
stack
page read and write
4B21000
heap
page read and write
A0E000
unkown
page execute and read and write
3AA000
unkown
page execute and write copy
EF4000
heap
page read and write
4421000
heap
page read and write
4E91000
heap
page read and write
D64000
heap
page read and write
D40000
heap
page read and write
E19000
heap
page read and write
4421000
heap
page read and write
1554000
heap
page read and write
2E6E000
stack
page read and write
6144000
trusted library allocation
page read and write
23F54000
heap
page read and write
2EAE000
stack
page read and write
EF4000
heap
page read and write
206000
unkown
page execute and write copy
375E000
stack
page read and write
3CCF000
stack
page read and write
31FE000
stack
page read and write
4421000
heap
page read and write
4421000
heap
page read and write
4FD1000
heap
page read and write
346F000
stack
page read and write
4B21000
heap
page read and write
50C0000
trusted library allocation
page read and write
397000
unkown
page execute and write copy
4B21000
heap
page read and write
AA5000
unkown
page execute and write copy
4421000
heap
page read and write
88B000
stack
page read and write
1554000
heap
page read and write
1D55E000
stack
page read and write
1930000
direct allocation
page read and write
5350000
direct allocation
page execute and read and write
2DBE000
stack
page read and write
E0B000
heap
page read and write
EF4000
heap
page read and write
D15000
unkown
page execute and read and write
4EFE000
stack
page read and write
1DA87000
heap
page read and write
447F000
stack
page read and write
4781000
heap
page read and write
1CE3D000
stack
page read and write
408F000
stack
page read and write
467F000
stack
page read and write
8B0000
unkown
page readonly
51C0000
direct allocation
page read and write
192E000
stack
page read and write
E33000
heap
page read and write
9F0000
heap
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
61EB7000
direct allocation
page readonly
41FF000
stack
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
1FA000
unkown
page execute and write copy
4421000
heap
page read and write
4E6E000
stack
page read and write
5330000
direct allocation
page execute and read and write
EF4000
heap
page read and write
3B2F000
stack
page read and write
154E000
stack
page read and write
8DE000
unkown
page execute and write copy
A90000
unkown
page execute and read and write
3E6000
unkown
page execute and write copy
4B21000
heap
page read and write
D9D000
heap
page read and write
4D4F000
stack
page read and write
2EA0000
direct allocation
page read and write
11E4000
heap
page read and write
1550000
heap
page read and write
312E000
stack
page read and write
1554000
heap
page read and write
4EA2000
heap
page read and write
2EA0000
direct allocation
page read and write
3C7000
unkown
page execute and read and write
371F000
stack
page read and write
4ACF000
stack
page read and write
1FA000
unkown
page execute and read and write
384E000
stack
page read and write
4B21000
heap
page read and write
EF4000
heap
page read and write
3FB000
unkown
page execute and read and write
3400000
heap
page read and write
19C2000
heap
page read and write
3BCF000
stack
page read and write
1380000
heap
page read and write
1554000
heap
page read and write
1DAA1000
heap
page read and write
EF4000
heap
page read and write
4A41000
heap
page read and write
11E4000
heap
page read and write
69CF000
heap
page read and write
45CE000
stack
page read and write
30EF000
stack
page read and write
30EE000
stack
page read and write
4A30000
direct allocation
page execute and read and write
4C83000
trusted library allocation
page execute and read and write
B5B000
unkown
page execute and read and write
4A41000
heap
page read and write
3F7F000
stack
page read and write
1764000
heap
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
4B21000
heap
page read and write
412000
unkown
page execute and write copy
4C0F000
stack
page read and write
11E4000
heap
page read and write
B58000
unkown
page execute and read and write
4FD1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
426000
unkown
page execute and read and write
EF4000
heap
page read and write
4A41000
heap
page read and write
3C7000
unkown
page execute and read and write
DEA000
heap
page read and write
404000
unkown
page execute and write copy
23B05000
heap
page read and write
4C4E000
stack
page read and write
4A4000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
BB8000
unkown
page execute and read and write
4FD1000
heap
page read and write
11E4000
heap
page read and write
D64000
heap
page read and write
410E000
stack
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
6961000
heap
page read and write
E72000
unkown
page execute and read and write
8D0000
unkown
page execute and write copy
2EBF000
stack
page read and write
4FD0000
trusted library allocation
page read and write
4E00000
direct allocation
page execute and read and write
1DA9A000
heap
page read and write
EF5000
heap
page read and write
3FDF000
stack
page read and write
4D90000
direct allocation
page execute and read and write
11E4000
heap
page read and write
51C0000
direct allocation
page read and write
16FE000
heap
page read and write
2ABC1000
heap
page read and write
4B21000
heap
page read and write
4C3E000
stack
page read and write
4FD1000
heap
page read and write
980000
unkown
page readonly
11E4000
heap
page read and write
4FD1000
heap
page read and write
34FF000
stack
page read and write
61ED0000
direct allocation
page read and write
ACE000
unkown
page execute and write copy
EF4000
heap
page read and write
398000
unkown
page execute and read and write
6C650000
unkown
page readonly
2EF0000
heap
page read and write
19A6000
heap
page read and write
1764000
heap
page read and write
1554000
heap
page read and write
11E4000
heap
page read and write
D2A000
heap
page read and write
DDE000
heap
page read and write
4B21000
heap
page read and write
4421000
heap
page read and write
2DFE000
stack
page read and write
1465000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
4E80000
direct allocation
page read and write
85E0000
trusted library allocation
page read and write
EF4000
heap
page read and write
693C000
stack
page read and write
8CA000
unkown
page execute and read and write
3A8000
unkown
page execute and write copy
1120000
direct allocation
page read and write
11E4000
heap
page read and write
EF4000
heap
page read and write
AFE000
unkown
page execute and write copy
4ABF000
stack
page read and write
1DABC000
heap
page read and write
520E000
stack
page read and write
4A4000
unkown
page execute and write copy
1DAAD000
heap
page read and write
1930000
direct allocation
page read and write
EF4000
heap
page read and write
B7F000
unkown
page execute and read and write
1DAA1000
heap
page read and write
4FD1000
heap
page read and write
16E9000
heap
page read and write
4B40000
heap
page read and write
11D0000
heap
page read and write
1370000
direct allocation
page read and write
1D32D000
stack
page read and write
91B000
unkown
page execute and read and write
1F2000
unkown
page execute and read and write
4B10000
direct allocation
page read and write
EF4000
heap
page read and write
8A0000
direct allocation
page read and write
4421000
heap
page read and write
1764000
heap
page read and write
4FD1000
heap
page read and write
EF4000
heap
page read and write
927000
unkown
page execute and write copy
38A000
unkown
page execute and read and write
6C8D0000
unkown
page read and write
1554000
heap
page read and write
426000
unkown
page execute and read and write
11E4000
heap
page read and write
504E000
stack
page read and write
1554000
heap
page read and write
365000
unkown
page execute and read and write
5040000
direct allocation
page execute and read and write
380E000
stack
page read and write
4B21000
heap
page read and write
4F90000
heap
page read and write
1554000
heap
page read and write
11E4000
heap
page read and write
B2F000
unkown
page execute and read and write
FD4000
heap
page read and write
439F000
stack
page read and write
35BE000
stack
page read and write
BB7000
unkown
page execute and read and write
4FD1000
heap
page read and write
3FBE000
stack
page read and write
3E6F000
stack
page read and write
1DAA1000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
4421000
heap
page read and write
601C000
stack
page read and write
D64000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
9B7000
unkown
page execute and read and write
EF4000
heap
page read and write
4A41000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
54B0000
direct allocation
page execute and read and write
3B3F000
stack
page read and write
1DA97000
heap
page read and write
D2C000
unkown
page execute and read and write
11E4000
heap
page read and write
1DA70000
heap
page read and write
EF4000
heap
page read and write
4E8F000
stack
page read and write
DFE000
heap
page read and write
23F4C000
heap
page read and write
B9A000
unkown
page execute and read and write
4E91000
heap
page read and write
B25000
unkown
page execute and read and write
298E000
stack
page read and write
1554000
heap
page read and write
1357000
heap
page read and write
4C70000
direct allocation
page read and write
4421000
heap
page read and write
1DAAD000
heap
page read and write
4781000
heap
page read and write
4D98000
stack
page read and write
39FF000
stack
page read and write
EF4000
heap
page read and write
1028000
unkown
page execute and read and write
23D40000
trusted library allocation
page read and write
48AE000
stack
page read and write
4E80000
direct allocation
page read and write
DED000
heap
page read and write
376F000
stack
page read and write
827000
unkown
page execute and write copy
FD4000
heap
page read and write
E00000
heap
page read and write
7CE000
stack
page read and write
4EB0000
heap
page read and write
425F000
stack
page read and write
EF4000
heap
page read and write
EF5000
heap
page read and write
4A41000
heap
page read and write
1D03E000
stack
page read and write
EF4000
heap
page read and write
325E000
stack
page read and write
394F000
stack
page read and write
11E4000
heap
page read and write
1029000
unkown
page execute and write copy
4FD4000
trusted library allocation
page read and write
80DC000
stack
page read and write
1764000
heap
page read and write
42AE000
stack
page read and write
3E8E000
stack
page read and write
1D670000
heap
page read and write
384000
unkown
page execute and write copy
502B000
stack
page read and write
D83000
heap
page read and write
4E80000
direct allocation
page read and write
E42000
unkown
page execute and read and write
4421000
heap
page read and write
44CE000
stack
page read and write
4B21000
heap
page read and write
E81000
unkown
page execute and read and write
3E4F000
stack
page read and write
5020000
direct allocation
page execute and read and write
1554000
heap
page read and write
1764000
heap
page read and write
4FD1000
heap
page read and write
EF4000
heap
page read and write
169E000
stack
page read and write
4B21000
heap
page read and write
1D27F000
stack
page read and write
4FD1000
heap
page read and write
1D56E000
stack
page read and write
406E000
stack
page read and write
1148000
unkown
page execute and read and write
B10000
unkown
page execute and read and write
4FB0000
direct allocation
page read and write
EF4000
heap
page read and write
FD4000
heap
page read and write
EF4000
heap
page read and write
1DA7F000
heap
page read and write
91B000
unkown
page execute and write copy
B20000
unkown
page execute and write copy
EF4000
heap
page read and write
4FD1000
heap
page read and write
372F000
stack
page read and write
F6B000
heap
page read and write
4421000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
4A41000
heap
page read and write
1370000
direct allocation
page read and write
EF4000
heap
page read and write
523D000
stack
page read and write
4F9F000
stack
page read and write
4D8E000
stack
page read and write
52F0000
trusted library allocation
page read and write
1D17F000
stack
page read and write
4421000
heap
page read and write
362F000
stack
page read and write
EF4000
heap
page read and write
34DE000
stack
page read and write
37CF000
stack
page read and write
4FD1000
heap
page read and write
376000
unkown
page execute and read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
3F4F000
stack
page read and write
406000
unkown
page execute and read and write
EF4000
heap
page read and write
494000
unkown
page execute and write copy
6B5000
heap
page read and write
865000
unkown
page execute and read and write
4421000
heap
page read and write
23E9E000
stack
page read and write
B99000
unkown
page execute and write copy
4AEF000
stack
page read and write
1161000
unkown
page execute and read and write
53D0000
direct allocation
page execute and read and write
1DA7F000
heap
page read and write
EF4000
heap
page read and write
4A00000
direct allocation
page execute and read and write
11E4000
heap
page read and write
1554000
heap
page read and write
4B21000
heap
page read and write
537C000
stack
page read and write
D64000
heap
page read and write
1D3BF000
stack
page read and write
4D1F000
stack
page read and write
E81000
unkown
page execute and write copy
4B21000
heap
page read and write
F8F000
heap
page read and write
1DAB4000
heap
page read and write
1DAA8000
heap
page read and write
4770000
direct allocation
page read and write
1DA9A000
heap
page read and write
1554000
heap
page read and write
413000
unkown
page execute and read and write
4A41000
heap
page read and write
1D0DE000
stack
page read and write
EF4000
heap
page read and write
4B10000
direct allocation
page read and write
512E000
stack
page read and write
D64000
heap
page read and write
EF5000
heap
page read and write
9AC000
stack
page read and write
8A0000
direct allocation
page read and write
122F000
stack
page read and write
4B0E000
stack
page read and write
422F000
stack
page read and write
44EE000
stack
page read and write
5160000
direct allocation
page execute and read and write
5939000
heap
page read and write
919000
unkown
page write copy
EF4000
heap
page read and write
52E0000
trusted library allocation
page read and write
55D0000
direct allocation
page execute and read and write
4B21000
heap
page read and write
2E90000
heap
page read and write
AFE000
unkown
page execute and write copy
4B21000
heap
page read and write
1CDFF000
stack
page read and write
4E91000
heap
page read and write
33BF000
stack
page read and write
773C000
stack
page read and write
EF4000
heap
page read and write
6520000
heap
page read and write
EF4000
heap
page read and write
8B1000
unkown
page execute and write copy
11E4000
heap
page read and write
4770000
direct allocation
page read and write
1D07E000
stack
page read and write
54B0000
direct allocation
page execute and read and write
424E000
stack
page read and write
479E000
stack
page read and write
EF4000
heap
page read and write
1930000
direct allocation
page read and write
1090000
heap
page read and write
4B21000
heap
page read and write
1930000
direct allocation
page read and write
3B4000
unkown
page execute and write copy
4FD1000
heap
page read and write
457E000
stack
page read and write
11E4000
heap
page read and write
4D90000
direct allocation
page execute and read and write
11E4000
heap
page read and write
1554000
heap
page read and write
4EA0000
heap
page read and write
EF4000
heap
page read and write
1DA8D000
heap
page read and write
3DFE000
stack
page read and write
5303000
trusted library allocation
page execute and read and write
4F6E000
stack
page read and write
B35000
unkown
page execute and read and write
23C81000
heap
page read and write
927000
unkown
page execute and write copy
4CA0000
heap
page read and write
4E91000
heap
page read and write
11E4000
heap
page read and write
1F0000
unkown
page readonly
4C20000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
4ECE000
stack
page read and write
4EC0000
direct allocation
page read and write
43FF000
stack
page read and write
132E000
stack
page read and write
2FFF000
stack
page read and write
1750000
heap
page read and write
4A41000
heap
page read and write
4421000
heap
page read and write
4FD1000
heap
page read and write
1CF3E000
stack
page read and write
1F2000
unkown
page execute and read and write
503A000
trusted library allocation
page execute and read and write
1DAB7000
heap
page read and write
84E000
stack
page read and write
B57000
unkown
page execute and write copy
1D65F000
stack
page read and write
10A5000
heap
page read and write
104F000
stack
page read and write
EF4000
heap
page read and write
833000
unkown
page execute and read and write
3E9F000
stack
page read and write
4E91000
heap
page read and write
4B10000
direct allocation
page read and write
4B21000
heap
page read and write
EF4000
heap
page read and write
2D2F000
stack
page read and write
1554000
heap
page read and write
31BF000
stack
page read and write
384000
unkown
page execute and read and write
4A41000
heap
page read and write
EF4000
heap
page read and write
5040000
trusted library allocation
page read and write
4E91000
heap
page read and write
45EF000
stack
page read and write
8F7000
unkown
page execute and read and write
BC7000
unkown
page execute and read and write
51D1000
heap
page read and write
6C6F1000
unkown
page execute read
438E000
stack
page read and write
1717000
heap
page read and write
A9C000
unkown
page execute and read and write
4B21000
heap
page read and write
3B3F000
stack
page read and write
51D1000
heap
page read and write
11E4000
heap
page read and write
4D90000
direct allocation
page execute and read and write
4B21000
heap
page read and write
BB7000
unkown
page execute and read and write
354F000
stack
page read and write
787E000
stack
page read and write
1440000
heap
page read and write
4C4E000
stack
page read and write
11E4000
heap
page read and write
1DA80000
heap
page read and write
3E9000
unkown
page execute and write copy
377F000
stack
page read and write
4421000
heap
page read and write
156E000
heap
page read and write
1554000
heap
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
EF4000
heap
page read and write
1DAA5000
heap
page read and write
1764000
heap
page read and write
1930000
direct allocation
page read and write
407E000
stack
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
128E000
stack
page read and write
45CF000
stack
page read and write
1152000
unkown
page execute and read and write
1554000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
1DA9A000
heap
page read and write
4B21000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
78FE000
stack
page read and write
11E4000
heap
page read and write
872000
unkown
page execute and read and write
E1D000
heap
page read and write
312F000
stack
page read and write
8A0000
direct allocation
page read and write
2A3F000
stack
page read and write
4400000
heap
page read and write
322F000
stack
page read and write
5370000
direct allocation
page execute and read and write
41C000
unkown
page execute and read and write
8A0000
direct allocation
page read and write
1D2DF000
stack
page read and write
206000
unkown
page execute and write copy
4780000
heap
page read and write
6940000
heap
page read and write
4770000
direct allocation
page read and write
3E9000
unkown
page execute and write copy
11E4000
heap
page read and write
1554000
heap
page read and write
7B0000
unkown
page execute and write copy
4421000
heap
page read and write
4421000
heap
page read and write
4B10000
direct allocation
page read and write
754D000
stack
page read and write
159E000
heap
page read and write
1554000
heap
page read and write
800000
unkown
page execute and write copy
EF4000
heap
page read and write
1DABA000
heap
page read and write
BAE000
unkown
page execute and write copy
1764000
heap
page read and write
EF4000
heap
page read and write
4E0B000
trusted library allocation
page execute and read and write
4FEE000
stack
page read and write
EF4000
heap
page read and write
142E000
heap
page read and write
1DAAE000
heap
page read and write
866000
unkown
page execute and write copy
1764000
heap
page read and write
EF4000
heap
page read and write
370E000
stack
page read and write
352E000
stack
page read and write
46AE000
stack
page read and write
EF4000
heap
page read and write
4FD1000
heap
page read and write
4F24000
heap
page read and write
AA5000
unkown
page execute and write copy
EF4000
heap
page read and write
EF4000
heap
page read and write
B21000
unkown
page execute and read and write
4B21000
heap
page read and write
657000
unkown
page execute and write copy
4E91000
heap
page read and write
D97000
heap
page read and write
E6C000
heap
page read and write
2C3F000
stack
page read and write
1930000
direct allocation
page read and write
494000
unkown
page execute and write copy
DF9000
stack
page read and write
389E000
stack
page read and write
11E0000
heap
page read and write
EF4000
heap
page read and write
3ADF000
stack
page read and write
4DA0000
direct allocation
page execute and read and write
113E000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
D5C000
unkown
page execute and read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1554000
heap
page read and write
1DA9A000
heap
page read and write
11E4000
heap
page read and write
1554000
heap
page read and write
15AB000
heap
page read and write
4E80000
trusted library allocation
page read and write
ACE000
unkown
page execute and write copy
EF4000
heap
page read and write
54BE000
stack
page read and write
370F000
stack
page read and write
1120000
direct allocation
page read and write
1554000
heap
page read and write
3A4F000
stack
page read and write
1DA84000
heap
page read and write
4BCF000
stack
page read and write
458E000
stack
page read and write
4EF6000
direct allocation
page read and write
4E80000
direct allocation
page read and write
4E91000
heap
page read and write
11F8000
heap
page read and write
11E4000
heap
page read and write
EF0000
heap
page read and write
4E91000
heap
page read and write
86C000
stack
page read and write
2EA0000
direct allocation
page read and write
430F000
stack
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
42F000
unkown
page execute and read and write
4E91000
heap
page read and write
BC8000
unkown
page execute and write copy
EBE000
stack
page read and write
EF4000
heap
page read and write
5350000
direct allocation
page execute and read and write
4FD1000
heap
page read and write
1DA9F000
heap
page read and write
51C0000
direct allocation
page read and write
EF4000
heap
page read and write
334E000
stack
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
3EAE000
stack
page read and write
504B000
trusted library allocation
page execute and read and write
51D1000
heap
page read and write
91B000
unkown
page execute and write copy
51C0000
direct allocation
page read and write
34EE000
stack
page read and write
85F000
unkown
page execute and read and write
36FE000
stack
page read and write
460E000
stack
page read and write
5497000
trusted library allocation
page execute and read and write
912000
unkown
page execute and write copy
ACB000
unkown
page execute and read and write
3D6F000
stack
page read and write
2F47000
heap
page read and write
4421000
heap
page read and write
51C0000
direct allocation
page read and write
8A0000
direct allocation
page read and write
1F6000
unkown
page write copy
2A0E000
stack
page read and write
1DA93000
heap
page read and write
11E4000
heap
page read and write
44CE000
stack
page read and write
11E4000
heap
page read and write
1DAA1000
heap
page read and write
4A60000
direct allocation
page execute and read and write
BB9000
unkown
page execute and write copy
7CC000
unkown
page execute and write copy
1DA90000
heap
page read and write
489C000
stack
page read and write
42D000
unkown
page execute and write copy
3FEF000
stack
page read and write
1930000
direct allocation
page read and write
B42000
unkown
page execute and read and write
4B21000
heap
page read and write
11E4000
heap
page read and write
D64000
heap
page read and write
15A7000
heap
page read and write
1554000
heap
page read and write
1930000
direct allocation
page read and write
1343000
heap
page read and write
51D1000
heap
page read and write
4A41000
heap
page read and write
649000
unkown
page write copy
4FD1000
heap
page read and write
EF4000
heap
page read and write
353E000
stack
page read and write
4421000
heap
page read and write
7D5000
unkown
page execute and write copy
4A6000
unkown
page execute and write copy
D00000
heap
page read and write
4E91000
heap
page read and write
7EC000
unkown
page execute and read and write
186E000
stack
page read and write
3B2E000
stack
page read and write
919000
unkown
page write copy
43D000
unkown
page execute and write copy
4B21000
heap
page read and write
3F6000
unkown
page execute and write copy
A2F000
unkown
page execute and read and write
EF4000
heap
page read and write
4E91000
heap
page read and write
4B21000
heap
page read and write
51D1000
heap
page read and write
34EF000
stack
page read and write
6C6F0000
unkown
page readonly
1764000
heap
page read and write
33AF000
stack
page read and write
4A41000
heap
page read and write
51C0000
direct allocation
page read and write
1D80D000
stack
page read and write
EF4000
heap
page read and write
466E000
stack
page read and write
3100000
heap
page read and write
42FE000
stack
page read and write
30F0000
direct allocation
page read and write
311E000
stack
page read and write
4FD0000
heap
page read and write
4B21000
heap
page read and write
43DE000
stack
page read and write
448D000
stack
page read and write
420F000
stack
page read and write
4421000
heap
page read and write
474E000
stack
page read and write
3ABE000
stack
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
4421000
heap
page read and write
18A0000
heap
page read and write
4B21000
heap
page read and write
EF4000
heap
page read and write
F77000
heap
page read and write
1370000
direct allocation
page read and write
322E000
stack
page read and write
4A4000
unkown
page execute and read and write
3AEF000
stack
page read and write
3DAF000
stack
page read and write
11C7000
heap
page read and write
415E000
stack
page read and write
BC7000
unkown
page execute and write copy
4F70000
trusted library allocation
page execute and read and write
368000
unkown
page execute and write copy
4FD1000
heap
page read and write
650000
heap
page read and write
4E91000
heap
page read and write
1554000
heap
page read and write
3107000
heap
page read and write
123C000
stack
page read and write
4421000
heap
page read and write
ABC000
unkown
page execute and read and write
42F000
unkown
page execute and read and write
3ED000
stack
page read and write
3EEF000
stack
page read and write
30F0000
direct allocation
page read and write
4FD1000
heap
page read and write
EF4000
heap
page read and write
3B4000
unkown
page execute and write copy
5120000
direct allocation
page execute and read and write
EF4000
heap
page read and write
4B10000
direct allocation
page read and write
4AF0000
direct allocation
page read and write
2F9F000
stack
page read and write
4B21000
heap
page read and write
1554000
heap
page read and write
2FEE000
stack
page read and write
40EF000
stack
page read and write
1554000
heap
page read and write
4421000
heap
page read and write
4FE0000
direct allocation
page read and write
4BFF000
stack
page read and write
4D90000
direct allocation
page execute and read and write
53E0000
direct allocation
page execute and read and write
4E30000
direct allocation
page execute and read and write
EF4000
heap
page read and write
EF5000
heap
page read and write
489F000
stack
page read and write
1554000
heap
page read and write
BB9000
unkown
page execute and write copy
4C1E000
stack
page read and write
1120000
direct allocation
page read and write
8B0000
unkown
page readonly
1764000
heap
page read and write
326E000
stack
page read and write
11E4000
heap
page read and write
55C0000
direct allocation
page execute and read and write
1120000
direct allocation
page read and write
3A3E000
stack
page read and write
4B20000
heap
page read and write
501E000
stack
page read and write
EF4000
heap
page read and write
470E000
stack
page read and write
40CF000
stack
page read and write
43FF000
stack
page read and write
1D1F0000
heap
page read and write
398E000
stack
page read and write
4D4F000
stack
page read and write
42FE000
stack
page read and write
4B10000
direct allocation
page read and write
1180000
heap
page read and write
37AE000
stack
page read and write
4B32000
heap
page read and write
D20000
heap
page read and write
EF4000
heap
page read and write
2EDE000
stack
page read and write
367E000
stack
page read and write
4E91000
heap
page read and write
E42000
unkown
page execute and read and write
66AE000
stack
page read and write
2A60000
heap
page read and write
17EE000
stack
page read and write
4B10000
direct allocation
page read and write
1DABA000
heap
page read and write
3D0F000
stack
page read and write
414000
unkown
page execute and write copy
32AE000
stack
page read and write
960000
heap
page read and write
C97000
unkown
page execute and read and write
1764000
heap
page read and write
530F000
stack
page read and write
1554000
heap
page read and write
4B21000
heap
page read and write
4E91000
heap
page read and write
4770000
direct allocation
page read and write
EF4000
heap
page read and write
11E4000
heap
page read and write
8F8000
unkown
page execute and write copy
1930000
direct allocation
page read and write
3C1F000
stack
page read and write
EF5000
heap
page read and write
EF4000
heap
page read and write
EF4000
heap
page read and write
1DA87000
heap
page read and write
5350000
direct allocation
page execute and read and write
4421000
heap
page read and write
A2F000
unkown
page execute and read and write
39D000
unkown
page execute and read and write
37BE000
stack
page read and write
EF4000
heap
page read and write
D64000
heap
page read and write
11E4000
heap
page read and write
3E4F000
stack
page read and write
1DA6F000
stack
page read and write
5100000
heap
page read and write
386F000
stack
page read and write
3C0E000
stack
page read and write
3FEE000
stack
page read and write
11E4000
heap
page read and write
850000
unkown
page execute and write copy
666C000
stack
page read and write
1554000
heap
page read and write
4E8F000
stack
page read and write
472F000
stack
page read and write
4D80000
direct allocation
page execute and read and write
8E9000
unkown
page execute and write copy
61BE000
stack
page read and write
888000
unkown
page execute and read and write
2FAF000
stack
page read and write
4B21000
heap
page read and write
B36000
unkown
page execute and write copy
BA2000
unkown
page execute and write copy
EF5000
heap
page read and write
1554000
heap
page read and write
EF4000
heap
page read and write
There are 2757 hidden memdumps, click here to show them.