IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AKJDGIEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKJKEBGDHDAFHJKEGIID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFBAKKJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x37, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\ECGDHIDAAFHIIDGDBFIECFCFHI
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IDHCGDAFBKFIDHJJJDHCBFBGHD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IEHDBAAFIDGDAAAAAAAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JEGHJDGIJECGDHJJECGH
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\300d27cc-3230-40a4-9753-84781c0a3cb3.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3326e279-6ae1-4c41-8c03-7f38b7989b77.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\42c73d10-0f09-42f3-b383-9de4aebde72f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4cd4fb65-8772-400a-8aaa-a82a36fa9b14.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\61926b4a-3af2-4ec7-92eb-d8c2bc051819.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\c48f3f8c-0797-44fb-b731-9858ec1a8113.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-671EE3D1-1C84.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\19a89869-2a90-4868-82ed-919469571254.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3a0ca486-4fb0-4eb5-b4a7-9091aac8be1f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3a58bd81-55f4-476e-922c-4db97d00b1de.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4d32c082-39f6-4b45-b35c-deab0313893f.tmp
Unicode text, UTF-8 text, with very long lines (17436), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\85959edb-4833-4a38-bd30-ef86d2402368.tmp
Unicode text, UTF-8 text, with very long lines (17600), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\88e6b00c-b2a5-4382-a212-6d901c4475e7.tmp
Unicode text, UTF-8 text, with very long lines (17601), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\12c56608-f134-4aac-988a-314ab51388a4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\3858924b-b519-4139-8143-c8cef86308b1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\715525f6-5877-4404-8f87-430ad384eb52.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF4bb8c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3afe8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3c4f7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a35e416b-e2c4-40a3-983a-a01302e5e6a2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\bc43f46b-47c5-4ea5-8691-f4cbcd2c098f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f6f0868f-7e76-46a4-bb4c-a7ff11d8161a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3ee39.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF42a48.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF453d9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF4b051.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF40d79.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF41a99.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13374551251892351
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\050f0dfd-bdb6-497c-b51a-7cab1cd6f275.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\4b8a93f9-80d7-434b-acd4-93ec50acd823.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\89a5b9cc-bf4c-4f3e-a4a6-d0beb8a41a8a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3c4f7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\c07639dd-9787-4d9a-aff4-737ab75535e9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x37, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b0805781-f04a-4e82-8798-52f0a42a8391.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\c7817937-a012-4411-bf68-4de1115bab96.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d3abe8a3-37de-4554-a1ac-547fca540984.tmp
Unicode text, UTF-8 text, with very long lines (16843), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fa173010-cb7b-4d64-8a76-ca6e616a9885.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39d6a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39dd7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39f2f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c5f1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3fb78.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF4b022.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF50bcf.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a8f4032e-3d27-46c8-a094-280d519be0a5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\f4ed1390-8fe9-48c9-b44d-9d31c9eb2a8d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\fd757b79-cfcd-40b5-9084-eb94afb7fb3e.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\00c6ad9e-b232-4b70-8760-59703cb68c80.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\14582be1-e3fd-47b9-8aed-900047a42966.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\18b9426b-69cc-4e22-9232-a014fcb08282.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\54d7eb77-beab-42ef-b4c1-41fdc42590d5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41924
dropped
C:\Users\user\AppData\Local\Temp\6db7d1ec-7020-45dc-9a94-33eb0c5d9869.tmp
PNG image data, 50 x 50, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\a14969fc-2860-481b-9480-ee9e58dfa659.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\f8745f2a-3ac3-4dbb-bebd-f08fe39627a5.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\18b9426b-69cc-4e22-9232-a014fcb08282.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3700)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_1119855910\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3705)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_130933194\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_130933194\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_130933194\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_130933194\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7300_130933194\a14969fc-2860-481b-9480-ee9e58dfa659.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 441
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 442
ASCII text, with very long lines (4095)
downloaded
Chrome Cache Entry: 443
ASCII text
downloaded
Chrome Cache Entry: 444
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 445
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 446
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 447
SVG Scalable Vector Graphics image
downloaded
There are 277 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2720 --field-trial-handle=2660,i,2276085611420844755,11736436464237843795,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=2128,i,121182028962982601,14336481790819831583,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6564 --field-trial-handle=2128,i,121182028962982601,14336481790819831583,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6608 --field-trial-handle=2128,i,121182028962982601,14336481790819831583,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7344 --field-trial-handle=2128,i,121182028962982601,14336481790819831583,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7344 --field-trial-handle=2128,i,121182028962982601,14336481790819831583,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=4188 --field-trial-handle=2128,i,121182028962982601,14336481790819831583,262144 /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2320,i,10774180841234704449,9876674559022460149,262144 /prefetch:8
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/msvcp140.dll
185.215.113.206
malicious
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://ntp.msn.cn/edge/ntp
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://185.215.113.206/746f34465cf17784/mozglue.dllr
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://drive-daily-2.corp.google.com/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
23.192.223.45
https://permanently-removed.invalid/v1/issuetoken
unknown
http://anglebug.com/4722
unknown
https://assets.msn.com/statics/icons/favicon_newtabpage.png
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/5881S
unknown
https://srtb.msn.cn/
unknown
https://assets.msn.cn/resolver/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://185.215.113.206w
unknown
https://sb.scorecardresearch.com/b2?rn=1730077659523&c1=2&c2=3000001&cs_ucfr=1&c7=https%3A%2F%2Fntp.msn.com%2Fedge%2Fntp%3Flocale%3Den-GB%26title%3DNew%2Btab%26dsp%3D1%26sp%3DBing%26isFREModalBackground%3D1%26startpage%3D1%26PC%3DU531%26ocid%3Dmsedgdhp%26mkt%3Den-us&c8=New+tab&c9=&cs_fpid=335586F4D9E8607124F893D2D81961F7&cs_fpit=o&cs_fpdm=*null&cs_fpdt=*null
18.160.172.17
https://browser.events.data.msn.com/
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://ntp.msn.com/edge/ntp
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1730077661423&w=0&anoncknm=app_anon&NoResponseBody=true
20.52.64.201
http://anglebug.com/3970
unknown
https://anglebug.com/6574A
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://mail.google.com/mail/?tab
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
https://anglebug.com/7162
unknown
https://anglebug.com/7369E
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
https://permanently-removed.invalid/MergeSession
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
https://lens.google.com/v3/upload
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.186.68
http://anglebug.com/3832
unknown
https://www.google.comAccess-Control-Allow-Credentials:
unknown
https://drive-daily-0.corp.google.com/
unknown
https://permanently-removed.invalid/Logout
unknown
http://185.215.113.206HIJ
unknown
https://lens.google.com/upload
unknown
https://docs.google.com/document/?usp=installed_webapp
unknown
http://anglebug.com/6651
unknown
https://c.msn.com/
unknown
https://browser.events.data.msn.com/OneCollector/1.0?cors=true&content-type=application/x-json-stream&client-id=NO_AUTH&client-version=1DS-Web-JS-3.2.8&apikey=0ded60c75e44443aa3484c42c1c43fe8-9fc57d3f-fdac-4bcf-b927-75eafe60192e-7279&upload-time=1730077661433&w=0&anoncknm=app_anon&NoResponseBody=true
20.52.64.201
https://anglebug.com/4830
unknown
https://www.youtube.com/:
unknown
https://myaccount.google.com/shielded-email2B
unknown
https://sb.scorecardresearch.com/
unknown
https://csp.withgoogle.com/csp/report-to/gws/cdt1
unknown
https://www.google.com/tools/feedback/chrome/__submit
unknown
http://anglebug.com/2162
unknown
http://anglebug.com/5430
unknown
https://permanently-removed.invalid/LogoutYxABzen
unknown
https://chrome.google.com/webstore206E5
unknown
http://anglebug.com/3498
unknown
https://ch.search.yahoo.com/favicon.icofrom_play_api
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.186.68
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
https://anglebug.com/4966
unknown
https://www.youtube.com/J
unknown
http://anglebug.com/5421
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
plus.l.google.com
142.250.186.142
play.google.com
172.217.18.14
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.244.18.38
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.186.68
googlehosted.l.googleusercontent.com
142.250.184.193
sni1gl.wpc.nucdn.net
152.199.21.175
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
apis.google.com
unknown
api.msn.com
unknown
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
142.250.186.68
www.google.com
United States
23.198.7.183
unknown
United States
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
172.217.18.14
play.google.com
United States
152.195.19.97
unknown
United States
18.160.172.17
unknown
United States
20.125.209.212
unknown
United States
162.159.61.3
chrome.cloudflare-dns.com
United States
23.47.194.99
unknown
United States
104.93.21.139
unknown
United States
204.79.197.219
unknown
United States
104.93.21.152
unknown
United States
13.107.246.57
unknown
United States
142.250.184.193
googlehosted.l.googleusercontent.com
United States
20.52.64.201
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
18.244.18.38
sb.scorecardresearch.com
United States
20.99.186.246
unknown
United States
23.192.223.45
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.142
plus.l.google.com
United States
127.0.0.1
unknown
unknown
There are 14 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197688
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds
EdgeMUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
MUID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{C89E2069-AF13-46DB-9E39-216131494B87}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197688
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197688
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197688
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
There are 135 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5560000
direct allocation
page read and write
malicious
18CE000
heap
page read and write
malicious
B21000
unkown
page execute and read and write
malicious
E20002B8000
trusted library allocation
page read and write
716C03BC0000
trusted library allocation
page read and write
50E1000
heap
page read and write
E20003CC000
trusted library allocation
page read and write
716C023D4000
trusted library allocation
page read and write
B21000
unkown
page execute and write copy
9CCF7FE000
unkown
page readonly
50E1000
heap
page read and write
716C02B94000
trusted library allocation
page read and write
1DBAA000
heap
page read and write
716C02FA4000
trusted library allocation
page read and write
9CAAFFA000
stack
page read and write
410800648000
trusted library allocation
page read and write
6E3C002C0000
trusted library allocation
page read and write
50E0000
heap
page read and write
716C03858000
trusted library allocation
page read and write
F87000
unkown
page execute and read and write
18B0000
direct allocation
page read and write
1D72F000
stack
page read and write
716C0237C000
trusted library allocation
page read and write
716C03D64000
trusted library allocation
page read and write
9CC77FE000
unkown
page readonly
716C03960000
trusted library allocation
page read and write
9CA57FE000
unkown
page readonly
716C0268C000
trusted library allocation
page read and write
56D0000
direct allocation
page execute and read and write
12F400320000
trusted library allocation
page read and write
716C03C6C000
trusted library allocation
page read and write
716C02908000
trusted library allocation
page read and write
716C0285C000
trusted library allocation
page read and write
6CAB2000
unkown
page readonly
716C02401000
trusted library allocation
page read and write
9CA4FFE000
stack
page read and write
1E4E610D000
heap
page read and write
716C034B8000
trusted library allocation
page read and write
1E4EC7D7000
unclassified section
page read and write
716C02A64000
trusted library allocation
page read and write
4FBE000
stack
page read and write
1E4E613A000
heap
page read and write
1E4E9D80000
trusted library allocation
page read and write
1DBA3000
heap
page read and write
410800784000
trusted library allocation
page read and write
410800424000
trusted library allocation
page read and write
50E1000
heap
page read and write
12F400350000
trusted library allocation
page read and write
716C038B4000
trusted library allocation
page read and write
280B0135000
heap
page read and write
2D400238000
trusted library allocation
page read and write
716C03D70000
trusted library allocation
page read and write
716C0250C000
trusted library allocation
page read and write
1E4E5F40000
trusted library section
page read and write
716C034B8000
trusted library allocation
page read and write
1998000
heap
page read and write
1DBB5000
heap
page read and write
E20002E8000
trusted library allocation
page read and write
716C02424000
trusted library allocation
page read and write
50E1000
heap
page read and write
410800368000
trusted library allocation
page read and write
716C02C01000
trusted library allocation
page read and write
716C03480000
trusted library allocation
page read and write
6E3C002A0000
trusted library allocation
page read and write
716C02494000
trusted library allocation
page read and write
716C03974000
trusted library allocation
page read and write
2D4002B4000
trusted library allocation
page read and write
2D4002A8000
trusted library allocation
page read and write
1DBBD000
heap
page read and write
1DBB4000
heap
page read and write
E2000044000
trusted library allocation
page read and write
1E4E5AD1000
heap
page read and write
716C030A8000
trusted library allocation
page read and write
410800754000
trusted library allocation
page read and write
716C03234000
trusted library allocation
page read and write
716C0268C000
trusted library allocation
page read and write
716C030C4000
trusted library allocation
page read and write
9CA47FE000
unkown
page readonly
9CB5FFE000
stack
page read and write
716C03BE8000
trusted library allocation
page read and write
716C0225E000
trusted library allocation
page read and write
1E4E6138000
heap
page read and write
280B018E000
heap
page read and write
716C02384000
trusted library allocation
page read and write
1DBC2000
heap
page read and write
CB7D1FE000
stack
page read and write
6CCA0000
unkown
page read and write
50E1000
heap
page read and write
1E4E42B0000
heap
page read and write
716C030FC000
trusted library allocation
page read and write
CB7B9FE000
unkown
page readonly
4108007C8000
trusted library allocation
page read and write
1E4E42B3000
heap
page read and write
716C03201000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
6E3C002E4000
trusted library allocation
page read and write
716C02CC6000
trusted library allocation
page read and write
B9800280000
direct allocation
page read and write
1DB1C000
stack
page read and write
716C03734000
trusted library allocation
page read and write
E2000334000
trusted library allocation
page read and write
B98002D0000
direct allocation
page read and write
716C03030000
trusted library allocation
page read and write
E20002BC000
trusted library allocation
page read and write
716C0250C000
trusted library allocation
page read and write
E20002D0000
trusted library allocation
page read and write
353F000
stack
page read and write
9CB8FFD000
stack
page read and write
716C03001000
trusted library allocation
page read and write
5BBC00318000
direct allocation
page read and write
6CC5F000
unkown
page readonly
410800364000
trusted library allocation
page read and write
1E4E2A00000
trusted library allocation
page read and write
716C03129000
trusted library allocation
page read and write
716C0356C000
trusted library allocation
page read and write
41080035C000
trusted library allocation
page read and write
1E4E5A90000
heap
page read and write
716C02518000
trusted library allocation
page read and write
9CCD7FE000
unkown
page readonly
1DBA3000
heap
page read and write
716C02888000
trusted library allocation
page read and write
716C03B98000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C032E0000
trusted library allocation
page read and write
6E3C00278000
trusted library allocation
page read and write
716C030E8000
trusted library allocation
page read and write
716C0306C000
trusted library allocation
page read and write
280AE2F6000
heap
page read and write
50E1000
heap
page read and write
12F400284000
trusted library allocation
page read and write
50E1000
heap
page read and write
CB6F9FE000
unkown
page readonly
716C03414000
trusted library allocation
page read and write
9CCA7FE000
unkown
page readonly
5BBC00244000
direct allocation
page read and write
410800658000
trusted library allocation
page read and write
716C038A4000
trusted library allocation
page read and write
12F400404000
trusted library allocation
page read and write
B98002DC000
direct allocation
page read and write
280AE22C000
heap
page read and write
23E8F000
stack
page read and write
716C027A4000
trusted library allocation
page read and write
280AE2A5000
heap
page read and write
716C02ED4000
trusted library allocation
page read and write
716C033E0000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
2D400201000
trusted library allocation
page read and write
1E4E60F3000
heap
page read and write
716C024BB000
trusted library allocation
page read and write
23D8E000
stack
page read and write
716C030FC000
trusted library allocation
page read and write
1239000
unkown
page execute and read and write
18B0000
direct allocation
page read and write
716C02C28000
trusted library allocation
page read and write
716C02C14000
trusted library allocation
page read and write
12F400310000
trusted library allocation
page read and write
716C031D0000
trusted library allocation
page read and write
E20002E8000
trusted library allocation
page read and write
1E4E2490000
heap
page read and write
6E3C00248000
trusted library allocation
page read and write
6E3C002A0000
trusted library allocation
page read and write
280AE302000
heap
page read and write
410800354000
trusted library allocation
page read and write
1DB9B000
heap
page read and write
716C02AC8000
trusted library allocation
page read and write
E2000128000
trusted library allocation
page read and write
716C02414000
trusted library allocation
page read and write
CB057FE000
stack
page read and write
716C03598000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
716C02DC4000
trusted library allocation
page read and write
1E4E5AD1000
heap
page read and write
9CCCFFE000
stack
page read and write
716C030FC000
trusted library allocation
page read and write
280AE32B000
heap
page read and write
E20000D0000
trusted library allocation
page read and write
46FE000
stack
page read and write
716C03118000
trusted library allocation
page read and write
23CEA000
heap
page read and write
CB05FFE000
unkown
page readonly
410800704000
trusted library allocation
page read and write
23D10000
trusted library allocation
page read and write
190F000
heap
page read and write
4D3E000
stack
page read and write
41080060C000
trusted library allocation
page read and write
716C03D54000
trusted library allocation
page read and write
716C03460000
trusted library allocation
page read and write
1DBCC000
heap
page read and write
1E4E2680000
trusted library allocation
page read and write
716C03768000
trusted library allocation
page read and write
716C03738000
trusted library allocation
page read and write
716C03B68000
trusted library allocation
page read and write
1DCA4000
heap
page read and write
716C02494000
trusted library allocation
page read and write
716C02A94000
trusted library allocation
page read and write
280AE2A5000
heap
page read and write
1E4E613C000
heap
page read and write
5BBC00217000
direct allocation
page read and write
12F400238000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
CB7F1FD000
stack
page read and write
50E1000
heap
page read and write
1E4E5AC6000
heap
page read and write
9CC37FE000
unkown
page readonly
280AE213000
heap
page read and write
716C03D30000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
E2000260000
trusted library allocation
page read and write
716C030FC000
trusted library allocation
page read and write
716C02494000
trusted library allocation
page read and write
9CA77FE000
unkown
page readonly
410800310000
trusted library allocation
page read and write
E200040F000
trusted library allocation
page read and write
716C03D7C000
trusted library allocation
page read and write
4108006D0000
trusted library allocation
page read and write
716C039A4000
trusted library allocation
page read and write
716C03144000
trusted library allocation
page read and write
CB7F9FE000
unkown
page readonly
716C03918000
trusted library allocation
page read and write
716C0229F000
trusted library allocation
page read and write
56C0000
direct allocation
page execute and read and write
280AE360000
heap
page read and write
716C03D64000
trusted library allocation
page read and write
716C02F7C000
trusted library allocation
page read and write
9CA97FE000
unkown
page readonly
716C02504000
trusted library allocation
page read and write
E2000224000
trusted library allocation
page read and write
716C03D7C000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
716C036FC000
trusted library allocation
page read and write
716C02D10000
trusted library allocation
page read and write
716C02CD4000
trusted library allocation
page read and write
1E4E9F80000
heap
page read and write
716C036CC000
trusted library allocation
page read and write
716C02518000
trusted library allocation
page read and write
716C03704000
trusted library allocation
page read and write
410800250000
trusted library allocation
page read and write
716C0241C000
trusted library allocation
page read and write
716C03D7C000
trusted library allocation
page read and write
716C02410000
trusted library allocation
page read and write
716C02FF0000
trusted library allocation
page read and write
9CC1FFC000
stack
page read and write
280AE32B000
heap
page read and write
E20004A8000
trusted library allocation
page read and write
716C0354C000
trusted library allocation
page read and write
716C03801000
trusted library allocation
page read and write
280B0002000
heap
page read and write
716C038DC000
trusted library allocation
page read and write
E2000228000
trusted library allocation
page read and write
4108007E0000
trusted library allocation
page read and write
CB017FE000
stack
page read and write
716C0396C000
trusted library allocation
page read and write
E20002E8000
trusted library allocation
page read and write
37FE000
stack
page read and write
716C023B4000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C03520000
trusted library allocation
page read and write
B9800250000
direct allocation
page read and write
716C026D4000
trusted library allocation
page read and write
1E4E9FA3000
heap
page read and write
280B018B000
heap
page read and write
2D400250000
trusted library allocation
page read and write
9CB0FFE000
stack
page read and write
716C03040000
trusted library allocation
page read and write
2D4002B4000
trusted library allocation
page read and write
716C02F88000
trusted library allocation
page read and write
2D4002B4000
trusted library allocation
page read and write
280B018B000
heap
page read and write
1E4EBD82000
trusted library section
page read and write
716C02C44000
trusted library allocation
page read and write
2D4002E4000
trusted library allocation
page read and write
32FB000
heap
page read and write
12F400201000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C02577000
trusted library allocation
page read and write
280B016D000
heap
page read and write
716C03BB8000
trusted library allocation
page read and write
E2000280000
trusted library allocation
page read and write
23C40000
heap
page read and write
716C03CC8000
trusted library allocation
page read and write
B980020C000
direct allocation
page read and write
2D400235000
trusted library allocation
page read and write
716C03258000
trusted library allocation
page read and write
716C02594000
trusted library allocation
page read and write
9CBCFFD000
stack
page read and write
716C039E0000
trusted library allocation
page read and write
716C02AA0000
trusted library allocation
page read and write
1D79E000
stack
page read and write
1DBC2000
heap
page read and write
1DBA3000
heap
page read and write
12F4003AC000
trusted library allocation
page read and write
716C02498000
trusted library allocation
page read and write
9CB87FE000
unkown
page readonly
716C02D1C000
trusted library allocation
page read and write
716C03480000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C03B38000
trusted library allocation
page read and write
1DBAD000
heap
page read and write
B98002AC000
direct allocation
page read and write
E2000364000
trusted library allocation
page read and write
280AE330000
heap
page read and write
280B7010000
trusted library allocation
page read and write
716C023F0000
trusted library allocation
page read and write
716C0340C000
trusted library allocation
page read and write
E20002DC000
trusted library allocation
page read and write
1DB9A000
heap
page read and write
716C03B58000
trusted library allocation
page read and write
6E3C00288000
trusted library allocation
page read and write
9CB97FE000
unkown
page readonly
41080040C000
trusted library allocation
page read and write
12F4002C4000
trusted library allocation
page read and write
E20000FC000
trusted library allocation
page read and write
410800404000
trusted library allocation
page read and write
1DB8F000
heap
page read and write
E20002DC000
trusted library allocation
page read and write
716C037F0000
trusted library allocation
page read and write
50E1000
heap
page read and write
9CC4FFD000
stack
page read and write
E200040C000
trusted library allocation
page read and write
716C02518000
trusted library allocation
page read and write
E20001E8000
trusted library allocation
page read and write
716C02B54000
trusted library allocation
page read and write
12F4002A0000
trusted library allocation
page read and write
716C02490000
trusted library allocation
page read and write
1DBC3000
heap
page read and write
1DBB0000
heap
page read and write
E2000288000
trusted library allocation
page read and write
716C03108000
trusted library allocation
page read and write
716C03258000
trusted library allocation
page read and write
4108002FC000
trusted library allocation
page read and write
716C03824000
trusted library allocation
page read and write
1E4E9F93000
heap
page read and write
E200030C000
trusted library allocation
page read and write
E200024C000
trusted library allocation
page read and write
6E3C002A4000
trusted library allocation
page read and write
716C02E0C000
trusted library allocation
page read and write
716C033DB000
trusted library allocation
page read and write
E20002DC000
trusted library allocation
page read and write
E2000298000
trusted library allocation
page read and write
497E000
stack
page read and write
1E4E4D00000
unkown
page read and write
12F400230000
trusted library allocation
page read and write
716C02E7D000
trusted library allocation
page read and write
280AE2A5000
heap
page read and write
716C03D70000
trusted library allocation
page read and write
1DBA8000
heap
page read and write
716C03564000
trusted library allocation
page read and write
716C02960000
trusted library allocation
page read and write
E200040C000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
1DBB5000
heap
page read and write
6E3C002D8000
trusted library allocation
page read and write
716C023B4000
trusted library allocation
page read and write
E200022C000
trusted library allocation
page read and write
23D20000
trusted library allocation
page read and write
9CC97FE000
unkown
page readonly
716C03C3C000
trusted library allocation
page read and write
716C0357C000
trusted library allocation
page read and write
716C03460000
trusted library allocation
page read and write
1DB82000
heap
page read and write
12F4003BC000
trusted library allocation
page read and write
716C03C54000
trusted library allocation
page read and write
716C03554000
trusted library allocation
page read and write
716C039A0000
trusted library allocation
page read and write
E2000210000
trusted library allocation
page read and write
24128000
heap
page read and write
1DBB0000
heap
page read and write
280B0155000
heap
page read and write
50E1000
heap
page read and write
410800758000
trusted library allocation
page read and write
716C03930000
trusted library allocation
page read and write
716C023EC000
trusted library allocation
page read and write
2D4002FC000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C023B4000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
CB691FC000
stack
page read and write
E2000440000
trusted library allocation
page read and write
E2000114000
trusted library allocation
page read and write
410800640000
trusted library allocation
page read and write
9CAA7FE000
unkown
page readonly
5560000
direct allocation
page read and write
1DBAB000
heap
page read and write
12F4002F1000
trusted library allocation
page read and write
716C030FC000
trusted library allocation
page read and write
716C03450000
trusted library allocation
page read and write
716C03B3C000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C03430000
trusted library allocation
page read and write
280B0129000
heap
page read and write
123A000
unkown
page execute and write copy
716C024B4000
trusted library allocation
page read and write
716C030FC000
trusted library allocation
page read and write
1DBB4000
heap
page read and write
410800760000
trusted library allocation
page read and write
280AE190000
heap
page read and write
280AE21E000
heap
page read and write
1E4EBE26000
trusted library section
page read and write
716C03460000
trusted library allocation
page read and write
716C02D1C000
trusted library allocation
page read and write
1DBBD000
heap
page read and write
716C03460000
trusted library allocation
page read and write
716C030FC000
trusted library allocation
page read and write
410800320000
trusted library allocation
page read and write
E2000250000
trusted library allocation
page read and write
E2000498000
trusted library allocation
page read and write
1750000
heap
page read and write
716C023F4000
trusted library allocation
page read and write
716C028C0000
trusted library allocation
page read and write
4A7F000
stack
page read and write
716C0249E000
trusted library allocation
page read and write
E200048C000
trusted library allocation
page read and write
CB5C1F3000
stack
page read and write
38FF000
stack
page read and write
716C026FB000
trusted library allocation
page read and write
E2000234000
trusted library allocation
page read and write
716C0228C000
trusted library allocation
page read and write
716C03BE4000
trusted library allocation
page read and write
12F400364000
trusted library allocation
page read and write
6E3C00294000
trusted library allocation
page read and write
6E3C002C0000
trusted library allocation
page read and write
1DBC2000
heap
page read and write
716C030D0000
trusted library allocation
page read and write
716C03A44000
trusted library allocation
page read and write
716C02CE4000
trusted library allocation
page read and write
12F400290000
trusted library allocation
page read and write
B9800234000
direct allocation
page read and write
61E00000
direct allocation
page execute and read and write
50E1000
heap
page read and write
716C0360C000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
CB6D1FC000
stack
page read and write
716C03198000
trusted library allocation
page read and write
1DBAB000
heap
page read and write
716C03868000
trusted library allocation
page read and write
716C038D8000
trusted library allocation
page read and write
716C03970000
trusted library allocation
page read and write
716C02270000
trusted library allocation
page read and write
50E1000
heap
page read and write
50E1000
heap
page read and write
716C03C90000
trusted library allocation
page read and write
189E000
stack
page read and write
1DB96000
heap
page read and write
410800684000
trusted library allocation
page read and write
716C03984000
trusted library allocation
page read and write
E2000240000
trusted library allocation
page read and write
558B000
direct allocation
page read and write
23C10000
trusted library allocation
page read and write
716C03994000
trusted library allocation
page read and write
E20002C0000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
3CBF000
stack
page read and write
716C03CCC000
trusted library allocation
page read and write
4108002F4000
trusted library allocation
page read and write
B9800294000
direct allocation
page read and write
9CAE7FE000
unkown
page readonly
50E1000
heap
page read and write
716C02574000
trusted library allocation
page read and write
716C0255C000
trusted library allocation
page read and write
1E4E254A000
heap
page read and write
4BFE000
stack
page read and write
9CD2FFE000
stack
page read and write
716C0395C000
trusted library allocation
page read and write
9CD1FFC000
stack
page read and write
E20002F4000
trusted library allocation
page read and write
716C02704000
trusted library allocation
page read and write
716C03838000
trusted library allocation
page read and write
716C02570000
trusted library allocation
page read and write
716C03154000
trusted library allocation
page read and write
9CCC7FE000
unkown
page readonly
280AE2AE000
heap
page read and write
5BBC00234000
direct allocation
page read and write
410800430000
trusted library allocation
page read and write
410800201000
trusted library allocation
page read and write
9CB17FE000
unkown
page readonly
280B0171000
heap
page read and write
410800220000
trusted library allocation
page read and write
716C00201000
trusted library allocation
page read and write
716C03C0C000
trusted library allocation
page read and write
280AE170000
heap
page read and write
716C035C8000
trusted library allocation
page read and write
716C03700000
trusted library allocation
page read and write
716C030FC000
trusted library allocation
page read and write
E2000324000
trusted library allocation
page read and write
716C03964000
trusted library allocation
page read and write
E20001F0000
trusted library allocation
page read and write
E2000250000
trusted library allocation
page read and write
40BE000
stack
page read and write
716C024EC000
trusted library allocation
page read and write
2D4002B4000
trusted library allocation
page read and write
280B0198000
heap
page read and write
716C0390C000
trusted library allocation
page read and write
12F40031C000
trusted library allocation
page read and write
716C03C20000
trusted library allocation
page read and write
716C03714000
trusted library allocation
page read and write
23C10000
trusted library allocation
page read and write
716C02C28000
trusted library allocation
page read and write
3A7E000
stack
page read and write
716C033D4000
trusted library allocation
page read and write
716C02498000
trusted library allocation
page read and write
B9800230000
direct allocation
page read and write
1620000
heap
page read and write
716C02990000
trusted library allocation
page read and write
CB027FE000
stack
page read and write
716C034F8000
trusted library allocation
page read and write
716C023AC000
trusted library allocation
page read and write
50E1000
heap
page read and write
1092000
unkown
page execute and read and write
1DBB0000
heap
page read and write
716C03528000
trusted library allocation
page read and write
1E4E9FD6000
heap
page read and write
CB7E1FC000
stack
page read and write
716C02E60000
trusted library allocation
page read and write
4E7E000
stack
page read and write
2D4002D8000
trusted library allocation
page read and write
410800354000
trusted library allocation
page read and write
716C03CE0000
trusted library allocation
page read and write
716C03718000
trusted library allocation
page read and write
E2000244000
trusted library allocation
page read and write
1E4EBCCE000
trusted library section
page read and write
716C02418000
trusted library allocation
page read and write
CB621FE000
stack
page read and write
3F3F000
stack
page read and write
716C02420000
trusted library allocation
page read and write
716C03420000
trusted library allocation
page read and write
4108002E4000
trusted library allocation
page read and write
3DFF000
stack
page read and write
12F400338000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
716C0392C000
trusted library allocation
page read and write
4108006B0000
trusted library allocation
page read and write
716C036E4000
trusted library allocation
page read and write
9CCDFFE000
stack
page read and write
2D400274000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
2D400288000
trusted library allocation
page read and write
716C02498000
trusted library allocation
page read and write
12F40032C000
trusted library allocation
page read and write
716C03C01000
trusted library allocation
page read and write
12F400408000
trusted library allocation
page read and write
716C02FD4000
trusted library allocation
page read and write
41080033C000
trusted library allocation
page read and write
41FE000
stack
page read and write
716C03C40000
trusted library allocation
page read and write
716C02DEC000
trusted library allocation
page read and write
716C02EA4000
trusted library allocation
page read and write
410800368000
trusted library allocation
page read and write
716C030E8000
trusted library allocation
page read and write
50BF000
stack
page read and write
5BBC002A8000
direct allocation
page read and write
716C035A8000
trusted library allocation
page read and write
41080075C000
trusted library allocation
page read and write
CB7C9FE000
unkown
page readonly
CB5E9FE000
unkown
page readonly
32DE000
stack
page read and write
716C03494000
trusted library allocation
page read and write
716C02C28000
trusted library allocation
page read and write
716C02C28000
trusted library allocation
page read and write
716C0255C000
trusted library allocation
page read and write
716C02F48000
trusted library allocation
page read and write
716C02928000
trusted library allocation
page read and write
280B017E000
heap
page read and write
9CA8FFB000
stack
page read and write
12F4002F4000
trusted library allocation
page read and write
50E1000
heap
page read and write
50E1000
heap
page read and write
280AFFB0000
trusted library allocation
page read and write
E2000058000
trusted library allocation
page read and write
716C02280000
trusted library allocation
page read and write
12F400360000
trusted library allocation
page read and write
E2000068000
trusted library allocation
page read and write
E200026C000
trusted library allocation
page read and write
50E1000
heap
page read and write
1DBA3000
heap
page read and write
716C035D4000
trusted library allocation
page read and write
5BBC002D0000
direct allocation
page read and write
716C031D0000
trusted library allocation
page read and write
716C03180000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C038D4000
trusted library allocation
page read and write
CCA000
unkown
page execute and read and write
B98002A8000
direct allocation
page read and write
4ABE000
stack
page read and write
5BBC00210000
direct allocation
page read and write
716C038CC000
trusted library allocation
page read and write
1DBBD000
heap
page read and write
716C0262C000
trusted library allocation
page read and write
410800644000
trusted library allocation
page read and write
9CBBFFC000
stack
page read and write
6CD69000
unkown
page readonly
50E1000
heap
page read and write
716C0268C000
trusted library allocation
page read and write
9CBEFFE000
stack
page read and write
716C03D54000
trusted library allocation
page read and write
E20001F8000
trusted library allocation
page read and write
1E4E6083000
heap
page read and write
1DBB4000
heap
page read and write
716C03D64000
trusted library allocation
page read and write
B9800201000
direct allocation
page read and write
410800698000
trusted library allocation
page read and write
716C03384000
trusted library allocation
page read and write
1E4E6134000
heap
page read and write
716C023A0000
trusted library allocation
page read and write
716C027EC000
trusted library allocation
page read and write
716C0384C000
trusted library allocation
page read and write
9CAEFFA000
stack
page read and write
716C031C0000
trusted library allocation
page read and write
716C02DC4000
trusted library allocation
page read and write
9CAFFFE000
stack
page read and write
12F400380000
trusted library allocation
page read and write
280B01D9000
heap
page read and write
716C036E8000
trusted library allocation
page read and write
410800730000
trusted library allocation
page read and write
716C03C50000
trusted library allocation
page read and write
E200038C000
trusted library allocation
page read and write
716C03240000
trusted library allocation
page read and write
716C02518000
trusted library allocation
page read and write
716C02EFC000
trusted library allocation
page read and write
B9800270000
direct allocation
page read and write
716C03B64000
trusted library allocation
page read and write
716C031F4000
trusted library allocation
page read and write
5560000
direct allocation
page read and write
E2000378000
trusted library allocation
page read and write
3F7E000
stack
page read and write
716C02A1C000
trusted library allocation
page read and write
716C03CDC000
trusted library allocation
page read and write
2D4002F0000
trusted library allocation
page read and write
23E97000
heap
page read and write
716C03730000
trusted library allocation
page read and write
9CD27FE000
unkown
page readonly
716C02979000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C03448000
trusted library allocation
page read and write
9CA2FFE000
stack
page read and write
716C03D64000
trusted library allocation
page read and write
12F400220000
trusted library allocation
page read and write
1E4EBFE0000
trusted library section
page read and write
E200018C000
trusted library allocation
page read and write
716C03218000
trusted library allocation
page read and write
2D400260000
trusted library allocation
page read and write
18A0000
heap
page read and write
18B0000
direct allocation
page read and write
716C03B08000
trusted library allocation
page read and write
716C00A01000
trusted library allocation
page read and write
9CA67FE000
unkown
page readonly
2D4002A8000
trusted library allocation
page read and write
50E1000
heap
page read and write
B9800244000
direct allocation
page read and write
1DBB0000
heap
page read and write
716C0397C000
trusted library allocation
page read and write
6E3C00230000
trusted library allocation
page read and write
6E3C00201000
trusted library allocation
page read and write
B9800303000
direct allocation
page read and write
50E1000
heap
page read and write
716C037E8000
trusted library allocation
page read and write
CB631FE000
stack
page read and write
9CD17FE000
unkown
page readonly
410800714000
trusted library allocation
page read and write
716C03540000
trusted library allocation
page read and write
9CD07FE000
unkown
page readonly
5BBC0021C000
direct allocation
page read and write
50E1000
heap
page read and write
280B01B3000
heap
page read and write
716C027CC000
trusted library allocation
page read and write
E2000134000
trusted library allocation
page read and write
6CCC0000
unkown
page readonly
36BE000
stack
page read and write
716C02BF4000
trusted library allocation
page read and write
4108003EC000
trusted library allocation
page read and write
280AE2A1000
heap
page read and write
716C025DC000
trusted library allocation
page read and write
716C00C01000
trusted library allocation
page read and write
CB609FE000
unkown
page readonly
716C02EFC000
trusted library allocation
page read and write
1D89F000
stack
page read and write
716C034DC000
trusted library allocation
page read and write
447E000
stack
page read and write
50E1000
heap
page read and write
5BBC00270000
direct allocation
page read and write
2D400294000
trusted library allocation
page read and write
716C02518000
trusted library allocation
page read and write
1DBA3000
heap
page read and write
9CC8FFE000
stack
page read and write
716C03DA4000
trusted library allocation
page read and write
716C02E48000
trusted library allocation
page read and write
6CC9F000
unkown
page write copy
716C0268C000
trusted library allocation
page read and write
280AE266000
heap
page read and write
716C0386C000
trusted library allocation
page read and write
9CAF7FE000
unkown
page readonly
6CD21000
unkown
page readonly
716C02F68000
trusted library allocation
page read and write
D68000
unkown
page execute and read and write
716C0280C000
trusted library allocation
page read and write
280AE244000
heap
page read and write
50E1000
heap
page read and write
716C03940000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
716C02EFC000
trusted library allocation
page read and write
E2000124000
trusted library allocation
page read and write
1E4E2690000
heap
page read and write
E20001A0000
trusted library allocation
page read and write
13C2000
stack
page read and write
716C0326C000
trusted library allocation
page read and write
4108006EC000
trusted library allocation
page read and write
12F400358000
trusted library allocation
page read and write
716C031D0000
trusted library allocation
page read and write
E200016C000
trusted library allocation
page read and write
716C031C0000
trusted library allocation
page read and write
12F400250000
trusted library allocation
page read and write
716C02FBC000
trusted library allocation
page read and write
410800310000
trusted library allocation
page read and write
1DBCC000
heap
page read and write
4108002ED000
trusted library allocation
page read and write
2D4002A8000
trusted library allocation
page read and write
1E4E2460000
heap
page read and write
716C02601000
trusted library allocation
page read and write
E2000078000
trusted library allocation
page read and write
9CC17FE000
unkown
page readonly
1E4E2557000
heap
page read and write
280B01D6000
heap
page read and write
1DA1D000
stack
page read and write
CB7E9FE000
unkown
page readonly
716C038F4000
trusted library allocation
page read and write
1E4E614B000
heap
page read and write
32F0000
heap
page read and write
CB671FD000
stack
page read and write
716C024F8000
trusted library allocation
page read and write
319D000
stack
page read and write
716C02FAB000
trusted library allocation
page read and write
410800330000
trusted library allocation
page read and write
1DB8E000
heap
page read and write
E2000324000
trusted library allocation
page read and write
483E000
stack
page read and write
50E1000
heap
page read and write
1E4E6094000
heap
page read and write
1E4EBD8D000
trusted library section
page read and write
457F000
stack
page read and write
280AE200000
heap
page read and write
2D4002B8000
trusted library allocation
page read and write
716C036C0000
trusted library allocation
page read and write
E20002A8000
trusted library allocation
page read and write
410800408000
trusted library allocation
page read and write
716C022F0000
trusted library allocation
page read and write
6E3C00264000
trusted library allocation
page read and write
716C029C8000
trusted library allocation
page read and write
716C0300C000
trusted library allocation
page read and write
56F0000
direct allocation
page execute and read and write
5BBC00201000
direct allocation
page read and write
1947000
heap
page read and write
6CA9D000
unkown
page readonly
1D4AF000
stack
page read and write
9CC7FFE000
stack
page read and write
716C03154000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
E2000248000
trusted library allocation
page read and write
6E3C002F4000
trusted library allocation
page read and write
716C0221C000
trusted library allocation
page read and write
E2000401000
trusted library allocation
page read and write
1DBC9000
heap
page read and write
2D4002B4000
trusted library allocation
page read and write
280AE358000
heap
page read and write
716C034B8000
trusted library allocation
page read and write
6E3C002A0000
trusted library allocation
page read and write
410800248000
trusted library allocation
page read and write
CB781FD000
stack
page read and write
2D400230000
trusted library allocation
page read and write
716C03BF4000
trusted library allocation
page read and write
12F4003C0000
trusted library allocation
page read and write
716C03A01000
trusted library allocation
page read and write
6E3C00250000
trusted library allocation
page read and write
1E4E6108000
heap
page read and write
E2000094000
trusted library allocation
page read and write
716C037A0000
trusted library allocation
page read and write
410800789000
trusted library allocation
page read and write
716C02520000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
716C03118000
trusted library allocation
page read and write
13CC000
stack
page read and write
410800330000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C02A44000
trusted library allocation
page read and write
716C034DC000
trusted library allocation
page read and write
6E3C002A0000
trusted library allocation
page read and write
41080039C000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C02264000
trusted library allocation
page read and write
716C02944000
trusted library allocation
page read and write
716C03494000
trusted library allocation
page read and write
716C03880000
trusted library allocation
page read and write
716C02C28000
trusted library allocation
page read and write
1E4E2527000
heap
page read and write
1DBB1000
heap
page read and write
410800288000
trusted library allocation
page read and write
32F7000
heap
page read and write
2D4002B4000
trusted library allocation
page read and write
5BBC0031C000
direct allocation
page read and write
9CCAFFA000
stack
page read and write
12F400210000
trusted library allocation
page read and write
6E3C002A0000
trusted library allocation
page read and write
2D400270000
trusted library allocation
page read and write
716C0255C000
trusted library allocation
page read and write
716C00001000
trusted library allocation
page read and write
716C03D48000
trusted library allocation
page read and write
9CA0FEF000
stack
page read and write
3BBE000
stack
page read and write
716C03BAC000
trusted library allocation
page read and write
1E4E60A5000
heap
page read and write
1DBAC000
heap
page read and write
6CD67000
unkown
page read and write
716C03028000
trusted library allocation
page read and write
E20004AC000
trusted library allocation
page read and write
E20003A0000
trusted library allocation
page read and write
716C039EC000
trusted library allocation
page read and write
E2000218000
trusted library allocation
page read and write
716C0240C000
trusted library allocation
page read and write
716C035CD000
trusted library allocation
page read and write
716C02334000
trusted library allocation
page read and write
B9800217000
direct allocation
page read and write
50E1000
heap
page read and write
9CBC7FE000
unkown
page readonly
716C034B8000
trusted library allocation
page read and write
5BBC002E0000
direct allocation
page read and write
716C02985000
trusted library allocation
page read and write
4CFF000
stack
page read and write
716C02AF8000
trusted library allocation
page read and write
716C03BE0000
trusted library allocation
page read and write
716C03830000
trusted library allocation
page read and write
E2000230000
trusted library allocation
page read and write
50E1000
heap
page read and write
280AE2BD000
heap
page read and write
1DCA0000
trusted library allocation
page read and write
1E4E5AA0000
heap
page read and write
E2000214000
trusted library allocation
page read and write
24133000
heap
page read and write
280AE327000
heap
page read and write
6E3C002B0000
trusted library allocation
page read and write
CB699FE000
unkown
page readonly
569F000
stack
page read and write
CB6A1FD000
stack
page read and write
5BBC00316000
direct allocation
page read and write
280B0129000
heap
page read and write
2D4002B4000
trusted library allocation
page read and write
5BBC002D8000
direct allocation
page read and write
1E4EBBE3000
heap
page read and write
5BBC002D8000
direct allocation
page read and write
716C0276C000
trusted library allocation
page read and write
716C02594000
trusted library allocation
page read and write
1E4EA1C2000
trusted library allocation
page read and write
716C02BD4000
trusted library allocation
page read and write
9CC47FE000
unkown
page readonly
9CBAFFB000
stack
page read and write
716C036EC000
trusted library allocation
page read and write
716C038A8000
trusted library allocation
page read and write
E20002E8000
trusted library allocation
page read and write
E2000254000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C03790000
trusted library allocation
page read and write
410800734000
trusted library allocation
page read and write
716C03CB4000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C038D0000
trusted library allocation
page read and write
1DBB2000
heap
page read and write
12F40040C000
trusted library allocation
page read and write
1E4ECA80000
trusted library section
page read and write
716C02494000
trusted library allocation
page read and write
716C023DC000
trusted library allocation
page read and write
716C03494000
trusted library allocation
page read and write
716C0260C000
trusted library allocation
page read and write
716C03B7C000
trusted library allocation
page read and write
E2000150000
trusted library allocation
page read and write
CB789FE000
unkown
page readonly
E200029C000
trusted library allocation
page read and write
CB679FE000
unkown
page readonly
716C033E0000
trusted library allocation
page read and write
716C031CC000
trusted library allocation
page read and write
716C02E98000
trusted library allocation
page read and write
716C03450000
trusted library allocation
page read and write
716C0234C000
trusted library allocation
page read and write
716C030EC000
trusted library allocation
page read and write
716C03C24000
trusted library allocation
page read and write
B9800290000
direct allocation
page read and write
280AE313000
heap
page read and write
E200000C000
trusted library allocation
page read and write
716C03758000
trusted library allocation
page read and write
716C03278000
trusted library allocation
page read and write
E200020C000
trusted library allocation
page read and write
9CA87FE000
unkown
page readonly
280AE2F6000
heap
page read and write
B98002E4000
direct allocation
page read and write
50E1000
heap
page read and write
12F40039C000
trusted library allocation
page read and write
179E000
stack
page read and write
6E3C002A0000
trusted library allocation
page read and write
280B0140000
heap
page read and write
716C0277C000
trusted library allocation
page read and write
716C03950000
trusted library allocation
page read and write
716C031C0000
trusted library allocation
page read and write
716C03318000
trusted library allocation
page read and write
367F000
stack
page read and write
50E1000
heap
page read and write
4E3F000
stack
page read and write
716C00E01000
trusted library allocation
page read and write
716C0225A000
trusted library allocation
page read and write
4108006AC000
trusted library allocation
page read and write
4F7F000
stack
page read and write
E20002C0000
trusted library allocation
page read and write
3B7F000
stack
page read and write
E20001F4000
trusted library allocation
page read and write
6E3C00235000
trusted library allocation
page read and write
23C60000
heap
page read and write
716C0268C000
trusted library allocation
page read and write
716C03C38000
trusted library allocation
page read and write
4108006B8000
trusted library allocation
page read and write
4108002B8000
trusted library allocation
page read and write
716C02318000
trusted library allocation
page read and write
716C0220C000
trusted library allocation
page read and write
716C0291C000
trusted library allocation
page read and write
50E1000
heap
page read and write
329F000
stack
page read and write
716C02518000
trusted library allocation
page read and write
716C03898000
trusted library allocation
page read and write
2D4002A8000
trusted library allocation
page read and write
CB037FE000
stack
page read and write
716C03198000
trusted library allocation
page read and write
280AE2AC000
heap
page read and write
716C02F94000
trusted library allocation
page read and write
716C035C8000
trusted library allocation
page read and write
716C03854000
trusted library allocation
page read and write
716C02801000
trusted library allocation
page read and write
9CCE7FE000
unkown
page readonly
50E1000
heap
page read and write
9CD37FE000
unkown
page readonly
9CA3FFE000
stack
page read and write
9CACFFB000
stack
page read and write
1915000
heap
page read and write
41080033C000
trusted library allocation
page read and write
716C036BC000
trusted library allocation
page read and write
716C03C28000
trusted library allocation
page read and write
716C025E8000
trusted library allocation
page read and write
280B0138000
heap
page read and write
1DBAC000
heap
page read and write
B9800215000
direct allocation
page read and write
2D400248000
trusted library allocation
page read and write
12F400284000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
6E3C002A4000
trusted library allocation
page read and write
12F400300000
trusted library allocation
page read and write
716C02CC0000
trusted library allocation
page read and write
716C0299A000
trusted library allocation
page read and write
433E000
stack
page read and write
41080035C000
trusted library allocation
page read and write
6E3C00220000
trusted library allocation
page read and write
46BF000
stack
page read and write
41BF000
stack
page read and write
716C02494000
trusted library allocation
page read and write
50C0000
heap
page read and write
9CB27FE000
unkown
page readonly
410800688000
trusted library allocation
page read and write
716C02494000
trusted library allocation
page read and write
9CB9FFB000
stack
page read and write
716C03B94000
trusted library allocation
page read and write
1DB95000
heap
page read and write
716C025DC000
trusted library allocation
page read and write
5BBC00294000
direct allocation
page read and write
716C032A4000
trusted library allocation
page read and write
12F40032C000
trusted library allocation
page read and write
716C03864000
trusted library allocation
page read and write
716C0236C000
trusted library allocation
page read and write
716C02430000
trusted library allocation
page read and write
716C0309C000
trusted library allocation
page read and write
716C024B0000
trusted library allocation
page read and write
716C033F0000
trusted library allocation
page read and write
E2000201000
trusted library allocation
page read and write
716C031C0000
trusted library allocation
page read and write
716C03A0C000
trusted library allocation
page read and write
4108006E8000
trusted library allocation
page read and write
716C036F8000
trusted library allocation
page read and write
E20003D0000
trusted library allocation
page read and write
716C03B40000
trusted library allocation
page read and write
716C039C0000
trusted library allocation
page read and write
1DBCC000
heap
page read and write
6E3C002C8000
trusted library allocation
page read and write
410800230000
trusted library allocation
page read and write
716C033A8000
trusted library allocation
page read and write
407F000
stack
page read and write
716C02518000
trusted library allocation
page read and write
716C03D64000
trusted library allocation
page read and write
18B0000
direct allocation
page read and write
23C20000
heap
page read and write
6CC9E000
unkown
page read and write
716C02C88000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C024E0000
trusted library allocation
page read and write
716C024C0000
trusted library allocation
page read and write
716C02540000
trusted library allocation
page read and write
1DBBD000
heap
page read and write
1E4E5AC4000
heap
page read and write
C34000
unkown
page execute and read and write
716C026B8000
trusted library allocation
page read and write
716C03198000
trusted library allocation
page read and write
443F000
stack
page read and write
410800320000
trusted library allocation
page read and write
716C02B14000
trusted library allocation
page read and write
E2000220000
trusted library allocation
page read and write
18C0000
heap
page read and write
50E1000
heap
page read and write
716C039BC000
trusted library allocation
page read and write
716C0268C000
trusted library allocation
page read and write
716C03584000
trusted library allocation
page read and write
716C02A0C000
trusted library allocation
page read and write
716C03B90000
trusted library allocation
page read and write
1DB96000
heap
page read and write
716C0269C000
trusted library allocation
page read and write
716C03A20000
trusted library allocation
page read and write
108B000
unkown
page execute and read and write
B4C000
unkown
page execute and read and write
716C023AC000
trusted library allocation
page read and write
716C03D70000
trusted library allocation
page read and write
1E4E5ABE000
heap
page read and write
716C03274000
trusted library allocation
page read and write
280AE2C7000
heap
page read and write
716C03748000
trusted library allocation
page read and write
716C03108000
trusted library allocation
page read and write
716C03728000
trusted library allocation
page read and write
716C03D31000
trusted library allocation
page read and write
716C03E0C000
trusted library allocation
page read and write
410800390000
trusted library allocation
page read and write
E2000300000
trusted library allocation
page read and write
716C024B7000
trusted library allocation
page read and write
343C000
stack
page read and write
1DB96000
heap
page read and write
4108007D0000
trusted library allocation
page read and write
716C033A0000
trusted library allocation
page read and write
280AE2E4000
heap
page read and write
716C034B8000
trusted library allocation
page read and write
2D4002B8000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
9CCBFFC000
stack
page read and write
280B01B5000
heap
page read and write
41080088C000
trusted library allocation
page read and write
280B012C000
heap
page read and write
716C03384000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C0255C000
trusted library allocation
page read and write
716C02EC8000
trusted library allocation
page read and write
1E4EBBA0000
trusted library section
page read and write
716C023D0000
trusted library allocation
page read and write
9CAC7FE000
unkown
page readonly
716C030D0000
trusted library allocation
page read and write
9CB7FFC000
stack
page read and write
716C03CA8000
trusted library allocation
page read and write
CB719FE000
unkown
page readonly
410800238000
trusted library allocation
page read and write
12F4003C4000
trusted library allocation
page read and write
1E4EBA27000
unclassified section
page read and write
50E1000
heap
page read and write
716C03D7C000
trusted library allocation
page read and write
1D5EF000
stack
page read and write
716C03988000
trusted library allocation
page read and write
716C03B08000
trusted library allocation
page read and write
2D400294000
trusted library allocation
page read and write
1DB9A000
heap
page read and write
716C034B8000
trusted library allocation
page read and write
50E1000
heap
page read and write
9CA7FFB000
stack
page read and write
1E4E611F000
heap
page read and write
1755000
heap
page read and write
410800374000
trusted library allocation
page read and write
280B01DF000
heap
page read and write
410800248000
trusted library allocation
page read and write
716C030DC000
trusted library allocation
page read and write
1E4EBB30000
heap
page read and write
716C026C4000
trusted library allocation
page read and write
E20000B1000
trusted library allocation
page read and write
716C037EC000
trusted library allocation
page read and write
12F400418000
trusted library allocation
page read and write
50E1000
heap
page read and write
C69000
unkown
page execute and read and write
4108006FC000
trusted library allocation
page read and write
E2000108000
trusted library allocation
page read and write
12F400430000
trusted library allocation
page read and write
1DBC5000
heap
page read and write
E2000350000
trusted library allocation
page read and write
716C03D3C000
trusted library allocation
page read and write
280B01A4000
heap
page read and write
2D400294000
trusted library allocation
page read and write
E2000284000
trusted library allocation
page read and write
E200026C000
trusted library allocation
page read and write
280AE2A7000
heap
page read and write
50E1000
heap
page read and write
1E4EC420000
trusted library section
page read and write
410800801000
trusted library allocation
page read and write
716C03090000
trusted library allocation
page read and write
E20002F4000
trusted library allocation
page read and write
1DB80000
heap
page read and write
4108006C4000
trusted library allocation
page read and write
1DBAC000
heap
page read and write
716C02CB4000
trusted library allocation
page read and write
41080078C000
trusted library allocation
page read and write
CB5D1FE000
unkown
page read and write
1DBA6000
heap
page read and write
716C030B8000
trusted library allocation
page read and write
12F400308000
trusted library allocation
page read and write
1E4EC431000
trusted library section
page read and write
716C03754000
trusted library allocation
page read and write
716C03968000
trusted library allocation
page read and write
1DB8B000
heap
page read and write
37BF000
stack
page read and write
42FF000
stack
page read and write
CB759FE000
unkown
page readonly
CB771FE000
stack
page read and write
716C02520000
trusted library allocation
page read and write
6E3C002A0000
trusted library allocation
page read and write
716C02254000
trusted library allocation
page read and write
1DBC4000
heap
page read and write
18B0000
direct allocation
page read and write
1DB8E000
heap
page read and write
41080069C000
trusted library allocation
page read and write
E2000268000
trusted library allocation
page read and write
9CB67FE000
unkown
page readonly
5BBC00284000
direct allocation
page read and write
716C02520000
trusted library allocation
page read and write
E2000050000
trusted library allocation
page read and write
6CCC1000
unkown
page execute read
716C02518000
trusted library allocation
page read and write
716C03774000
trusted library allocation
page read and write
716C032F0000
trusted library allocation
page read and write
716C037DC000
trusted library allocation
page read and write
1E4E5AC3000
heap
page read and write
1E4E6060000
heap
page read and write
1E4EC1E0000
trusted library section
page read and write
410800678000
trusted library allocation
page read and write
716C033D4000
trusted library allocation
page read and write
716C02894000
trusted library allocation
page read and write
CBB000
unkown
page execute and read and write
1E4EC800000
trusted library section
page read and write
1D62E000
stack
page read and write
716C03C80000
trusted library allocation
page read and write
32FE000
heap
page read and write
1E4E6131000
heap
page read and write
41080020C000
trusted library allocation
page read and write
24130000
heap
page read and write
61EB4000
direct allocation
page read and write
716C024E0000
trusted library allocation
page read and write
4108006E4000
trusted library allocation
page read and write
716C029A4000
trusted library allocation
page read and write
716C02C28000
trusted library allocation
page read and write
12F400401000
trusted library allocation
page read and write
716C039CC000
trusted library allocation
page read and write
CC7000
unkown
page execute and read and write
C9B000
unkown
page execute and read and write
716C0332C000
trusted library allocation
page read and write
410800320000
trusted library allocation
page read and write
CB751FE000
stack
page read and write
716C0286C000
trusted library allocation
page read and write
716C03C44000
trusted library allocation
page read and write
280AE273000
heap
page read and write
716C03BCC000
trusted library allocation
page read and write
716C03C94000
trusted library allocation
page read and write
E2000274000
trusted library allocation
page read and write
9CB77FE000
unkown
page readonly
716C03D94000
trusted library allocation
page read and write
716C023AC000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C03BBC000
trusted library allocation
page read and write
23C80000
heap
page read and write
716C03108000
trusted library allocation
page read and write
357E000
stack
page read and write
280B0100000
heap
page read and write
9CA27FE000
unkown
page readonly
18CA000
heap
page read and write
280B012E000
heap
page read and write
280B013D000
heap
page read and write
410800418000
trusted library allocation
page read and write
716C03CA4000
trusted library allocation
page read and write
4BBF000
stack
page read and write
280AE230000
heap
page read and write
5100000
heap
page read and write
716C03494000
trusted library allocation
page read and write
410800624000
trusted library allocation
page read and write
9CC9FFE000
stack
page read and write
E2000238000
trusted library allocation
page read and write
280AFFE0000
trusted library section
page readonly
716C03154000
trusted library allocation
page read and write
716C030FC000
trusted library allocation
page read and write
716C0291E000
trusted library allocation
page read and write
B20000
unkown
page readonly
51E0000
trusted library allocation
page read and write
2D4002B4000
trusted library allocation
page read and write
56E0000
direct allocation
page execute and read and write
B980024C000
direct allocation
page read and write
CB7D9FE000
unkown
page readonly
6E3C002A0000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C037CC000
trusted library allocation
page read and write
4108002CC000
trusted library allocation
page read and write
280B017F000
heap
page read and write
E20003E0000
trusted library allocation
page read and write
E200027C000
trusted library allocation
page read and write
716C03D30000
trusted library allocation
page read and write
CB601FE000
stack
page read and write
716C03450000
trusted library allocation
page read and write
1DBCC000
heap
page read and write
E20001AC000
trusted library allocation
page read and write
716C030E8000
trusted library allocation
page read and write
716C0383C000
trusted library allocation
page read and write
716C0255C000
trusted library allocation
page read and write
E20003A4000
trusted library allocation
page read and write
716C02F1C000
trusted library allocation
page read and write
716C03B78000
trusted library allocation
page read and write
716C030E8000
trusted library allocation
page read and write
716C028E4000
trusted library allocation
page read and write
716C03850000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
23E90000
heap
page read and write
E2000044000
trusted library allocation
page read and write
1DBC4000
heap
page read and write
716C031D0000
trusted library allocation
page read and write
716C0268C000
trusted library allocation
page read and write
716C02B74000
trusted library allocation
page read and write
9CC0FFC000
stack
page read and write
CB709FE000
unkown
page readonly
716C02830000
trusted library allocation
page read and write
1E4E5ABE000
heap
page read and write
716C03450000
trusted library allocation
page read and write
5BBC0024C000
direct allocation
page read and write
2D4002F8000
trusted library allocation
page read and write
410800770000
trusted library allocation
page read and write
5BBC00308000
direct allocation
page read and write
716C033D0000
trusted library allocation
page read and write
716C03258000
trusted library allocation
page read and write
1DBAB000
heap
page read and write
9CC3FFE000
stack
page read and write
410800788000
trusted library allocation
page read and write
1E4E610F000
heap
page read and write
716C0320C000
trusted library allocation
page read and write
716C0242C000
trusted library allocation
page read and write
716C028AC000
trusted library allocation
page read and write
1DB96000
heap
page read and write
280B010F000
heap
page read and write
9CADFFC000
stack
page read and write
716C035CD000
trusted library allocation
page read and write
1E4EC443000
trusted library section
page read and write
716C03138000
trusted library allocation
page read and write
12F400288000
trusted library allocation
page read and write
410800720000
trusted library allocation
page read and write
12F400344000
trusted library allocation
page read and write
E2000270000
trusted library allocation
page read and write
E20000E0000
trusted library allocation
page read and write
12F4003A0000
trusted library allocation
page read and write
B9800210000
direct allocation
page read and write
716C02A80000
trusted library allocation
page read and write
716C02DBC000
trusted library allocation
page read and write
716C02F29000
trusted library allocation
page read and write
E2000424000
trusted library allocation
page read and write
716C03440000
trusted library allocation
page read and write
280B0132000
heap
page read and write
E200025C000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C02594000
trusted library allocation
page read and write
716C02BA0000
trusted library allocation
page read and write
410800348000
trusted library allocation
page read and write
716C02DD8000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C033F8000
trusted library allocation
page read and write
2D400294000
trusted library allocation
page read and write
280AE330000
heap
page read and write
716C029E0000
trusted library allocation
page read and write
12F4002D8000
trusted library allocation
page read and write
2D4002A8000
trusted library allocation
page read and write
E2000390000
trusted library allocation
page read and write
50E1000
heap
page read and write
9CC6FFE000
stack
page read and write
716C039DC000
trusted library allocation
page read and write
716C03DA4000
trusted library allocation
page read and write
B9800284000
direct allocation
page read and write
18B0000
direct allocation
page read and write
716C0388C000
trusted library allocation
page read and write
9CC5FFC000
stack
page read and write
716C03228000
trusted library allocation
page read and write
CB639FE000
unkown
page readonly
716C037B4000
trusted library allocation
page read and write
716C0267C000
trusted library allocation
page read and write
E2000160000
trusted library allocation
page read and write
1DBA6000
heap
page read and write
716C039E8000
trusted library allocation
page read and write
716C03888000
trusted library allocation
page read and write
716C03B48000
trusted library allocation
page read and write
716C02A01000
trusted library allocation
page read and write
716C03CB0000
trusted library allocation
page read and write
716C02584000
trusted library allocation
page read and write
716C030E8000
trusted library allocation
page read and write
716C030D0000
trusted library allocation
page read and write
280B01E4000
heap
page read and write
280B0DC0000
unkown
page read and write
410800601000
trusted library allocation
page read and write
716C03890000
trusted library allocation
page read and write
50E6000
heap
page read and write
9CB1FFE000
stack
page read and write
CB6D9FE000
unkown
page readonly
E2000300000
trusted library allocation
page read and write
410800664000
trusted library allocation
page read and write
1D9DD000
stack
page read and write
9CC57FE000
unkown
page readonly
9CCEFFE000
stack
page read and write
716C03980000
trusted library allocation
page read and write
1DBBD000
heap
page read and write
CB6F1FE000
stack
page read and write
280B012C000
heap
page read and write
716C039D0000
trusted library allocation
page read and write
716C03D98000
trusted library allocation
page read and write
E20002B4000
trusted library allocation
page read and write
1E4EBDC0000
trusted library section
page read and write
1E4E5AD0000
heap
page read and write
CB799FE000
unkown
page readonly
716C03401000
trusted library allocation
page read and write
716C038C0000
trusted library allocation
page read and write
716C022A8000
trusted library allocation
page read and write
12F400424000
trusted library allocation
page read and write
280B01CE000
heap
page read and write
E20002B0000
trusted library allocation
page read and write
716C03DA8000
trusted library allocation
page read and write
1E4E60B0000
heap
page read and write
716C02328000
trusted library allocation
page read and write
E2000430000
trusted library allocation
page read and write
716C032D8000
trusted library allocation
page read and write
716C03448000
trusted library allocation
page read and write
410800744000
trusted library allocation
page read and write
716C02538000
trusted library allocation
page read and write
716C02201000
trusted library allocation
page read and write
280B6F30000
trusted library allocation
page read and write
716C0378C000
trusted library allocation
page read and write
716C02FC8000
trusted library allocation
page read and write
9CC87FE000
unkown
page readonly
5710000
direct allocation
page execute and read and write
1DBA3000
heap
page read and write
1E4E5ACB000
heap
page read and write
716C026F8000
trusted library allocation
page read and write
716C028F8000
trusted library allocation
page read and write
23C10000
heap
page read and write
CB791FE000
stack
page read and write
CB7A9FE000
unkown
page readonly
CB6C9FE000
unkown
page readonly
50E1000
heap
page read and write
716C02E7D000
trusted library allocation
page read and write
716C033E0000
trusted library allocation
page read and write
716C02C0C000
trusted library allocation
page read and write
716C02ADC000
trusted library allocation
page read and write
716C02F34000
trusted library allocation
page read and write
716C03CAC000
trusted library allocation
page read and write
6E3C002A1000
trusted library allocation
page read and write
716C026BC000
trusted library allocation
page read and write
C8E000
unkown
page execute and read and write
6CAC1000
unkown
page execute read
61ED0000
direct allocation
page read and write
716C03134000
trusted library allocation
page read and write
716C03D70000
trusted library allocation
page read and write
E20004A4000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
716C033C0000
trusted library allocation
page read and write
B20000
unkown
page read and write
716C03C14000
trusted library allocation
page read and write
716C025DC000
trusted library allocation
page read and write
716C02D1C000
trusted library allocation
page read and write
716C03288000
trusted library allocation
page read and write
716C033E0000
trusted library allocation
page read and write
1E4EBBE0000
heap
page read and write
E2000320000
trusted library allocation
page read and write
24139000
heap
page read and write
716C02EB4000
trusted library allocation
page read and write
9CB07FE000
unkown
page readonly
1E4E5AB9000
heap
page read and write
716C03078000
trusted library allocation
page read and write
CB03FFE000
unkown
page readonly
716C023E0000
trusted library allocation
page read and write
1E4E6071000
heap
page read and write
E2000278000
trusted library allocation
page read and write
1E4E5ABE000
heap
page read and write
6E3C002A0000
trusted library allocation
page read and write
CB7C1FE000
stack
page read and write
716C02621000
trusted library allocation
page read and write
4108006D4000
trusted library allocation
page read and write
9CB4FFE000
stack
page read and write
50E1000
heap
page read and write
716C02C28000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
716C03C1C000
trusted library allocation
page read and write
280AE284000
heap
page read and write
716C02BCB000
trusted library allocation
page read and write
9CC07FE000
unkown
page readonly
716C036BC000
trusted library allocation
page read and write
410800694000
trusted library allocation
page read and write
1E4EC5C0000
trusted library section
page read and write
280B0130000
heap
page read and write
1DB8E000
heap
page read and write
716C025DC000
trusted library allocation
page read and write
716C03C70000
trusted library allocation
page read and write
9CAB7FE000
unkown
page readonly
18B0000
direct allocation
page read and write
716C03134000
trusted library allocation
page read and write
45BE000
stack
page read and write
6E3C002F0000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
716C03BF0000
trusted library allocation
page read and write
716C02DF4000
trusted library allocation
page read and write
716C0254C000
trusted library allocation
page read and write
E20003B4000
trusted library allocation
page read and write
6E3C0020C000
trusted library allocation
page read and write
1DBC8000
heap
page read and write
716C02E1C000
trusted library allocation
page read and write
716C0266C000
trusted library allocation
page read and write
50E1000
heap
page read and write
1700000
heap
page read and write
716C03724000
trusted library allocation
page read and write
1DBA6000
heap
page read and write
5BBC00311000
direct allocation
page read and write
6E3C00238000
trusted library allocation
page read and write
716C03C58000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
4108006E0000
trusted library allocation
page read and write
50F0000
heap
page read and write
C06000
unkown
page execute and read and write
CB701FE000
stack
page read and write
410800724000
trusted library allocation
page read and write
5700000
direct allocation
page execute and read and write
1DBAB000
heap
page read and write
50E1000
heap
page read and write
716C0240C000
trusted library allocation
page read and write
1D8DD000
stack
page read and write
CB6C1FD000
stack
page read and write
12F4002AC000
trusted library allocation
page read and write
716C0381C000
trusted library allocation
page read and write
1DBBD000
heap
page read and write
716C03D70000
trusted library allocation
page read and write
716C026B8000
trusted library allocation
page read and write
E20000EC000
trusted library allocation
page read and write
280B8402000
heap
page read and write
E20000A4000
trusted library allocation
page read and write
2D4002B8000
trusted library allocation
page read and write
CB6E9FE000
unkown
page readonly
12F40025C000
trusted library allocation
page read and write
716C03894000
trusted library allocation
page read and write
716C0271C000
trusted library allocation
page read and write
716C02594000
trusted library allocation
page read and write
6E3C002A4000
trusted library allocation
page read and write
E2000258000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
1DB98000
heap
page read and write
716C02CA4000
trusted library allocation
page read and write
1E4E6136000
heap
page read and write
716C025DC000
trusted library allocation
page read and write
E20001B8000
trusted library allocation
page read and write
9CBB7FE000
unkown
page readonly
50E1000
heap
page read and write
716C03480000
trusted library allocation
page read and write
5BBC002D0000
direct allocation
page read and write
716C03B6C000
trusted library allocation
page read and write
1E4E62A0000
trusted library section
page read and write
280AE2B8000
heap
page read and write
716C02520000
trusted library allocation
page read and write
1DBA6000
heap
page read and write
716C0249C000
trusted library allocation
page read and write
3A3F000
stack
page read and write
5143000
heap
page read and write
716C0278C000
trusted library allocation
page read and write
716C02494000
trusted library allocation
page read and write
9CB2FFD000
stack
page read and write
2D4002A0000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
1E4E611C000
heap
page read and write
280B013D000
heap
page read and write
E0A000
unkown
page execute and read and write
1E4E249B000
heap
page read and write
1DBB0000
heap
page read and write
6E3C002F8000
trusted library allocation
page read and write
716C03288000
trusted library allocation
page read and write
716C023E4000
trusted library allocation
page read and write
50E1000
heap
page read and write
1E4EC80E000
trusted library section
page read and write
2D400220000
trusted library allocation
page read and write
716C031C0000
trusted library allocation
page read and write
E20001EC000
trusted library allocation
page read and write
E20001D4000
trusted library allocation
page read and write
716C02518000
trusted library allocation
page read and write
716C037D0000
trusted library allocation
page read and write
493F000
stack
page read and write
410800320000
trusted library allocation
page read and write
410800210000
trusted library allocation
page read and write
716C038E0000
trusted library allocation
page read and write
716C02FBC000
trusted library allocation
page read and write
410800610000
trusted library allocation
page read and write
1E4E5AC4000
heap
page read and write
E200031C000
trusted library allocation
page read and write
9CA5FFE000
stack
page read and write
CB669FE000
unkown
page readonly
1E4E606D000
heap
page read and write
E20002A0000
trusted library allocation
page read and write
716C0281C000
trusted library allocation
page read and write
41080080C000
trusted library allocation
page read and write
6CAC0000
unkown
page readonly
716C02628000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
716C02F60000
trusted library allocation
page read and write
9CD0FFD000
stack
page read and write
50E1000
heap
page read and write
9CBFFFB000
stack
page read and write
56E0000
direct allocation
page execute and read and write
4108006B4000
trusted library allocation
page read and write
1E4E5AC3000
heap
page read and write
716C037C8000
trusted library allocation
page read and write
9CBF7FE000
unkown
page readonly
716C023F8000
trusted library allocation
page read and write
716C03B44000
trusted library allocation
page read and write
716C037A4000
trusted library allocation
page read and write
1E4E60C8000
heap
page read and write
18B0000
direct allocation
page read and write
716C023E8000
trusted library allocation
page read and write
E2000140000
trusted library allocation
page read and write
280AE2A1000
heap
page read and write
716C03820000
trusted library allocation
page read and write
12F40031C000
trusted library allocation
page read and write
716C03494000
trusted library allocation
page read and write
1DBA4000
heap
page read and write
CB661FE000
stack
page read and write
716C02E88000
trusted library allocation
page read and write
716C02DAC000
trusted library allocation
page read and write
1E4E5AB9000
heap
page read and write
1E4E6129000
heap
page read and write
716C024E0000
trusted library allocation
page read and write
B9800220000
direct allocation
page read and write
716C03760000
trusted library allocation
page read and write
E2000344000
trusted library allocation
page read and write
1DBC9000
heap
page read and write
716C0252C000
trusted library allocation
page read and write
56E0000
direct allocation
page execute and read and write
280B8400000
heap
page read and write
E20002F4000
trusted library allocation
page read and write
1E4E6143000
heap
page read and write
9CBDFFA000
stack
page read and write
716C02518000
trusted library allocation
page read and write
280B012E000
heap
page read and write
716C038B0000
trusted library allocation
page read and write
9CC67FE000
unkown
page readonly
3E3E000
stack
page read and write
716C0372C000
trusted library allocation
page read and write
410800668000
trusted library allocation
page read and write
1E4E5F90000
trusted library section
page read and write
5BBC00290000
direct allocation
page read and write
716C023AC000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C034DC000
trusted library allocation
page read and write
1E4E4280000
trusted library section
page readonly
E200023C000
trusted library allocation
page read and write
1E4E5D10000
heap
page read and write
716C03D70000
trusted library allocation
page read and write
CB01FFE000
unkown
page readonly
716C024A4000
trusted library allocation
page read and write
716C030CC000
trusted library allocation
page read and write
10A1000
unkown
page execute and write copy
1DBBD000
heap
page read and write
716C02C78000
trusted library allocation
page read and write
716C02E01000
trusted library allocation
page read and write
1DB90000
heap
page read and write
24090000
trusted library allocation
page read and write
50E1000
heap
page read and write
1E4E5AC3000
heap
page read and write
716C030D0000
trusted library allocation
page read and write
E20000C4000
trusted library allocation
page read and write
716C00401000
trusted library allocation
page read and write
B980026C000
direct allocation
page read and write
1E4E2470000
heap
page readonly
5BBC0026C000
direct allocation
page read and write
5BBC0025C000
direct allocation
page read and write
5BBC00280000
direct allocation
page read and write
E2000020000
trusted library allocation
page read and write
CB6E1FE000
stack
page read and write
E2000264000
trusted library allocation
page read and write
B980025C000
direct allocation
page read and write
716C030FC000
trusted library allocation
page read and write
1E4EBF97000
unclassified section
page read and write
716C02FB0000
trusted library allocation
page read and write
280AE302000
heap
page read and write
E200041C000
trusted library allocation
page read and write
50E1000
heap
page read and write
E20002A4000
trusted library allocation
page read and write
1DB9B000
heap
page read and write
280AE1E0000
heap
page read and write
1DBCC000
heap
page read and write
6CCA5000
unkown
page readonly
CB7B1FC000
stack
page read and write
716C037C4000
trusted library allocation
page read and write
2D4002A8000
trusted library allocation
page read and write
41080025C000
trusted library allocation
page read and write
E200021C000
trusted library allocation
page read and write
716C0305C000
trusted library allocation
page read and write
716C024E0000
trusted library allocation
page read and write
280AE1C0000
heap
page read and write
716C0358C000
trusted library allocation
page read and write
12F40020C000
trusted library allocation
page read and write
716C03788000
trusted library allocation
page read and write
1DBAA000
heap
page read and write
6CA20000
unkown
page readonly
2412B000
heap
page read and write
716C03884000
trusted library allocation
page read and write
716C03601000
trusted library allocation
page read and write
716C023AC000
trusted library allocation
page read and write
716C0247C000
trusted library allocation
page read and write
1DBA6000
heap
page read and write
1D4EE000
stack
page read and write
716C023C8000
trusted library allocation
page read and write
716C022D0000
trusted library allocation
page read and write
9CB37FE000
unkown
page readonly
1E4E2551000
heap
page read and write
56EE000
stack
page read and write
716C02B08000
trusted library allocation
page read and write
716C02C20000
trusted library allocation
page read and write
5BBC00212000
direct allocation
page read and write
1E4EC5CE000
trusted library section
page read and write
716C033E4000
trusted library allocation
page read and write
E20001DC000
trusted library allocation
page read and write
E2000344000
trusted library allocation
page read and write
410800380000
trusted library allocation
page read and write
716C01001000
trusted library allocation
page read and write
716C02EE8000
trusted library allocation
page read and write
5BBC002AC000
direct allocation
page read and write
716C02F58000
trusted library allocation
page read and write
716C025DC000
trusted library allocation
page read and write
3CFE000
stack
page read and write
410800401000
trusted library allocation
page read and write
716C0387C000
trusted library allocation
page read and write
4108006CC000
trusted library allocation
page read and write
716C03778000
trusted library allocation
page read and write
1DBAD000
heap
page read and write
5BBC00328000
direct allocation
page read and write
716C02C28000
trusted library allocation
page read and write
6E3C00274000
trusted library allocation
page read and write
716C032F8000
trusted library allocation
page read and write
716C02DAC000
trusted library allocation
page read and write
393E000
stack
page read and write
D88000
unkown
page execute and read and write
716C02F3C000
trusted library allocation
page read and write
10A1000
unkown
page execute and read and write
716C038AC000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
716C0268C000
trusted library allocation
page read and write
716C0257F000
trusted library allocation
page read and write
4108006C8000
trusted library allocation
page read and write
716C02520000
trusted library allocation
page read and write
5BBC00250000
direct allocation
page read and write
50E1000
heap
page read and write
9CCFFFE000
stack
page read and write
716C03C7C000
trusted library allocation
page read and write
6E3C002C0000
trusted library allocation
page read and write
6E3C002C0000
trusted library allocation
page read and write
6CA21000
unkown
page execute read
716C0297C000
trusted library allocation
page read and write
1DB8E000
heap
page read and write
2D400278000
trusted library allocation
page read and write
559B000
stack
page read and write
5BBC002C0000
direct allocation
page read and write
716C031D0000
trusted library allocation
page read and write
716C03514000
trusted library allocation
page read and write
280AE2AC000
heap
page read and write
716C039E4000
trusted library allocation
page read and write
716C03C8C000
trusted library allocation
page read and write
716C023C4000
trusted library allocation
page read and write
CB711FE000
stack
page read and write
6E3C00260000
trusted library allocation
page read and write
CB629FE000
unkown
page readonly
410800700000
trusted library allocation
page read and write
CB7A1FE000
stack
page read and write
716C03A1C000
trusted library allocation
page read and write
716C00601000
trusted library allocation
page read and write
716C02398000
trusted library allocation
page read and write
716C024F8000
trusted library allocation
page read and write
280B01D0000
heap
page read and write
E20003C0000
trusted library allocation
page read and write
280B0140000
heap
page read and write
716C027B8000
trusted library allocation
page read and write
280B0151000
heap
page read and write
1E4E2695000
heap
page read and write
716C02428000
trusted library allocation
page read and write
1DBC4000
heap
page read and write
5BBC002EC000
direct allocation
page read and write
280AE2DE000
heap
page read and write
716C02B34000
trusted library allocation
page read and write
E2000001000
trusted library allocation
page read and write
9CB6FFC000
stack
page read and write
B98002EC000
direct allocation
page read and write
1E4E60ED000
heap
page read and write
716C02DC4000
trusted library allocation
page read and write
280B0130000
heap
page read and write
2D4002A8000
trusted library allocation
page read and write
280AE2FC000
heap
page read and write
47FF000
stack
page read and write
E20002D0000
trusted library allocation
page read and write
716C02518000
trusted library allocation
page read and write
2D4002C8000
trusted library allocation
page read and write
9CA6FFD000
stack
page read and write
716C00801000
trusted library allocation
page read and write
9CB57FE000
unkown
page readonly
41080027C000
trusted library allocation
page read and write
716C039B8000
trusted library allocation
page read and write
716C02DAC000
trusted library allocation
page read and write
12CC000
stack
page read and write
4108006F0000
trusted library allocation
page read and write
716C024A4000
trusted library allocation
page read and write
50E1000
heap
page read and write
E2000300000
trusted library allocation
page read and write
410800620000
trusted library allocation
page read and write
50E1000
heap
page read and write
410800614000
trusted library allocation
page read and write
9CC27FC000
stack
page read and write
5BBC00215000
direct allocation
page read and write
9CABFFC000
stack
page read and write
716C034B8000
trusted library allocation
page read and write
1E4EBCC2000
trusted library section
page read and write
13C8000
stack
page read and write
716C03164000
trusted library allocation
page read and write
9CA1FFE000
unkown
page read and write
716C02E64000
trusted library allocation
page read and write
716C022E0000
trusted library allocation
page read and write
12F400248000
trusted library allocation
page read and write
410800630000
trusted library allocation
page read and write
410800750000
trusted library allocation
page read and write
4108002D4000
trusted library allocation
page read and write
12F400374000
trusted library allocation
page read and write
1E4EBBD0000
trusted library section
page read and write
280B0013000
heap
page read and write
61ED4000
direct allocation
page readonly
6E3C00270000
trusted library allocation
page read and write
716C03CB8000
trusted library allocation
page read and write
E20002AC000
trusted library allocation
page read and write
716C023B4000
trusted library allocation
page read and write
716C034DC000
trusted library allocation
page read and write
2D4002B8000
trusted library allocation
page read and write
716C03B9C000
trusted library allocation
page read and write
716C0299C000
trusted library allocation
page read and write
716C023D8000
trusted library allocation
page read and write
716C03C68000
trusted library allocation
page read and write
280B0151000
heap
page read and write
56B0000
direct allocation
page execute and read and write
716C03B08000
trusted library allocation
page read and write
716C03C18000
trusted library allocation
page read and write
716C03B1C000
trusted library allocation
page read and write
716C02625000
trusted library allocation
page read and write
5BBC00230000
direct allocation
page read and write
716C02A6C000
trusted library allocation
page read and write
280B01E6000
heap
page read and write
716C039B4000
trusted library allocation
page read and write
716C038F0000
trusted library allocation
page read and write
6CAAE000
unkown
page read and write
9CB3FFE000
stack
page read and write
1E4EBBB1000
trusted library section
page read and write
9CCB7FE000
unkown
page readonly
716C03764000
trusted library allocation
page read and write
716C0235C000
trusted library allocation
page read and write
1E4EB9F7000
unclassified section
page read and write
CB6A9FE000
unkown
page readonly
716C0380C000
trusted library allocation
page read and write
716C02DC4000
trusted library allocation
page read and write
716C03308000
trusted library allocation
page read and write
9CBA7FE000
unkown
page readonly
1063000
unkown
page execute and read and write
716C02EFC000
trusted library allocation
page read and write
280AE25E000
heap
page read and write
716C0304C000
trusted library allocation
page read and write
9CC2FFE000
unkown
page readonly
9CBE7FE000
unkown
page readonly
716C02494000
trusted library allocation
page read and write
716C03BF8000
trusted library allocation
page read and write
716C038F8000
trusted library allocation
page read and write
12F4002D0000
trusted library allocation
page read and write
50E1000
heap
page read and write
280B01A0000
heap
page read and write
280AE2A9000
heap
page read and write
6E3C002B0000
trusted library allocation
page read and write
716C03834000
trusted library allocation
page read and write
1E4EBB97000
unclassified section
page read and write
61ECD000
direct allocation
page readonly
716C03A58000
trusted library allocation
page read and write
E200017C000
trusted library allocation
page read and write
2D400264000
trusted library allocation
page read and write
9CB47FE000
unkown
page readonly
716C024E0000
trusted library allocation
page read and write
4108007B4000
trusted library allocation
page read and write
1E4E2660000
heap
page read and write
50E1000
heap
page read and write
1DBCC000
heap
page read and write
716C02968000
trusted library allocation
page read and write
9CBD7FE000
unkown
page readonly
716C036D4000
trusted library allocation
page read and write
CB779FE000
unkown
page readonly
4108007CC000
trusted library allocation
page read and write
D8E000
unkown
page execute and read and write
716C02520000
trusted library allocation
page read and write
716C03928000
trusted library allocation
page read and write
716C037A8000
trusted library allocation
page read and write
1DBB0000
heap
page read and write
10A2000
unkown
page execute and write copy
716C03978000
trusted library allocation
page read and write
280AE1A0000
heap
page readonly
716C03B8C000
trusted library allocation
page read and write
12F400390000
trusted library allocation
page read and write
50E1000
heap
page read and write
5BBC00220000
direct allocation
page read and write
716C02883000
trusted library allocation
page read and write
9CA9FF9000
stack
page read and write
716C03C10000
trusted library allocation
page read and write
CB5E1FE000
stack
page read and write
5BBC00303000
direct allocation
page read and write
716C038FC000
trusted library allocation
page read and write
716C03BD0000
trusted library allocation
page read and write
12F40027C000
trusted library allocation
page read and write
12F4003A8000
trusted library allocation
page read and write
716C028FC000
trusted library allocation
page read and write
1DBAB000
heap
page read and write
716C036D0000
trusted library allocation
page read and write
716C024EC000
trusted library allocation
page read and write
2D400210000
trusted library allocation
page read and write
1E4E29E0000
heap
page read and write
CB02FFE000
unkown
page readonly
1DB95000
heap
page read and write
1E4E5ACC000
heap
page read and write
4108002B0000
trusted library allocation
page read and write
716C02F0C000
trusted library allocation
page read and write
9CAD7FE000
unkown
page readonly
716C03278000
trusted library allocation
page read and write
E20001C8000
trusted library allocation
page read and write
1928000
heap
page read and write
410800330000
trusted library allocation
page read and write
716C0375C000
trusted library allocation
page read and write
33FF000
stack
page read and write
6E3C002C0000
trusted library allocation
page read and write
1E4E252B000
heap
page read and write
1DBB3000
heap
page read and write
E200038C000
trusted library allocation
page read and write
5BBC0030A000
direct allocation
page read and write
716C02C34000
trusted library allocation
page read and write
50E1000
heap
page read and write
716C0391C000
trusted library allocation
page read and write
2D4002B8000
trusted library allocation
page read and write
There are 1834 hidden memdumps, click here to show them.