IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DocumentsHCFBFBAEBK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CBKFIECBGDHJKECAKFBGDHJKEC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHCBAAAFHJDHJJKEBGHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FCFBAKJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHJDBAKEHDHDGCAKKJJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKEGHDGHCGHDHJKFBFBK
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\KECFIDGCBFBAKEBFBKFBFBAFII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKEHIEBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a0969106aa.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\0215fea6-a5d1-4bbb-b4d5-c6b75c4ffa46.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\33d826da-056e-43b1-80b6-3c6541ae650c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3bdb071e-1683-424f-9829-6daa99d4659a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\604fbbe3-2741-4bce-928f-175f6a9f9ed5.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\64e93689-f581-452c-9d2c-9c9df4ad5df6.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8cc23a34-6c88-4246-81b6-84b8bf0f1b32.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\6dad775e-eae6-4f62-8ad7-f4ee5c8279d7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-6732E648-DFC.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\2af7298d-39fb-491d-b3f9-0a93800e3a22.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\33b44271-e709-4100-8b0d-82c551fb4b85.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\577b35b9-bcb7-4d88-aa56-097cbeb1076d.tmp
Unicode text, UTF-8 text, with very long lines (16734), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\662a2f20-c13b-4272-834a-98dac141cb11.tmp
Unicode text, UTF-8 text, with very long lines (16899), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7721995e-f0d4-4d13-9e41-e9b7e093135f.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\1135278a-e5e2-4f9a-9419-d9aa5bfbec0e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\3731e2cd-52f3-4180-9d3d-d53a0da683ef.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\4bb3cbda-4223-42eb-9166-e2269eaddeda.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9207ed22-a7b1-4518-b1b5-a2a6fe9d41c7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3850f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3904a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fbb284b2-b1ab-4019-801a-60baed047c2a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3c9d9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF40d79.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF482b9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3dc86.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF3fd0e.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13375862603640737
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\2950caac-584f-48a8-8a45-9583165ade32.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\975c2c7a-b22b-4b5c-9052-3ac4fd3c1d4a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3905a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\dcde5425-78f3-4fe0-a516-3a0967619230.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a0a1d061-d90c-40c1-931c-aedfcc4db63b.tmp
Unicode text, UTF-8 text, with very long lines (16899), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b6d2ad14-388c-4a68-bd7b-26a9674418b6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\eae353be-bbb9-4735-8190-c35eb5c4a76a.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f99b07bd-636d-40f9-8520-cfae94cb9bfa.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF36dde.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF36dfd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF37187.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39869.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3d2c2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4827a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4ddf8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a6dec175-91f0-4495-8dd6-e7286f187e6d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ffbae65b-51a7-44f7-bcfa-db12dbc12d0f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\10699e6d-1a93-4370-a8d7-04e310ab3c6d.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\1881bb43-95dd-46cb-b8a1-8fdb072ad3fc.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\4764d088-b841-457e-b1e8-cac206941ac7.tmp
PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\757442ad-7ea2-4030-b15f-282f2a59fa43.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\aebb9f70-5b9e-4180-9cab-fec760e7f74d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\10699e6d-1a93-4370-a8d7-04e310ab3c6d.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3700)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3580_1299173422\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3705)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 04:23:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 04:23:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 04:23:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 04:23:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 12 04:23:13 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
Chrome Cache Entry: 472
ASCII text, with very long lines (4234)
downloaded
Chrome Cache Entry: 473
ASCII text
downloaded
Chrome Cache Entry: 474
ASCII text, with very long lines (2586)
downloaded
Chrome Cache Entry: 475
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 476
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 477
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 478
SVG Scalable Vector Graphics image
downloaded
There are 273 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 --field-trial-handle=2480,i,12669535664876434942,9463197344397114714,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2112,i,15661409552434283723,8671285796704867672,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2768 --field-trial-handle=2248,i,16075850456477314035,13090639209018372966,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6760 --field-trial-handle=2248,i,16075850456477314035,13090639209018372966,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=7196 --field-trial-handle=2248,i,16075850456477314035,13090639209018372966,262144 /prefetch:8
malicious
C:\Users\user\DocumentsHCFBFBAEBK.exe
"C:\Users\user\DocumentsHCFBFBAEBK.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1005695001\6fc7e371fe.exe
"C:\Users\user\AppData\Local\Temp\1005695001\6fc7e371fe.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7324 --field-trial-handle=2248,i,16075850456477314035,13090639209018372966,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1005695001\6fc7e371fe.exe
"C:\Users\user\AppData\Local\Temp\1005695001\6fc7e371fe.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005697001\a0969106aa.exe
"C:\Users\user\AppData\Local\Temp\1005697001\a0969106aa.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005695001\6fc7e371fe.exe
"C:\Users\user\AppData\Local\Temp\1005695001\6fc7e371fe.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005697001\a0969106aa.exe
"C:\Users\user\AppData\Local\Temp\1005697001\a0969106aa.exe"
malicious
C:\Users\user\AppData\Local\Temp\1005697001\a0969106aa.exe
"C:\Users\user\AppData\Local\Temp\1005697001\a0969106aa.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\DocumentsHCFBFBAEBK.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/68b591d6548ec281/mozglue.dllE8
unknown
https://ntp.msn.com/0
unknown
https://ntp.msn.com/_default
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.43/ows
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ntp.msn.cn/edge/ntp
unknown
https://aefd.nelreports.net/api/report?cat=bingcsp
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dllK8
unknown
https://deff.nelreports.net/api/report
unknown
https://docs.google.com/
unknown
https://www.youtube.com
unknown
https://deff.nelreports.net/api/report?cat=msnw
unknown
https://www.instagram.com
unknown
https://sb.scorecardresearch.com/b2?rn=1731389013838&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=39559DFC669A689A222688C967CD69C0&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null
18.244.18.38
http://185.215.113.206C
unknown
http://185.215.113.206/68b591d6548ec281/nss3.dll
185.215.113.206
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
https://outlook.office.com/mail/compose?isExtension=true
unknown
http://185.215.113.206/c4becf79229cb002.phpvh
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
185.215.113.206/c4becf79229cb002.php
https://web.telegram.org/
unknown
http://185.215.113.43/ViewSizePreferences.SourceAumid1
unknown
https://drive-daily-2.corp.google.com/
unknown
http://185.215.113.206/ockedCacheCounterMutex
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.215.113.206T
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://drive-daily-5.corp.google.com/
unknown
https://plus.google.com
unknown
http://185.215.113.16/steam/random.exe1395d7f
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
http://185.215.113.16/off/random.exe0
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.181.238
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://drive-preprod.corp.google.com/
unknown
https://srtb.msn.cn/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://bard.google.com/
unknown
https://assets.msn.cn/resolver/
unknown
http://185.215.113.43/Zu7JuNko/index.phpV
unknown
https://browser.events.data.msn.com/
unknown
http://185.215.113.206/68b591d6548ec281/vcruntime140.dll
185.215.113.206
http://185.215.113.206/c4becf79229cb002.phpY
unknown
http://185.215.113.206/c4becf79229cb002.php/l
unknown
http://185.215.113.43/Zu7JuNko/index.phpW
unknown
http://185.215.113.206/c4becf79229cb002.php003
unknown
https://www.office.com
unknown
https://outlook.live.com/mail/0/
unknown
http://185.215.113.206/c4becf79229cb002.phpb
unknown
http://185.215.113.16/mine/random.exe78
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/c4becf79229cb002.php/s
unknown
https://ntp.msn.com/edge/ntp
unknown
https://assets.msn.com/resolver/
unknown
http://185.215.113.206/c4becf79229cb002.phpp
unknown
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.phpM
unknown
http://185.215.113.206/c4becf79229cb002.phpq
unknown
https://tidal.com/
unknown
https://ntp.msn.com
unknown
http://185.215.113.206/c4becf79229cb002.phpx
unknown
http://185.215.113.206/c4becf79229cb002.phpy
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedh
unknown
https://gaana.com/
unknown
http://185.215.113.43/lfons
unknown
https://outlook.live.com/mail/compose?isExtension=true
unknown
http://185.215.113.206/c4becf79229cb002.phpbh
unknown
http://185.215.113.206/68b591d6548ec281/mozglue.dll
185.215.113.206
http://185.215.113.43/Zu7JuNko/index.php7001
unknown
https://outlook.office.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true
unknown
https://apis.google.com
unknown
http://185.215.113.16/steam/random.exeW
unknown
http://185.215.113.43/Zu7JuNko/index.php.
unknown
https://domains.google.com/suggest/flow
unknown
https://latest.web.skype.com/?browsername=edge_canary_shoreline
unknown
https://word.new?from=EdgeM365Shoreline
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://mail.google.com/mail/mu/mp/266/#tl/Inbox
unknown
http://185.215.113.206/urrentVersion
unknown
https://drive-autopush.corp.google.com/
unknown
http://185.215.113.16/steam/random.exe
185.215.113.16
https://outlook.office.com/mail/inbox?isExtension=true&sharedHeader=1&client_flight=outlookedge
unknown
https://open.spotify.com
unknown
http://185.215.113.206/c4becf79229cb002.phpp#Xl
unknown
https://twitter.com/
unknown
http://185.215.113.206/c4becf79229cb002.php/$
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded;
unknown
https://m.vk.com/
unknown
http://185.215.113.206/c4becf79229cb002.php.h
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.100
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
chrome.cloudflare-dns.com
172.64.41.3
plus.l.google.com
142.250.181.238
play.google.com
216.58.206.46
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.244.18.27
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.185.100
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.18
googlehosted.l.googleusercontent.com
142.250.186.65
sni1gl.wpc.nucdn.net
152.199.21.175
assets.msn.com
unknown
r.msftstatic.com
unknown
15.164.165.52.in-addr.arpa
unknown
c.msn.com
unknown
ntp.msn.com
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
apis.google.com
unknown
api.msn.com
unknown
browser.events.data.msn.com
unknown
There are 11 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
192.168.2.5
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
142.250.185.100
www.google.com
United States
18.244.18.27
sb.scorecardresearch.com
United States
142.250.181.238
plus.l.google.com
United States
104.40.82.182
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
13.107.246.57
unknown
United States
23.221.22.212
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
185.215.113.16
unknown
Portugal
18.244.18.38
unknown
United States
216.58.206.46
play.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
142.250.186.65
googlehosted.l.googleusercontent.com
United States
There are 8 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
6fc7e371fe.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
a0969106aa.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197820
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197820
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197820
WindowTabManagerFileMappingId
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 142 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
52F0000
direct allocation
page read and write
malicious
161000
unkown
page execute and read and write
malicious
167B000
heap
page read and write
malicious
5AE000
heap
page read and write
malicious
4A00000
direct allocation
page read and write
malicious
161000
unkown
page execute and read and write
malicious
C81000
unkown
page execute and read and write
malicious
5430000
direct allocation
page read and write
malicious
A7D000
heap
page read and write
malicious
16DB000
heap
page read and write
malicious
841000
unkown
page execute and read and write
malicious
D31000
unkown
page execute and read and write
malicious
4F40000
direct allocation
page read and write
malicious
C81000
unkown
page execute and read and write
malicious
C81000
unkown
page execute and read and write
malicious
775000
heap
page read and write
17E4000
heap
page read and write
F48000
unkown
page execute and read and write
2B1E000
stack
page read and write
4481000
heap
page read and write
532A000
trusted library allocation
page execute and read and write
3CF000
unkown
page execute and read and write
774000
heap
page read and write
27FF000
stack
page read and write
4B60000
direct allocation
page execute and read and write
774000
heap
page read and write
5181000
heap
page read and write
533B000
trusted library allocation
page execute and read and write
61ED4000
direct allocation
page readonly
774000
heap
page read and write
15F0000
heap
page read and write
628D000
heap
page read and write
CCB000
heap
page read and write
774000
heap
page read and write
F68000
unkown
page execute and read and write
774000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
53BE000
stack
page read and write
23157000
heap
page read and write
5181000
heap
page read and write
D2F000
unkown
page execute and read and write
347E000
stack
page read and write
32D000
unkown
page execute and read and write
545000
heap
page read and write
304E000
stack
page read and write
774000
heap
page read and write
46C000
unkown
page execute and write copy
774000
heap
page read and write
F2F000
unkown
page execute and write copy
4481000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
1109000
stack
page read and write
363F000
stack
page read and write
3CC000
unkown
page execute and read and write
774000
heap
page read and write
B07000
unkown
page execute and read and write
F6B000
unkown
page execute and write copy
774000
heap
page read and write
1D022000
heap
page read and write
5200000
direct allocation
page read and write
5181000
heap
page read and write
AB8000
unkown
page execute and write copy
472E000
stack
page read and write
775000
heap
page read and write
E97000
unkown
page execute and read and write
774000
heap
page read and write
D40000
unkown
page readonly
774000
heap
page read and write
1650000
direct allocation
page read and write
2DDE000
stack
page read and write
674000
heap
page read and write
F8A000
unkown
page execute and read and write
F98000
unkown
page execute and write copy
AC9000
unkown
page execute and write copy
D30000
direct allocation
page read and write
5180000
heap
page read and write
3AD000
unkown
page execute and write copy
15B0000
direct allocation
page read and write
674000
heap
page read and write
4481000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
516F000
stack
page read and write
775000
heap
page read and write
5590000
direct allocation
page execute and read and write
4A90000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
774000
heap
page read and write
EF6000
unkown
page execute and write copy
440F000
stack
page read and write
4AC1000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
1C2000
unkown
page execute and read and write
4AC0000
heap
page read and write
2C4F000
stack
page read and write
15D4000
heap
page read and write
16B7000
heap
page read and write
774000
heap
page read and write
2F0E000
stack
page read and write
357000
unkown
page execute and read and write
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
365E000
stack
page read and write
775000
heap
page read and write
367E000
stack
page read and write
6C641000
unkown
page execute read
327F000
stack
page read and write
3D1F000
stack
page read and write
149B000
heap
page read and write
775000
heap
page read and write
17E4000
heap
page read and write
1175000
unkown
page execute and write copy
774000
heap
page read and write
7E0000
direct allocation
page read and write
423E000
stack
page read and write
40BF000
stack
page read and write
3ABE000
stack
page read and write
4FD0000
heap
page read and write
32F000
unkown
page execute and write copy
1D06C000
heap
page read and write
774000
heap
page read and write
1CD7D000
stack
page read and write
1D64D000
stack
page read and write
1C9000
unkown
page write copy
32F000
unkown
page execute and write copy
49C0000
direct allocation
page execute and read and write
1004000
unkown
page execute and write copy
BA4000
heap
page read and write
35A000
unkown
page execute and read and write
1444000
heap
page read and write
774000
heap
page read and write
1D26F000
stack
page read and write
4560000
direct allocation
page read and write
774000
heap
page read and write
411E000
stack
page read and write
4E71000
heap
page read and write
53FE000
stack
page read and write
774000
heap
page read and write
1CD2F000
stack
page read and write
26E0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
D56000
unkown
page execute and write copy
4571000
heap
page read and write
77ED000
stack
page read and write
9BE000
stack
page read and write
B3C000
unkown
page execute and write copy
774000
heap
page read and write
2C7E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
3C8F000
stack
page read and write
774000
heap
page read and write
1D04D000
heap
page read and write
399E000
stack
page read and write
774000
heap
page read and write
779E000
stack
page read and write
1D730000
heap
page read and write
2CFE000
stack
page read and write
38DE000
stack
page read and write
674000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
3ABD000
stack
page read and write
774000
heap
page read and write
ADD000
heap
page read and write
774000
heap
page read and write
C60000
heap
page read and write
15D4000
heap
page read and write
4560000
direct allocation
page read and write
17E4000
heap
page read and write
4B1E000
stack
page read and write
1444000
heap
page read and write
774000
heap
page read and write
485E000
stack
page read and write
4A9C000
stack
page read and write
15D4000
heap
page read and write
404F000
stack
page read and write
11E4000
unkown
page execute and read and write
4AC1000
heap
page read and write
1650000
direct allocation
page read and write
4FC6000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
884000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5200000
direct allocation
page read and write
4571000
heap
page read and write
775000
heap
page read and write
4571000
heap
page read and write
15D4000
heap
page read and write
4481000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
231F0000
heap
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
703E000
heap
page read and write
774000
heap
page read and write
1D051000
heap
page read and write
774000
heap
page read and write
351E000
stack
page read and write
2ECE000
stack
page read and write
17E4000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
1444000
heap
page read and write
44AE000
stack
page read and write
5181000
heap
page read and write
774000
heap
page read and write
F44000
unkown
page execute and write copy
774000
heap
page read and write
4BBE000
stack
page read and write
4571000
heap
page read and write
A8D000
unkown
page execute and write copy
4A90000
direct allocation
page execute and read and write
774000
heap
page read and write
4AC1000
heap
page read and write
4E71000
heap
page read and write
BA4000
heap
page read and write
ECE000
unkown
page execute and read and write
774000
heap
page read and write
1444000
heap
page read and write
4571000
heap
page read and write
5181000
heap
page read and write
3D8000
unkown
page execute and write copy
774000
heap
page read and write
5F1000
heap
page read and write
774000
heap
page read and write
49D0000
heap
page read and write
40DF000
stack
page read and write
774000
heap
page read and write
D1E000
heap
page read and write
17E4000
heap
page read and write
F9A000
unkown
page execute and write copy
5310000
heap
page read and write
4B7F000
stack
page read and write
775000
heap
page read and write
BA4000
heap
page read and write
F0E000
unkown
page execute and write copy
4AE0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
335E000
stack
page read and write
3A1E000
stack
page read and write
26E0000
direct allocation
page read and write
4AC1000
heap
page read and write
26E0000
direct allocation
page read and write
1D051000
heap
page read and write
775000
heap
page read and write
379E000
stack
page read and write
774000
heap
page read and write
4AE1000
trusted library allocation
page read and write
775000
heap
page read and write
28FF000
stack
page read and write
774000
heap
page read and write
3E7E000
stack
page read and write
775000
heap
page read and write
F6F000
unkown
page execute and write copy
4571000
heap
page read and write
61ECD000
direct allocation
page readonly
775000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
269E000
stack
page read and write
1444000
heap
page read and write
336F000
stack
page read and write
3227000
heap
page read and write
1176000
unkown
page execute and write copy
390E000
stack
page read and write
1D047000
heap
page read and write
4481000
heap
page read and write
363F000
stack
page read and write
950000
heap
page read and write
F98000
unkown
page execute and write copy
5181000
heap
page read and write
674000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
1C9000
unkown
page write copy
774000
heap
page read and write
6C8C5000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
15D4000
heap
page read and write
4481000
heap
page read and write
DE5000
unkown
page execute and read and write
774000
heap
page read and write
F9C000
unkown
page execute and read and write
D2C000
heap
page read and write
3D3E000
stack
page read and write
775000
heap
page read and write
774000
heap
page read and write
45EE000
stack
page read and write
4E71000
heap
page read and write
5430000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
39DF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
31CE000
stack
page read and write
EB6000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4DBE000
stack
page read and write
5211000
heap
page read and write
50A0000
direct allocation
page execute and read and write
4571000
heap
page read and write
2B4E000
stack
page read and write
15D4000
heap
page read and write
B90000
heap
page read and write
80E000
stack
page read and write
15D4000
heap
page read and write
775000
heap
page read and write
1D03F000
heap
page read and write
5181000
heap
page read and write
774000
heap
page read and write
5A0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
17E4000
heap
page read and write
4AC1000
heap
page read and write
45FE000
stack
page read and write
5181000
heap
page read and write
36C000
unkown
page execute and write copy
396E000
stack
page read and write
CDD000
heap
page read and write
D54000
heap
page read and write
D46000
heap
page read and write
17E4000
heap
page read and write
4A00000
direct allocation
page read and write
A40000
direct allocation
page read and write
5370000
direct allocation
page read and write
4481000
heap
page read and write
4571000
heap
page read and write
F69000
unkown
page execute and write copy
1175000
unkown
page execute and write copy
4411000
heap
page read and write
D54000
heap
page read and write
15B0000
direct allocation
page read and write
48A0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D050000
heap
page read and write
61F000
heap
page read and write
774000
heap
page read and write
D30000
direct allocation
page read and write
61EB7000
direct allocation
page readonly
1444000
heap
page read and write
52D0000
direct allocation
page read and write
774000
heap
page read and write
1D048000
heap
page read and write
774000
heap
page read and write
F7E000
unkown
page execute and write copy
C70000
direct allocation
page execute and read and write
F6E000
unkown
page execute and read and write
C60000
direct allocation
page execute and read and write
15D4000
heap
page read and write
BA4000
heap
page read and write
D46000
unkown
page write copy
319F000
stack
page read and write
774000
heap
page read and write
EE6000
unkown
page execute and read and write
774000
heap
page read and write
1650000
direct allocation
page read and write
353E000
stack
page read and write
4571000
heap
page read and write
774000
heap
page read and write
1D0D1000
heap
page read and write
775000
heap
page read and write
333E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
1D03D000
heap
page read and write
1002000
unkown
page execute and read and write
17E4000
heap
page read and write
B29000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1CB000
unkown
page execute and write copy
4FB1000
heap
page read and write
774000
heap
page read and write
1D05E000
heap
page read and write
55A0000
direct allocation
page execute and read and write
4FC0000
heap
page read and write
4CBF000
stack
page read and write
4FB1000
heap
page read and write
1004000
unkown
page execute and write copy
D46000
unkown
page write copy
405E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
774000
heap
page read and write
15D4000
heap
page read and write
4571000
heap
page read and write
9AC000
stack
page read and write
31BF000
stack
page read and write
4ADE000
stack
page read and write
D30000
unkown
page read and write
15D4000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
556F000
stack
page read and write
46D000
unkown
page execute and write copy
774000
heap
page read and write
4B2F000
stack
page read and write
775000
heap
page read and write
1225000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
1400000
heap
page read and write
774000
heap
page read and write
1D048000
heap
page read and write
774000
heap
page read and write
26DB000
stack
page read and write
F69000
unkown
page execute and write copy
FF3000
unkown
page execute and write copy
774000
heap
page read and write
17E4000
heap
page read and write
4480000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1650000
direct allocation
page read and write
32DE000
stack
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
1D037000
heap
page read and write
313F000
stack
page read and write
A2D000
unkown
page execute and write copy
4D5F000
stack
page read and write
4AC1000
heap
page read and write
169E000
stack
page read and write
774000
heap
page read and write
2F3F000
stack
page read and write
1318000
unkown
page execute and write copy
5510000
trusted library allocation
page read and write
774000
heap
page read and write
1D37E000
stack
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
3A7F000
stack
page read and write
D40000
unkown
page readonly
4C7E000
stack
page read and write
392F000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
1444000
heap
page read and write
774000
heap
page read and write
52EE000
stack
page read and write
774000
heap
page read and write
76E000
stack
page read and write
774000
heap
page read and write
5181000
heap
page read and write
D33000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
467F000
stack
page read and write
774000
heap
page read and write
1444000
heap
page read and write
774000
heap
page read and write
161000
unkown
page execute and write copy
774000
heap
page read and write
51E0000
direct allocation
page read and write
4571000
heap
page read and write
33FE000
stack
page read and write
2A7E000
stack
page read and write
1D05A000
heap
page read and write
17E4000
heap
page read and write
F80000
unkown
page execute and read and write
4A4F000
stack
page read and write
365F000
stack
page read and write
774000
heap
page read and write
D30000
direct allocation
page read and write
4AC1000
heap
page read and write
5181000
heap
page read and write
C4E000
stack
page read and write
1D61E000
stack
page read and write
5FDE000
stack
page read and write
3A7F000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
293E000
stack
page read and write
674000
heap
page read and write
52C0000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
15D4000
heap
page read and write
15D0000
heap
page read and write
D56000
unkown
page execute and write copy
774000
heap
page read and write
1D051000
heap
page read and write
368E000
stack
page read and write
32CE000
stack
page read and write
350F000
stack
page read and write
4481000
heap
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
B28000
heap
page read and write
774000
heap
page read and write
1CB000
unkown
page execute and write copy
4481000
heap
page read and write
3BFE000
stack
page read and write
436E000
stack
page read and write
774000
heap
page read and write
5466000
direct allocation
page read and write
3070000
heap
page read and write
4F9000
stack
page read and write
447F000
stack
page read and write
4E70000
heap
page read and write
2DCE000
stack
page read and write
4E71000
heap
page read and write
BA0000
direct allocation
page read and write
774000
heap
page read and write
6C6CE000
unkown
page read and write
4FB1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
674000
heap
page read and write
1D020000
heap
page read and write
53E0000
heap
page read and write
15D4000
heap
page read and write
1D048000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
4E71000
heap
page read and write
4481000
heap
page read and write
D1E000
heap
page read and write
4571000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
1D051000
heap
page read and write
17E4000
heap
page read and write
382E000
stack
page read and write
48C0000
trusted library allocation
page read and write
156E000
stack
page read and write
3C9E000
stack
page read and write
329E000
stack
page read and write
F5B000
unkown
page execute and read and write
775000
heap
page read and write
40FE000
stack
page read and write
3E0E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
540000
heap
page read and write
5440000
direct allocation
page execute and read and write
4E71000
heap
page read and write
774000
heap
page read and write
61ED3000
direct allocation
page read and write
D10000
direct allocation
page read and write
15B0000
direct allocation
page read and write
774000
heap
page read and write
445E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
407E000
stack
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
487E000
stack
page read and write
774000
heap
page read and write
BA0000
direct allocation
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
3C0000
unkown
page execute and write copy
5B05000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
C81000
unkown
page execute and write copy
4571000
heap
page read and write
774000
heap
page read and write
1317000
unkown
page execute and read and write
BA0000
direct allocation
page read and write
421F000
stack
page read and write
774000
heap
page read and write
1D046000
heap
page read and write
401F000
stack
page read and write
774000
heap
page read and write
C80000
unkown
page read and write
4AC1000
heap
page read and write
775000
heap
page read and write
38BF000
stack
page read and write
230BB000
heap
page read and write
5181000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
4AC2000
heap
page read and write
46C000
unkown
page execute and write copy
774000
heap
page read and write
15D4000
heap
page read and write
F10000
unkown
page execute and write copy
455F000
stack
page read and write
1D05E000
heap
page read and write
774000
heap
page read and write
35A000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
C6E000
stack
page read and write
774000
heap
page read and write
4571000
heap
page read and write
59B6000
heap
page read and write
774000
heap
page read and write
3CF000
unkown
page execute and read and write
D30000
direct allocation
page read and write
1D02B000
heap
page read and write
1D4EE000
stack
page read and write
834000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
33CF000
stack
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1150000
heap
page read and write
774000
heap
page read and write
F9A000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1CEAF000
stack
page read and write
EDC000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
1D06C000
heap
page read and write
15D4000
heap
page read and write
5370000
heap
page read and write
774000
heap
page read and write
45C000
unkown
page execute and write copy
4AC1000
heap
page read and write
F59000
unkown
page execute and write copy
2C3F000
stack
page read and write
6271000
heap
page read and write
774000
heap
page read and write
3E6E000
stack
page read and write
4E9F000
stack
page read and write
42FE000
stack
page read and write
429F000
stack
page read and write
774000
heap
page read and write
F48000
unkown
page execute and read and write
AA0000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
D0E000
heap
page read and write
5220000
heap
page read and write
775000
heap
page read and write
D67000
unkown
page execute and read and write
5370000
direct allocation
page read and write
4E71000
heap
page read and write
161000
unkown
page execute and write copy
774000
heap
page read and write
1D5F0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
49B0000
trusted library allocation
page read and write
3E9000
unkown
page execute and write copy
422E000
stack
page read and write
160000
unkown
page readonly
B80000
heap
page read and write
774000
heap
page read and write
1D03F000
heap
page read and write
774000
heap
page read and write
F32000
unkown
page execute and write copy
15D4000
heap
page read and write
331F000
stack
page read and write
BA4000
heap
page read and write
1175000
unkown
page execute and read and write
4481000
heap
page read and write
774000
heap
page read and write
F2F000
unkown
page execute and write copy
D0E000
unkown
page execute and read and write
774000
heap
page read and write
4E71000
heap
page read and write
50C0000
direct allocation
page execute and read and write
5BD6000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
D4F000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
4750000
direct allocation
page read and write
BA4000
heap
page read and write
F6B000
unkown
page execute and write copy
160000
unkown
page read and write
EB8000
unkown
page execute and read and write
340E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
840C000
stack
page read and write
436E000
stack
page read and write
EDB000
unkown
page execute and write copy
15D4000
heap
page read and write
2F4E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
44DD000
stack
page read and write
ABC000
unkown
page execute and read and write
1430000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
42BF000
stack
page read and write
542E000
stack
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
489E000
stack
page read and write
46D000
unkown
page execute and write copy
41DE000
stack
page read and write
774000
heap
page read and write
D55000
unkown
page execute and read and write
D54000
unkown
page execute and write copy
774000
heap
page read and write
5181000
heap
page read and write
496F000
stack
page read and write
4411000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
393F000
stack
page read and write
5760000
heap
page read and write
354E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
54F0000
trusted library allocation
page read and write
BA4000
heap
page read and write
D42000
unkown
page execute and write copy
4A10000
direct allocation
page execute and read and write
36AF000
stack
page read and write
15D4000
heap
page read and write
B3A000
unkown
page execute and read and write
4BEF000
stack
page read and write
775000
heap
page read and write
D42000
unkown
page execute and write copy
774000
heap
page read and write
4571000
heap
page read and write
17E4000
heap
page read and write
1D039000
heap
page read and write
774000
heap
page read and write
F52000
unkown
page execute and read and write
4E71000
heap
page read and write
33DE000
stack
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
31BF000
stack
page read and write
4481000
heap
page read and write
17E4000
heap
page read and write
48A0000
direct allocation
page execute and read and write
EB8000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
4FFF000
stack
page read and write
4571000
heap
page read and write
4FB1000
heap
page read and write
D6B000
heap
page read and write
774000
heap
page read and write
43E1000
heap
page read and write
1D051000
heap
page read and write
774000
heap
page read and write
488E000
stack
page read and write
774000
heap
page read and write
5181000
heap
page read and write
774000
heap
page read and write
37CE000
stack
page read and write
774000
heap
page read and write
26E0000
direct allocation
page read and write
D42000
unkown
page execute and read and write
17E4000
heap
page read and write
17E4000
heap
page read and write
9E4000
heap
page read and write
774000
heap
page read and write
850C000
stack
page read and write
39FF000
stack
page read and write
4750000
direct allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
48B0000
trusted library allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
16B0000
direct allocation
page execute and read and write
449000
unkown
page execute and write copy
61E01000
direct allocation
page execute read
17E4000
heap
page read and write
1CB000
unkown
page execute and read and write
233CA000
heap
page read and write
4571000
heap
page read and write
1317000
unkown
page execute and read and write
3BC000
unkown
page execute and write copy
775000
heap
page read and write
4AC1000
heap
page read and write
AA6000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4601000
heap
page read and write
8D4000
heap
page read and write
3BAF000
stack
page read and write
AE1000
unkown
page execute and read and write
6C8C0000
unkown
page read and write
300E000
stack
page read and write
F7E000
unkown
page execute and write copy
C80000
unkown
page read and write
45DF000
stack
page read and write
36EE000
stack
page read and write
1444000
heap
page read and write
774000
heap
page read and write
4571000
heap
page read and write
BA0000
direct allocation
page read and write
D30000
direct allocation
page read and write
377F000
stack
page read and write
774000
heap
page read and write
4F7E000
stack
page read and write
359000
unkown
page execute and write copy
3B3F000
stack
page read and write
4571000
heap
page read and write
774000
heap
page read and write
D40000
unkown
page read and write
2EDF000
stack
page read and write
4E71000
heap
page read and write
2FDF000
stack
page read and write
34D000
unkown
page execute and write copy
4560000
direct allocation
page read and write
48D0000
trusted library allocation
page read and write
774000
heap
page read and write
FF3000
unkown
page execute and write copy
1444000
heap
page read and write
4740000
trusted library allocation
page read and write
15D4000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
17E4000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
315E000
stack
page read and write
1CA8F000
stack
page read and write
30BE000
stack
page read and write
CAE000
stack
page read and write
1134000
unkown
page execute and read and write
15B0000
direct allocation
page read and write
326F000
stack
page read and write
4700000
heap
page read and write
5181000
heap
page read and write
3C0000
unkown
page execute and write copy
4411000
heap
page read and write
1D140000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
26E0000
direct allocation
page read and write
4AC0000
direct allocation
page execute and read and write
774000
heap
page read and write
26E0000
direct allocation
page read and write
774000
heap
page read and write
F06000
unkown
page execute and write copy
774000
heap
page read and write
15D4000
heap
page read and write
6C6E0000
unkown
page readonly
774000
heap
page read and write
52BD000
stack
page read and write
427000
unkown
page execute and read and write
482F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
1650000
direct allocation
page read and write
F99000
unkown
page execute and read and write
151F000
stack
page read and write
3A1F000
stack
page read and write
17E4000
heap
page read and write
34FF000
stack
page read and write
774000
heap
page read and write
3E1E000
stack
page read and write
15D4000
heap
page read and write
4AC1000
heap
page read and write
17E4000
heap
page read and write
F5B000
unkown
page execute and read and write
17E0000
heap
page read and write
15D4000
heap
page read and write
4E71000
heap
page read and write
2A3F000
stack
page read and write
A5E000
unkown
page execute and read and write
789D000
stack
page read and write
774000
heap
page read and write
F2F000
unkown
page execute and write copy
775000
heap
page read and write
EE6000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
AFE000
stack
page read and write
3FF000
unkown
page execute and write copy
4AC1000
heap
page read and write
774000
heap
page read and write
4A80000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
29DF000
stack
page read and write
2E9F000
stack
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
49AE000
stack
page read and write
40AF000
stack
page read and write
D30000
direct allocation
page read and write
259E000
stack
page read and write
4481000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
C60000
direct allocation
page execute and read and write
774000
heap
page read and write
43E1000
heap
page read and write
176F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
48A4000
trusted library allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
CDD000
heap
page read and write
4910000
direct allocation
page read and write
774000
heap
page read and write
2BBE000
stack
page read and write
146B000
heap
page read and write
46C000
unkown
page execute and read and write
6E2E000
stack
page read and write
4850000
trusted library allocation
page read and write
4571000
heap
page read and write
3C7F000
stack
page read and write
EDB000
unkown
page execute and write copy
3EFF000
stack
page read and write
774000
heap
page read and write
4B50000
direct allocation
page execute and read and write
26E0000
direct allocation
page read and write
507F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
774000
heap
page read and write
1D049000
heap
page read and write
F07000
unkown
page execute and read and write
4AC1000
heap
page read and write
1DB2C000
stack
page read and write
774000
heap
page read and write
403F000
stack
page read and write
2EDE000
stack
page read and write
17E4000
heap
page read and write
7E0000
direct allocation
page read and write
774000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
775000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
3BEE000
stack
page read and write
830000
direct allocation
page execute and read and write
774000
heap
page read and write
3FBE000
stack
page read and write
4AC1000
heap
page read and write
1D058000
heap
page read and write
1C9000
unkown
page write copy
5200000
direct allocation
page read and write
4571000
heap
page read and write
329F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
5170000
direct allocation
page read and write
3E9000
unkown
page execute and write copy
7CE000
stack
page read and write
4AC1000
heap
page read and write
473E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
37FF000
stack
page read and write
3EDF000
stack
page read and write
15D4000
heap
page read and write
5170000
direct allocation
page read and write
489C000
stack
page read and write
775000
heap
page read and write
49DF000
stack
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
357000
unkown
page execute and read and write
17E4000
heap
page read and write
15D4000
heap
page read and write
2F7E000
stack
page read and write
1D05E000
heap
page read and write
F23000
unkown
page execute and read and write
774000
heap
page read and write
7E0000
direct allocation
page read and write
46EE000
stack
page read and write
774000
heap
page read and write
D47000
heap
page read and write
3F0F000
stack
page read and write
1650000
direct allocation
page read and write
4DFF000
stack
page read and write
774000
heap
page read and write
5218000
heap
page read and write
4A00000
direct allocation
page execute and read and write
385E000
stack
page read and write
49D0000
direct allocation
page execute and read and write
774000
heap
page read and write
4AC1000
heap
page read and write
46C000
unkown
page execute and read and write
15D4000
heap
page read and write
775000
heap
page read and write
4670000
trusted library allocation
page read and write
774000
heap
page read and write
4571000
heap
page read and write
BA4000
heap
page read and write
3DDF000
stack
page read and write
BB0000
heap
page read and write
4481000
heap
page read and write
4560000
direct allocation
page read and write
3BBF000
stack
page read and write
54C4000
trusted library allocation
page read and write
4FB1000
heap
page read and write
3E6E000
stack
page read and write
D0B000
heap
page read and write
775000
heap
page read and write
17E4000
heap
page read and write
4A20000
direct allocation
page execute and read and write
774000
heap
page read and write
1225000
unkown
page execute and read and write
471F000
stack
page read and write
35BE000
stack
page read and write
3C5E000
stack
page read and write
F0E000
unkown
page execute and write copy
2A1E000
stack
page read and write
B55000
heap
page read and write
1CEBD000
stack
page read and write
61ED0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D12F000
stack
page read and write
674000
heap
page read and write
6C8BF000
unkown
page write copy
774000
heap
page read and write
43FF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
327F000
stack
page read and write
307F000
stack
page read and write
774000
heap
page read and write
BA0000
direct allocation
page read and write
F5C000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
3B1F000
stack
page read and write
63B000
heap
page read and write
1DC7E000
stack
page read and write
17E4000
heap
page read and write
4481000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
5E9E000
stack
page read and write
1D33F000
stack
page read and write
B37000
unkown
page execute and write copy
47FE000
stack
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
15D4000
heap
page read and write
17E4000
heap
page read and write
391000
unkown
page execute and read and write
774000
heap
page read and write
5181000
heap
page read and write
4481000
heap
page read and write
4481000
heap
page read and write
4D9E000
stack
page read and write
3F1F000
stack
page read and write
499F000
stack
page read and write
775000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
840000
heap
page read and write
351F000
stack
page read and write
251E000
stack
page read and write
437E000
stack
page read and write
5350000
heap
page read and write
D00000
heap
page read and write
29FF000
stack
page read and write
CFC000
heap
page read and write
4FB1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
774000
heap
page read and write
25F7000
heap
page read and write
2B7F000
stack
page read and write
775000
heap
page read and write
37BE000
stack
page read and write
5181000
heap
page read and write
4481000
heap
page read and write
1C98E000
stack
page read and write
C60000
direct allocation
page execute and read and write
4481000
heap
page read and write
9E4000
heap
page read and write
9E0000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
1226000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
F9C000
unkown
page execute and read and write
4481000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
342000
unkown
page execute and read and write
1670000
heap
page read and write
774000
heap
page read and write
1AC000
stack
page read and write
C81000
unkown
page execute and write copy
6CEE000
stack
page read and write
4A20000
direct allocation
page execute and read and write
774000
heap
page read and write
60DF000
stack
page read and write
1460000
heap
page read and write
774000
heap
page read and write
2D8F000
stack
page read and write
449F000
stack
page read and write
774000
heap
page read and write
674000
heap
page read and write
165E000
stack
page read and write
F98000
unkown
page execute and write copy
4AC1000
heap
page read and write
774000
heap
page read and write
F07000
unkown
page execute and read and write
F69000
unkown
page execute and write copy
774000
heap
page read and write
160000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5450000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
17E4000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
37D000
unkown
page execute and write copy
430E000
stack
page read and write
774000
heap
page read and write
D1E000
heap
page read and write
774000
heap
page read and write
A40000
direct allocation
page read and write
3E9E000
stack
page read and write
161000
unkown
page execute and write copy
38FE000
stack
page read and write
391E000
stack
page read and write
3B4F000
stack
page read and write
4481000
heap
page read and write
1D2AE000
stack
page read and write
4481000
heap
page read and write
4ABF000
stack
page read and write
D5C000
heap
page read and write
774000
heap
page read and write
F0F000
unkown
page execute and read and write
774000
heap
page read and write
775000
heap
page read and write
4571000
heap
page read and write
4FB1000
heap
page read and write
CB7000
unkown
page execute and read and write
160000
unkown
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
37FF000
stack
page read and write
49AE000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
314F000
stack
page read and write
A40000
direct allocation
page read and write
3E3F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
F59000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
40EE000
stack
page read and write
341E000
stack
page read and write
42DE000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
D6C000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
F06000
unkown
page execute and write copy
109C000
stack
page read and write
1D066000
heap
page read and write
C80000
unkown
page readonly
1D050000
heap
page read and write
9E4000
heap
page read and write
40EE000
stack
page read and write
5310000
trusted library allocation
page read and write
6C6D2000
unkown
page readonly
5170000
direct allocation
page read and write
1444000
heap
page read and write
775000
heap
page read and write
F60000
unkown
page execute and read and write
774000
heap
page read and write
5211000
heap
page read and write
774000
heap
page read and write
446F000
stack
page read and write
15D4000
heap
page read and write
DB4000
unkown
page execute and read and write
774000
heap
page read and write
4BC0000
trusted library allocation
page read and write
42BF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
93D000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
5170000
direct allocation
page read and write
4FB1000
heap
page read and write
D30000
direct allocation
page read and write
8B7000
unkown
page execute and write copy
BA4000
heap
page read and write
BA0000
direct allocation
page read and write
4481000
heap
page read and write
15D4000
heap
page read and write
F23000
unkown
page execute and read and write
4AC1000
heap
page read and write
774000
heap
page read and write
1DD7F000
stack
page read and write
774000
heap
page read and write
45C000
unkown
page execute and write copy
626C000
stack
page read and write
A40000
direct allocation
page read and write
303E000
stack
page read and write
EEF000
unkown
page execute and read and write
774000
heap
page read and write
1D03B000
heap
page read and write
775000
heap
page read and write
775000
heap
page read and write
5211000
heap
page read and write
54FB000
trusted library allocation
page execute and read and write
1D051000
heap
page read and write
BA4000
heap
page read and write
1D1FF000
stack
page read and write
774000
heap
page read and write
1C2000
unkown
page execute and read and write
F5B000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
45BF000
stack
page read and write
496E000
stack
page read and write
775000
heap
page read and write
630000
heap
page read and write
810000
direct allocation
page read and write
453F000
stack
page read and write
ECC000
unkown
page execute and read and write
3F5E000
stack
page read and write
35BE000
stack
page read and write
775000
heap
page read and write
F35000
unkown
page execute and read and write
15D4000
heap
page read and write
774000
heap
page read and write
C60000
direct allocation
page read and write
775000
heap
page read and write
F07000
unkown
page execute and read and write
4AC1000
heap
page read and write
1D045000
heap
page read and write
4E71000
heap
page read and write
15D4000
heap
page read and write
316E000
stack
page read and write
D4A000
unkown
page execute and read and write
3CEF000
stack
page read and write
BA0000
direct allocation
page read and write
4AC1000
heap
page read and write
4AAF000
stack
page read and write
840000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
1C7000
stack
page read and write
674000
heap
page read and write
32BE000
stack
page read and write
26E0000
direct allocation
page read and write
3CDE000
stack
page read and write
3A6F000
stack
page read and write
774000
heap
page read and write
461E000
stack
page read and write
9E0000
heap
page read and write
1444000
heap
page read and write
BA4000
heap
page read and write
3077000
heap
page read and write
D1E000
heap
page read and write
774000
heap
page read and write
990000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4910000
direct allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
4571000
heap
page read and write
1D03F000
heap
page read and write
F35000
unkown
page execute and read and write
2A01C000
stack
page read and write
4481000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
9DE000
stack
page read and write
BDE000
stack
page read and write
774000
heap
page read and write
441F000
stack
page read and write
4571000
heap
page read and write
37EF000
stack
page read and write
3BEE000
stack
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
1D03D000
heap
page read and write
F88000
unkown
page execute and write copy
1D5000
unkown
page execute and write copy
4E6F000
stack
page read and write
628E000
heap
page read and write
45C000
unkown
page execute and write copy
1D050000
heap
page read and write
670000
heap
page read and write
774000
heap
page read and write
4920000
heap
page execute and read and write
6C7D000
stack
page read and write
4C3B000
stack
page read and write
D05000
heap
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
14A8000
heap
page read and write
45C000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
357F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
CC5000
heap
page read and write
6C87F000
unkown
page readonly
1317000
unkown
page execute and read and write
4A30000
direct allocation
page execute and read and write
4481000
heap
page read and write
4AC1000
heap
page read and write
17E4000
heap
page read and write
9F0000
heap
page read and write
2A021000
heap
page read and write
4A3C000
stack
page read and write
1D37E000
stack
page read and write
403F000
stack
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
1175000
unkown
page execute and read and write
606000
heap
page read and write
F6E000
unkown
page execute and read and write
3DDE000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
486E000
stack
page read and write
1D05E000
heap
page read and write
BA4000
heap
page read and write
17AE000
stack
page read and write
774000
heap
page read and write
4B90000
direct allocation
page execute and read and write
49B0000
direct allocation
page execute and read and write
774000
heap
page read and write
F9C000
unkown
page execute and read and write
26FD000
heap
page read and write
1444000
heap
page read and write
830000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
408E000
stack
page read and write
DAF000
stack
page read and write
15AE000
stack
page read and write
774000
heap
page read and write
49F0000
direct allocation
page execute and read and write
774000
heap
page read and write
F6F000
unkown
page execute and write copy
774000
heap
page read and write
17E4000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
C4B000
heap
page read and write
36EE000
stack
page read and write
F23000
unkown
page execute and read and write
3F7F000
stack
page read and write
774000
heap
page read and write
41BE000
stack
page read and write
7040000
heap
page read and write
774000
heap
page read and write
13C8000
unkown
page execute and write copy
775000
heap
page read and write
5F3000
heap
page read and write
317E000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
AC1000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
4FAF000
stack
page read and write
774000
heap
page read and write
4BEF000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
1640000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
D55000
unkown
page execute and read and write
15D4000
heap
page read and write
774000
heap
page read and write
9E4000
heap
page read and write
774000
heap
page read and write
56B1000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
FF3000
unkown
page execute and write copy
1D043000
heap
page read and write
C8E000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
4B20000
direct allocation
page execute and read and write
BA4000
heap
page read and write
A4C000
unkown
page execute and write copy
54D0000
trusted library allocation
page read and write
5170000
direct allocation
page read and write
9F0000
heap
page read and write
3CBE000
stack
page read and write
6C640000
unkown
page readonly
774000
heap
page read and write
774000
heap
page read and write
48A0000
direct allocation
page read and write
5211000
heap
page read and write
770000
heap
page read and write
774000
heap
page read and write
391000
unkown
page execute and read and write
307F000
stack
page read and write
774000
heap
page read and write
7E0000
direct allocation
page read and write
AFE000
heap
page read and write
A9C000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
820000
direct allocation
page execute and read and write
774000
heap
page read and write
17E4000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
1004000
unkown
page execute and write copy
4A90000
direct allocation
page execute and read and write
774000
heap
page read and write
304E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
4A00000
direct allocation
page read and write
25DE000
stack
page read and write
4C1F000
stack
page read and write
1444000
heap
page read and write
2ADF000
stack
page read and write
774000
heap
page read and write
61EB4000
direct allocation
page read and write
774000
heap
page read and write
309E000
stack
page read and write
17E4000
heap
page read and write
34D000
unkown
page execute and read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
472E000
stack
page read and write
774000
heap
page read and write
6C6E1000
unkown
page execute read
774000
heap
page read and write
674000
heap
page read and write
A5F000
unkown
page execute and write copy
A90000
heap
page read and write
6F6E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
B97000
heap
page read and write
BA4000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
160000
unkown
page readonly
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5200000
direct allocation
page read and write
4571000
heap
page read and write
1444000
heap
page read and write
774000
heap
page read and write
493E000
stack
page read and write
79E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
2C9E000
stack
page read and write
9E4000
heap
page read and write
482F000
stack
page read and write
17E4000
heap
page read and write
1166000
unkown
page execute and read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
435F000
stack
page read and write
4FB1000
heap
page read and write
774000
heap
page read and write
33BF000
stack
page read and write
D30000
direct allocation
page read and write
41CE000
stack
page read and write
15D4000
heap
page read and write
C70000
direct allocation
page execute and read and write
6C6BD000
unkown
page readonly
233D2000
heap
page read and write
1444000
heap
page read and write
F0E000
unkown
page execute and write copy
4AC1000
heap
page read and write
7E0000
direct allocation
page read and write
774000
heap
page read and write
5200000
direct allocation
page read and write
161000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
1D88C000
stack
page read and write
774000
heap
page read and write
271F000
stack
page read and write
CB5000
heap
page read and write
A40000
direct allocation
page read and write
25E0000
heap
page read and write
774000
heap
page read and write
1D5000
unkown
page execute and write copy
510000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
456000
unkown
page execute and read and write
3A0F000
stack
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
2F1E000
stack
page read and write
40AF000
stack
page read and write
EB8000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
44A0000
heap
page read and write
774000
heap
page read and write
2D7F000
stack
page read and write
38DF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
32FF000
stack
page read and write
D42000
unkown
page execute and write copy
4560000
direct allocation
page read and write
5181000
heap
page read and write
1D051000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
EE6000
unkown
page execute and read and write
375F000
stack
page read and write
774000
heap
page read and write
EF8000
unkown
page execute and read and write
397E000
stack
page read and write
775000
heap
page read and write
1D05E000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
3B7E000
stack
page read and write
775000
heap
page read and write
4E71000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
D16000
unkown
page execute and read and write
774000
heap
page read and write
C60000
direct allocation
page execute and read and write
15D4000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
AA0000
unkown
page execute and write copy
4A00000
direct allocation
page execute and read and write
5EC000
stack
page read and write
46B000
stack
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
D16000
unkown
page execute and read and write
F6A000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
48D0000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
17E5000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
D10000
heap
page read and write
1D037000
heap
page read and write
774000
heap
page read and write
5610000
heap
page execute and read and write
841000
unkown
page execute and write copy
15D4000
heap
page read and write
34DF000
stack
page read and write
3C9E000
stack
page read and write
A40000
direct allocation
page read and write
1444000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
497F000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
16CE000
heap
page read and write
3C7F000
stack
page read and write
1D047000
heap
page read and write
1002000
unkown
page execute and read and write
D30000
unkown
page readonly
774000
heap
page read and write
48AD000
trusted library allocation
page execute and read and write
29F1B000
stack
page read and write
D0B000
stack
page read and write
2ECF000
stack
page read and write
4571000
heap
page read and write
A5A000
heap
page read and write
774000
heap
page read and write
4D2F000
stack
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
1D047000
heap
page read and write
17C0000
direct allocation
page execute and read and write
EE5000
unkown
page execute and write copy
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
32BE000
stack
page read and write
4FB1000
heap
page read and write
1D33F000
stack
page read and write
774000
heap
page read and write
F60000
unkown
page execute and read and write
774000
heap
page read and write
4571000
heap
page read and write
66B4000
trusted library allocation
page read and write
A3E000
stack
page read and write
52B4000
trusted library allocation
page read and write
1D47E000
stack
page read and write
A40000
direct allocation
page read and write
774000
heap
page read and write
775000
heap
page read and write
36DF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
2AFF000
stack
page read and write
4AC1000
heap
page read and write
1D059000
heap
page read and write
41FF000
stack
page read and write
774000
heap
page read and write
A40000
direct allocation
page read and write
6B0000
heap
page read and write
5200000
direct allocation
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
674000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
299F000
stack
page read and write
1D051000
heap
page read and write
774000
heap
page read and write
F50000
unkown
page execute and write copy
4B70000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
5620000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
1D049000
heap
page read and write
1444000
heap
page read and write
8F5000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
28DF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
830000
heap
page read and write
4B00000
heap
page read and write
BA4000
heap
page read and write
419F000
stack
page read and write
8A2000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
F59000
unkown
page execute and write copy
775000
heap
page read and write
3CD000
unkown
page execute and write copy
1166000
unkown
page execute and read and write
15D4000
heap
page read and write
B7E000
stack
page read and write
A36000
unkown
page execute and write copy
3F1E000
stack
page read and write
775000
heap
page read and write
15D4000
heap
page read and write
44AE000
stack
page read and write
1C2000
unkown
page execute and write copy
233D3000
heap
page read and write
33DF000
stack
page read and write
43E1000
heap
page read and write
381F000
stack
page read and write
1D05E000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4A80000
direct allocation
page execute and read and write
774000
heap
page read and write
A39000
unkown
page execute and write copy
774000
heap
page read and write
4A3F000
stack
page read and write
48FF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
4B00000
direct allocation
page execute and read and write
1D051000
heap
page read and write
409E000
stack
page read and write
4D6E000
stack
page read and write
3DBF000
stack
page read and write
4571000
heap
page read and write
774000
heap
page read and write
433F000
stack
page read and write
28FF000
stack
page read and write
774000
heap
page read and write
3AD000
unkown
page execute and write copy
774000
heap
page read and write
807000
heap
page read and write
17E4000
heap
page read and write
D4A000
unkown
page execute and read and write
3B3F000
stack
page read and write
1D7000
unkown
page execute and write copy
38BF000
stack
page read and write
774000
heap
page read and write
7030000
heap
page read and write
445000
unkown
page execute and write copy
37EF000
stack
page read and write
1444000
heap
page read and write
5200000
direct allocation
page read and write
17E4000
heap
page read and write
1D3ED000
stack
page read and write
231F0000
trusted library allocation
page read and write
54AE000
stack
page read and write
7E0000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
494B000
stack
page read and write
1D036000
heap
page read and write
5360000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
ADF000
heap
page read and write
774000
heap
page read and write
F76000
unkown
page execute and read and write
31FE000
stack
page read and write
52D0000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
5200000
direct allocation
page read and write
4FB1000
heap
page read and write
ADF000
unkown
page execute and write copy
49F0000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
393F000
stack
page read and write
1D78D000
stack
page read and write
BA4000
heap
page read and write
EEE000
unkown
page execute and write copy
EEE000
unkown
page execute and write copy
16D0000
heap
page read and write
1C3000
stack
page read and write
4B3F000
stack
page read and write
EE5000
unkown
page execute and write copy
5170000
direct allocation
page read and write
455000
unkown
page execute and write copy
17E4000
heap
page read and write
172E000
heap
page read and write
D40000
unkown
page readonly
61E00000
direct allocation
page execute and read and write
774000
heap
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
1134000
unkown
page execute and read and write
774000
heap
page read and write
1D06C000
heap
page read and write
4FB1000
heap
page read and write
1D03E000
heap
page read and write
15D4000
heap
page read and write
4571000
heap
page read and write
5AA000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D03F000
heap
page read and write
1D066000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
41BE000
stack
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D78D000
stack
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
4A20000
direct allocation
page execute and read and write
774000
heap
page read and write
D55000
heap
page read and write
34FF000
stack
page read and write
4FB1000
heap
page read and write
382E000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
4481000
heap
page read and write
15D4000
heap
page read and write
706E000
stack
page read and write
37BE000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
4560000
direct allocation
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
1002000
unkown
page execute and write copy
4EAE000
stack
page read and write
1D4BE000
stack
page read and write
4571000
heap
page read and write
774000
heap
page read and write
B35000
unkown
page execute and write copy
BA4000
heap
page read and write
774000
heap
page read and write
4A70000
direct allocation
page execute and read and write
437E000
stack
page read and write
774000
heap
page read and write
4481000
heap
page read and write
496F000
stack
page read and write
7E0000
direct allocation
page read and write
1DA04000
heap
page read and write
4AC1000
heap
page read and write
15D4000
heap
page read and write
35AE000
stack
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
1650000
direct allocation
page read and write
396E000
stack
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
17E4000
heap
page read and write
9E4000
heap
page read and write
1444000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
332F000
stack
page read and write
1166000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
774000
heap
page read and write
36FE000
stack
page read and write
774000
heap
page read and write
940000
heap
page read and write
4560000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D051000
heap
page read and write
4AC1000
heap
page read and write
4610000
heap
page read and write
CEC000
stack
page read and write
1D47F000
stack
page read and write
774000
heap
page read and write
120D000
unkown
page execute and read and write
1444000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
1D065000
heap
page read and write
F35000
unkown
page execute and read and write
D74000
heap
page read and write
44BE000
stack
page read and write
EF6000
unkown
page execute and write copy
17E4000
heap
page read and write
4FB1000
heap
page read and write
3A6F000
stack
page read and write
4AC1000
heap
page read and write
445000
unkown
page execute and write copy
26FB000
heap
page read and write
15D4000
heap
page read and write
A40000
direct allocation
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
1D050000
heap
page read and write
4C5E000
stack
page read and write
49BE000
stack
page read and write
50B0000
trusted library allocation
page read and write
83C000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1520000
heap
page read and write
2C1F000
stack
page read and write
774000
heap
page read and write
4A90000
direct allocation
page execute and read and write
BA4000
heap
page read and write
3CA000
unkown
page execute and write copy
775000
heap
page read and write
17E4000
heap
page read and write
58E000
stack
page read and write
47BF000
stack
page read and write
1444000
heap
page read and write
3E2F000
stack
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
379F000
stack
page read and write
D4A000
unkown
page execute and read and write
774000
heap
page read and write
CB7000
unkown
page execute and read and write
4490000
heap
page read and write
1D067000
heap
page read and write
D30000
direct allocation
page read and write
2E3C000
stack
page read and write
3D8000
unkown
page execute and write copy
3DC000
unkown
page execute and read and write
31FE000
stack
page read and write
F88000
unkown
page execute and write copy
775000
heap
page read and write
4560000
direct allocation
page read and write
141E000
stack
page read and write
4FB1000
heap
page read and write
5181000
heap
page read and write
4E71000
heap
page read and write
31D0000
heap
page read and write
1D06C000
heap
page read and write
2329C000
heap
page read and write
774000
heap
page read and write
A40000
direct allocation
page read and write
422E000
stack
page read and write
774000
heap
page read and write
F10000
unkown
page execute and write copy
774000
heap
page read and write
1C9000
unkown
page write copy
16A0000
direct allocation
page read and write
774000
heap
page read and write
449000
unkown
page execute and write copy
EDB000
unkown
page execute and write copy
2DFF000
stack
page read and write
3E1000
unkown
page execute and read and write
4AC0000
direct allocation
page execute and read and write
4E71000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
BD5000
stack
page read and write
4481000
heap
page read and write
305E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
6270000
heap
page read and write
1CFEF000
stack
page read and write
CE0000
heap
page read and write
BA4000
heap
page read and write
1DB32000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
36D000
unkown
page execute and read and write
1444000
heap
page read and write
1D035000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
EEF000
unkown
page execute and read and write
443E000
stack
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
BA0000
heap
page read and write
774000
heap
page read and write
48DB000
trusted library allocation
page execute and read and write
774000
heap
page read and write
775000
heap
page read and write
4481000
heap
page read and write
5090000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
15D4000
heap
page read and write
4571000
heap
page read and write
1D037000
heap
page read and write
774000
heap
page read and write
33BF000
stack
page read and write
2B3E000
stack
page read and write
1D048000
heap
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
84A000
heap
page read and write
D2F000
unkown
page execute and read and write
15D4000
heap
page read and write
A71000
unkown
page execute and read and write
4571000
heap
page read and write
674000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
16C0000
direct allocation
page execute and read and write
49DE000
stack
page read and write
4E71000
heap
page read and write
48DE000
stack
page read and write
1D8EE000
stack
page read and write
4571000
heap
page read and write
ECC000
unkown
page execute and read and write
2C5F000
stack
page read and write
774000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
2DFF000
stack
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
14BD000
heap
page read and write
4A90000
direct allocation
page execute and read and write
774000
heap
page read and write
162B000
heap
page read and write
9E4000
heap
page read and write
774000
heap
page read and write
3E7E000
stack
page read and write
4E71000
heap
page read and write
17E4000
heap
page read and write
4FB1000
heap
page read and write
1D5BF000
stack
page read and write
9E4000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
5650000
heap
page read and write
774000
heap
page read and write
43DF000
stack
page read and write
774000
heap
page read and write
3BAF000
stack
page read and write
431E000
stack
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
37D000
unkown
page execute and write copy
3BF000
unkown
page execute and read and write
1650000
direct allocation
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
3D9F000
stack
page read and write
115D000
unkown
page execute and read and write
840000
unkown
page read and write
775000
heap
page read and write
3AAE000
stack
page read and write
41EF000
stack
page read and write
233D8000
heap
page read and write
29DE000
stack
page read and write
231F0000
trusted library allocation
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
4C2E000
stack
page read and write
774000
heap
page read and write
26E0000
direct allocation
page read and write
4481000
heap
page read and write
4AC1000
heap
page read and write
4E71000
heap
page read and write
53AE000
stack
page read and write
4481000
heap
page read and write
61ECC000
direct allocation
page read and write
774000
heap
page read and write
B3E000
stack
page read and write
ECC000
unkown
page execute and read and write
325F000
stack
page read and write
774000
heap
page read and write
36AF000
stack
page read and write
D07000
heap
page read and write
455000
unkown
page execute and write copy
5210000
heap
page read and write
3EFF000
stack
page read and write
427000
unkown
page execute and read and write
321E000
stack
page read and write
AAC000
unkown
page execute and read and write
774000
heap
page read and write
17E4000
heap
page read and write
41EF000
stack
page read and write
F76000
unkown
page execute and read and write
774000
heap
page read and write
5170000
direct allocation
page read and write
311F000
stack
page read and write
F0F000
unkown
page execute and read and write
52A0000
trusted library allocation
page read and write
1D06C000
heap
page read and write
3EA000
unkown
page execute and read and write
15D4000
heap
page read and write
774000
heap
page read and write
45C000
unkown
page execute and write copy
356F000
stack
page read and write
774000
heap
page read and write
52FD000
stack
page read and write
475E000
stack
page read and write
A0D000
unkown
page execute and read and write
29CF000
stack
page read and write
3E1000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
A2D000
unkown
page execute and read and write
4481000
heap
page read and write
774000
heap
page read and write
B3C000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
4FB1000
heap
page read and write
17E4000
heap
page read and write
4AC1000
heap
page read and write
4B10000
direct allocation
page execute and read and write
52C4000
trusted library allocation
page read and write
774000
heap
page read and write
D46000
unkown
page write copy
4FB1000
heap
page read and write
D74000
heap
page read and write
774000
heap
page read and write
ABD000
unkown
page execute and write copy
15D4000
heap
page read and write
3CC000
unkown
page execute and read and write
1D06B000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1CEEE000
stack
page read and write
ADC000
stack
page read and write
6286000
heap
page read and write
5350000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
3DFE000
stack
page read and write
D54000
unkown
page execute and write copy
F8A000
unkown
page execute and read and write
5761000
trusted library allocation
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4E90000
heap
page read and write
166E000
stack
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
774000
heap
page read and write
4481000
heap
page read and write
35AE000
stack
page read and write
774000
heap
page read and write
A0F000
unkown
page execute and write copy
774000
heap
page read and write
3D2E000
stack
page read and write
15D4000
heap
page read and write
417E000
stack
page read and write
3FBE000
stack
page read and write
1D050000
heap
page read and write
775000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
275B000
stack
page read and write
774000
heap
page read and write
3A3D000
stack
page read and write
17E4000
heap
page read and write
4481000
heap
page read and write
C60000
direct allocation
page execute and read and write
4481000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
5600000
trusted library allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
5181000
heap
page read and write
FF3000
unkown
page execute and write copy
EF6000
unkown
page execute and write copy
775000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
EB4000
unkown
page execute and read and write
775000
heap
page read and write
D3E000
heap
page read and write
15D4000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
7BE000
stack
page read and write
1D06C000
heap
page read and write
3ADE000
stack
page read and write
17E4000
heap
page read and write
F8A000
unkown
page execute and read and write
774000
heap
page read and write
C60000
direct allocation
page execute and read and write
774000
heap
page read and write
1D043000
heap
page read and write
66D5000
trusted library allocation
page read and write
3B9E000
stack
page read and write
1D050000
heap
page read and write
542F000
stack
page read and write
A37000
unkown
page execute and read and write
4900000
trusted library allocation
page execute and read and write
5AE1000
trusted library allocation
page read and write
1444000
heap
page read and write
5280000
trusted library allocation
page read and write
B4C000
unkown
page execute and read and write
4571000
heap
page read and write
4FB1000
heap
page read and write
774000
heap
page read and write
54EE000
stack
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
17E4000
heap
page read and write
33FE000
stack
page read and write
774000
heap
page read and write
5460000
direct allocation
page execute and read and write
774000
heap
page read and write
D56000
unkown
page execute and write copy
4ADF000
stack
page read and write
439E000
stack
page read and write
5181000
heap
page read and write
774000
heap
page read and write
6110000
heap
page read and write
4AC1000
heap
page read and write
1106000
unkown
page execute and read and write
42CF000
stack
page read and write
FF3000
unkown
page execute and write copy
EEF000
unkown
page execute and read and write
3CCE000
stack
page read and write
774000
heap
page read and write
5AE4000
trusted library allocation
page read and write
2D9F000
stack
page read and write
1444000
heap
page read and write
774000
heap
page read and write
1D043000
heap
page read and write
2EFE000
stack
page read and write
5170000
direct allocation
page read and write
1D051000
heap
page read and write
774000
heap
page read and write
A22000
unkown
page execute and read and write
274F000
stack
page read and write
3AAE000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
BA4000
heap
page read and write
346E000
stack
page read and write
4571000
heap
page read and write
54C3000
trusted library allocation
page execute and read and write
8AB000
unkown
page execute and write copy
774000
heap
page read and write
775000
heap
page read and write
1CB000
unkown
page execute and read and write
2C8E000
stack
page read and write
774000
heap
page read and write
5570000
direct allocation
page execute and read and write
774000
heap
page read and write
5080000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
4700000
trusted library allocation
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
5150000
heap
page read and write
810000
direct allocation
page read and write
17E4000
heap
page read and write
3B8D000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
278E000
stack
page read and write
774000
heap
page read and write
417F000
stack
page read and write
E04000
unkown
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
F52000
unkown
page execute and read and write
17E4000
heap
page read and write
774000
heap
page read and write
EDC000
unkown
page execute and read and write
4CFE000
stack
page read and write
1134000
unkown
page execute and read and write
774000
heap
page read and write
7E0000
direct allocation
page read and write
1D05E000
heap
page read and write
C70000
heap
page read and write
774000
heap
page read and write
EAE000
stack
page read and write
17D0000
direct allocation
page execute and read and write
232A2000
heap
page read and write
419E000
stack
page read and write
43E0000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
3B7E000
stack
page read and write
359F000
stack
page read and write
775000
heap
page read and write
16B9000
heap
page read and write
3C2000
unkown
page execute and read and write
774000
heap
page read and write
4481000
heap
page read and write
5170000
direct allocation
page read and write
69A000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5170000
direct allocation
page read and write
3F7F000
stack
page read and write
774000
heap
page read and write
445000
unkown
page execute and write copy
4410000
heap
page read and write
3C1E000
stack
page read and write
445000
unkown
page execute and write copy
774000
heap
page read and write
15D4000
heap
page read and write
F0F000
unkown
page execute and read and write
1510000
heap
page read and write
4571000
heap
page read and write
D46000
unkown
page write copy
774000
heap
page read and write
3E2F000
stack
page read and write
F80000
unkown
page execute and read and write
EB4000
unkown
page execute and read and write
774000
heap
page read and write
8A2000
unkown
page execute and read and write
4AC1000
heap
page read and write
D02000
heap
page read and write
4AC1000
heap
page read and write
5350000
direct allocation
page execute and read and write
1D16E000
stack
page read and write
3A5E000
stack
page read and write
FEC000
unkown
page execute and write copy
1637000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A9F000
unkown
page execute and read and write
3B5F000
stack
page read and write
A5D000
unkown
page execute and write copy
36FE000
stack
page read and write
1175000
unkown
page execute and write copy
1176000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
37F000
unkown
page execute and write copy
775000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
7031000
heap
page read and write
15D4000
heap
page read and write
3DD000
unkown
page execute and write copy
343F000
stack
page read and write
56A000
stack
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
F52000
unkown
page execute and read and write
1CB000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
457000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
15D5000
heap
page read and write
5181000
heap
page read and write
980000
heap
page read and write
774000
heap
page read and write
261E000
stack
page read and write
774000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
17E4000
heap
page read and write
E00000
unkown
page execute and read and write
B51000
heap
page read and write
ACA000
unkown
page execute and read and write
4E71000
heap
page read and write
5200000
direct allocation
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
37E000
unkown
page execute and read and write
42DF000
stack
page read and write
1004000
unkown
page execute and write copy
775000
heap
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
A40000
direct allocation
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
455000
unkown
page execute and write copy
383E000
stack
page read and write
1D048000
heap
page read and write
15D4000
heap
page read and write
C80000
unkown
page readonly
6C8BE000
unkown
page read and write
37DE000
stack
page read and write
4A20000
direct allocation
page execute and read and write
A40000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
343F000
stack
page read and write
26E0000
direct allocation
page read and write
4E71000
heap
page read and write
4481000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
40BF000
stack
page read and write
328F000
stack
page read and write
1444000
heap
page read and write
1444000
heap
page read and write
49A0000
direct allocation
page execute and read and write
774000
heap
page read and write
26E0000
direct allocation
page read and write
F30000
unkown
page execute and read and write
4AC1000
heap
page read and write
15D4000
heap
page read and write
1650000
direct allocation
page read and write
3BF000
unkown
page execute and read and write
774000
heap
page read and write
775000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
1318000
unkown
page execute and write copy
4E71000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
16E8000
heap
page read and write
30BE000
stack
page read and write
4571000
heap
page read and write
3FDE000
stack
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
8D1000
heap
page read and write
4EBF000
stack
page read and write
774000
heap
page read and write
485F000
stack
page read and write
BA4000
heap
page read and write
F6E000
unkown
page execute and read and write
4AC1000
heap
page read and write
774000
heap
page read and write
15CF000
stack
page read and write
37E000
unkown
page execute and read and write
774000
heap
page read and write
775000
heap
page read and write
4E71000
heap
page read and write
115D000
unkown
page execute and read and write
48B4000
trusted library allocation
page read and write
346F000
stack
page read and write
50A0000
direct allocation
page execute and read and write
774000
heap
page read and write
9E4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D6000
unkown
page execute and read and write
26F0000
heap
page read and write
774000
heap
page read and write
1650000
direct allocation
page read and write
4481000
heap
page read and write
774000
heap
page read and write
1185000
heap
page read and write
3210000
direct allocation
page execute and read and write
32D000
unkown
page execute and read and write
304E000
stack
page read and write
774000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
364F000
stack
page read and write
530E000
stack
page read and write
317F000
stack
page read and write
774000
heap
page read and write
775000
heap
page read and write
4481000
heap
page read and write
EB4000
unkown
page execute and read and write
774000
heap
page read and write
1444000
heap
page read and write
17E4000
heap
page read and write
4E71000
heap
page read and write
301F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
415F000
stack
page read and write
B4C000
unkown
page execute and write copy
17E4000
heap
page read and write
17E4000
heap
page read and write
378F000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
457000
unkown
page execute and write copy
15B0000
direct allocation
page read and write
774000
heap
page read and write
F30000
unkown
page execute and read and write
315F000
stack
page read and write
4560000
direct allocation
page read and write
774000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
C00000
heap
page read and write
BA0000
direct allocation
page read and write
774000
heap
page read and write
674000
heap
page read and write
17E4000
heap
page read and write
D40000
heap
page read and write
774000
heap
page read and write
5F0000
heap
page read and write
F6A000
unkown
page execute and read and write
774000
heap
page read and write
FEC000
unkown
page execute and write copy
4AC1000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
371E000
stack
page read and write
2F3F000
stack
page read and write
2D5F000
stack
page read and write
774000
heap
page read and write
1749000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
4590000
heap
page read and write
7D0000
heap
page read and write
17B0000
direct allocation
page read and write
1444000
heap
page read and write
9F5000
heap
page read and write
3FAE000
stack
page read and write
FF3000
unkown
page execute and write copy
774000
heap
page read and write
5D5E000
stack
page read and write
369E000
stack
page read and write
289E000
stack
page read and write
5370000
direct allocation
page read and write
1D71F000
stack
page read and write
17E4000
heap
page read and write
301E000
stack
page read and write
3060000
direct allocation
page read and write
9E4000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
71E000
stack
page read and write
F7C000
unkown
page execute and read and write
17B0000
direct allocation
page read and write
F50000
unkown
page execute and write copy
BA4000
heap
page read and write
401000
unkown
page execute and read and write
1002000
unkown
page execute and write copy
532E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D06C000
heap
page read and write
5330000
trusted library allocation
page read and write
774000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
CB7000
unkown
page execute and read and write
555E000
stack
page read and write
CD0000
heap
page read and write
775000
heap
page read and write
3E3F000
stack
page read and write
28CE000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
8A1000
heap
page read and write
62D4000
heap
page read and write
5211000
heap
page read and write
774000
heap
page read and write
356F000
stack
page read and write
36C000
unkown
page execute and write copy
17E4000
heap
page read and write
15D4000
heap
page read and write
775000
heap
page read and write
232CD000
heap
page read and write
446F000
stack
page read and write
774000
heap
page read and write
674000
heap
page read and write
774000
heap
page read and write
25F0000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
9E4000
heap
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
13C7000
unkown
page execute and read and write
774000
heap
page read and write
353E000
stack
page read and write
4B8E000
stack
page read and write
774000
heap
page read and write
3BDF000
stack
page read and write
774000
heap
page read and write
1D069000
heap
page read and write
774000
heap
page read and write
9E4000
heap
page read and write
285F000
stack
page read and write
18CE000
stack
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1C9000
unkown
page write copy
4FB1000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
1D9EE000
stack
page read and write
455000
unkown
page execute and write copy
774000
heap
page read and write
5200000
direct allocation
page read and write
98D000
stack
page read and write
76ED000
stack
page read and write
8B5000
unkown
page execute and write copy
774000
heap
page read and write
1D6000
unkown
page execute and read and write
4571000
heap
page read and write
627A000
heap
page read and write
31D7000
heap
page read and write
D40000
unkown
page read and write
5181000
heap
page read and write
27FF000
stack
page read and write
1DB30000
heap
page read and write
774000
heap
page read and write
48C0000
trusted library allocation
page read and write
4AC1000
heap
page read and write
EB6000
unkown
page execute and write copy
15D4000
heap
page read and write
775000
heap
page read and write
1D5DF000
stack
page read and write
4FB1000
heap
page read and write
45C000
unkown
page execute and write copy
3BFE000
stack
page read and write
349E000
stack
page read and write
D4A000
unkown
page execute and write copy
774000
heap
page read and write
84E000
heap
page read and write
5BD0000
heap
page read and write
EF8000
unkown
page execute and read and write
774000
heap
page read and write
3DD000
unkown
page execute and write copy
774000
heap
page read and write
1650000
direct allocation
page read and write
5570000
direct allocation
page execute and read and write
15D4000
heap
page read and write
774000
heap
page read and write
3CFF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
ADE000
stack
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
674000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
36BF000
stack
page read and write
CF8000
heap
page read and write
4481000
heap
page read and write
49AC000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
3A4E000
stack
page read and write
3A3E000
stack
page read and write
D31000
unkown
page execute and write copy
774000
heap
page read and write
383E000
stack
page read and write
339F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
46EF000
stack
page read and write
F30000
unkown
page execute and read and write
4FB1000
heap
page read and write
5181000
heap
page read and write
115D000
unkown
page execute and read and write
456000
unkown
page execute and read and write
774000
heap
page read and write
674000
heap
page read and write
5320000
direct allocation
page execute and read and write
774000
heap
page read and write
4481000
heap
page read and write
D16000
unkown
page execute and read and write
4580000
heap
page read and write
1D035000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4C2E000
stack
page read and write
800000
heap
page read and write
2A020000
heap
page read and write
1056000
unkown
page execute and read and write
4481000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
AAD000
unkown
page execute and write copy
486E000
stack
page read and write
BA4000
heap
page read and write
3A9F000
stack
page read and write
2B0F000
stack
page read and write
774000
heap
page read and write
C50000
direct allocation
page execute and read and write
432F000
stack
page read and write
141E000
stack
page read and write
774000
heap
page read and write
627A000
heap
page read and write
BBE000
heap
page read and write
4A7E000
stack
page read and write
F48000
unkown
page execute and read and write
F6B000
unkown
page execute and write copy
2FCE000
stack
page read and write
1C2000
unkown
page execute and write copy
D2B000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
3F9F000
stack
page read and write
432F000
stack
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
B36000
unkown
page execute and read and write
15E0000
heap
page read and write
774000
heap
page read and write
3D3E000
stack
page read and write
616B000
stack
page read and write
774000
heap
page read and write
775000
heap
page read and write
D30000
direct allocation
page read and write
F88000
unkown
page execute and write copy
29ED0000
heap
page read and write
48D7000
trusted library allocation
page execute and read and write
3DFE000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
392F000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
6DEE000
stack
page read and write
15D4000
heap
page read and write
6EA0000
heap
page read and write
D30000
direct allocation
page read and write
774000
heap
page read and write
854E000
stack
page read and write
5E5F000
stack
page read and write
A60000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1CC2E000
stack
page read and write
C47000
heap
page read and write
D46000
unkown
page write copy
15D4000
heap
page read and write
3EA000
unkown
page execute and read and write
546E000
stack
page read and write
54BD000
stack
page read and write
4B30000
direct allocation
page execute and read and write
774000
heap
page read and write
3B4000
unkown
page execute and read and write
4575000
heap
page read and write
775000
heap
page read and write
17E4000
heap
page read and write
17E4000
heap
page read and write
1C2000
unkown
page execute and write copy
4AC1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
483F000
stack
page read and write
774000
heap
page read and write
46C000
unkown
page execute and write copy
62EC000
heap
page read and write
774000
heap
page read and write
5181000
heap
page read and write
D30000
direct allocation
page read and write
4AEE000
stack
page read and write
4571000
heap
page read and write
500000
heap
page read and write
CC000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
D4A000
unkown
page execute and write copy
355E000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
4A20000
direct allocation
page execute and read and write
A3A000
unkown
page execute and read and write
401000
unkown
page execute and read and write
4A20000
direct allocation
page execute and read and write
4FB1000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4601000
heap
page read and write
BA4000
heap
page read and write
775000
heap
page read and write
35DE000
stack
page read and write
1527000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1216000
unkown
page execute and read and write
46C000
unkown
page execute and write copy
4BA0000
direct allocation
page execute and read and write
4AC1000
heap
page read and write
1CB000
unkown
page execute and write copy
B4D000
unkown
page execute and write copy
4E77000
heap
page read and write
15D4000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4D2F000
stack
page read and write
2F7E000
stack
page read and write
1D037000
heap
page read and write
1440000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4571000
heap
page read and write
447F000
stack
page read and write
1318000
unkown
page execute and write copy
2EBE000
stack
page read and write
774000
heap
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
17E4000
heap
page read and write
1004000
unkown
page execute and write copy
3F6F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
1CFBD000
stack
page read and write
EF8000
unkown
page execute and read and write
2FFF000
stack
page read and write
3CEF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
F5C000
unkown
page execute and write copy
48C0000
heap
page read and write
775000
heap
page read and write
77F000
stack
page read and write
4A20000
direct allocation
page execute and read and write
15D4000
heap
page read and write
5181000
heap
page read and write
1002000
unkown
page execute and write copy
774000
heap
page read and write
C20000
heap
page read and write
4F76000
direct allocation
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
4FB1000
heap
page read and write
4AC1000
heap
page read and write
4E71000
heap
page read and write
26E0000
direct allocation
page read and write
418F000
stack
page read and write
15D4000
heap
page read and write
C81000
unkown
page execute and write copy
4A90000
direct allocation
page execute and read and write
356000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
C60000
direct allocation
page read and write
2D9E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
5211000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
A50000
heap
page read and write
F80000
unkown
page execute and read and write
433F000
stack
page read and write
4AC1000
heap
page read and write
4571000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4FB1000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
1DB34000
heap
page read and write
4481000
heap
page read and write
357F000
stack
page read and write
4560000
direct allocation
page read and write
4560000
direct allocation
page read and write
5181000
heap
page read and write
300F000
stack
page read and write
1650000
direct allocation
page read and write
775000
heap
page read and write
9E4000
heap
page read and write
AA2000
unkown
page execute and read and write
26E0000
direct allocation
page read and write
774000
heap
page read and write
D54000
heap
page read and write
48F0000
trusted library allocation
page read and write
774000
heap
page read and write
D0E000
unkown
page execute and read and write
4AAF000
stack
page read and write
774000
heap
page read and write
62D8000
heap
page read and write
4601000
heap
page read and write
232B2000
heap
page read and write
5170000
direct allocation
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
4601000
heap
page read and write
4AC1000
heap
page read and write
774000
heap
page read and write
C30000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
66A0000
trusted library allocation
page read and write
15D4000
heap
page read and write
41FE000
stack
page read and write
CF0000
heap
page read and write
3F6F000
stack
page read and write
40FE000
stack
page read and write
1004000
unkown
page execute and write copy
F44000
unkown
page execute and write copy
1DA00000
heap
page read and write
2B1F000
stack
page read and write
4AEE000
stack
page read and write
1D046000
heap
page read and write
AD5000
heap
page read and write
1175000
unkown
page execute and read and write
1D050000
heap
page read and write
1D144000
heap
page read and write
45AF000
stack
page read and write
8B6000
unkown
page execute and read and write
4E71000
heap
page read and write
774000
heap
page read and write
1650000
direct allocation
page read and write
D0E000
unkown
page execute and read and write
D30000
direct allocation
page read and write
774000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4571000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
499F000
stack
page read and write
674000
heap
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
3F3E000
stack
page read and write
5170000
direct allocation
page read and write
3F3E000
stack
page read and write
15D4000
heap
page read and write
1199000
stack
page read and write
4481000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A40000
direct allocation
page read and write
15B0000
direct allocation
page read and write
232F0000
trusted library allocation
page read and write
163E000
stack
page read and write
6764000
trusted library allocation
page read and write
4571000
heap
page read and write
774000
heap
page read and write
5200000
direct allocation
page read and write
774000
heap
page read and write
575F000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5580000
direct allocation
page execute and read and write
BBA000
heap
page read and write
449000
unkown
page execute and write copy
4600000
heap
page read and write
3220000
heap
page read and write
F60000
unkown
page execute and read and write
15D4000
heap
page read and write
5360000
trusted library allocation
page execute and read and write
66B2000
trusted library allocation
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
1C2000
unkown
page execute and write copy
774000
heap
page read and write
255E000
stack
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
5200000
direct allocation
page read and write
774000
heap
page read and write
39FF000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
A5E000
heap
page read and write
45A000
unkown
page execute and read and write
53C0000
trusted library allocation
page read and write
88C000
stack
page read and write
F6F000
unkown
page execute and write copy
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
342F000
stack
page read and write
F44000
unkown
page execute and write copy
774000
heap
page read and write
4AC1000
heap
page read and write
F32000
unkown
page execute and write copy
17E4000
heap
page read and write
774000
heap
page read and write
ECE000
unkown
page execute and read and write
4AC1000
heap
page read and write
774000
heap
page read and write
6785000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D05E000
heap
page read and write
4571000
heap
page read and write
1CDAE000
stack
page read and write
38CF000
stack
page read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A40000
direct allocation
page read and write
774000
heap
page read and write
4AE0000
heap
page read and write
2B5E000
stack
page read and write
15D4000
heap
page read and write
AE7000
heap
page read and write
774000
heap
page read and write
1D88E000
stack
page read and write
FEC000
unkown
page execute and write copy
774000
heap
page read and write
BA4000
heap
page read and write
36BF000
stack
page read and write
405F000
stack
page read and write
389F000
stack
page read and write
26F7000
heap
page read and write
774000
heap
page read and write
407E000
stack
page read and write
774000
heap
page read and write
423E000
stack
page read and write
D55000
heap
page read and write
4FB1000
heap
page read and write
BA0000
direct allocation
page read and write
1D05E000
heap
page read and write
1D9CE000
stack
page read and write
B35000
unkown
page execute and write copy
774000
heap
page read and write
52D0000
direct allocation
page read and write
F50000
unkown
page execute and write copy
1056000
unkown
page execute and read and write
774000
heap
page read and write
7E0000
direct allocation
page read and write
D42000
unkown
page execute and read and write
864E000
stack
page read and write
3B4000
unkown
page execute and read and write
15FB000
heap
page read and write
4481000
heap
page read and write
BA0000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
23330000
trusted library allocation
page read and write
BA0000
direct allocation
page read and write
4481000
heap
page read and write
1D7000
unkown
page execute and write copy
BA4000
heap
page read and write
32FF000
stack
page read and write
C40000
heap
page read and write
6762000
trusted library allocation
page read and write
1496000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4D7F000
stack
page read and write
356000
unkown
page execute and write copy
506E000
stack
page read and write
59B6000
heap
page read and write
4481000
heap
page read and write
774000
heap
page read and write
359000
unkown
page execute and write copy
15B0000
direct allocation
page read and write
3CA000
unkown
page execute and write copy
774000
heap
page read and write
19EE000
stack
page read and write
775000
heap
page read and write
775000
heap
page read and write
160000
unkown
page readonly
774000
heap
page read and write
4481000
heap
page read and write
1625000
heap
page read and write
774000
heap
page read and write
34D000
unkown
page execute and write copy
4571000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
4A36000
direct allocation
page read and write
5200000
direct allocation
page read and write
D4F000
heap
page read and write
775000
heap
page read and write
55EE000
stack
page read and write
15D4000
heap
page read and write
3D2E000
stack
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
3DCF000
stack
page read and write
4FB1000
heap
page read and write
D55000
unkown
page execute and read and write
EEE000
unkown
page execute and write copy
774000
heap
page read and write
51BD000
stack
page read and write
5181000
heap
page read and write
775000
heap
page read and write
5181000
heap
page read and write
D46000
unkown
page write copy
774000
heap
page read and write
15D4000
heap
page read and write
2E3E000
stack
page read and write
36D000
unkown
page execute and read and write
4AC1000
heap
page read and write
1D050000
heap
page read and write
774000
heap
page read and write
320C000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
4481000
heap
page read and write
AAB000
heap
page read and write
BA0000
direct allocation
page read and write
4FB1000
heap
page read and write
1D06C000
heap
page read and write
1D02E000
stack
page read and write
CDE000
heap
page read and write
1D3AC000
stack
page read and write
1D74D000
stack
page read and write
774000
heap
page read and write
F6A000
unkown
page execute and read and write
1180000
heap
page read and write
333E000
stack
page read and write
7E0000
direct allocation
page read and write
3CBE000
stack
page read and write
377F000
stack
page read and write
D4F000
heap
page read and write
45EE000
stack
page read and write
342000
unkown
page execute and read and write
15D4000
heap
page read and write
774000
heap
page read and write
5BD5000
heap
page read and write
4910000
trusted library allocation
page read and write
774000
heap
page read and write
4481000
heap
page read and write
420000
heap
page read and write
31A0000
heap
page read and write
774000
heap
page read and write
54D4000
trusted library allocation
page read and write
1C94F000
stack
page read and write
50D0000
direct allocation
page execute and read and write
1D066000
heap
page read and write
774000
heap
page read and write
4560000
direct allocation
page read and write
F10000
unkown
page execute and write copy
F7E000
unkown
page execute and write copy
1056000
unkown
page execute and read and write
2C5E000
stack
page read and write
D32000
heap
page read and write
15D4000
heap
page read and write
774000
heap
page read and write
8FD000
stack
page read and write
367E000
stack
page read and write
1CB000
unkown
page execute and write copy
4571000
heap
page read and write
4750000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
318E000
stack
page read and write
1641000
heap
page read and write
45AE000
stack
page read and write
8AB000
unkown
page execute and read and write
1415000
stack
page read and write
4FB1000
heap
page read and write
1D04B000
heap
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
B25000
unkown
page execute and write copy
F99000
unkown
page execute and read and write
15D4000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
4FB0000
heap
page read and write
4E6F000
stack
page read and write
4571000
heap
page read and write
395F000
stack
page read and write
52B3000
trusted library allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
4AC1000
heap
page read and write
4570000
heap
page read and write
26FF000
stack
page read and write
48A3000
trusted library allocation
page execute and read and write
D00000
heap
page read and write
233CB000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
1D037000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
F06000
unkown
page execute and write copy
15D4000
heap
page read and write
774000
heap
page read and write
11D0000
heap
page read and write
D6B000
heap
page read and write
80E000
heap
page read and write
774000
heap
page read and write
4E80000
heap
page read and write
46FF000
stack
page read and write
4571000
heap
page read and write
1CB000
unkown
page execute and write copy
D1E000
heap
page read and write
1D8CD000
stack
page read and write
48CA000
trusted library allocation
page execute and read and write
38FE000
stack
page read and write
26E0000
direct allocation
page read and write
D1C000
stack
page read and write
449000
unkown
page execute and write copy
17E4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
425E000
stack
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
3FF000
unkown
page execute and write copy
775000
heap
page read and write
774000
heap
page read and write
1176000
unkown
page execute and write copy
774000
heap
page read and write
1CACE000
stack
page read and write
62E5000
heap
page read and write
1444000
heap
page read and write
161C000
stack
page read and write
774000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
478B000
stack
page read and write
4EFD000
stack
page read and write
4E71000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
BA0000
direct allocation
page read and write
1CE7D000
stack
page read and write
3DBF000
stack
page read and write
4A40000
direct allocation
page execute and read and write
5ED000
heap
page read and write
774000
heap
page read and write
319E000
stack
page read and write
774000
heap
page read and write
1444000
heap
page read and write
4601000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
674000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
BA4000
heap
page read and write
455000
unkown
page execute and write copy
4571000
heap
page read and write
774000
heap
page read and write
5170000
direct allocation
page read and write
37F000
unkown
page execute and write copy
4D6E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
3CFF000
stack
page read and write
D52000
heap
page read and write
1CB000
unkown
page execute and write copy
5170000
direct allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
8A9000
unkown
page write copy
775000
heap
page read and write
16A0000
direct allocation
page read and write
11CE000
stack
page read and write
774000
heap
page read and write
6CA0000
heap
page execute and read and write
23210000
heap
page read and write
46BE000
stack
page read and write
6EA9000
heap
page read and write
4B80000
direct allocation
page execute and read and write
34D000
unkown
page execute and read and write
774000
heap
page read and write
17E4000
heap
page read and write
171B000
heap
page read and write
BA4000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
56A0000
heap
page execute and read and write
88B000
heap
page read and write
1D067000
heap
page read and write
1002000
unkown
page execute and read and write
4571000
heap
page read and write
774000
heap
page read and write
347E000
stack
page read and write
774000
heap
page read and write
3BBF000
stack
page read and write
15D4000
heap
page read and write
F32000
unkown
page execute and write copy
4481000
heap
page read and write
8A9000
unkown
page write copy
D2F000
unkown
page execute and read and write
3DC000
unkown
page execute and read and write
774000
heap
page read and write
4571000
heap
page read and write
774000
heap
page read and write
23231000
heap
page read and write
4560000
direct allocation
page read and write
17E4000
heap
page read and write
3E5F000
stack
page read and write
5326000
direct allocation
page read and write
AB9000
heap
page read and write
5F9F000
stack
page read and write
F99000
unkown
page execute and read and write
C80000
heap
page read and write
774000
heap
page read and write
361F000
stack
page read and write
3B5E000
stack
page read and write
EB6000
unkown
page execute and write copy
3FAE000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
345F000
stack
page read and write
1CBCE000
stack
page read and write
18EE000
stack
page read and write
65E000
stack
page read and write
4AD0000
heap
page read and write
AAF000
unkown
page execute and read and write
774000
heap
page read and write
EE5000
unkown
page execute and write copy
2DBE000
stack
page read and write
17E4000
heap
page read and write
774000
heap
page read and write
C8A000
heap
page read and write
774000
heap
page read and write
1D04D000
heap
page read and write
4820000
trusted library allocation
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
1D048000
heap
page read and write
D40000
unkown
page read and write
1D047000
heap
page read and write
5200000
direct allocation
page read and write
774000
heap
page read and write
A94000
unkown
page execute and read and write
5D0000
heap
page read and write
5181000
heap
page read and write
B18000
heap
page read and write
455000
unkown
page execute and write copy
4AC1000
heap
page read and write
3CD000
unkown
page execute and write copy
2CBF000
stack
page read and write
774000
heap
page read and write
C80000
unkown
page readonly
9E4000
heap
page read and write
774000
heap
page read and write
45A000
unkown
page execute and read and write
D30000
direct allocation
page read and write
1444000
heap
page read and write
1D047000
heap
page read and write
F9A000
unkown
page execute and write copy
232F0000
trusted library allocation
page read and write
15D4000
heap
page read and write
4481000
heap
page read and write
457E000
stack
page read and write
774000
heap
page read and write
ECE000
unkown
page execute and read and write
2CFE000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
34D000
unkown
page execute and write copy
775000
heap
page read and write
B62000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
15D4000
heap
page read and write
775000
heap
page read and write
774000
heap
page read and write
EDC000
unkown
page execute and read and write
1444000
heap
page read and write
1D23E000
stack
page read and write
1650000
direct allocation
page read and write
774000
heap
page read and write
3D5E000
stack
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
4FB1000
heap
page read and write
6F2E000
stack
page read and write
D54000
unkown
page execute and write copy
7040000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
A4D000
unkown
page execute and read and write
4AC1000
heap
page read and write
774000
heap
page read and write
7E0000
direct allocation
page read and write
4571000
heap
page read and write
1D04B000
heap
page read and write
54C0000
direct allocation
page execute and read and write
D4A000
unkown
page execute and write copy
69C000
heap
page read and write
54EA000
trusted library allocation
page execute and read and write
4E71000
heap
page read and write
BA4000
heap
page read and write
4560000
direct allocation
page read and write
774000
heap
page read and write
49E0000
direct allocation
page execute and read and write
774000
heap
page read and write
774000
heap
page read and write
775000
heap
page read and write
288F000
stack
page read and write
4FB1000
heap
page read and write
774000
heap
page read and write
4A50000
direct allocation
page execute and read and write
1DA2E000
stack
page read and write
34D000
unkown
page execute and write copy
397E000
stack
page read and write
775000
heap
page read and write
1C9000
unkown
page write copy
774000
heap
page read and write
2A0E000
stack
page read and write
1D03F000
heap
page read and write
55BE000
stack
page read and write
3BC000
unkown
page execute and write copy
775000
heap
page read and write
774000
heap
page read and write
15B0000
direct allocation
page read and write
775000
heap
page read and write
4FB1000
heap
page read and write
774000
heap
page read and write
F76000
unkown
page execute and read and write
4AC1000
heap
page read and write
C80000
unkown
page read and write
AAA000
unkown
page execute and write copy
1D4DE000
stack
page read and write
9E4000
heap
page read and write
774000
heap
page read and write
7E0000
direct allocation
page read and write
774000
heap
page read and write
17E4000
heap
page read and write
3C2000
unkown
page execute and read and write
3F4E000
stack
page read and write
D42000
unkown
page execute and read and write
BA0000
direct allocation
page read and write
F5C000
unkown
page execute and write copy
4AC1000
heap
page read and write
1D06A000
heap
page read and write
There are 3568 hidden memdumps, click here to show them.