IOC Report
S0FTWARE.exe

loading gif

Files

File Path
Type
Category
Malicious
S0FTWARE.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\JECAEHJJJKJK\AECAKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JECAEHJJJKJK\AKEGDH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JECAEHJJJKJK\AKEGDH-shm
data
dropped
C:\ProgramData\JECAEHJJJKJK\BGDAAE
ASCII text, with very long lines (1765), with CRLF line terminators
modified
C:\ProgramData\JECAEHJJJKJK\DBKFHC
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JECAEHJJJKJK\FBFCAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\ProgramData\JECAEHJJJKJK\HJJEGCAAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JECAEHJJJKJK\IECGIEBAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JECAEHJJJKJK\IEHIII
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JECAEHJJJKJK\IEHIII-shm
data
dropped
C:\ProgramData\JECAEHJJJKJK\KFIJEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\29794eeb-1179-4f49-8576-8748bf02c527.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\44bf9d3d-436c-4eba-983e-a56496463353.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4d80bdea-64cb-446b-9531-364381d5611f.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-673F483B-938.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-673F483C-19C4.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\11532a6d-242d-4e38-b742-1f20bcc8def9.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1e4bf043-0f6a-4596-9d44-1d15441977c4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\5b89db5d-7bca-40c9-b5ad-87393e6361a9.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\62960126-b725-4189-9d5b-07633611f377.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\76949767-d67f-45f7-b538-9b1d3019ccf1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\78fcdd3b-5a0c-4d64-aba3-10129e819b0a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\97f66652-f0e5-4ab0-a51d-ce24c1379c6a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\20975aff-ea7d-4ca4-9d11-52096d5cae27.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 8, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF37f24.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF3ccf6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c0f04066-c8ef-477c-8caa-88c8328c2de2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f7556e90-bf66-4a4f-be71-bddcf84d02f7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\ff7cc0d3-7720-437b-ba7e-7dc8d3dc3bb0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3c16d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF40442.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3c5e1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3ef81.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13376674111222586
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\30962e57-71a2-4612-a59a-1fb555e9f1ef.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\43617108-6bc7-4971-82e9-c874e5955678.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\5020bc69-cc62-4f2f-b822-629506450868.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF3ccf6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 9, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a9288a94-8d77-4295-a1fc-66fea79b4a6f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f20eaaf2-945e-4e1d-af81-153cc1eede70.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF367e3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3689e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF36a34.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF390b8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a6e46ac1-d7fe-4d65-b94e-d111f73fcbd8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bad73ab8-d79e-4d4c-a32c-053dbbd2cc90.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\349308d4-d913-4fb1-8120-2bdb9b32ada5.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], progressive, precision 8, 1920x1080, components 3
dropped
C:\Users\user\AppData\Local\Temp\8feeb957-1525-4e4a-9802-2369efbf71ba.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\9ca71cd0-7423-4e94-9276-77d189273c12.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\c76ee082-9bc5-43e5-a8c2-cc146e78d3f8.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\c8eca8f8-af66-4438-bdca-65ccc494d0a2.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\e475f2c9-1b89-448b-b445-7c2264b16d5a.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_584404894\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_584404894\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_584404894\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_584404894\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_584404894\c8eca8f8-af66-4438-bdca-65ccc494d0a2.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\9ca71cd0-7423-4e94-9276-77d189273c12.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (3777)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6596_799178386\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (3782)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 13:48:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 13:48:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 13:48:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 13:48:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 13:48:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 246
ASCII text, with very long lines (766)
downloaded
Chrome Cache Entry: 247
ASCII text
downloaded
Chrome Cache Entry: 248
ASCII text, with very long lines (65531)
downloaded
There are 243 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\S0FTWARE.exe
"C:\Users\user\Desktop\S0FTWARE.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 --field-trial-handle=2268,i,3846380570938654004,26334187060056597,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2620 --field-trial-handle=2320,i,9641244863575168474,7710836502246451740,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3052 --field-trial-handle=2040,i,6971755058969874143,14166415319364147513,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7088 --field-trial-handle=2040,i,6971755058969874143,14166415319364147513,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=5220 --field-trial-handle=2040,i,6971755058969874143,14166415319364147513,262144 /prefetch:8
malicious

URLs

Name
IP
Malicious
https://mvce45.cyou/vcruntime140.dll
49.13.32.95
malicious
https://mvce45.cyou/
49.13.32.95
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://permanently-removed.invalid/oauth2/v2/tokeninfo
unknown
https://docs.google.com/document/J
unknown
https://ntp.msn.com/_default
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://mvce45.cyouXEJpdGNvaW5cd2FsbGV0c1x8d2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8K
unknown
https://google-ohttp-relay-join.fastly-edge.com/A
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://t.me/fu4chmo
149.154.167.99
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/J
unknown
https://anglebug.com/7714
unknown
https://www.instagram.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/H
unknown
https://mvce45.cyou/lE
unknown
https://google-ohttp-relay-join.fastly-edge.com/M
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://t.me/fu4chmor08etMozilla/5.0
unknown
https://google-ohttp-relay-join.fastly-edge.com/Q
unknown
https://google-ohttp-relay-join.fastly-edge.com/W
unknown
https://google-ohttp-relay-join.fastly-edge.com/V
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
https://outlook.office.com/mail/compose?isExtension=true
unknown
http://anglebug.com/6929
unknown
https://google-ohttp-relay-join.fastly-edge.com/c
unknown
http://anglebug.com/5281
unknown
https://mvce45.cyoua4a7f1267effnt-Disposition:
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
https://google-ohttp-relay-join.fastly-edge.com/g
unknown
https://issuetracker.google.com/255411748
unknown
https://web.telegram.org/
unknown
https://permanently-removed.invalid/oauth2/v4/token
unknown
https://anglebug.com/7246
unknown
http://postneo.com/icbm/idna:
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://mvce45.cyou/Ma
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://madskills.com/public/xml/rss/module/trackback/reflect.Value.Slice:
unknown
https://issuetracker.google.com/161903006
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://drive-daily-5.corp.google.com/
unknown
https://google-ohttp-relay-query.fastly-edge.com/https://google-ohttp-relay-join.fastly-edge.com/S
unknown
https://permanently-removed.invalid/chrome/blank.html
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://mvce45.cyou/sT$
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
https://mvce45.cyou/CDu
unknown
http://anglebug.com/7556
unknown
https://mvce45.cyou/000
unknown
https://chromewebstore.google.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://drive-preprod.corp.google.com/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://mvce45.cyou/b
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://www.office.com
unknown
http://anglebug.com/3625
unknown
https://outlook.live.com/mail/0/
unknown
https://steamcommunity.com/profiles/76561199802540894
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://mvce45.cyou/s
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://tidal.com/
unknown
https://docs.google.com/presentation/:
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mvce45.cyou
49.13.32.95
malicious
chrome.cloudflare-dns.com
162.159.61.3
t.me
149.154.167.99
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
sb.scorecardresearch.com
18.165.220.106
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
sni1gl.wpc.nucdn.net
152.199.21.175
bzib.nelreports.net
unknown
assets.msn.com
unknown
c.msn.com
unknown
ntp.msn.com
unknown
api.msn.com
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
malicious
49.13.32.95
mvce45.cyou
Germany
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
20.25.227.174
unknown
United States
13.107.246.40
unknown
United States
18.165.220.106
sb.scorecardresearch.com
United States
152.195.19.97
unknown
United States
20.189.173.2
unknown
United States
149.154.167.99
t.me
United Kingdom
162.159.61.3
chrome.cloudflare-dns.com
United States
172.217.21.36
www.google.com
United States
172.64.41.3
unknown
United States
23.44.203.23
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
2.16.158.185
unknown
European Union
239.255.255.250
unknown
Reserved
23.44.203.16
unknown
United States
142.250.65.225
unknown
United States
127.0.0.1
unknown
unknown
There are 9 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\263324
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\263324
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\263324
WindowTabManagerFileMappingId
There are 138 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1175E000
direct allocation
page read and write
malicious
911000
remote allocation
page readonly
malicious
11646000
direct allocation
page read and write
malicious
2FC001348000
trusted library allocation
page read and write
11978000
direct allocation
page read and write
F9C000
unkown
page write copy
1193C000
direct allocation
page read and write
2FC0027DC000
trusted library allocation
page read and write
2031C232000
heap
page read and write
47D000294000
trusted library allocation
page read and write
280400288000
trusted library allocation
page read and write
11A4A000
direct allocation
page read and write
12C0C000
stack
page read and write
3338000
heap
page read and write
6FE8001F4000
trusted library allocation
page read and write
2804003C0000
trusted library allocation
page read and write
6CBEF000
unkown
page write copy
2FC002CAC000
trusted library allocation
page read and write
119B2000
direct allocation
page read and write
2FC0001E8000
trusted library allocation
page read and write
11AC0000
direct allocation
page read and write
2FC002AEC000
trusted library allocation
page read and write
6FE8002C4000
trusted library allocation
page read and write
31E9000
heap
page read and write
280400338000
trusted library allocation
page read and write
28847564000
heap
page read and write
31A9000
heap
page read and write
3246000
heap
page read and write
89A000
stack
page read and write
119FA000
direct allocation
page read and write
3302000
heap
page read and write
870000
direct allocation
page read and write
2FC0029C4000
trusted library allocation
page read and write
2FC000218000
trusted library allocation
page read and write
2031C23A000
heap
page read and write
119B0000
direct allocation
page read and write
11B80000
direct allocation
page read and write
740000
direct allocation
page read and write
327C00270000
direct allocation
page read and write
288456E8000
heap
page read and write
12C60000
remote allocation
page read and write
2884F812000
heap
page read and write
11486000
direct allocation
page read and write
280400300000
trusted library allocation
page read and write
2FC0029D4000
trusted library allocation
page read and write
2FC000214000
trusted library allocation
page read and write
2FC00020C000
trusted library allocation
page read and write
2FC002318000
trusted library allocation
page read and write
321D000
heap
page read and write
3309000
heap
page read and write
2FC002904000
trusted library allocation
page read and write
6FE800050000
trusted library allocation
page read and write
2FC001318000
trusted library allocation
page read and write
2FC0014F2000
trusted library allocation
page read and write
2FC002710000
trusted library allocation
page read and write
280400390000
trusted library allocation
page read and write
C84B1FD000
stack
page read and write
2FC00274C000
trusted library allocation
page read and write
11990000
direct allocation
page read and write
280400360000
trusted library allocation
page read and write
BA7000
heap
page read and write
119F6000
direct allocation
page read and write
28847500000
heap
page read and write
C8591FE000
stack
page read and write
11908000
direct allocation
page read and write
6FE800224000
trusted library allocation
page read and write
5C940078C000
trusted library allocation
page read and write
28845629000
heap
page read and write
28845766000
heap
page read and write
11404000
direct allocation
page read and write
119CA000
direct allocation
page read and write
2FC000CA0000
trusted library allocation
page read and write
28847413000
heap
page read and write
11A20000
direct allocation
page read and write
11986000
direct allocation
page read and write
119F2000
direct allocation
page read and write
5C94006F4000
trusted library allocation
page read and write
6FE8003A4000
trusted library allocation
page read and write
2FC000294000
trusted library allocation
page read and write
327C00230000
direct allocation
page read and write
11934000
direct allocation
page read and write
5D8C002C0000
trusted library allocation
page read and write
2FC0025C4000
trusted library allocation
page read and write
3302000
heap
page read and write
11A02000
direct allocation
page read and write
320B000
heap
page read and write
8E0000
remote allocation
page execute and read and write
3328000
heap
page read and write
11A50000
direct allocation
page read and write
11908000
direct allocation
page read and write
982000
remote allocation
page execute and read and write
2FC0013BD000
trusted library allocation
page read and write
2884758A000
heap
page read and write
1197A000
direct allocation
page read and write
11A40000
direct allocation
page read and write
2FC000F68000
trusted library allocation
page read and write
5D8C002C0000
trusted library allocation
page read and write
2FC000790000
trusted library allocation
page read and write
5D8C002BC000
trusted library allocation
page read and write
3166000
heap
page read and write
2804003A0000
trusted library allocation
page read and write
11B1A000
direct allocation
page read and write
31DF000
heap
page read and write
6FE80017C000
trusted library allocation
page read and write
2FC00035C000
trusted library allocation
page read and write
2FC000F08000
trusted library allocation
page read and write
1150C000
direct allocation
page read and write
119C4000
direct allocation
page read and write
119D0000
direct allocation
page read and write
119A4000
direct allocation
page read and write
2FC000F34000
trusted library allocation
page read and write
2FC0027C4000
trusted library allocation
page read and write
118F2000
direct allocation
page read and write
2FC002620000
trusted library allocation
page read and write
5D8C002BC000
trusted library allocation
page read and write
8AC000
stack
page read and write
2FC0012E4000
trusted library allocation
page read and write
11402000
direct allocation
page read and write
F9B000
unkown
page read and write
2FC0027BC000
trusted library allocation
page read and write
327F000
heap
page read and write
2FC002ACC000
trusted library allocation
page read and write
2FC002D14000
trusted library allocation
page read and write
31E1000
heap
page read and write
C8361FE000
stack
page read and write
1197A000
direct allocation
page read and write
11994000
direct allocation
page read and write
333E000
heap
page read and write
A96000
direct allocation
page read and write
2FC000BD4000
trusted library allocation
page read and write
C8459FE000
unkown
page readonly
3274000
heap
page read and write
11CB0000
direct allocation
page read and write
3240000
heap
page read and write
2FC0013E0000
trusted library allocation
page read and write
119BE000
direct allocation
page read and write
2FC0026DC000
trusted library allocation
page read and write
6FE8002D0000
trusted library allocation
page read and write
288456B9000
heap
page read and write
28040020C000
trusted library allocation
page read and write
28845758000
heap
page read and write
33D2000
heap
page read and write
5C9400844000
trusted library allocation
page read and write
119C2000
direct allocation
page read and write
288456A5000
heap
page read and write
288456FB000
heap
page read and write
11934000
direct allocation
page read and write
11908000
direct allocation
page read and write
11BD0000
direct allocation
page read and write
3225000
heap
page read and write
2FC001698000
trusted library allocation
page read and write
117E000
direct allocation
page read and write
F98000
unkown
page read and write
2FC00035C000
trusted library allocation
page read and write
C84E1FD000
stack
page read and write
31D2000
heap
page read and write
2FC00160C000
trusted library allocation
page read and write
2FC000F08000
trusted library allocation
page read and write
2FC002C68000
trusted library allocation
page read and write
6FE800250000
trusted library allocation
page read and write
895000
heap
page read and write
1198A000
direct allocation
page read and write
11452000
direct allocation
page read and write
6FE80023C000
trusted library allocation
page read and write
2FC001430000
trusted library allocation
page read and write
2FC0026F0000
trusted library allocation
page read and write
323B000
heap
page read and write
280400430000
trusted library allocation
page read and write
2FC002A2C000
trusted library allocation
page read and write
2FC00250C000
trusted library allocation
page read and write
2884F800000
heap
page read and write
288456A3000
heap
page read and write
2FC0027AC000
trusted library allocation
page read and write
1002000
unkown
page readonly
6CBAF000
unkown
page readonly
1524C000
stack
page read and write
2031C23A000
heap
page read and write
11988000
direct allocation
page read and write
2FC00029A000
trusted library allocation
page read and write
5D8C002BC000
trusted library allocation
page read and write
B70000
heap
page read and write
6FE800248000
trusted library allocation
page read and write
47D000264000
trusted library allocation
page read and write
1B923000
heap
page read and write
47D0002E4000
trusted library allocation
page read and write
898000
stack
page read and write
2804002D8000
trusted library allocation
page read and write
327C0030A000
direct allocation
page read and write
119B2000
direct allocation
page read and write
11990000
direct allocation
page read and write
288481C0000
unkown
page read and write
5C9400818000
trusted library allocation
page read and write
3173000
heap
page read and write
5C9400884000
trusted library allocation
page read and write
2FC000790000
trusted library allocation
page read and write
3163F000
stack
page read and write
327C0021C000
direct allocation
page read and write
2FC000394000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
2FC0001D0000
trusted library allocation
page read and write
3D3000234000
direct allocation
page read and write
1B64F000
direct allocation
page readonly
11A00000
direct allocation
page read and write
2031C234000
heap
page read and write
119FE000
direct allocation
page read and write
3376000
heap
page read and write
31900000
direct allocation
page read and write
11435000
direct allocation
page read and write
2FC002BBC000
trusted library allocation
page read and write
6CA10000
unkown
page readonly
119F0000
direct allocation
page read and write
2FC0029B4000
trusted library allocation
page read and write
11924000
direct allocation
page read and write
2884F813000
heap
page read and write
2FC0024CC000
trusted library allocation
page read and write
327C00260000
direct allocation
page read and write
3308000
heap
page read and write
5D8C002A0000
trusted library allocation
page read and write
11939000
direct allocation
page read and write
2FC000F34000
trusted library allocation
page read and write
3286000
heap
page read and write
288456AA000
heap
page read and write
6FE8001B8000
trusted library allocation
page read and write
11A90000
direct allocation
page read and write
2884756E000
heap
page read and write
119F2000
direct allocation
page read and write
CEE000
unkown
page readonly
6CBF0000
unkown
page read and write
288455B0000
heap
page readonly
6FE8002D0000
trusted library allocation
page read and write
2FC001776000
trusted library allocation
page read and write
31E7000
heap
page read and write
5C94006AC000
trusted library allocation
page read and write
5C94006E8000
trusted library allocation
page read and write
3240000
heap
page read and write
280400310000
trusted library allocation
page read and write
2FC002568000
trusted library allocation
page read and write
2FC002B00000
trusted library allocation
page read and write
2FC0022BC000
trusted library allocation
page read and write
C83A9FE000
unkown
page readonly
2FC000CB8000
trusted library allocation
page read and write
C84E9FE000
unkown
page readonly
322A000
heap
page read and write
119AA000
direct allocation
page read and write
3240000
heap
page read and write
2FC0014C8000
trusted library allocation
page read and write
2884562F000
heap
page read and write
11978000
direct allocation
page read and write
2FC000394000
trusted library allocation
page read and write
2FC001640000
trusted library allocation
page read and write
2FC002944000
trusted library allocation
page read and write
337A000
heap
page read and write
31E4000
heap
page read and write
280400408000
trusted library allocation
page read and write
313B000
heap
page read and write
3213000
heap
page read and write
11440000
direct allocation
page read and write
1198C000
direct allocation
page read and write
2FC0004A8000
trusted library allocation
page read and write
6FE8002B4000
trusted library allocation
page read and write
11A30000
direct allocation
page read and write
11A0A000
direct allocation
page read and write
D1A000
heap
page read and write
6FE80005C000
trusted library allocation
page read and write
2FC002904000
trusted library allocation
page read and write
3329D000
stack
page read and write
5D8C002A0000
trusted library allocation
page read and write
876000
direct allocation
page read and write
2FC000294000
trusted library allocation
page read and write
31C0000
heap
page read and write
2FC00102C000
trusted library allocation
page read and write
11966000
direct allocation
page read and write
11B90000
direct allocation
page read and write
2FC002A38000
trusted library allocation
page read and write
327C00316000
direct allocation
page read and write
6FE800230000
trusted library allocation
page read and write
2FC00298C000
trusted library allocation
page read and write
2FC00130C000
trusted library allocation
page read and write
2FC0014C8000
trusted library allocation
page read and write
2FC001729000
trusted library allocation
page read and write
280400284000
trusted library allocation
page read and write
2884754B000
heap
page read and write
119B8000
direct allocation
page read and write
31CE000
heap
page read and write
11AB0000
direct allocation
page read and write
11992000
direct allocation
page read and write
2031C818000
heap
page read and write
105FD000
stack
page read and write
2FC002780000
trusted library allocation
page read and write
11988000
direct allocation
page read and write
2884754F000
heap
page read and write
11984000
direct allocation
page read and write
2FC0012E4000
trusted library allocation
page read and write
156A8000
heap
page read and write
119A9000
direct allocation
page read and write
BA7000
heap
page read and write
320F000
heap
page read and write
11904000
direct allocation
page read and write
155FF000
heap
page read and write
119A4000
direct allocation
page read and write
2FC0001B4000
trusted library allocation
page read and write
11900000
direct allocation
page read and write
2FC0016B8000
trusted library allocation
page read and write
C8521FC000
stack
page read and write
2FC000BDE000
trusted library allocation
page read and write
5C94006C8000
trusted library allocation
page read and write
2FC0013D4000
trusted library allocation
page read and write
2FC000FE4000
trusted library allocation
page read and write
327F000
heap
page read and write
119DA000
direct allocation
page read and write
31D2000
heap
page read and write
2FC002B0C000
trusted library allocation
page read and write
2FC002088000
trusted library allocation
page read and write
11980000
direct allocation
page read and write
12C60000
remote allocation
page read and write
2FC0003D8000
trusted library allocation
page read and write
105E000
stack
page read and write
6FE800104000
trusted library allocation
page read and write
3225000
heap
page read and write
3274000
heap
page read and write
119A4000
direct allocation
page read and write
2FC000296000
trusted library allocation
page read and write
2FC002624000
trusted library allocation
page read and write
325C000
heap
page read and write
316A000
heap
page read and write
2FC00143A000
trusted library allocation
page read and write
11AA0000
direct allocation
page read and write
3297000
heap
page read and write
6FE80038C000
trusted library allocation
page read and write
2FC000F5C000
trusted library allocation
page read and write
2FC002AFC000
trusted library allocation
page read and write
97F000
remote allocation
page execute and read and write
11AA0000
direct allocation
page read and write
280400201000
trusted library allocation
page read and write
2FC000380000
trusted library allocation
page read and write
2FC00022C000
trusted library allocation
page read and write
2FC000B58000
trusted library allocation
page read and write
119EC000
direct allocation
page read and write
327C00294000
direct allocation
page read and write
6FE800390000
trusted library allocation
page read and write
2FC000298000
trusted library allocation
page read and write
11908000
direct allocation
page read and write
2FC000298000
trusted library allocation
page read and write
6FE800260000
trusted library allocation
page read and write
F96000
unkown
page write copy
33B6000
heap
page read and write
3217000
heap
page read and write
2FC0024C8000
trusted library allocation
page read and write
2FC002318000
trusted library allocation
page read and write
2FC0026C4000
trusted library allocation
page read and write
334B000
heap
page read and write
327C00212000
direct allocation
page read and write
119D0000
direct allocation
page read and write
119A4000
direct allocation
page read and write
5C9400248000
trusted library allocation
page read and write
6FE80016C000
trusted library allocation
page read and write
2FC002A34000
trusted library allocation
page read and write
31DA000
heap
page read and write
11952000
direct allocation
page read and write
C8511FE000
stack
page read and write
2031C232000
heap
page read and write
C84D1FE000
stack
page read and write
11A2A000
direct allocation
page read and write
33BD000
heap
page read and write
2FC0029C8000
trusted library allocation
page read and write
11998000
direct allocation
page read and write
119BE000
direct allocation
page read and write
327C00234000
direct allocation
page read and write
31E9000
heap
page read and write
15380000
heap
page read and write
1198E000
direct allocation
page read and write
3274000
heap
page read and write
11966000
direct allocation
page read and write
6FE80000C000
trusted library allocation
page read and write
3286000
heap
page read and write
11B70000
direct allocation
page read and write
324D000
heap
page read and write
3394000
heap
page read and write
33BD000
heap
page read and write
28847573000
heap
page read and write
2FC000394000
trusted library allocation
page read and write
327C0031C000
direct allocation
page read and write
3290000
heap
page read and write
1190E000
direct allocation
page read and write
33A6000
heap
page read and write
2FC000224000
trusted library allocation
page read and write
28847402000
heap
page read and write
47D000288000
trusted library allocation
page read and write
3217000
heap
page read and write
2FC00143A000
trusted library allocation
page read and write
2FC002C0C000
trusted library allocation
page read and write
6FE800024000
trusted library allocation
page read and write
11A60000
direct allocation
page read and write
1191E000
direct allocation
page read and write
2FC002750000
trusted library allocation
page read and write
11916000
direct allocation
page read and write
28847513000
heap
page read and write
316A000
heap
page read and write
2FC000318000
trusted library allocation
page read and write
11990000
direct allocation
page read and write
2FC001489000
trusted library allocation
page read and write
119C0000
direct allocation
page read and write
11B68000
direct allocation
page read and write
2FC002CC0000
trusted library allocation
page read and write
31ED000
heap
page read and write
2FC002AA4000
trusted library allocation
page read and write
750000
heap
page read and write
280400308000
trusted library allocation
page read and write
3366000
heap
page read and write
11998000
direct allocation
page read and write
28845644000
heap
page read and write
6FE800078000
trusted library allocation
page read and write
2FC0025D8000
trusted library allocation
page read and write
325C000
heap
page read and write
119A6000
direct allocation
page read and write
3173000
heap
page read and write
11418000
direct allocation
page read and write
317BD000
stack
page read and write
327C00284000
direct allocation
page read and write
1198E000
direct allocation
page read and write
C8441FE000
stack
page read and write
118D0000
direct allocation
page read and write
2FC002828000
trusted library allocation
page read and write
280400284000
trusted library allocation
page read and write
3290000
heap
page read and write
5C9400894000
trusted library allocation
page read and write
2FC0013CC000
trusted library allocation
page read and write
33AA000
heap
page read and write
2FC000BD8000
trusted library allocation
page read and write
31D2000
heap
page read and write
2FC00281C000
trusted library allocation
page read and write
335D000
heap
page read and write
1142A000
direct allocation
page read and write
11D9000
direct allocation
page read and write
2FC0010DC000
trusted library allocation
page read and write
5C94006AC000
trusted library allocation
page read and write
1191C000
direct allocation
page read and write
BA7000
heap
page read and write
2FC002A7C000
trusted library allocation
page read and write
278ED000
heap
page read and write
2FC002CD8000
trusted library allocation
page read and write
280400358000
trusted library allocation
page read and write
11412000
direct allocation
page read and write
47D0002A8000
trusted library allocation
page read and write
2FC0013D5000
trusted library allocation
page read and write
2FC002590000
trusted library allocation
page read and write
1528C000
stack
page read and write
320D000
heap
page read and write
2FC0013B4000
trusted library allocation
page read and write
324D000
heap
page read and write
33C5000
heap
page read and write
119B6000
direct allocation
page read and write
11A98000
direct allocation
page read and write
2031C232000
heap
page read and write
327C00210000
direct allocation
page read and write
2FC0002B4000
trusted library allocation
page read and write
2FC000394000
trusted library allocation
page read and write
3240000
heap
page read and write
3240000
heap
page read and write
119C0000
direct allocation
page read and write
11540000
direct allocation
page read and write
119F0000
direct allocation
page read and write
5C94006E0000
trusted library allocation
page read and write
11BB0000
direct allocation
page read and write
1190C000
direct allocation
page read and write
2FC0029B0000
trusted library allocation
page read and write
327C00328000
direct allocation
page read and write
2FC0015AC000
trusted library allocation
page read and write
11524000
direct allocation
page read and write
2FC0012F0000
trusted library allocation
page read and write
5C9400864000
trusted library allocation
page read and write
2FC00140C000
trusted library allocation
page read and write
11A30000
direct allocation
page read and write
6FE8000F4000
trusted library allocation
page read and write
6CA02000
unkown
page readonly
6FE80009F000
trusted library allocation
page read and write
2FC00140C000
trusted library allocation
page read and write
2FC00130C000
trusted library allocation
page read and write
2FC002A80000
trusted library allocation
page read and write
2FC000BDE000
trusted library allocation
page read and write
2FC00169C000
trusted library allocation
page read and write
2FC002664000
trusted library allocation
page read and write
2FC0026B4000
trusted library allocation
page read and write
11AD0000
direct allocation
page read and write
6FE800254000
trusted library allocation
page read and write
6FE8001E8000
trusted library allocation
page read and write
11C30000
direct allocation
page read and write
2FC002660000
trusted library allocation
page read and write
2FC002724000
trusted library allocation
page read and write
2FC00102C000
trusted library allocation
page read and write
11C20000
direct allocation
page read and write
1B880000
trusted library allocation
page read and write
2FC002AC0000
trusted library allocation
page read and write
1190E000
direct allocation
page read and write
2031C240000
heap
page read and write
11C60000
direct allocation
page read and write
6FE8004B0000
trusted library allocation
page read and write
11CD0000
direct allocation
page read and write
C8529FE000
unkown
page readonly
11B70000
direct allocation
page read and write
11988000
direct allocation
page read and write
2884756C000
heap
page read and write
6FE800240000
trusted library allocation
page read and write
2FC000CC8000
trusted library allocation
page read and write
2FC000AF8000
trusted library allocation
page read and write
31EA000
heap
page read and write
327C002EC000
direct allocation
page read and write
2FC00139C000
trusted library allocation
page read and write
2FC00270C000
trusted library allocation
page read and write
119C2000
direct allocation
page read and write
118D4000
direct allocation
page read and write
11908000
direct allocation
page read and write
6FE800314000
trusted library allocation
page read and write
31E4000
heap
page read and write
2FC0025E8000
trusted library allocation
page read and write
2031C81D000
heap
page read and write
2FC000228000
trusted library allocation
page read and write
2FC002634000
trusted library allocation
page read and write
119EC000
direct allocation
page read and write
2FC0022BC000
trusted library allocation
page read and write
2FC002A84000
trusted library allocation
page read and write
320A000
heap
page read and write
1B880000
trusted library allocation
page read and write
6FE8001D0000
trusted library allocation
page read and write
3274000
heap
page read and write
2031C23A000
heap
page read and write
2FC000BD4000
trusted library allocation
page read and write
1B663000
heap
page read and write
2804002F1000
trusted library allocation
page read and write
3394000
heap
page read and write
2FC000394000
trusted library allocation
page read and write
6FE800130000
trusted library allocation
page read and write
11908000
direct allocation
page read and write
119D0000
direct allocation
page read and write
2031C820000
heap
page read and write
2FC002B54000
trusted library allocation
page read and write
327C00308000
direct allocation
page read and write
1155E000
direct allocation
page read and write
334B000
heap
page read and write
2FC0015B0000
trusted library allocation
page read and write
2031C232000
heap
page read and write
28845730000
heap
page read and write
2FC002564000
trusted library allocation
page read and write
2FC00048C000
trusted library allocation
page read and write
2804002D0000
trusted library allocation
page read and write
6FE800120000
trusted library allocation
page read and write
31DA000
heap
page read and write
2FC0017A4000
trusted library allocation
page read and write
119B8000
direct allocation
page read and write
2FC000230000
trusted library allocation
page read and write
28040039C000
trusted library allocation
page read and write
3290000
heap
page read and write
6FE800024000
trusted library allocation
page read and write
2FC00264C000
trusted library allocation
page read and write
BA7000
heap
page read and write
2FC00276C000
trusted library allocation
page read and write
2FC000388000
trusted library allocation
page read and write
119B4000
direct allocation
page read and write
2031C233000
heap
page read and write
119FE000
direct allocation
page read and write
32B7000
heap
page read and write
2FC00120C000
trusted library allocation
page read and write
15391000
heap
page read and write
2FC0003A8000
trusted library allocation
page read and write
CFE000
stack
page read and write
119FE000
direct allocation
page read and write
6FE8002DC000
trusted library allocation
page read and write
2FC0025A0000
trusted library allocation
page read and write
2804003BC000
trusted library allocation
page read and write
6FE80040C000
trusted library allocation
page read and write
6FE8002DC000
trusted library allocation
page read and write
11978000
direct allocation
page read and write
47D0002A8000
trusted library allocation
page read and write
C8341FE000
stack
page read and write
C8539FE000
unkown
page readonly
1B64D000
direct allocation
page readonly
C83E9FE000
unkown
page readonly
2FC000AF8000
trusted library allocation
page read and write
2FC0026D0000
trusted library allocation
page read and write
2FC0014C8000
trusted library allocation
page read and write
11926000
direct allocation
page read and write
2884753B000
heap
page read and write
1B64A000
direct allocation
page readonly
119B8000
direct allocation
page read and write
119AC000
direct allocation
page read and write
119D0000
direct allocation
page read and write
2FC001489000
trusted library allocation
page read and write
2FC0024BC000
trusted library allocation
page read and write
D10000
heap
page read and write
288475D7000
heap
page read and write
2FC000FE4000
trusted library allocation
page read and write
326D000
heap
page read and write
11970000
direct allocation
page read and write
2FC002720000
trusted library allocation
page read and write
A0AF000
stack
page read and write
1146C000
direct allocation
page read and write
C8451FE000
stack
page read and write
2FC001313000
trusted library allocation
page read and write
280400424000
trusted library allocation
page read and write
11A7A000
direct allocation
page read and write
11948000
direct allocation
page read and write
6FE8001D4000
trusted library allocation
page read and write
327C002A8000
direct allocation
page read and write
119C0000
direct allocation
page read and write
A7A000
remote allocation
page execute and read and write
6FE80008C000
trusted library allocation
page read and write
6FE8001C4000
trusted library allocation
page read and write
119E6000
direct allocation
page read and write
2884755E000
heap
page read and write
C83E1FE000
stack
page read and write
6FE80044C000
trusted library allocation
page read and write
11924000
direct allocation
page read and write
119FE000
direct allocation
page read and write
1197C000
direct allocation
page read and write
3286000
heap
page read and write
2FC001634000
trusted library allocation
page read and write
11916000
direct allocation
page read and write
31C2000
heap
page read and write
6FE800244000
trusted library allocation
page read and write
2FC0003D8000
trusted library allocation
page read and write
47D0002B8000
trusted library allocation
page read and write
288456BA000
heap
page read and write
890000
heap
page read and write
324D000
heap
page read and write
11990000
direct allocation
page read and write
3211000
heap
page read and write
288456B4000
heap
page read and write
318BF000
stack
page read and write
2FC0026FC000
trusted library allocation
page read and write
11AF0000
direct allocation
page read and write
6FE8002F4000
trusted library allocation
page read and write
2FC002730000
trusted library allocation
page read and write
6FE800334000
trusted library allocation
page read and write
327C00311000
direct allocation
page read and write
2031C22E000
heap
page read and write
156A6000
heap
page read and write
2FC0029F0000
trusted library allocation
page read and write
31D2000
heap
page read and write
1198E000
direct allocation
page read and write
6FE800234000
trusted library allocation
page read and write
119A8000
direct allocation
page read and write
5C94008C4000
trusted library allocation
page read and write
3354000
heap
page read and write
2FC0025F0000
trusted library allocation
page read and write
2FC0001AC000
trusted library allocation
page read and write
709000
direct allocation
page read and write
2FC00107C000
trusted library allocation
page read and write
6FE8002E8000
trusted library allocation
page read and write
2FC002BBC000
trusted library allocation
page read and write
2FC001320000
trusted library allocation
page read and write
280400210000
trusted library allocation
page read and write
11A20000
direct allocation
page read and write
2FC000EEC000
trusted library allocation
page read and write
321D000
heap
page read and write
1BA06000
heap
page read and write
757000
heap
page read and write
1B401000
direct allocation
page execute read
5C9400974000
trusted library allocation
page read and write
2031C835000
heap
page read and write
2FC002B24000
trusted library allocation
page read and write
11474000
direct allocation
page read and write
3333000
heap
page read and write
86C000
stack
page read and write
11970000
direct allocation
page read and write
C84A1FE000
stack
page read and write
118F6000
direct allocation
page read and write
2FC0012F5000
trusted library allocation
page read and write
28845727000
heap
page read and write
11970000
direct allocation
page read and write
3225000
heap
page read and write
119F0000
direct allocation
page read and write
47D0002A8000
trusted library allocation
page read and write
5C94008F0000
trusted library allocation
page read and write
3290000
heap
page read and write
3177F000
stack
page read and write
2FC00039C000
trusted library allocation
page read and write
3230000
heap
page read and write
280400350000
trusted library allocation
page read and write
2FC0003A8000
trusted library allocation
page read and write
C8391FE000
stack
page read and write
2FC001048000
trusted library allocation
page read and write
28845673000
heap
page read and write
6FE800220000
trusted library allocation
page read and write
280400344000
trusted library allocation
page read and write
327C0024C000
direct allocation
page read and write
119C0000
direct allocation
page read and write
119D0000
direct allocation
page read and write
2FC000EEC000
trusted library allocation
page read and write
2031C232000
heap
page read and write
1B618000
direct allocation
page readonly
2FC000294000
trusted library allocation
page read and write
6FE800264000
trusted library allocation
page read and write
47D000235000
trusted library allocation
page read and write
1B400000
direct allocation
page execute and read and write
28847597000
heap
page read and write
2FC002AB0000
trusted library allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
11ADA000
direct allocation
page read and write
C84C9FE000
unkown
page readonly
119B0000
direct allocation
page read and write
119F0000
direct allocation
page read and write
338B000
heap
page read and write
3264000
heap
page read and write
1160000
heap
page read and write
2FC000234000
trusted library allocation
page read and write
115F000
stack
page read and write
1192C000
direct allocation
page read and write
2FC002A74000
trusted library allocation
page read and write
2FC002CF8000
trusted library allocation
page read and write
2FC00240C000
trusted library allocation
page read and write
C8339FE000
unkown
page readonly
325C000
heap
page read and write
327C002E0000
direct allocation
page read and write
2FC000CB0000
trusted library allocation
page read and write
2884A8E0000
trusted library allocation
page read and write
2FC000EEC000
trusted library allocation
page read and write
2FC00169C000
trusted library allocation
page read and write
118E4000
direct allocation
page read and write
3E0000
heap
page read and write
39730000
heap
page read and write
119B0000
direct allocation
page read and write
322A000
heap
page read and write
6FE80028C000
trusted library allocation
page read and write
B21000
remote allocation
page execute and read and write
3252000
heap
page read and write
2031C234000
heap
page read and write
2FC0014C8000
trusted library allocation
page read and write
2FC0015C0000
trusted library allocation
page read and write
5C94002FC000
trusted library allocation
page read and write
327C002C0000
direct allocation
page read and write
11472000
direct allocation
page read and write
2FC0010DC000
trusted library allocation
page read and write
5D8C00248000
trusted library allocation
page read and write
119E4000
direct allocation
page read and write
336A000
heap
page read and write
11924000
direct allocation
page read and write
152CA000
heap
page read and write
31E7000
heap
page read and write
2FC001634000
trusted library allocation
page read and write
C8469FE000
unkown
page readonly
1190A000
direct allocation
page read and write
CBE000
stack
page read and write
2FC00129C000
trusted library allocation
page read and write
2FC000CB8000
trusted library allocation
page read and write
2FC001598000
trusted library allocation
page read and write
2FC002BA4000
trusted library allocation
page read and write
3338000
heap
page read and write
2FC000294000
trusted library allocation
page read and write
327F000
heap
page read and write
2FC00035C000
trusted library allocation
page read and write
2FC001048000
trusted library allocation
page read and write
6FE8000BC000
trusted library allocation
page read and write
28845713000
heap
page read and write
118F8000
direct allocation
page read and write
5C94007E4000
trusted library allocation
page read and write
11A30000
direct allocation
page read and write
327C00201000
direct allocation
page read and write
11A50000
direct allocation
page read and write
2FC0014C8000
trusted library allocation
page read and write
6FE800344000
trusted library allocation
page read and write
288475F9000
heap
page read and write
2FC000AF8000
trusted library allocation
page read and write
3173000
heap
page read and write
2FC0012FC000
trusted library allocation
page read and write
2FC002500000
trusted library allocation
page read and write
1149E000
direct allocation
page read and write
11CC0000
direct allocation
page read and write
2FC000F68000
trusted library allocation
page read and write
5C94007BC000
trusted library allocation
page read and write
339D000
heap
page read and write
6FE800238000
trusted library allocation
page read and write
2FC000294000
trusted library allocation
page read and write
5C94008F4000
trusted library allocation
page read and write
2FC0026AC000
trusted library allocation
page read and write
6FE8001E4000
trusted library allocation
page read and write
3346000
heap
page read and write
6FE800314000
trusted library allocation
page read and write
339D000
heap
page read and write
118C4000
direct allocation
page read and write
AA1000
unkown
page execute read
321D000
heap
page read and write
3211000
heap
page read and write
BA7000
heap
page read and write
11998000
direct allocation
page read and write
31906000
direct allocation
page read and write
2FC00129C000
trusted library allocation
page read and write
3297000
heap
page read and write
28040032C000
trusted library allocation
page read and write
AA0000
unkown
page readonly
119F6000
direct allocation
page read and write
15391000
heap
page read and write
2FC002798000
trusted library allocation
page read and write
2FC00178A000
trusted library allocation
page read and write
2884757C000
heap
page read and write
3328000
heap
page read and write
3264000
heap
page read and write
2FC001348000
trusted library allocation
page read and write
31F5000
heap
page read and write
11478000
direct allocation
page read and write
3217000
heap
page read and write
31E3000
heap
page read and write
1196C000
direct allocation
page read and write
288456A3000
heap
page read and write
2804002A4000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
C85B1FE000
stack
page read and write
3321F000
stack
page read and write
C83F9FE000
unkown
page readonly
1196C000
direct allocation
page read and write
2FC000AFC000
trusted library allocation
page read and write
1192B000
direct allocation
page read and write
5C94007D4000
trusted library allocation
page read and write
6FE800040000
trusted library allocation
page read and write
2FC000F64000
trusted library allocation
page read and write
2FC000790000
trusted library allocation
page read and write
2FC000CB8000
trusted library allocation
page read and write
2FC000BDE000
trusted library allocation
page read and write
5D8C002B0000
trusted library allocation
page read and write
6FE8002B4000
trusted library allocation
page read and write
2FC0016D8000
trusted library allocation
page read and write
2FC000314000
trusted library allocation
page read and write
2FC0027E0000
trusted library allocation
page read and write
333C000
heap
page read and write
31A9000
heap
page read and write
2FC002758000
trusted library allocation
page read and write
2FC0025BC000
trusted library allocation
page read and write
331B000
heap
page read and write
2FC0029F4000
trusted library allocation
page read and write
3264000
heap
page read and write
6FE8000E4000
trusted library allocation
page read and write
2FC002754000
trusted library allocation
page read and write
11934000
direct allocation
page read and write
327F000
heap
page read and write
11476000
direct allocation
page read and write
2FC00139C000
trusted library allocation
page read and write
3297000
heap
page read and write
F5E000
unkown
page write copy
31E3000
heap
page read and write
3339F000
stack
page read and write
3341000
heap
page read and write
2FC000FBC000
trusted library allocation
page read and write
3286000
heap
page read and write
2804003C4000
trusted library allocation
page read and write
118CC000
direct allocation
page read and write
5C9400790000
trusted library allocation
page read and write
3252000
heap
page read and write
5D8C002A0000
trusted library allocation
page read and write
11BD000
direct allocation
page read and write
119AC000
direct allocation
page read and write
2031C232000
heap
page read and write
3246000
heap
page read and write
2FC000394000
trusted library allocation
page read and write
152C0000
trusted library allocation
page read and write
11938000
direct allocation
page read and write
2031C7FA000
heap
page read and write
31D5000
heap
page read and write
31C0000
heap
page read and write
33220000
direct allocation
page read and write
3311000
heap
page read and write
31E0000
heap
page read and write
11986000
direct allocation
page read and write
31DB000
heap
page read and write
119BC000
direct allocation
page read and write
33E7000
heap
page read and write
11976000
direct allocation
page read and write
2FC002AA8000
trusted library allocation
page read and write
2FC002C30000
trusted library allocation
page read and write
2031C233000
heap
page read and write
11998000
direct allocation
page read and write
1156E000
direct allocation
page read and write
6CA11000
unkown
page execute read
7B6E000
stack
page read and write
3230000
heap
page read and write
2FC0001D4000
trusted library allocation
page read and write
28845628000
heap
page read and write
119C4000
direct allocation
page read and write
6FE80021C000
trusted library allocation
page read and write
2FC0015C0000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
2884752F000
heap
page read and write
106CE000
stack
page read and write
31D8000
heap
page read and write
11968000
direct allocation
page read and write
2FC000CA0000
trusted library allocation
page read and write
31CC000
heap
page read and write
2FC002A64000
trusted library allocation
page read and write
119EC000
direct allocation
page read and write
28040027C000
trusted library allocation
page read and write
2FC0027A0000
trusted library allocation
page read and write
31E7000
heap
page read and write
3211000
heap
page read and write
11B4A000
direct allocation
page read and write
F95000
unkown
page read and write
1B60F000
direct allocation
page readonly
327F000
heap
page read and write
2FC002AAC000
trusted library allocation
page read and write
5C9400778000
trusted library allocation
page read and write
2031C234000
heap
page read and write
11932000
direct allocation
page read and write
6FE800324000
trusted library allocation
page read and write
119F0000
direct allocation
page read and write
3240000
heap
page read and write
47D0002A8000
trusted library allocation
page read and write
11A1C000
direct allocation
page read and write
119AC000
direct allocation
page read and write
327C00217000
direct allocation
page read and write
6FE800228000
trusted library allocation
page read and write
118EE000
direct allocation
page read and write
6FE800140000
trusted library allocation
page read and write
5C9400830000
trusted library allocation
page read and write
31D2000
heap
page read and write
2FC00039C000
trusted library allocation
page read and write
11AB0000
direct allocation
page read and write
31CC000
heap
page read and write
11A0E000
direct allocation
page read and write
2031C234000
heap
page read and write
C8509FE000
unkown
page readonly
11980000
direct allocation
page read and write
3274000
heap
page read and write
5C94006F4000
trusted library allocation
page read and write
30CE000
stack
page read and write
1B700000
trusted library allocation
page read and write
1B60D000
direct allocation
page execute read
2FC000394000
trusted library allocation
page read and write
FE1000
unkown
page write copy
2FC0026F4000
trusted library allocation
page read and write
33B2000
heap
page read and write
316D000
heap
page read and write
119F0000
direct allocation
page read and write
11932000
direct allocation
page read and write
47D0002F0000
trusted library allocation
page read and write
2FC002350000
trusted library allocation
page read and write
2FC00120C000
trusted library allocation
page read and write
11990000
direct allocation
page read and write
28040040C000
trusted library allocation
page read and write
11A8000
direct allocation
page read and write
11900000
direct allocation
page read and write
32B7000
heap
page read and write
6FE80026C000
trusted library allocation
page read and write
11928000
direct allocation
page read and write
6FE80014C000
trusted library allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
33DD000
heap
page read and write
2FC000EEC000
trusted library allocation
page read and write
11416000
direct allocation
page read and write
1153A000
direct allocation
page read and write
2FC000294000
trusted library allocation
page read and write
2FC002550000
trusted library allocation
page read and write
6FE800001000
trusted library allocation
page read and write
2FC001634000
trusted library allocation
page read and write
5C940080C000
trusted library allocation
page read and write
11A60000
direct allocation
page read and write
11998000
direct allocation
page read and write
11964000
direct allocation
page read and write
11991000
direct allocation
page read and write
2FC002BCC000
trusted library allocation
page read and write
3385000
heap
page read and write
C8571FE000
stack
page read and write
11A10000
direct allocation
page read and write
2FC002BB0000
trusted library allocation
page read and write
2FC0001AC000
trusted library allocation
page read and write
3274000
heap
page read and write
2FC000CA0000
trusted library allocation
page read and write
31DA000
heap
page read and write
2FC000CB0000
trusted library allocation
page read and write
2FC002530000
trusted library allocation
page read and write
6FE8000AE000
trusted library allocation
page read and write
3246000
heap
page read and write
6FE800114000
trusted library allocation
page read and write
11B50000
direct allocation
page read and write
11B00000
direct allocation
page read and write
3264000
heap
page read and write
31F5000
heap
page read and write
C8569FE000
unkown
page readonly
288475B1000
heap
page read and write
C84F9FE000
unkown
page readonly
119AC000
direct allocation
page read and write
11906000
direct allocation
page read and write
2FC002A0C000
trusted library allocation
page read and write
2FC002548000
trusted library allocation
page read and write
3233000
heap
page read and write
E0BD000
stack
page read and write
288456C4000
heap
page read and write
3169000
heap
page read and write
C84C1FD000
stack
page read and write
3297000
heap
page read and write
2804003AC000
trusted library allocation
page read and write
327F000
heap
page read and write
2FC0016B0000
trusted library allocation
page read and write
33CB000
heap
page read and write
5C94008EC000
trusted library allocation
page read and write
3234000
heap
page read and write
119E0000
direct allocation
page read and write
280400404000
trusted library allocation
page read and write
324D000
heap
page read and write
2FC001418000
trusted library allocation
page read and write
2FC00280C000
trusted library allocation
page read and write
5D8C002D8000
trusted library allocation
page read and write
280400320000
trusted library allocation
page read and write
2FC002A50000
trusted library allocation
page read and write
2FC0001E0000
trusted library allocation
page read and write
89C000
stack
page read and write
11B30000
direct allocation
page read and write
33C5000
heap
page read and write
6FE800294000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
31CF000
heap
page read and write
11958000
direct allocation
page read and write
33CB000
heap
page read and write
6C971000
unkown
page execute read
118B4000
direct allocation
page read and write
6FE8001A8000
trusted library allocation
page read and write
11A00000
direct allocation
page read and write
288456FB000
heap
page read and write
3252000
heap
page read and write
2FC0013D4000
trusted library allocation
page read and write
2FC002570000
trusted library allocation
page read and write
308E000
stack
page read and write
2FC000EED000
trusted library allocation
page read and write
6FE80029C000
trusted library allocation
page read and write
5C940070C000
trusted library allocation
page read and write
28040031C000
trusted library allocation
page read and write
2FC0002F0000
trusted library allocation
page read and write
47D000210000
trusted library allocation
page read and write
2FC001598000
trusted library allocation
page read and write
11936000
direct allocation
page read and write
31E9000
heap
page read and write
6FE8002C0000
trusted library allocation
page read and write
11A6A000
direct allocation
page read and write
2FC002A4C000
trusted library allocation
page read and write
2FC001422000
trusted library allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
2FC002A48000
trusted library allocation
page read and write
944000
remote allocation
page execute and read and write
3311D000
stack
page read and write
47D000238000
trusted library allocation
page read and write
2FC00039C000
trusted library allocation
page read and write
119C8000
direct allocation
page read and write
31E3000
heap
page read and write
119EE000
direct allocation
page read and write
2FC002AD0000
trusted library allocation
page read and write
31D8000
heap
page read and write
31ED000
heap
page read and write
11A00000
direct allocation
page read and write
2FC002638000
trusted library allocation
page read and write
2197D000
heap
page read and write
31D2000
heap
page read and write
11A2C000
direct allocation
page read and write
11A3A000
direct allocation
page read and write
6CBF5000
unkown
page readonly
2FC000394000
trusted library allocation
page read and write
11958000
direct allocation
page read and write
2FC00029A000
trusted library allocation
page read and write
6FE8000A8000
trusted library allocation
page read and write
3372000
heap
page read and write
C8389FE000
unkown
page readonly
28847597000
heap
page read and write
28040025C000
trusted library allocation
page read and write
3252000
heap
page read and write
288475AF000
heap
page read and write
2FC001538000
trusted library allocation
page read and write
2FC000F8C000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
1067F000
stack
page read and write
2FC002CD0000
trusted library allocation
page read and write
47D000294000
trusted library allocation
page read and write
2FC002920000
trusted library allocation
page read and write
2FC0006D4000
trusted library allocation
page read and write
1193E000
direct allocation
page read and write
C8349FE000
unkown
page readonly
3286000
heap
page read and write
154A1000
heap
page read and write
119E2000
direct allocation
page read and write
2031C23F000
heap
page read and write
2FC0002A8000
trusted library allocation
page read and write
338B000
heap
page read and write
C8519FE000
unkown
page readonly
1192E000
direct allocation
page read and write
2FC0027CC000
trusted library allocation
page read and write
3238000
heap
page read and write
2FC000F8C000
trusted library allocation
page read and write
11972000
direct allocation
page read and write
5C940079C000
trusted library allocation
page read and write
280400374000
trusted library allocation
page read and write
11A2E000
direct allocation
page read and write
119F0000
direct allocation
page read and write
3246000
heap
page read and write
47D000278000
trusted library allocation
page read and write
1198E000
direct allocation
page read and write
2FC00102C000
trusted library allocation
page read and write
3314000
heap
page read and write
118F2000
direct allocation
page read and write
6FE80038C000
trusted library allocation
page read and write
31F5000
heap
page read and write
119C8000
direct allocation
page read and write
2884F802000
heap
page read and write
2FC0025A8000
trusted library allocation
page read and write
31A7000
heap
page read and write
3167D000
stack
page read and write
2FC002990000
trusted library allocation
page read and write
2FC002734000
trusted library allocation
page read and write
1143A000
direct allocation
page read and write
47D0002A8000
trusted library allocation
page read and write
3234000
heap
page read and write
114DC000
direct allocation
page read and write
119A4000
direct allocation
page read and write
2FC000EEC000
trusted library allocation
page read and write
5C9400828000
trusted library allocation
page read and write
6FE8001E0000
trusted library allocation
page read and write
3264000
heap
page read and write
119A8000
direct allocation
page read and write
2FC0026F8000
trusted library allocation
page read and write
2FC00260C000
trusted library allocation
page read and write
3170000
heap
page read and write
326D000
heap
page read and write
31DF000
heap
page read and write
11A0F000
direct allocation
page read and write
288456BE000
heap
page read and write
119BA000
direct allocation
page read and write
3274000
heap
page read and write
6FE800350000
trusted library allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
FB1000
unkown
page read and write
11CA0000
direct allocation
page read and write
11982000
direct allocation
page read and write
11574000
direct allocation
page read and write
33CC000
heap
page read and write
6FE800268000
trusted library allocation
page read and write
2FC002AA0000
trusted library allocation
page read and write
5C940091C000
trusted library allocation
page read and write
28847575000
heap
page read and write
6FE8002DC000
trusted library allocation
page read and write
3346000
heap
page read and write
332F000
heap
page read and write
2FC002AE8000
trusted library allocation
page read and write
2031C23A000
heap
page read and write
321D000
heap
page read and write
12C60000
remote allocation
page read and write
6FE8002A8000
trusted library allocation
page read and write
3264000
heap
page read and write
47D0002B8000
trusted library allocation
page read and write
326D000
heap
page read and write
11B3E000
direct allocation
page read and write
119A4000
direct allocation
page read and write
119E0000
direct allocation
page read and write
33B2000
heap
page read and write
2FC002A9C000
trusted library allocation
page read and write
31FC000
heap
page read and write
31E6000
heap
page read and write
6FE8003F4000
trusted library allocation
page read and write
2031C22E000
heap
page read and write
28845613000
heap
page read and write
119BA000
direct allocation
page read and write
288456D5000
heap
page read and write
2FC000BD4000
trusted library allocation
page read and write
2FC002668000
trusted library allocation
page read and write
2FC002A8C000
trusted library allocation
page read and write
5C94007E0000
trusted library allocation
page read and write
327C00244000
direct allocation
page read and write
1199A000
direct allocation
page read and write
5C9400848000
trusted library allocation
page read and write
6FE8002E8000
trusted library allocation
page read and write
280400401000
trusted library allocation
page read and write
11516000
direct allocation
page read and write
11996000
direct allocation
page read and write
6FE800284000
trusted library allocation
page read and write
2FC002968000
trusted library allocation
page read and write
119A9000
direct allocation
page read and write
31FC000
heap
page read and write
5C9400424000
trusted library allocation
page read and write
119EC000
direct allocation
page read and write
3264000
heap
page read and write
47D000274000
trusted library allocation
page read and write
32C000
stack
page read and write
6FE800378000
trusted library allocation
page read and write
2FC002A1C000
trusted library allocation
page read and write
119C0000
direct allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
F5E000
unkown
page read and write
2FC0012E8000
trusted library allocation
page read and write
11900000
direct allocation
page read and write
314FF000
stack
page read and write
6FE800020000
trusted library allocation
page read and write
2FC000294000
trusted library allocation
page read and write
31CC000
heap
page read and write
2FC00039C000
trusted library allocation
page read and write
C8401FC000
stack
page read and write
119AA000
direct allocation
page read and write
2FC0024FC000
trusted library allocation
page read and write
327C00215000
direct allocation
page read and write
119A4000
direct allocation
page read and write
31F5000
heap
page read and write
300E000
stack
page read and write
2FC0013A8000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
2FC00143A000
trusted library allocation
page read and write
2031C22E000
heap
page read and write
1179000
direct allocation
page read and write
2FC0001F0000
trusted library allocation
page read and write
2FC000F5C000
trusted library allocation
page read and write
C8501FE000
stack
page read and write
1145E000
direct allocation
page read and write
3225000
heap
page read and write
C83F1FC000
stack
page read and write
113ED000
stack
page read and write
3233000
heap
page read and write
2FC002738000
trusted library allocation
page read and write
5C94007C4000
trusted library allocation
page read and write
31F5000
heap
page read and write
151DF000
stack
page read and write
2FC000CA0000
trusted library allocation
page read and write
326D000
heap
page read and write
288456AA000
heap
page read and write
3246000
heap
page read and write
1B780000
heap
page read and write
C84A9FE000
unkown
page readonly
325C000
heap
page read and write
3252000
heap
page read and write
288456C4000
heap
page read and write
11A50000
direct allocation
page read and write
1193A000
direct allocation
page read and write
11A06000
direct allocation
page read and write
28040032C000
trusted library allocation
page read and write
2FC000CB0000
trusted library allocation
page read and write
11906000
direct allocation
page read and write
2FC00257C000
trusted library allocation
page read and write
6FE800418000
trusted library allocation
page read and write
BA0000
heap
page read and write
2FC001150000
trusted library allocation
page read and write
11A88000
direct allocation
page read and write
6FE8002F4000
trusted library allocation
page read and write
280400338000
trusted library allocation
page read and write
1B921000
heap
page read and write
5C94008E8000
trusted library allocation
page read and write
5C940040C000
trusted library allocation
page read and write
2FC002CF0000
trusted library allocation
page read and write
F67000
unkown
page write copy
11484000
direct allocation
page read and write
1150E000
direct allocation
page read and write
288473F0000
trusted library section
page readonly
11B60000
direct allocation
page read and write
2FC002534000
trusted library allocation
page read and write
2884572B000
heap
page read and write
11520000
direct allocation
page read and write
5C940084C000
trusted library allocation
page read and write
2FC002A5C000
trusted library allocation
page read and write
11984000
direct allocation
page read and write
2FC002328000
trusted library allocation
page read and write
C83A1FE000
stack
page read and write
331B000
heap
page read and write
322A000
heap
page read and write
FE1000
unkown
page write copy
11930000
direct allocation
page read and write
325C000
heap
page read and write
33BA000
heap
page read and write
C8589FE000
unkown
page readonly
47D0002D8000
trusted library allocation
page read and write
2884756E000
heap
page read and write
C8431FD000
stack
page read and write
280400364000
trusted library allocation
page read and write
2FC002AB4000
trusted library allocation
page read and write
11C10000
direct allocation
page read and write
3297000
heap
page read and write
280400238000
trusted library allocation
page read and write
3297000
heap
page read and write
47D0002A8000
trusted library allocation
page read and write
3354000
heap
page read and write
2FC00101C000
trusted library allocation
page read and write
76D000
heap
page read and write
700000
direct allocation
page read and write
288475A0000
heap
page read and write
11522000
direct allocation
page read and write
47D000260000
trusted library allocation
page read and write
11988000
direct allocation
page read and write
2FC002784000
trusted library allocation
page read and write
2FC001348000
trusted library allocation
page read and write
2FC0026D4000
trusted library allocation
page read and write
C8429FE000
unkown
page readonly
6FE8001F0000
trusted library allocation
page read and write
2FC00298C000
trusted library allocation
page read and write
2FC002B14000
trusted library allocation
page read and write
6FE80019C000
trusted library allocation
page read and write
2FC0025C0000
trusted library allocation
page read and write
3246000
heap
page read and write
6FE80015C000
trusted library allocation
page read and write
337D000
heap
page read and write
119CC000
direct allocation
page read and write
28845674000
heap
page read and write
2FC002AD4000
trusted library allocation
page read and write
2FC00299C000
trusted library allocation
page read and write
6FE800098000
trusted library allocation
page read and write
11992000
direct allocation
page read and write
119BC000
direct allocation
page read and write
280400230000
trusted library allocation
page read and write
2FC0026D8000
trusted library allocation
page read and write
6FE8001DC000
trusted library allocation
page read and write
31E9000
heap
page read and write
119C2000
direct allocation
page read and write
2FC002790000
trusted library allocation
page read and write
1147E000
direct allocation
page read and write
1155A000
direct allocation
page read and write
1197C000
direct allocation
page read and write
2FC00035C000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
C84D9FE000
unkown
page readonly
11A5A000
direct allocation
page read and write
2FC0024D0000
trusted library allocation
page read and write
11B2A000
direct allocation
page read and write
2FC002B08000
trusted library allocation
page read and write
2FC002A30000
trusted library allocation
page read and write
3322000
heap
page read and write
3211000
heap
page read and write
1B900000
trusted library allocation
page read and write
11906000
direct allocation
page read and write
12C9E000
stack
page read and write
11A70000
direct allocation
page read and write
2FC002694000
trusted library allocation
page read and write
119CA000
direct allocation
page read and write
C8561FE000
stack
page read and write
5C940071C000
trusted library allocation
page read and write
326D000
heap
page read and write
C8399FE000
unkown
page readonly
6FE8003C0000
trusted library allocation
page read and write
1196C000
direct allocation
page read and write
6FE80022C000
trusted library allocation
page read and write
11BF0000
direct allocation
page read and write
11510000
direct allocation
page read and write
5C940039C000
trusted library allocation
page read and write
2FC001698000
trusted library allocation
page read and write
2FC002714000
trusted library allocation
page read and write
2FC000790000
trusted library allocation
page read and write
2FC002B44000
trusted library allocation
page read and write
6FE800344000
trusted library allocation
page read and write
6FE8002A4000
trusted library allocation
page read and write
2FC0012A0000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2FC000DBC000
trusted library allocation
page read and write
321D000
heap
page read and write
2031C827000
heap
page read and write
1B566000
direct allocation
page execute read
11B50000
direct allocation
page read and write
1197E000
direct allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
11BA0000
direct allocation
page read and write
11976000
direct allocation
page read and write
320D000
heap
page read and write
5C9400880000
trusted library allocation
page read and write
6FE80043C000
trusted library allocation
page read and write
115BA000
direct allocation
page read and write
47D0002FC000
trusted library allocation
page read and write
2804002F4000
trusted library allocation
page read and write
11A80000
direct allocation
page read and write
2FC00254C000
trusted library allocation
page read and write
C8449FE000
unkown
page readonly
6FE8002DC000
trusted library allocation
page read and write
3333000
heap
page read and write
11990000
direct allocation
page read and write
11900000
direct allocation
page read and write
C8581FE000
stack
page read and write
5C9400890000
trusted library allocation
page read and write
280400418000
trusted library allocation
page read and write
6FE8001F8000
trusted library allocation
page read and write
2031C838000
heap
page read and write
28847527000
heap
page read and write
2FC00263C000
trusted library allocation
page read and write
2031C23A000
heap
page read and write
3372000
heap
page read and write
5C94006C8000
trusted library allocation
page read and write
2FC000AF8000
trusted library allocation
page read and write
47D000220000
trusted library allocation
page read and write
6FD000
stack
page read and write
5C9400728000
trusted library allocation
page read and write
1196E000
direct allocation
page read and write
3217000
heap
page read and write
31D2000
heap
page read and write
3385000
heap
page read and write
3376000
heap
page read and write
A70000
heap
page read and write
2FC002544000
trusted library allocation
page read and write
1190F000
direct allocation
page read and write
2FC00279C000
trusted library allocation
page read and write
11989000
direct allocation
page read and write
3211000
heap
page read and write
119E0000
direct allocation
page read and write
327C002D8000
direct allocation
page read and write
6FE8002E8000
trusted library allocation
page read and write
31D2000
heap
page read and write
6FE80020C000
trusted library allocation
page read and write
F99000
unkown
page write copy
2FC0029EC000
trusted library allocation
page read and write
119DE000
direct allocation
page read and write
333C000
heap
page read and write
31CC000
heap
page read and write
11980000
direct allocation
page read and write
47D0002A0000
trusted library allocation
page read and write
6FE8000CC000
trusted library allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
11924000
direct allocation
page read and write
326D000
heap
page read and write
11A0A000
direct allocation
page read and write
2FC000FD8000
trusted library allocation
page read and write
47D000294000
trusted library allocation
page read and write
1170000
direct allocation
page read and write
11CE0000
direct allocation
page read and write
6FE800190000
trusted library allocation
page read and write
2FC0024DC000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
119CE000
direct allocation
page read and write
2031C22E000
heap
page read and write
2FC0001D8000
trusted library allocation
page read and write
15391000
heap
page read and write
2FC00173C000
trusted library allocation
page read and write
28845700000
heap
page read and write
31D2000
heap
page read and write
2031C23A000
heap
page read and write
2FC0003A8000
trusted library allocation
page read and write
2FC0001B4000
trusted library allocation
page read and write
30F8000
heap
page read and write
3217000
heap
page read and write
28847591000
heap
page read and write
2FC0029DC000
trusted library allocation
page read and write
2884572B000
heap
page read and write
31ED000
heap
page read and write
119AC000
direct allocation
page read and write
11C40000
direct allocation
page read and write
320D000
heap
page read and write
11972000
direct allocation
page read and write
AA1000
unkown
page execute read
5C940085C000
trusted library allocation
page read and write
2FC002A78000
trusted library allocation
page read and write
2FC002B50000
trusted library allocation
page read and write
1195E000
direct allocation
page read and write
2FC001552000
trusted library allocation
page read and write
6FE8001D0000
trusted library allocation
page read and write
31E1000
heap
page read and write
288456C8000
heap
page read and write
FB9000
unkown
page read and write
3300000
heap
page read and write
32C3000
heap
page read and write
3252000
heap
page read and write
11A70000
direct allocation
page read and write
2FC0001E4000
trusted library allocation
page read and write
6FE800324000
trusted library allocation
page read and write
1197E000
direct allocation
page read and write
3240000
heap
page read and write
280400380000
trusted library allocation
page read and write
2031C229000
heap
page read and write
11994000
direct allocation
page read and write
C84B9FE000
unkown
page readonly
6FE8003B4000
trusted library allocation
page read and write
2FC0017B0000
trusted library allocation
page read and write
11974000
direct allocation
page read and write
119E2000
direct allocation
page read and write
11410000
direct allocation
page read and write
28845761000
heap
page read and write
119D2000
direct allocation
page read and write
2FC002748000
trusted library allocation
page read and write
2FC00035C000
trusted library allocation
page read and write
318EF000
direct allocation
page read and write
5D8C002B0000
trusted library allocation
page read and write
11940000
direct allocation
page read and write
151F0000
heap
page read and write
1195C000
direct allocation
page read and write
113F6000
direct allocation
page read and write
2FC00277C000
trusted library allocation
page read and write
11B2E000
direct allocation
page read and write
33B6000
heap
page read and write
FD9000
unkown
page read and write
119E0000
direct allocation
page read and write
11A80000
direct allocation
page read and write
31DF000
heap
page read and write
C8439FE000
unkown
page readonly
C83C1FE000
stack
page read and write
288456AC000
heap
page read and write
2FC0024EC000
trusted library allocation
page read and write
288456D6000
heap
page read and write
2FC002C30000
trusted library allocation
page read and write
1190A000
direct allocation
page read and write
1151A000
direct allocation
page read and write
3240000
heap
page read and write
114A2000
direct allocation
page read and write
2FC00176D000
trusted library allocation
page read and write
31D9000
heap
page read and write
3217000
heap
page read and write
5D8C002BC000
trusted library allocation
page read and write
288456C4000
heap
page read and write
11C50000
direct allocation
page read and write
2FC00035C000
trusted library allocation
page read and write
3DE000
stack
page read and write
11978000
direct allocation
page read and write
5D8C002C0000
trusted library allocation
page read and write
11A40000
direct allocation
page read and write
B80000
heap
page readonly
6FE80025C000
trusted library allocation
page read and write
988000
remote allocation
page execute and read and write
6FE80024C000
trusted library allocation
page read and write
280400250000
trusted library allocation
page read and write
327C00318000
direct allocation
page read and write
5C940082C000
trusted library allocation
page read and write
2FC0003D8000
trusted library allocation
page read and write
31E8000
heap
page read and write
327C002D8000
direct allocation
page read and write
11B20000
direct allocation
page read and write
2FC002944000
trusted library allocation
page read and write
2FC000C54000
trusted library allocation
page read and write
324D000
heap
page read and write
2FC0026CC000
trusted library allocation
page read and write
1190A000
direct allocation
page read and write
2FC0027A8000
trusted library allocation
page read and write
2804002C4000
trusted library allocation
page read and write
6CBEE000
unkown
page read and write
1B929000
heap
page read and write
2FC0027F4000
trusted library allocation
page read and write
15391000
heap
page read and write
47D0002C8000
trusted library allocation
page read and write
5C940039C000
trusted library allocation
page read and write
2FC001634000
trusted library allocation
page read and write
337C3000
heap
page read and write
11BE0000
direct allocation
page read and write
316B000
heap
page read and write
119B0000
direct allocation
page read and write
31AA000
heap
page read and write
320F000
heap
page read and write
15391000
heap
page read and write
2FC001421000
trusted library allocation
page read and write
2FC002698000
trusted library allocation
page read and write
6FE8003C4000
trusted library allocation
page read and write
1192E000
direct allocation
page read and write
2031C22E000
heap
page read and write
1B642000
direct allocation
page read and write
31E6000
heap
page read and write
2FC0012D8000
trusted library allocation
page read and write
2FC0001DC000
trusted library allocation
page read and write
2FC0025D4000
trusted library allocation
page read and write
11978000
direct allocation
page read and write
33E7000
heap
page read and write
2FC001334000
trusted library allocation
page read and write
288475BD000
heap
page read and write
1B880000
trusted library allocation
page read and write
31D5000
heap
page read and write
2884A8E0000
trusted library allocation
page read and write
11C00000
direct allocation
page read and write
2FC002C7C000
trusted library allocation
page read and write
2884754D000
heap
page read and write
1197E000
direct allocation
page read and write
2FC00021C000
trusted library allocation
page read and write
11968000
direct allocation
page read and write
33AA000
heap
page read and write
3290000
heap
page read and write
390000
heap
page read and write
119B6000
direct allocation
page read and write
32F8000
heap
page read and write
326D000
heap
page read and write
11994000
direct allocation
page read and write
11A60000
direct allocation
page read and write
316B000
heap
page read and write
11A1A000
direct allocation
page read and write
119F0000
direct allocation
page read and write
11C80000
direct allocation
page read and write
2FC00261C000
trusted library allocation
page read and write
1B91D000
heap
page read and write
2FC0002F3000
trusted library allocation
page read and write
5C9400418000
trusted library allocation
page read and write
1195E000
direct allocation
page read and write
6FE800274000
trusted library allocation
page read and write
C8381FE000
stack
page read and write
2FC000FE4000
trusted library allocation
page read and write
BA7000
heap
page read and write
11A2A000
direct allocation
page read and write
2FC001320000
trusted library allocation
page read and write
2884755A000
heap
page read and write
2FC0003A8000
trusted library allocation
page read and write
2031C22E000
heap
page read and write
5C94006AC000
trusted library allocation
page read and write
47D000270000
trusted library allocation
page read and write
324D000
heap
page read and write
11906000
direct allocation
page read and write
2FC000F5C000
trusted library allocation
page read and write
11778000
direct allocation
page read and write
3206000
heap
page read and write
5C9400878000
trusted library allocation
page read and write
2FC0024BC000
trusted library allocation
page read and write
11956000
direct allocation
page read and write
2FC002580000
trusted library allocation
page read and write
119E2000
direct allocation
page read and write
6FE800218000
trusted library allocation
page read and write
2FC000F08000
trusted library allocation
page read and write
11400000
direct allocation
page read and write
2FC00039C000
trusted library allocation
page read and write
2FC002CE8000
trusted library allocation
page read and write
1063E000
stack
page read and write
C8579FE000
unkown
page readonly
11914000
direct allocation
page read and write
5C94007A0000
trusted library allocation
page read and write
327C00274000
direct allocation
page read and write
2FC002794000
trusted library allocation
page read and write
31E8000
heap
page read and write
288454D0000
heap
page read and write
2FC0003D8000
trusted library allocation
page read and write
2FC0003D8000
trusted library allocation
page read and write
327C002D0000
direct allocation
page read and write
31E0000
heap
page read and write
47D000294000
trusted library allocation
page read and write
335D000
heap
page read and write
6FE800424000
trusted library allocation
page read and write
1196A000
direct allocation
page read and write
2FC0024F0000
trusted library allocation
page read and write
2031C232000
heap
page read and write
2FC000294000
trusted library allocation
page read and write
2FC002B10000
trusted library allocation
page read and write
11B10000
direct allocation
page read and write
119BA000
direct allocation
page read and write
31F5000
heap
page read and write
11AEA000
direct allocation
page read and write
2FC000CA0000
trusted library allocation
page read and write
1198C000
direct allocation
page read and write
2FC00035C000
trusted library allocation
page read and write
5C940060C000
trusted library allocation
page read and write
11980000
direct allocation
page read and write
2FC000314000
trusted library allocation
page read and write
11A10000
direct allocation
page read and write
1B786000
heap
page read and write
3205000
heap
page read and write
6FE800424000
trusted library allocation
page read and write
5C94007AC000
trusted library allocation
page read and write
1196C000
direct allocation
page read and write
1190E000
direct allocation
page read and write
2FC0013BE000
trusted library allocation
page read and write
15390000
heap
page read and write
C83C9FE000
unkown
page readonly
2FC0001AC000
trusted library allocation
page read and write
288454B0000
heap
page read and write
2FC000EEC000
trusted library allocation
page read and write
47D000250000
trusted library allocation
page read and write
2FC002350000
trusted library allocation
page read and write
337A000
heap
page read and write
6FE800210000
trusted library allocation
page read and write
2FC0015AC000
trusted library allocation
page read and write
3290000
heap
page read and write
119AC000
direct allocation
page read and write
11A00000
direct allocation
page read and write
3234000
heap
page read and write
C8409FE000
unkown
page readonly
1198E000
direct allocation
page read and write
3341000
heap
page read and write
1194C000
direct allocation
page read and write
119EE000
direct allocation
page read and write
2FC0001B4000
trusted library allocation
page read and write
2884569F000
heap
page read and write
322A000
heap
page read and write
33D6000
heap
page read and write
CEE000
unkown
page readonly
1198A000
direct allocation
page read and write
2884759D000
heap
page read and write
C8559FE000
unkown
page readonly
FDD000
unkown
page read and write
47D000201000
trusted library allocation
page read and write
288455D0000
heap
page read and write
119AE000
direct allocation
page read and write
6FE800449000
trusted library allocation
page read and write
1195C000
direct allocation
page read and write
324D000
heap
page read and write
2FC00101C000
trusted library allocation
page read and write
118EC000
direct allocation
page read and write
119C6000
direct allocation
page read and write
5D8C002C0000
trusted library allocation
page read and write
11C70000
direct allocation
page read and write
3286000
heap
page read and write
327C00220000
direct allocation
page read and write
2FC001316000
trusted library allocation
page read and write
1190E000
direct allocation
page read and write
C8369FE000
unkown
page readonly
333E000
heap
page read and write
1197C000
direct allocation
page read and write
6C9FE000
unkown
page read and write
2884569F000
heap
page read and write
2FC0016D8000
trusted library allocation
page read and write
324D000
heap
page read and write
2FC0024F8000
trusted library allocation
page read and write
11AC000
direct allocation
page read and write
11AFA000
direct allocation
page read and write
2FC0010F8000
trusted library allocation
page read and write
327C00280000
direct allocation
page read and write
11A26000
direct allocation
page read and write
47D000248000
trusted library allocation
page read and write
288456A6000
heap
page read and write
327C00250000
direct allocation
page read and write
2FC002B04000
trusted library allocation
page read and write
FE2000
unkown
page readonly
2D85A000
heap
page read and write
2FC0003A8000
trusted library allocation
page read and write
288475AF000
heap
page read and write
3290000
heap
page read and write
2FC0027C8000
trusted library allocation
page read and write
2FC001489000
trusted library allocation
page read and write
2FC000294000
trusted library allocation
page read and write
5C94007C0000
trusted library allocation
page read and write
11A00000
direct allocation
page read and write
3153E000
stack
page read and write
2FC0014D4000
trusted library allocation
page read and write
31CC000
heap
page read and write
2FC002654000
trusted library allocation
page read and write
91E000
remote allocation
page execute and read and write
316D000
heap
page read and write
C8461FE000
stack
page read and write
280400248000
trusted library allocation
page read and write
288455F0000
heap
page read and write
2FC000394000
trusted library allocation
page read and write
327F000
heap
page read and write
1141E000
direct allocation
page read and write
B33000
remote allocation
page readonly
28847571000
heap
page read and write
5C9400860000
trusted library allocation
page read and write
327C002AC000
direct allocation
page read and write
2FC002BA4000
trusted library allocation
page read and write
31E1000
heap
page read and write
2FC00231C000
trusted library allocation
page read and write
2FC00232C000
trusted library allocation
page read and write
2FC000AF8000
trusted library allocation
page read and write
3246000
heap
page read and write
288456A3000
heap
page read and write
28847557000
heap
page read and write
2884752D000
heap
page read and write
2FC000B1C000
trusted library allocation
page read and write
11444000
direct allocation
page read and write
2FC0026C8000
trusted library allocation
page read and write
2FC002A60000
trusted library allocation
page read and write
6FE800300000
trusted library allocation
page read and write
31E8000
heap
page read and write
28847565000
heap
page read and write
2FC0026B0000
trusted library allocation
page read and write
6FE8002A0000
trusted library allocation
page read and write
2FC000FA4000
trusted library allocation
page read and write
1146E000
direct allocation
page read and write
2884753F000
heap
page read and write
11990000
direct allocation
page read and write
C8331FE000
unkown
page read and write
31CC000
heap
page read and write
32F1000
heap
page read and write
6FE8002F4000
trusted library allocation
page read and write
33D2000
heap
page read and write
3252000
heap
page read and write
1140E000
direct allocation
page read and write
11954000
direct allocation
page read and write
1198C000
direct allocation
page read and write
2FC000F34000
trusted library allocation
page read and write
11988000
direct allocation
page read and write
2FC000BD8000
trusted library allocation
page read and write
155E1000
heap
page read and write
5C9400408000
trusted library allocation
page read and write
6C970000
unkown
page readonly
6FE800458000
trusted library allocation
page read and write
2FC000F34000
trusted library allocation
page read and write
2884757C000
heap
page read and write
2FC001311000
trusted library allocation
page read and write
31CC000
heap
page read and write
1141A000
direct allocation
page read and write
11998000
direct allocation
page read and write
31C0000
heap
page read and write
2FC000294000
trusted library allocation
page read and write
6FE800401000
trusted library allocation
page read and write
2FC000F64000
trusted library allocation
page read and write
3159000
heap
page read and write
119EA000
direct allocation
page read and write
2FC002854000
trusted library allocation
page read and write
31E1000
heap
page read and write
2FC0001EC000
trusted library allocation
page read and write
2FC002684000
trusted library allocation
page read and write
6FE8002B0000
trusted library allocation
page read and write
11B60000
direct allocation
page read and write
5C94008B4000
trusted library allocation
page read and write
337D000
heap
page read and write
5D8C002E4000
trusted library allocation
page read and write
5D8C002BC000
trusted library allocation
page read and write
11980000
direct allocation
page read and write
288456A5000
heap
page read and write
2FC0027A4000
trusted library allocation
page read and write
6FE800068000
trusted library allocation
page read and write
320F000
heap
page read and write
2FC000C90000
trusted library allocation
page read and write
2031C22C000
heap
page read and write
336A000
heap
page read and write
3213000
heap
page read and write
2FC000EEC000
trusted library allocation
page read and write
2FC00039C000
trusted library allocation
page read and write
2FC002D04000
trusted library allocation
page read and write
2FC0012B8000
trusted library allocation
page read and write
11924000
direct allocation
page read and write
11AE0000
direct allocation
page read and write
288475F7000
heap
page read and write
2FC0025A4000
trusted library allocation
page read and write
119F8000
direct allocation
page read and write
2FC000394000
trusted library allocation
page read and write
FE2000
unkown
page readonly
28040031C000
trusted library allocation
page read and write
6FE8003D4000
trusted library allocation
page read and write
1549A000
heap
page read and write
6FE800434000
trusted library allocation
page read and write
28845702000
heap
page read and write
2FC00256C000
trusted library allocation
page read and write
9C6000
remote allocation
page execute and read and write
96D000
remote allocation
page execute and read and write
11900000
direct allocation
page read and write
322A000
heap
page read and write
6FE8003A0000
trusted library allocation
page read and write
47D000230000
trusted library allocation
page read and write
2884569F000
heap
page read and write
47D0002B4000
trusted library allocation
page read and write
2FC0001F8000
trusted library allocation
page read and write
5C940081C000
trusted library allocation
page read and write
2FC0016D8000
trusted library allocation
page read and write
119C0000
direct allocation
page read and write
2FC0027B8000
trusted library allocation
page read and write
C84F1FC000
stack
page read and write
2FC00251C000
trusted library allocation
page read and write
2FC000DBC000
trusted library allocation
page read and write
11960000
direct allocation
page read and write
5D8C002C8000
trusted library allocation
page read and write
2FC00035C000
trusted library allocation
page read and write
1B792000
heap
page read and write
327C00290000
direct allocation
page read and write
330A000
heap
page read and write
327C00303000
direct allocation
page read and write
6FE800030000
trusted library allocation
page read and write
2804003A8000
trusted library allocation
page read and write
2884756C000
heap
page read and write
47D0002A8000
trusted library allocation
page read and write
5C94008E4000
trusted library allocation
page read and write
31E9000
heap
page read and write
5D8C002BC000
trusted library allocation
page read and write
288475B1000
heap
page read and write
2FC002650000
trusted library allocation
page read and write
47D0002E0000
trusted library allocation
page read and write
2FC002520000
trusted library allocation
page read and write
D1E000
heap
page read and write
2FC002560000
trusted library allocation
page read and write
C85B9FE000
unkown
page readonly
C8551FE000
stack
page read and write
3230000
heap
page read and write
288456A3000
heap
page read and write
2031C22E000
heap
page read and write
3171000
heap
page read and write
28847591000
heap
page read and write
11ACA000
direct allocation
page read and write
2FC000210000
trusted library allocation
page read and write
3225000
heap
page read and write
6FE8002D0000
trusted library allocation
page read and write
322A000
heap
page read and write
280400220000
trusted library allocation
page read and write
3225000
heap
page read and write
11986000
direct allocation
page read and write
2FC000C74000
trusted library allocation
page read and write
2FC001804000
trusted library allocation
page read and write
321D000
heap
page read and write
2FC0014E0000
trusted library allocation
page read and write
32C3000
heap
page read and write
119B0000
direct allocation
page read and write
31E6000
heap
page read and write
11546000
direct allocation
page read and write
1B915000
heap
page read and write
2FC0029D8000
trusted library allocation
page read and write
119BC000
direct allocation
page read and write
1198A000
direct allocation
page read and write
5C9400898000
trusted library allocation
page read and write
31CC000
heap
page read and write
6FE8002AC000
trusted library allocation
page read and write
11518000
direct allocation
page read and write
5C9400868000
trusted library allocation
page read and write
1197A000
direct allocation
page read and write
119A9000
direct allocation
page read and write
11BC0000
direct allocation
page read and write
1231000
direct allocation
page read and write
2FC002594000
trusted library allocation
page read and write
321D000
heap
page read and write
2FC002C4C000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
119E2000
direct allocation
page read and write
6FE800108000
trusted library allocation
page read and write
1196A000
direct allocation
page read and write
2FC000790000
trusted library allocation
page read and write
31E4000
heap
page read and write
2FC0026E0000
trusted library allocation
page read and write
11462000
direct allocation
page read and write
119A6000
direct allocation
page read and write
31E1000
heap
page read and write
304F000
stack
page read and write
2FC002538000
trusted library allocation
page read and write
6FE800290000
trusted library allocation
page read and write
2FC0013A8000
trusted library allocation
page read and write
47D0002B4000
trusted library allocation
page read and write
2FC000F08000
trusted library allocation
page read and write
31AC000
heap
page read and write
8A5000
stack
page read and write
119BC000
direct allocation
page read and write
11A18000
direct allocation
page read and write
11A70000
direct allocation
page read and write
3217000
heap
page read and write
6FE800030000
trusted library allocation
page read and write
2FC002B28000
trusted library allocation
page read and write
3297000
heap
page read and write
2884565C000
heap
page read and write
6FE800427000
trusted library allocation
page read and write
288456BE000
heap
page read and write
31E9000
heap
page read and write
3322000
heap
page read and write
47D000304000
trusted library allocation
page read and write
2FC001698000
trusted library allocation
page read and write
28845730000
heap
page read and write
119D2000
direct allocation
page read and write
2FC002768000
trusted library allocation
page read and write
2FC0026A8000
trusted library allocation
page read and write
288475A5000
heap
page read and write
119D4000
direct allocation
page read and write
2FC00232C000
trusted library allocation
page read and write
6FE800378000
trusted library allocation
page read and write
2FC0026E4000
trusted library allocation
page read and write
3225000
heap
page read and write
325C000
heap
page read and write
47D0002B8000
trusted library allocation
page read and write
6C9ED000
unkown
page readonly
119A8000
direct allocation
page read and write
11956000
direct allocation
page read and write
2031C835000
heap
page read and write
3235000
heap
page read and write
BA5000
heap
page read and write
C8531FD000
stack
page read and write
11908000
direct allocation
page read and write
333F6000
direct allocation
page read and write
11908000
direct allocation
page read and write
D13000
heap
page read and write
2884562B000
heap
page read and write
30F0000
heap
page read and write
2FC0024F4000
trusted library allocation
page read and write
11460000
direct allocation
page read and write
2FC001538000
trusted library allocation
page read and write
6FE800248000
trusted library allocation
page read and write
6FE8001EC000
trusted library allocation
page read and write
2FC002A88000
trusted library allocation
page read and write
3252000
heap
page read and write
1147A000
direct allocation
page read and write
1B408000
direct allocation
page execute read
6FE800258000
trusted library allocation
page read and write
119A4000
direct allocation
page read and write
2FC0025E4000
trusted library allocation
page read and write
2FC0001F4000
trusted library allocation
page read and write
11935000
direct allocation
page read and write
2031C23B000
heap
page read and write
6FE800288000
trusted library allocation
page read and write
A6F000
stack
page read and write
3211000
heap
page read and write
AA0000
unkown
page readonly
3303000
heap
page read and write
6FE800214000
trusted library allocation
page read and write
5D8C002C0000
trusted library allocation
page read and write
2FC001489000
trusted library allocation
page read and write
2FC0010DC000
trusted library allocation
page read and write
6FE800258000
trusted library allocation
page read and write
322A000
heap
page read and write
119D0000
direct allocation
page read and write
31E4000
heap
page read and write
2FC000BD4000
trusted library allocation
page read and write
11A04000
direct allocation
page read and write
31D9000
heap
page read and write
6FE800201000
trusted library allocation
page read and write
288475CE000
heap
page read and write
325C000
heap
page read and write
119E0000
direct allocation
page read and write
119C0000
direct allocation
page read and write
C8321F3000
stack
page read and write
11AC0000
direct allocation
page read and write
1002000
unkown
page readonly
11986000
direct allocation
page read and write
11A08000
direct allocation
page read and write
B90000
heap
page read and write
28845600000
heap
page read and write
3366000
heap
page read and write
31D2000
heap
page read and write
288456E8000
heap
page read and write
288456BF000
heap
page read and write
33BA000
heap
page read and write
11A0A000
direct allocation
page read and write
11B40000
direct allocation
page read and write
2FC0027C0000
trusted library allocation
page read and write
C85A9FE000
unkown
page readonly
288472F0000
trusted library allocation
page read and write
3211000
heap
page read and write
2FC002968000
trusted library allocation
page read and write
3246000
heap
page read and write
5C9400788000
trusted library allocation
page read and write
2FC002AD8000
trusted library allocation
page read and write
11C90000
direct allocation
page read and write
2FC00135D000
trusted library allocation
page read and write
28845672000
heap
page read and write
288456BC000
heap
page read and write
5C94008C8000
trusted library allocation
page read and write
11CF0000
direct allocation
page read and write
2FC000BDE000
trusted library allocation
page read and write
11982000
direct allocation
page read and write
332F000
heap
page read and write
1196C000
direct allocation
page read and write
280400290000
trusted library allocation
page read and write
33A6000
heap
page read and write
15391000
heap
page read and write
2FC002CB8000
trusted library allocation
page read and write
28847544000
heap
page read and write
2FC002A18000
trusted library allocation
page read and write
11A40000
direct allocation
page read and write
2FC000220000
trusted library allocation
page read and write
6FE80038C000
trusted library allocation
page read and write
11906000
direct allocation
page read and write
327C002D0000
direct allocation
page read and write
31E4000
heap
page read and write
11992000
direct allocation
page read and write
11988000
direct allocation
page read and write
6FE800364000
trusted library allocation
page read and write
11450000
direct allocation
page read and write
2FC0025EC000
trusted library allocation
page read and write
11B0A000
direct allocation
page read and write
11946000
direct allocation
page read and write
2804002B0000
trusted library allocation
page read and write
119F0000
direct allocation
page read and write
31ED000
heap
page read and write
2031C233000
heap
page read and write
2FC000EF8000
trusted library allocation
page read and write
33D3000
heap
page read and write
6FE800270000
trusted library allocation
page read and write
3286000
heap
page read and write
11968000
direct allocation
page read and write
6FE800298000
trusted library allocation
page read and write
1198C000
direct allocation
page read and write
6FE8003E4000
trusted library allocation
page read and write
C8421FD000
stack
page read and write
There are 2022 hidden memdumps, click here to show them.