Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_4d666f67-10b5-405b-8844-922ee1773494.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_4d666f67-10b5-405b-8844-922ee1773494.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\16a73249-6c99-43b3-b639-4a5eef0ee402.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\18040e10-a581-403d-9f6f-cfa1fbf7818b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4885a36e-a371-48c6-8c09-d0f80e760ccd.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\75c9fa31-5b4a-45e3-a4e6-677e095abe56.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7b91fb6c-8e26-49c1-a9a6-23cd71aa7572.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\73dad07c-6633-4ba6-8756-fc2879b35d23.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D9A48C-173C.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\12a18608-0976-479b-9427-bb63dd725c19.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1cd20c98-0f91-4f70-9b78-1a352222de74.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\31aabcfb-9026-4872-954c-0e10f9ff5ff2.tmp
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4be7b9a9-3e05-4db7-82d2-3d0a7853af00.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\581f24fb-013e-488d-986f-7ef1b87098b8.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8c89ad1f-07c7-4fdb-ab79-25e4b10bdcaa.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9c806900-d04b-4268-b92a-dda7e39c83f9.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9f302c3b-5635-42fe-a8d9-bd85cfeb9187.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5,
schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000004.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 11, cookie 0x3, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\MediaDeviceSalts
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 6, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\14f51c3d-8b0b-4803-b3fa-d58e55ebcdd4.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\450d4fc0-69dc-4fff-8635-8d3994500d83.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\65c04d9f-6c5f-4311-be65-911690178863.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\77c1d812-c358-4781-a098-6dae93accbee.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\7d217164-fcb2-4fcc-952d-ff338187d180.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF44bda.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF34595.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF36236.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF364b6.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF46b1a.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\ba8bc3a4-eb42-4a35-89fc-96395d696325.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e3c0fdc0-c844-4064-b466-04bf84bc3d30.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fb3b03aa-47f4-4c1a-8ea7-c8e58258159a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fc0c8301-c114-45e8-b7c5-3411d6b56eeb.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3807c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3cb5f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3f6b5.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF440af.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF387bf.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13370013070951362
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\044d7ad8-5253-47f6-baec-4ec1fd1d8e70.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\3736a277-3739-421d-a18d-dd7fac265fd9.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports~RF36236.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports~RF364b6.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch
Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust
Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\c838f2fc-95b6-40fd-92b7-b18e122ed6b1.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\db636191-38c0-4f0f-a5f9-f8b11060742a.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\f83e2c43-ab17-42d2-a0ac-cf56b5c7fa41.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie
0x36, schema 4, UTF-8, version-valid-for 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 11, database pages 7, cookie
0xb, schema 4, UTF-8, version-valid-for 11
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
|
ASCII text, with very long lines (3951), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b8589818-9671-442f-b145-f325edb3d817.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fd8e1f13-c2fa-4f77-9e6e-fed6445657a6.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF32d89.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF32da8.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF32fac.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3568d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF44032.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF49b81.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b3a56ec2-141d-4cb9-85aa-54a80526bf75.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ecf1adaa-459e-4887-bce3-3d7d441049c7.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\142faec3-441d-4d56-ba92-348598620b17.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3e6cdc9f-2ce2-4cab-8b7d-7b2a59dadf23.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6858cfc7-817a-44a9-82de-848b98f5839e.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cv_debug.log
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dc70ea12-5045-4ff5-9c82-44d96c1dd843.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e0b51882-a32d-4bf6-8fa3-6caa8570dcb9.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 693860
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e26b7634-2604-4558-ba58-a53049e2bfeb.tmp
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fcafbaa8-aa33-42c6-a532-cea333bfdf02.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\content.js
|
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\content_new.js
|
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\dc70ea12-5045-4ff5-9c82-44d96c1dd843.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\3e6cdc9f-2ce2-4cab-8b7d-7b2a59dadf23.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\af\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\am\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ar\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\az\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\be\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\bg\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\bn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ca\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\cs\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\cy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\da\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\de\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\el\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en_GB\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en_US\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\es\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\es_419\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\et\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\eu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fil\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fr_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\gl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\gu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\id\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\is\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\it\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\iw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ja\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ka\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\kk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\km\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\kn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ko\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\lo\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\lt\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\lv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ml\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\mn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\mr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ms\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\my\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ne\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\nl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\no\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pt_BR\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pt_PT\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ro\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ru\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\si\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ta\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\te\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\th\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\tr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\uk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ur\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\vi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zh_CN\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zh_HK\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zh_TW\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\dasherSettingSchema.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\offscreendocument.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\offscreendocument_main.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\page_embed_script.js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\service_worker_bin_prod.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\49409584-9cbe-40a8-9057-948720249a2c
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\49409584-9cbe-40a8-9057-948720249a2c.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 301 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 301 bytes
|
dropped
|
There are 268 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
--attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2056,i,6247163367441240488,2576398707470590896,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2688 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:3
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2248 -parentBuildID 20230927232528 -prefsHandle 2196
-prefMapHandle 2188 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {ccf95cfb-f749-4af2-904e-7994877402df} 1816 "\\.\pipe\gecko-crash-server-pipe.1816" 2408cb6db10 socket
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService
--lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6532 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor
--lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6736 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:8
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4456 -parentBuildID 20230927232528 -prefsHandle 4340
-prefMapHandle 4336 -prefsLen 26273 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f8d3111-a88f-4b01-91e4-af2e9be1c464}
1816 "\\.\pipe\gecko-crash-server-pipe.1816" 2409f819410 rdd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService
--lang=en-GB --service-sandbox-type=audio --mojo-platform-channel-handle=8500 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8648 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=price_comparison_service.mojom.DataProcessor
--lang=en-GB --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=8496 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker
--lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=8780 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144
/prefetch:8
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://www.msn.comZ
|
unknown
|
||
https://services.addons.mozilla.org
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/apps-themes
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://screenshots.firefox.com
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://www.instagram.com
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warning
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://profiler.firefox.com/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
|
unknown
|
||
https://outlook.office.com/mail/compose?isExtension=true
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
http://exslt.org/sets
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
http://exslt.org/dates-and-timesP5
|
unknown
|
||
https://i.y.qq.com/n2/m/index.html
|
unknown
|
||
https://www.deezer.com/
|
unknown
|
||
https://web.telegram.org/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
http://exslt.org/common
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://fpn.firefox.com
|
unknown
|
||
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://excel.new?from=EdgeM365Shoreline
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://www.google.com/favicon.ico
|
142.251.35.164
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://bzib.nelreports.net/api/report?cat=bingbusiness
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://bard.google.com/
|
unknown
|
||
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
|
142.250.185.65
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://www.office.com
|
unknown
|
||
https://outlook.live.com/mail/0/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
http://www.inbox.lv/rfc2368/?value=%su
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://www.tsn.caZ
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://www.tsn.ca
|
unknown
|
||
https://tidal.com/
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://www.openh264.org/
|
unknown
|
||
https://gaana.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://outlook.live.com/mail/compose?isExtension=true
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
chrome.cloudflare-dns.com
|
172.64.41.3
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
52.222.236.23
|
||
ipv4only.arpa
|
192.0.0.170
|
||
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
|
94.245.104.56
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
googlehosted.l.googleusercontent.com
|
142.250.185.65
|
||
sni1gl.wpc.nucdn.net
|
152.199.21.175
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
detectportal.firefox.com
|
unknown
|
||
clients2.googleusercontent.com
|
unknown
|
||
bzib.nelreports.net
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
There are 6 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.246.40
|
unknown
|
United States
|
||
23.55.235.170
|
unknown
|
United States
|
||
152.195.19.97
|
unknown
|
United States
|
||
23.59.250.72
|
unknown
|
United States
|
||
192.168.2.6
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
||
162.159.61.3
|
unknown
|
United States
|
||
52.222.236.23
|
services.addons.mozilla.org
|
United States
|
||
142.251.40.174
|
unknown
|
United States
|
||
172.64.41.3
|
chrome.cloudflare-dns.com
|
United States
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
||
142.250.185.65
|
googlehosted.l.googleusercontent.com
|
United States
|
||
64.233.180.84
|
unknown
|
United States
|
||
142.250.65.174
|
unknown
|
United States
|
||
94.245.104.56
|
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
|
United Kingdom
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
142.251.35.164
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 12 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseenversion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseen
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_dse_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_startup_page_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gcinnojdebelpnodghnoicmcdmamjoch
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jgcbloklkllbkmkbfckchanipicejgah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ojmnomejplkgljjhjindfoilnmobmihe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gcinnojdebelpnodghnoicmcdmamjoch
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jgcbloklkllbkmkbfckchanipicejgah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jmjflgjpcpepeafmmgdpfkogkghcpiha
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ojmnomejplkgljjhjindfoilnmobmihe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
There are 139 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2409D18D000
|
trusted library allocation
|
page read and write
|
||
2409FFC2000
|
trusted library allocation
|
page read and write
|
||
2409E55E000
|
trusted library allocation
|
page read and write
|
||
2409AABD000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409F78A000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
B559BFE000
|
unkown
|
page readonly
|
||
184434E0000
|
unclassified section
|
page readonly
|
||
2409EB9B000
|
trusted library allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
2409FBC1000
|
trusted library allocation
|
page read and write
|
||
240A0D06000
|
trusted library allocation
|
page read and write
|
||
240A0D86000
|
trusted library allocation
|
page read and write
|
||
18443560000
|
unclassified section
|
page readonly
|
||
2409D5EE000
|
trusted library allocation
|
page read and write
|
||
2409CF97000
|
trusted library allocation
|
page read and write
|
||
19FE000
|
stack
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
2409D3F5000
|
trusted library allocation
|
page read and write
|
||
2409CCC7000
|
trusted library allocation
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
240A0D42000
|
trusted library allocation
|
page read and write
|
||
2409DD3F000
|
trusted library allocation
|
page read and write
|
||
2409FAC2000
|
trusted library allocation
|
page read and write
|
||
18443850000
|
unclassified section
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240991AE000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
1F46C8589000
|
trusted library allocation
|
page read and write
|
||
2409FF7A000
|
trusted library allocation
|
page read and write
|
||
2409CCAE000
|
trusted library allocation
|
page read and write
|
||
2408F778000
|
heap
|
page read and write
|
||
2409F9EA000
|
trusted library allocation
|
page read and write
|
||
2409D171000
|
trusted library allocation
|
page read and write
|
||
2409FA32000
|
trusted library allocation
|
page read and write
|
||
2409B36B000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
2409CEB9000
|
trusted library allocation
|
page read and write
|
||
2409FBD4000
|
trusted library allocation
|
page read and write
|
||
2409F950000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
240A001A000
|
trusted library allocation
|
page read and write
|
||
2409DAF8000
|
trusted library allocation
|
page read and write
|
||
2409F9BD000
|
trusted library allocation
|
page read and write
|
||
2409E564000
|
trusted library allocation
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
2409F9CC000
|
trusted library allocation
|
page read and write
|
||
2409CCC2000
|
trusted library allocation
|
page read and write
|
||
240A0A8C000
|
trusted library allocation
|
page read and write
|
||
2409D1E8000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
240A0C4C000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
2409D1D4000
|
trusted library allocation
|
page read and write
|
||
2409CCAE000
|
trusted library allocation
|
page read and write
|
||
2409D3F5000
|
trusted library allocation
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
2409DD29000
|
trusted library allocation
|
page read and write
|
||
2409D06B000
|
trusted library allocation
|
page read and write
|
||
2409FF50000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409FFF7000
|
trusted library allocation
|
page read and write
|
||
2409F981000
|
trusted library allocation
|
page read and write
|
||
24099DB2000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409FF82000
|
trusted library allocation
|
page read and write
|
||
2409CB4B000
|
trusted library allocation
|
page read and write
|
||
2409D564000
|
trusted library allocation
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
2409CB84000
|
trusted library allocation
|
page read and write
|
||
2409D92B000
|
trusted library allocation
|
page read and write
|
||
2409AA50000
|
trusted library allocation
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
240A0CEF000
|
trusted library allocation
|
page read and write
|
||
2409FA68000
|
trusted library allocation
|
page read and write
|
||
2409DC51000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FAB2000
|
trusted library allocation
|
page read and write
|
||
2409CB98000
|
trusted library allocation
|
page read and write
|
||
A80DBFB000
|
stack
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409CD35000
|
trusted library allocation
|
page read and write
|
||
240A005D000
|
trusted library allocation
|
page read and write
|
||
240A0C4E000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
240A0A82000
|
trusted library allocation
|
page read and write
|
||
2409D940000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
C54000
|
unkown
|
page readonly
|
||
3A00000
|
heap
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
18443903000
|
trusted library allocation
|
page read and write
|
||
2409D552000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409DDFD000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
18444585000
|
heap
|
page read and write
|
||
2409F9B8000
|
trusted library allocation
|
page read and write
|
||
2409CB22000
|
trusted library allocation
|
page read and write
|
||
523B000
|
stack
|
page read and write
|
||
2409E79D000
|
trusted library allocation
|
page read and write
|
||
2409CBEA000
|
trusted library allocation
|
page read and write
|
||
2409CC0C000
|
trusted library allocation
|
page read and write
|
||
2409E5E1000
|
trusted library allocation
|
page read and write
|
||
2071B1B4000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240A0B4D000
|
trusted library allocation
|
page read and write
|
||
2409F8FD000
|
trusted library allocation
|
page read and write
|
||
2409CB7D000
|
trusted library allocation
|
page read and write
|
||
2409D9BC000
|
trusted library allocation
|
page read and write
|
||
2409DE80000
|
trusted library allocation
|
page read and write
|
||
2071B532000
|
trusted library allocation
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2409F8F6000
|
trusted library allocation
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
2409D5D9000
|
trusted library allocation
|
page read and write
|
||
184439D6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240A0AAA000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409E590000
|
trusted library allocation
|
page read and write
|
||
18443974000
|
trusted library allocation
|
page read and write
|
||
2409D1E1000
|
trusted library allocation
|
page read and write
|
||
240A0CE6000
|
trusted library allocation
|
page read and write
|
||
2409E55E000
|
trusted library allocation
|
page read and write
|
||
240A0AFA000
|
trusted library allocation
|
page read and write
|
||
2409DC2C000
|
trusted library allocation
|
page read and write
|
||
2409FF44000
|
trusted library allocation
|
page read and write
|
||
240A0063000
|
trusted library allocation
|
page read and write
|
||
1844452E000
|
heap
|
page read and write
|
||
1844456B000
|
heap
|
page read and write
|
||
A810189000
|
stack
|
page read and write
|
||
18443820000
|
heap
|
page readonly
|
||
2408CBF0000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
240A0B26000
|
trusted library allocation
|
page read and write
|
||
2409A9B8000
|
trusted library allocation
|
page read and write
|
||
2409B3F4000
|
trusted library allocation
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
240A0B8E000
|
trusted library allocation
|
page read and write
|
||
2408C869000
|
heap
|
page read and write
|
||
2409F9C7000
|
trusted library allocation
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
17EB9600000
|
heap
|
page read and write
|
||
2409DAF4000
|
trusted library allocation
|
page read and write
|
||
2409AA9C000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409DAD0000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409E555000
|
trusted library allocation
|
page read and write
|
||
2409FBA5000
|
trusted library allocation
|
page read and write
|
||
240A0B35000
|
trusted library allocation
|
page read and write
|
||
240A0A8E000
|
trusted library allocation
|
page read and write
|
||
2409DCB2000
|
trusted library allocation
|
page read and write
|
||
2409D4EC000
|
trusted library allocation
|
page read and write
|
||
2409D3E7000
|
trusted library allocation
|
page read and write
|
||
2409F9A3000
|
trusted library allocation
|
page read and write
|
||
2409CE73000
|
trusted library allocation
|
page read and write
|
||
24099BA3000
|
trusted library allocation
|
page read and write
|
||
240A005D000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409D1FC000
|
trusted library allocation
|
page read and write
|
||
2409FF7E000
|
trusted library allocation
|
page read and write
|
||
24099D67000
|
trusted library allocation
|
page read and write
|
||
2409CF63000
|
trusted library allocation
|
page read and write
|
||
240A00CA000
|
trusted library allocation
|
page read and write
|
||
2409CF4F000
|
trusted library allocation
|
page read and write
|
||
24099A1B000
|
trusted library allocation
|
page read and write
|
||
2409FF7E000
|
trusted library allocation
|
page read and write
|
||
18444528000
|
heap
|
page read and write
|
||
2409D5D9000
|
trusted library allocation
|
page read and write
|
||
2409FBCA000
|
trusted library allocation
|
page read and write
|
||
2409D170000
|
trusted library allocation
|
page read and write
|
||
24099DFD000
|
trusted library allocation
|
page read and write
|
||
2FC65FF000
|
stack
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409D519000
|
trusted library allocation
|
page read and write
|
||
2409FA0B000
|
trusted library allocation
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
2409AA66000
|
trusted library allocation
|
page read and write
|
||
18443F66000
|
unkown
|
page execute read
|
||
2408F736000
|
heap
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
18443923000
|
trusted library allocation
|
page read and write
|
||
3A11000
|
heap
|
page read and write
|
||
2409D3AC000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
2409CB19000
|
trusted library allocation
|
page read and write
|
||
2409D16A000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
2409D9A3000
|
trusted library allocation
|
page read and write
|
||
2409D552000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2408CBE9000
|
trusted library allocation
|
page read and write
|
||
2409E594000
|
trusted library allocation
|
page read and write
|
||
184444BD000
|
heap
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2409DFFC000
|
trusted library allocation
|
page read and write
|
||
2409CCAE000
|
trusted library allocation
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409CB87000
|
trusted library allocation
|
page read and write
|
||
2409E581000
|
trusted library allocation
|
page read and write
|
||
18444526000
|
heap
|
page read and write
|
||
2409CB7D000
|
trusted library allocation
|
page read and write
|
||
2409E5D9000
|
trusted library allocation
|
page read and write
|
||
2409CF85000
|
trusted library allocation
|
page read and write
|
||
2409F79E000
|
trusted library allocation
|
page read and write
|
||
2409F75A000
|
trusted library allocation
|
page read and write
|
||
2409E520000
|
trusted library allocation
|
page read and write
|
||
2409CF63000
|
trusted library allocation
|
page read and write
|
||
2409E56A000
|
trusted library allocation
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
18444598000
|
heap
|
page read and write
|
||
18444523000
|
heap
|
page read and write
|
||
18444529000
|
heap
|
page read and write
|
||
2409AA50000
|
trusted library allocation
|
page read and write
|
||
240A0A6C000
|
trusted library allocation
|
page read and write
|
||
2409E5EA000
|
trusted library allocation
|
page read and write
|
||
2409AA8A000
|
trusted library allocation
|
page read and write
|
||
2409AA5E000
|
trusted library allocation
|
page read and write
|
||
2409D5D9000
|
trusted library allocation
|
page read and write
|
||
240A0B39000
|
trusted library allocation
|
page read and write
|
||
240A0B7E000
|
trusted library allocation
|
page read and write
|
||
240A0AD1000
|
trusted library allocation
|
page read and write
|
||
2409CB98000
|
trusted library allocation
|
page read and write
|
||
2409CCA5000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
2409FA51000
|
trusted library allocation
|
page read and write
|
||
2408F76F000
|
heap
|
page read and write
|
||
240A0AD1000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FFFD000
|
trusted library allocation
|
page read and write
|
||
2409D373000
|
trusted library allocation
|
page read and write
|
||
2409F8F6000
|
trusted library allocation
|
page read and write
|
||
2409FFAA000
|
trusted library allocation
|
page read and write
|
||
2409D5AE000
|
trusted library allocation
|
page read and write
|
||
24099143000
|
trusted library allocation
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
2409DD7E000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2409FF3C000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
A80D13E000
|
stack
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
240990BF000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
2409DD9C000
|
trusted library allocation
|
page read and write
|
||
2409CC33000
|
trusted library allocation
|
page read and write
|
||
184444BD000
|
heap
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
240A0D81000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
2409918A000
|
trusted library allocation
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
A80673E000
|
stack
|
page read and write
|
||
2409D1E6000
|
trusted library allocation
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
2409D5AB000
|
trusted library allocation
|
page read and write
|
||
2409FB8F000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2071B0DA000
|
heap
|
page read and write
|
||
2409B3D9000
|
trusted library allocation
|
page read and write
|
||
240A00E1000
|
trusted library allocation
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
2409D5DD000
|
trusted library allocation
|
page read and write
|
||
2409FA9A000
|
trusted library allocation
|
page read and write
|
||
2409DD83000
|
trusted library allocation
|
page read and write
|
||
2409E562000
|
trusted library allocation
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
2409B3FC000
|
trusted library allocation
|
page read and write
|
||
2409DFF9000
|
trusted library allocation
|
page read and write
|
||
2409D9C7000
|
trusted library allocation
|
page read and write
|
||
2409FF44000
|
trusted library allocation
|
page read and write
|
||
24099AE4000
|
trusted library allocation
|
page read and write
|
||
2409D15B000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
240A00ED000
|
trusted library allocation
|
page read and write
|
||
1844402F000
|
trusted library allocation
|
page read and write
|
||
2408F737000
|
heap
|
page read and write
|
||
2409DFA8000
|
trusted library allocation
|
page read and write
|
||
2409D52C000
|
trusted library allocation
|
page read and write
|
||
2409D06B000
|
trusted library allocation
|
page read and write
|
||
2409CBEA000
|
trusted library allocation
|
page read and write
|
||
2408C860000
|
heap
|
page read and write
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409CB80000
|
trusted library allocation
|
page read and write
|
||
2408C7D0000
|
heap
|
page read and write
|
||
2409AAAB000
|
trusted library allocation
|
page read and write
|
||
240A0B7E000
|
trusted library allocation
|
page read and write
|
||
2409DCC0000
|
trusted library allocation
|
page read and write
|
||
240A001F000
|
trusted library allocation
|
page read and write
|
||
2409F957000
|
trusted library allocation
|
page read and write
|
||
2071B4B7000
|
trusted library allocation
|
page read and write
|
||
2409FFAA000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409D5D9000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
240999FB000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409CBB0000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409FA13000
|
trusted library allocation
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
2409DDDE000
|
trusted library allocation
|
page read and write
|
||
240A0AFA000
|
trusted library allocation
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
2409D873000
|
trusted library allocation
|
page read and write
|
||
2409F919000
|
trusted library allocation
|
page read and write
|
||
B55BCFE000
|
unkown
|
page readonly
|
||
240A0CFD000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2071B4A2000
|
trusted library allocation
|
page read and write
|
||
2409D9C0000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409CF2B000
|
trusted library allocation
|
page read and write
|
||
2409D156000
|
trusted library allocation
|
page read and write
|
||
24099085000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2409CF63000
|
trusted library allocation
|
page read and write
|
||
A8067BC000
|
stack
|
page read and write
|
||
240A0D50000
|
trusted library allocation
|
page read and write
|
||
2071B4BA000
|
trusted library allocation
|
page read and write
|
||
213BF500000
|
trusted library allocation
|
page read and write
|
||
240A0063000
|
trusted library allocation
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
A80E50A000
|
stack
|
page read and write
|
||
2409D05E000
|
trusted library allocation
|
page read and write
|
||
2409CB98000
|
trusted library allocation
|
page read and write
|
||
1BDB7304000
|
trusted library allocation
|
page read and write
|
||
240991B6000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
2409AA9C000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409E55A000
|
trusted library allocation
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409DFE8000
|
trusted library allocation
|
page read and write
|
||
240A0B6C000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
240A0B8E000
|
trusted library allocation
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D55B000
|
trusted library allocation
|
page read and write
|
||
240A0A7C000
|
trusted library allocation
|
page read and write
|
||
2409DD8E000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2409D38B000
|
trusted library allocation
|
page read and write
|
||
2071B412000
|
trusted library allocation
|
page read and write
|
||
18443969000
|
trusted library allocation
|
page read and write
|
||
2409DFE5000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409D39C000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2071B481000
|
trusted library allocation
|
page read and write
|
||
A8081FE000
|
stack
|
page read and write
|
||
2409F947000
|
trusted library allocation
|
page read and write
|
||
2409AAAB000
|
trusted library allocation
|
page read and write
|
||
2409CB8E000
|
trusted library allocation
|
page read and write
|
||
2409916C000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
240A0D90000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409EB7B000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
240A0AE6000
|
trusted library allocation
|
page read and write
|
||
2408F74E000
|
heap
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409F79E000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409B3F6000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
2409B342000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2409CEE4000
|
trusted library allocation
|
page read and write
|
||
2409CED3000
|
trusted library allocation
|
page read and write
|
||
240A0ABD000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409FA68000
|
trusted library allocation
|
page read and write
|
||
2409DC2C000
|
trusted library allocation
|
page read and write
|
||
240A00E1000
|
trusted library allocation
|
page read and write
|
||
2409D5F0000
|
trusted library allocation
|
page read and write
|
||
2409D163000
|
trusted library allocation
|
page read and write
|
||
2409FFBA000
|
trusted library allocation
|
page read and write
|
||
17EB9A60000
|
heap
|
page read and write
|
||
2409D1ED000
|
trusted library allocation
|
page read and write
|
||
2409FB87000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
2409F76F000
|
trusted library allocation
|
page read and write
|
||
2409E5D9000
|
trusted library allocation
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2408F694000
|
heap
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2071B467000
|
trusted library allocation
|
page read and write
|
||
2409F7AD000
|
trusted library allocation
|
page read and write
|
||
2409DFE5000
|
trusted library allocation
|
page read and write
|
||
17EBB2D0000
|
heap
|
page read and write
|
||
2409E563000
|
trusted library allocation
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2409DD6D000
|
trusted library allocation
|
page read and write
|
||
2409D5F9000
|
trusted library allocation
|
page read and write
|
||
240A0C4A000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409AA56000
|
trusted library allocation
|
page read and write
|
||
2409DD80000
|
trusted library allocation
|
page read and write
|
||
2409D061000
|
trusted library allocation
|
page read and write
|
||
2409E5D7000
|
trusted library allocation
|
page read and write
|
||
2409D936000
|
trusted library allocation
|
page read and write
|
||
240991AE000
|
trusted library allocation
|
page read and write
|
||
18444585000
|
heap
|
page read and write
|
||
2409F9BD000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409914B000
|
trusted library allocation
|
page read and write
|
||
2409D5AE000
|
trusted library allocation
|
page read and write
|
||
2409CCCD000
|
trusted library allocation
|
page read and write
|
||
240A0D4C000
|
trusted library allocation
|
page read and write
|
||
2408F78E000
|
heap
|
page read and write
|
||
3F057CA03000
|
trusted library allocation
|
page read and write
|
||
240A0B86000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409CEE1000
|
trusted library allocation
|
page read and write
|
||
A80BB3D000
|
stack
|
page read and write
|
||
2409FB92000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240A0CB7000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
240A0D4C000
|
trusted library allocation
|
page read and write
|
||
2409FA70000
|
trusted library allocation
|
page read and write
|
||
2409E557000
|
trusted library allocation
|
page read and write
|
||
2409B379000
|
trusted library allocation
|
page read and write
|
||
2409DD6D000
|
trusted library allocation
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
B55CCFE000
|
unkown
|
page readonly
|
||
2409AA5E000
|
trusted library allocation
|
page read and write
|
||
2409CC1F000
|
trusted library allocation
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
240A0D50000
|
trusted library allocation
|
page read and write
|
||
2409CC75000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
240993EE000
|
trusted library allocation
|
page read and write
|
||
240A0044000
|
trusted library allocation
|
page read and write
|
||
2409D178000
|
trusted library allocation
|
page read and write
|
||
24099163000
|
trusted library allocation
|
page read and write
|
||
2408F738000
|
heap
|
page read and write
|
||
2409DE2C000
|
trusted library allocation
|
page read and write
|
||
2409D1CC000
|
trusted library allocation
|
page read and write
|
||
2409CB4B000
|
trusted library allocation
|
page read and write
|
||
2409AC09000
|
trusted library allocation
|
page read and write
|
||
240A0A6C000
|
trusted library allocation
|
page read and write
|
||
1844395C000
|
trusted library allocation
|
page read and write
|
||
A80DE7E000
|
stack
|
page read and write
|
||
2FC75FF000
|
stack
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
240A009A000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240A0037000
|
trusted library allocation
|
page read and write
|
||
1F46C851E000
|
trusted library allocation
|
page read and write
|
||
2408F725000
|
heap
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
2409F9EF000
|
trusted library allocation
|
page read and write
|
||
2409D191000
|
trusted library allocation
|
page read and write
|
||
240A0D42000
|
trusted library allocation
|
page read and write
|
||
2409F9CC000
|
trusted library allocation
|
page read and write
|
||
2409D39B000
|
trusted library allocation
|
page read and write
|
||
24099065000
|
trusted library allocation
|
page read and write
|
||
2409D195000
|
trusted library allocation
|
page read and write
|
||
2409FAE3000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
240A0D10000
|
trusted library allocation
|
page read and write
|
||
240A0B4F000
|
trusted library allocation
|
page read and write
|
||
240993E1000
|
trusted library allocation
|
page read and write
|
||
2409F9CC000
|
trusted library allocation
|
page read and write
|
||
2409DD8E000
|
trusted library allocation
|
page read and write
|
||
A80458B000
|
stack
|
page read and write
|
||
240A0C7A000
|
trusted library allocation
|
page read and write
|
||
2409FFCA000
|
trusted library allocation
|
page read and write
|
||
2409CB22000
|
trusted library allocation
|
page read and write
|
||
2409D167000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
17EB96D0000
|
heap
|
page read and write
|
||
2409CF96000
|
trusted library allocation
|
page read and write
|
||
2409E575000
|
trusted library allocation
|
page read and write
|
||
2409CB22000
|
trusted library allocation
|
page read and write
|
||
2408CBFE000
|
trusted library allocation
|
page read and write
|
||
18444036000
|
trusted library allocation
|
page read and write
|
||
2409F8B4000
|
trusted library allocation
|
page read and write
|
||
2409D1E8000
|
trusted library allocation
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
2409D1CF000
|
trusted library allocation
|
page read and write
|
||
184434F0000
|
unclassified section
|
page readonly
|
||
24099167000
|
trusted library allocation
|
page read and write
|
||
2409DD8B000
|
trusted library allocation
|
page read and write
|
||
2409CBAB000
|
trusted library allocation
|
page read and write
|
||
A80DCBF000
|
stack
|
page read and write
|
||
2409D084000
|
trusted library allocation
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
B5583D8000
|
stack
|
page read and write
|
||
2409DFA2000
|
trusted library allocation
|
page read and write
|
||
2409CB4B000
|
trusted library allocation
|
page read and write
|
||
2409CF97000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2408C850000
|
trusted library allocation
|
page read and write
|
||
2409DBFC000
|
trusted library allocation
|
page read and write
|
||
184438B0000
|
trusted library allocation
|
page read and write
|
||
240A0D48000
|
trusted library allocation
|
page read and write
|
||
2409CE00000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
18443963000
|
trusted library allocation
|
page read and write
|
||
2409D90B000
|
trusted library allocation
|
page read and write
|
||
2409DCC0000
|
trusted library allocation
|
page read and write
|
||
1844449F000
|
heap
|
page read and write
|
||
240A0D21000
|
trusted library allocation
|
page read and write
|
||
240A0069000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
18443852000
|
unclassified section
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2071B1C0000
|
heap
|
page read and write
|
||
18444529000
|
heap
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409E550000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
18444598000
|
heap
|
page read and write
|
||
2409FF53000
|
trusted library allocation
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240990A1000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
2409FA0B000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
18444598000
|
heap
|
page read and write
|
||
17EB9900000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2408F6D4000
|
heap
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2409CCAE000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
1844449F000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
A80DC3F000
|
stack
|
page read and write
|
||
240A00F6000
|
trusted library allocation
|
page read and write
|
||
240A0AE6000
|
trusted library allocation
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
240993EE000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
240991DE000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
24099DAE000
|
trusted library allocation
|
page read and write
|
||
240A0AA8000
|
trusted library allocation
|
page read and write
|
||
240A0A70000
|
trusted library allocation
|
page read and write
|
||
2409D37F000
|
trusted library allocation
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
2409AA7C000
|
trusted library allocation
|
page read and write
|
||
184439C6000
|
trusted library allocation
|
page read and write
|
||
2409F9EA000
|
trusted library allocation
|
page read and write
|
||
2409D90B000
|
trusted library allocation
|
page read and write
|
||
2409D597000
|
trusted library allocation
|
page read and write
|
||
2071B410000
|
trusted library allocation
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
18443F61000
|
unkown
|
page execute read
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
2409B3F4000
|
trusted library allocation
|
page read and write
|
||
2409FB99000
|
trusted library allocation
|
page read and write
|
||
2409D1AD000
|
trusted library allocation
|
page read and write
|
||
2409DDAD000
|
trusted library allocation
|
page read and write
|
||
240A0AAC000
|
trusted library allocation
|
page read and write
|
||
240A0ADF000
|
trusted library allocation
|
page read and write
|
||
240A0B2C000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
2409D1E9000
|
trusted library allocation
|
page read and write
|
||
2071B190000
|
heap
|
page readonly
|
||
2409CC3B000
|
trusted library allocation
|
page read and write
|
||
2409DAE8000
|
trusted library allocation
|
page read and write
|
||
2071B51C000
|
trusted library allocation
|
page read and write
|
||
2409CB78000
|
trusted library allocation
|
page read and write
|
||
2409D370000
|
trusted library allocation
|
page read and write
|
||
2409AA7C000
|
trusted library allocation
|
page read and write
|
||
2409CB7D000
|
trusted library allocation
|
page read and write
|
||
2409E5C5000
|
trusted library allocation
|
page read and write
|
||
2409D325000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
2409B35F000
|
trusted library allocation
|
page read and write
|
||
2409E547000
|
trusted library allocation
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2409D189000
|
trusted library allocation
|
page read and write
|
||
240A0CEF000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409CF0E000
|
trusted library allocation
|
page read and write
|
||
2409CC75000
|
trusted library allocation
|
page read and write
|
||
18444598000
|
heap
|
page read and write
|
||
2409D1C2000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
2409FF41000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
2409FFBC000
|
trusted library allocation
|
page read and write
|
||
1844452E000
|
heap
|
page read and write
|
||
240A00BD000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
240993FD000
|
trusted library allocation
|
page read and write
|
||
2409DAFD000
|
trusted library allocation
|
page read and write
|
||
2409FFDA000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409DD1A000
|
trusted library allocation
|
page read and write
|
||
24099A93000
|
trusted library allocation
|
page read and write
|
||
2409D5F9000
|
trusted library allocation
|
page read and write
|
||
2409DDC2000
|
trusted library allocation
|
page read and write
|
||
2409B3F0000
|
trusted library allocation
|
page read and write
|
||
2409FA48000
|
trusted library allocation
|
page read and write
|
||
2409AABD000
|
trusted library allocation
|
page read and write
|
||
2409CE67000
|
trusted library allocation
|
page read and write
|
||
2409CCC9000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409D329000
|
trusted library allocation
|
page read and write
|
||
2409CC3B000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2409CCF1000
|
trusted library allocation
|
page read and write
|
||
2409992F000
|
trusted library allocation
|
page read and write
|
||
24099DC5000
|
trusted library allocation
|
page read and write
|
||
1844456B000
|
heap
|
page read and write
|
||
2409FFE1000
|
trusted library allocation
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2409CB22000
|
trusted library allocation
|
page read and write
|
||
2409F9BD000
|
trusted library allocation
|
page read and write
|
||
24099167000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
24099DBA000
|
trusted library allocation
|
page read and write
|
||
2409A9B8000
|
trusted library allocation
|
page read and write
|
||
24099D63000
|
trusted library allocation
|
page read and write
|
||
18443912000
|
trusted library allocation
|
page read and write
|
||
2409DDAD000
|
trusted library allocation
|
page read and write
|
||
213BF400000
|
trusted library allocation
|
page read and write
|
||
2408F73F000
|
heap
|
page read and write
|
||
24099163000
|
trusted library allocation
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
2409DDF5000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
240A0AB8000
|
trusted library allocation
|
page read and write
|
||
2409AABD000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2408F72D000
|
heap
|
page read and write
|
||
2071B517000
|
trusted library allocation
|
page read and write
|
||
240A00DF000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DCD0000
|
trusted library allocation
|
page read and write
|
||
2409D34E000
|
trusted library allocation
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
240A0B6E000
|
trusted library allocation
|
page read and write
|
||
2409AAB1000
|
trusted library allocation
|
page read and write
|
||
2409FA2F000
|
trusted library allocation
|
page read and write
|
||
2409E55C000
|
trusted library allocation
|
page read and write
|
||
2409CF22000
|
trusted library allocation
|
page read and write
|
||
240990BF000
|
trusted library allocation
|
page read and write
|
||
347EDCE000
|
unkown
|
page readonly
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409D5D6000
|
trusted library allocation
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
240A0D4E000
|
trusted library allocation
|
page read and write
|
||
240993EC000
|
trusted library allocation
|
page read and write
|
||
2409DCC9000
|
trusted library allocation
|
page read and write
|
||
240993FD000
|
trusted library allocation
|
page read and write
|
||
2409D365000
|
trusted library allocation
|
page read and write
|
||
17EB96E0000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DAFB000
|
trusted library allocation
|
page read and write
|
||
24099ACB000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409E555000
|
trusted library allocation
|
page read and write
|
||
2409FFA4000
|
trusted library allocation
|
page read and write
|
||
240A0B2A000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409D22E000
|
trusted library allocation
|
page read and write
|
||
1844385F000
|
unclassified section
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409CB2D000
|
trusted library allocation
|
page read and write
|
||
24099AAB000
|
trusted library allocation
|
page read and write
|
||
2409D1C8000
|
trusted library allocation
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2409CF97000
|
trusted library allocation
|
page read and write
|
||
2409E5B6000
|
trusted library allocation
|
page read and write
|
||
24099A75000
|
trusted library allocation
|
page read and write
|
||
2409CE34000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
2409CB87000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2409DDE1000
|
trusted library allocation
|
page read and write
|
||
240A0024000
|
trusted library allocation
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
2409D14A000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
A805FFE000
|
stack
|
page read and write
|
||
2409D398000
|
trusted library allocation
|
page read and write
|
||
2409DFFC000
|
trusted library allocation
|
page read and write
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
240A00EA000
|
trusted library allocation
|
page read and write
|
||
39D0000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
240A00CF000
|
trusted library allocation
|
page read and write
|
||
2409DCB5000
|
trusted library allocation
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409F7BD000
|
trusted library allocation
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
A80E70E000
|
stack
|
page read and write
|
||
2E4BBD680000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
24099923000
|
trusted library allocation
|
page read and write
|
||
2409E590000
|
trusted library allocation
|
page read and write
|
||
2409D9A3000
|
trusted library allocation
|
page read and write
|
||
A8079FD000
|
stack
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
2409CF52000
|
trusted library allocation
|
page read and write
|
||
24099163000
|
trusted library allocation
|
page read and write
|
||
2409D1E0000
|
trusted library allocation
|
page read and write
|
||
2409D03D000
|
trusted library allocation
|
page read and write
|
||
2409FAA2000
|
trusted library allocation
|
page read and write
|
||
2409D153000
|
trusted library allocation
|
page read and write
|
||
2409FB89000
|
trusted library allocation
|
page read and write
|
||
184444CA000
|
heap
|
page read and write
|
||
2409B108000
|
trusted library allocation
|
page read and write
|
||
240A0B1B000
|
trusted library allocation
|
page read and write
|
||
2409FBB8000
|
trusted library allocation
|
page read and write
|
||
213BF1D0000
|
heap
|
page read and write
|
||
2409FFDA000
|
trusted library allocation
|
page read and write
|
||
2408F73A000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
184445A9000
|
heap
|
page read and write
|
||
18444521000
|
heap
|
page read and write
|
||
24099DAE000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
A80EF0E000
|
stack
|
page read and write
|
||
2409DBFA000
|
trusted library allocation
|
page read and write
|
||
2408F752000
|
heap
|
page read and write
|
||
2409FF38000
|
trusted library allocation
|
page read and write
|
||
2409DCC9000
|
trusted library allocation
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
240A0C48000
|
trusted library allocation
|
page read and write
|
||
2409D5D6000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409B36F000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
340207E000
|
unkown
|
page readonly
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409D5ED000
|
trusted library allocation
|
page read and write
|
||
2409D4F0000
|
trusted library allocation
|
page read and write
|
||
24099971000
|
trusted library allocation
|
page read and write
|
||
17EB990A000
|
trusted library allocation
|
page read and write
|
||
2409D9C0000
|
trusted library allocation
|
page read and write
|
||
2071B263000
|
heap
|
page read and write
|
||
2409CF85000
|
trusted library allocation
|
page read and write
|
||
2409CC69000
|
trusted library allocation
|
page read and write
|
||
2409CB89000
|
trusted library allocation
|
page read and write
|
||
2409DD8B000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D06C000
|
trusted library allocation
|
page read and write
|
||
24099DB7000
|
trusted library allocation
|
page read and write
|
||
2409F77E000
|
trusted library allocation
|
page read and write
|
||
2409AAE2000
|
trusted library allocation
|
page read and write
|
||
2409F421000
|
trusted library allocation
|
page read and write
|
||
2409CB89000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2409E5EC000
|
trusted library allocation
|
page read and write
|
||
2409DDB6000
|
trusted library allocation
|
page read and write
|
||
2409F7F2000
|
trusted library allocation
|
page read and write
|
||
2409D39C000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
17EB96F7000
|
heap
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2071B1A0000
|
unclassified section
|
page read and write
|
||
2409FBD4000
|
trusted library allocation
|
page read and write
|
||
2409D16F000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409FB99000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
1844396F000
|
trusted library allocation
|
page read and write
|
||
2409D1C4000
|
trusted library allocation
|
page read and write
|
||
18444528000
|
heap
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409AABD000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
2409D1C4000
|
trusted library allocation
|
page read and write
|
||
240A00BD000
|
trusted library allocation
|
page read and write
|
||
2408F6D6000
|
heap
|
page read and write
|
||
24099DC5000
|
trusted library allocation
|
page read and write
|
||
2409DABD000
|
trusted library allocation
|
page read and write
|
||
2409FBFB000
|
trusted library allocation
|
page read and write
|
||
2409D550000
|
trusted library allocation
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2409D92B000
|
trusted library allocation
|
page read and write
|
||
2409D5AE000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DD36000
|
trusted library allocation
|
page read and write
|
||
240A0ADF000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
2409D9C7000
|
trusted library allocation
|
page read and write
|
||
17EBB2C0000
|
heap
|
page read and write
|
||
2409FFFD000
|
trusted library allocation
|
page read and write
|
||
240A0A53000
|
trusted library allocation
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
240A0AAA000
|
trusted library allocation
|
page read and write
|
||
240990EF000
|
trusted library allocation
|
page read and write
|
||
2409FA68000
|
trusted library allocation
|
page read and write
|
||
2409DFA5000
|
trusted library allocation
|
page read and write
|
||
2409B3F4000
|
trusted library allocation
|
page read and write
|
||
18443860000
|
heap
|
page read and write
|
||
2409CCA0000
|
trusted library allocation
|
page read and write
|
||
2409DAB0000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
2409DD3F000
|
trusted library allocation
|
page read and write
|
||
2409F95F000
|
trusted library allocation
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
24099DC5000
|
trusted library allocation
|
page read and write
|
||
24099A17000
|
trusted library allocation
|
page read and write
|
||
2409D148000
|
trusted library allocation
|
page read and write
|
||
2409DE70000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2409F8F6000
|
trusted library allocation
|
page read and write
|
||
2409E5E2000
|
trusted library allocation
|
page read and write
|
||
2409F957000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409F421000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
2409FC00000
|
trusted library allocation
|
page read and write
|
||
2409E6DE000
|
trusted library allocation
|
page read and write
|
||
2409FBDA000
|
trusted library allocation
|
page read and write
|
||
2408EDF0000
|
trusted library allocation
|
page read and write
|
||
2409DFF9000
|
trusted library allocation
|
page read and write
|
||
340287E000
|
stack
|
page read and write
|
||
240A0B53000
|
trusted library allocation
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
240A0A57000
|
trusted library allocation
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
240A0B2A000
|
trusted library allocation
|
page read and write
|
||
2409CBA6000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409CCA0000
|
trusted library allocation
|
page read and write
|
||
2409CF34000
|
trusted library allocation
|
page read and write
|
||
2409CFC7000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409DD9C000
|
trusted library allocation
|
page read and write
|
||
2409DAF4000
|
trusted library allocation
|
page read and write
|
||
2409E5D5000
|
trusted library allocation
|
page read and write
|
||
240A0097000
|
trusted library allocation
|
page read and write
|
||
A80DD3B000
|
stack
|
page read and write
|
||
24099187000
|
trusted library allocation
|
page read and write
|
||
279BA00000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
2409D5D6000
|
trusted library allocation
|
page read and write
|
||
2409AA6F000
|
trusted library allocation
|
page read and write
|
||
240A0044000
|
trusted library allocation
|
page read and write
|
||
2409FA48000
|
trusted library allocation
|
page read and write
|
||
2409DCCE000
|
trusted library allocation
|
page read and write
|
||
2409D3F6000
|
trusted library allocation
|
page read and write
|
||
2409CB84000
|
trusted library allocation
|
page read and write
|
||
2409EB2F000
|
trusted library allocation
|
page read and write
|
||
2409FBCA000
|
trusted library allocation
|
page read and write
|
||
2409F986000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2071B300000
|
trusted library allocation
|
page read and write
|
||
2409CC98000
|
trusted library allocation
|
page read and write
|
||
2409E5D5000
|
trusted library allocation
|
page read and write
|
||
18443910000
|
trusted library allocation
|
page read and write
|
||
240993EC000
|
trusted library allocation
|
page read and write
|
||
2409E79D000
|
trusted library allocation
|
page read and write
|
||
2409E5D8000
|
trusted library allocation
|
page read and write
|
||
2409CD28000
|
trusted library allocation
|
page read and write
|
||
24099DAE000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
A80450E000
|
stack
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
2409D936000
|
trusted library allocation
|
page read and write
|
||
1844457C000
|
heap
|
page read and write
|
||
2409DD3A000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409D1E3000
|
trusted library allocation
|
page read and write
|
||
2409F8B4000
|
trusted library allocation
|
page read and write
|
||
2409D343000
|
trusted library allocation
|
page read and write
|
||
2409AAAD000
|
trusted library allocation
|
page read and write
|
||
A80F74B000
|
stack
|
page read and write
|
||
2409AA8A000
|
trusted library allocation
|
page read and write
|
||
240A0ADF000
|
trusted library allocation
|
page read and write
|
||
2409D061000
|
trusted library allocation
|
page read and write
|
||
240A0CB7000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
2409D809000
|
trusted library allocation
|
page read and write
|
||
2409CE67000
|
trusted library allocation
|
page read and write
|
||
2409D065000
|
trusted library allocation
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
24099DBD000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
24099098000
|
trusted library allocation
|
page read and write
|
||
2409FAB7000
|
trusted library allocation
|
page read and write
|
||
2409DFB9000
|
trusted library allocation
|
page read and write
|
||
2409CFB1000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
17EB96ED000
|
heap
|
page read and write
|
||
240A0CB5000
|
trusted library allocation
|
page read and write
|
||
2409CCB8000
|
trusted library allocation
|
page read and write
|
||
2409AA8A000
|
trusted library allocation
|
page read and write
|
||
2409F7AD000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
240A0CFD000
|
trusted library allocation
|
page read and write
|
||
2409CC6F000
|
trusted library allocation
|
page read and write
|
||
2409F947000
|
trusted library allocation
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
2409D16F000
|
trusted library allocation
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
240993EE000
|
trusted library allocation
|
page read and write
|
||
2409DA89000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
18444523000
|
heap
|
page read and write
|
||
240A0A82000
|
trusted library allocation
|
page read and write
|
||
2409CB9B000
|
trusted library allocation
|
page read and write
|
||
2409CC64000
|
trusted library allocation
|
page read and write
|
||
2409AA9C000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409F96E000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409FA11000
|
trusted library allocation
|
page read and write
|
||
184444A9000
|
heap
|
page read and write
|
||
24099923000
|
trusted library allocation
|
page read and write
|
||
2408F76D000
|
heap
|
page read and write
|
||
2409E800000
|
trusted library allocation
|
page read and write
|
||
240990F5000
|
trusted library allocation
|
page read and write
|
||
240A0AB8000
|
trusted library allocation
|
page read and write
|
||
24099183000
|
trusted library allocation
|
page read and write
|
||
240A0A7C000
|
trusted library allocation
|
page read and write
|
||
240A003D000
|
trusted library allocation
|
page read and write
|
||
2409CF59000
|
trusted library allocation
|
page read and write
|
||
240A0A7C000
|
trusted library allocation
|
page read and write
|
||
2409CC4B000
|
trusted library allocation
|
page read and write
|
||
2409DF57000
|
trusted library allocation
|
page read and write
|
||
240A00F6000
|
trusted library allocation
|
page read and write
|
||
24099187000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CCB8000
|
trusted library allocation
|
page read and write
|
||
2409F934000
|
trusted library allocation
|
page read and write
|
||
347EC8B000
|
stack
|
page read and write
|
||
240A0D44000
|
trusted library allocation
|
page read and write
|
||
240A0037000
|
trusted library allocation
|
page read and write
|
||
24099D86000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page write copy
|
||
2409D1FE000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409CCA5000
|
trusted library allocation
|
page read and write
|
||
A808D32000
|
stack
|
page read and write
|
||
2408F72D000
|
heap
|
page read and write
|
||
18444441000
|
heap
|
page read and write
|
||
2409CD3F000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2409CBA6000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409FF9A000
|
trusted library allocation
|
page read and write
|
||
2409E547000
|
trusted library allocation
|
page read and write
|
||
2409D3E7000
|
trusted library allocation
|
page read and write
|
||
2409CC09000
|
trusted library allocation
|
page read and write
|
||
240991B6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DAB2000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
2409E555000
|
trusted library allocation
|
page read and write
|
||
2409D4ED000
|
trusted library allocation
|
page read and write
|
||
2409D5ED000
|
trusted library allocation
|
page read and write
|
||
2409DCF9000
|
trusted library allocation
|
page read and write
|
||
240A0C56000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
347F7D8000
|
stack
|
page read and write
|
||
2409D1AD000
|
trusted library allocation
|
page read and write
|
||
184435A0000
|
heap
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
24099DE7000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409FA0F000
|
trusted library allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
2408F737000
|
heap
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409CCC7000
|
trusted library allocation
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
A80454E000
|
stack
|
page read and write
|
||
2409FA33000
|
trusted library allocation
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
2409D873000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
2409E800000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409B3E3000
|
trusted library allocation
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2071AFC5000
|
remote allocation
|
page execute read
|
||
2409CC0C000
|
trusted library allocation
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2071B447000
|
trusted library allocation
|
page read and write
|
||
2409E874000
|
trusted library allocation
|
page read and write
|
||
2409DC26000
|
trusted library allocation
|
page read and write
|
||
2409FFF9000
|
trusted library allocation
|
page read and write
|
||
2409CEC7000
|
trusted library allocation
|
page read and write
|
||
24099DF5000
|
trusted library allocation
|
page read and write
|
||
2409F9EA000
|
trusted library allocation
|
page read and write
|
||
2409D3E1000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
240A00EA000
|
trusted library allocation
|
page read and write
|
||
2409FBAD000
|
trusted library allocation
|
page read and write
|
||
2409F9B8000
|
trusted library allocation
|
page read and write
|
||
2409FF4C000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
24099DB2000
|
trusted library allocation
|
page read and write
|
||
2409D562000
|
trusted library allocation
|
page read and write
|
||
2409CC6C000
|
trusted library allocation
|
page read and write
|
||
B55ACBE000
|
stack
|
page read and write
|
||
A80B73D000
|
stack
|
page read and write
|
||
2409FBBE000
|
trusted library allocation
|
page read and write
|
||
18443870000
|
trusted library section
|
page readonly
|
||
2409B34D000
|
trusted library allocation
|
page read and write
|
||
2409D169000
|
trusted library allocation
|
page read and write
|
||
2409DD1D000
|
trusted library allocation
|
page read and write
|
||
2409D3F3000
|
trusted library allocation
|
page read and write
|
||
2409D5A1000
|
trusted library allocation
|
page read and write
|
||
2409B340000
|
trusted library allocation
|
page read and write
|
||
2409909E000
|
trusted library allocation
|
page read and write
|
||
2409DDF3000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
240993F0000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
2408F741000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240990EF000
|
trusted library allocation
|
page read and write
|
||
2409CB4B000
|
trusted library allocation
|
page read and write
|
||
17EBB2E0000
|
heap
|
page read and write
|
||
240A0C52000
|
trusted library allocation
|
page read and write
|
||
2409D1A0000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409CD29000
|
trusted library allocation
|
page read and write
|
||
2409FA08000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DAAE000
|
trusted library allocation
|
page read and write
|
||
C1C000
|
unkown
|
page readonly
|
||
A806FFF000
|
stack
|
page read and write
|
||
24099065000
|
trusted library allocation
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2071B4E9000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2408C9A3000
|
heap
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
2409E599000
|
trusted library allocation
|
page read and write
|
||
2408CB94000
|
trusted library allocation
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
240A0037000
|
trusted library allocation
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
2409CB19000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409D59E000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
240A008B000
|
trusted library allocation
|
page read and write
|
||
2409FF4C000
|
trusted library allocation
|
page read and write
|
||
2409DC5B000
|
trusted library allocation
|
page read and write
|
||
2409D922000
|
trusted library allocation
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
2409CB7D000
|
trusted library allocation
|
page read and write
|
||
2409CC4C000
|
trusted library allocation
|
page read and write
|
||
2409DD7C000
|
trusted library allocation
|
page read and write
|
||
2409F7BD000
|
trusted library allocation
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
240A0B8A000
|
trusted library allocation
|
page read and write
|
||
240993E1000
|
trusted library allocation
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240A0C90000
|
trusted library allocation
|
page read and write
|
||
2409E555000
|
trusted library allocation
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2409DFA2000
|
trusted library allocation
|
page read and write
|
||
2409FAC1000
|
trusted library allocation
|
page read and write
|
||
2409CEC4000
|
trusted library allocation
|
page read and write
|
||
2409913D000
|
trusted library allocation
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2409FA33000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F740000
|
heap
|
page read and write
|
||
2409D9F7000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2071B260000
|
heap
|
page read and write
|
||
2408F642000
|
heap
|
page read and write
|
||
184444A0000
|
heap
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
1844456B000
|
heap
|
page read and write
|
||
2408F77A000
|
heap
|
page read and write
|
||
2409FFF7000
|
trusted library allocation
|
page read and write
|
||
2409FAE1000
|
trusted library allocation
|
page read and write
|
||
2408C820000
|
heap
|
page read and write
|
||
2409D31F000
|
trusted library allocation
|
page read and write
|
||
2409FFE1000
|
trusted library allocation
|
page read and write
|
||
18444531000
|
heap
|
page read and write
|
||
3410DFF000
|
stack
|
page read and write
|
||
2409D92B000
|
trusted library allocation
|
page read and write
|
||
2409E6EA000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
240A0AE6000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409D5ED000
|
trusted library allocation
|
page read and write
|
||
2409CEE1000
|
trusted library allocation
|
page read and write
|
||
2408C825000
|
heap
|
page read and write
|
||
24099DBD000
|
trusted library allocation
|
page read and write
|
||
2409E5B8000
|
trusted library allocation
|
page read and write
|
||
2409F7E0000
|
trusted library allocation
|
page read and write
|
||
213BF507000
|
trusted library allocation
|
page read and write
|
||
17EB9701000
|
heap
|
page read and write
|
||
2409B3A4000
|
trusted library allocation
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
18444440000
|
heap
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409CCBE000
|
trusted library allocation
|
page read and write
|
||
2409DDAD000
|
trusted library allocation
|
page read and write
|
||
240A0D4A000
|
trusted library allocation
|
page read and write
|
||
2409FB76000
|
trusted library allocation
|
page read and write
|
||
2409E5F2000
|
trusted library allocation
|
page read and write
|
||
2409CBE4000
|
trusted library allocation
|
page read and write
|
||
2409E5B6000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
18443844000
|
heap
|
page read and write
|
||
2409D080000
|
trusted library allocation
|
page read and write
|
||
2409E5D8000
|
trusted library allocation
|
page read and write
|
||
2409CE34000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409E590000
|
trusted library allocation
|
page read and write
|
||
2409D1AB000
|
trusted library allocation
|
page read and write
|
||
2409D3E7000
|
trusted library allocation
|
page read and write
|
||
2409F986000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
A80FF8F000
|
stack
|
page read and write
|
||
2409D56F000
|
trusted library allocation
|
page read and write
|
||
2409E55C000
|
trusted library allocation
|
page read and write
|
||
24099DBD000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2409DBEE000
|
trusted library allocation
|
page read and write
|
||
2409D166000
|
trusted library allocation
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
184435C0000
|
heap
|
page read and write
|
||
2409D90B000
|
trusted library allocation
|
page read and write
|
||
2409DD22000
|
trusted library allocation
|
page read and write
|
||
2409FBDA000
|
trusted library allocation
|
page read and write
|
||
24099AB0000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2071B45B000
|
trusted library allocation
|
page read and write
|
||
2409D070000
|
trusted library allocation
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
2409E565000
|
trusted library allocation
|
page read and write
|
||
2409F90C000
|
trusted library allocation
|
page read and write
|
||
2409CC98000
|
trusted library allocation
|
page read and write
|
||
2408F752000
|
heap
|
page read and write
|
||
240A0D46000
|
trusted library allocation
|
page read and write
|
||
A80DABB000
|
stack
|
page read and write
|
||
2409E542000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DD97000
|
trusted library allocation
|
page read and write
|
||
240A006B000
|
trusted library allocation
|
page read and write
|
||
240A0A46000
|
trusted library allocation
|
page read and write
|
||
2409D5EE000
|
trusted library allocation
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2408CBD9000
|
trusted library allocation
|
page read and write
|
||
2409CB9E000
|
trusted library allocation
|
page read and write
|
||
2071B4C8000
|
trusted library allocation
|
page read and write
|
||
2409E5D8000
|
trusted library allocation
|
page read and write
|
||
240A00BF000
|
trusted library allocation
|
page read and write
|
||
240A0CEF000
|
trusted library allocation
|
page read and write
|
||
2409AAAB000
|
trusted library allocation
|
page read and write
|
||
2409D5D7000
|
trusted library allocation
|
page read and write
|
||
2408C810000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409B33B000
|
trusted library allocation
|
page read and write
|
||
240A00F1000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
240A0AFA000
|
trusted library allocation
|
page read and write
|
||
A80B33B000
|
stack
|
page read and write
|
||
2408F76C000
|
heap
|
page read and write
|
||
2409CDA6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409FFA4000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409D5A5000
|
trusted library allocation
|
page read and write
|
||
2409FBAF000
|
trusted library allocation
|
page read and write
|
||
2409914B000
|
trusted library allocation
|
page read and write
|
||
240990B3000
|
trusted library allocation
|
page read and write
|
||
2409D57D000
|
trusted library allocation
|
page read and write
|
||
2408F6C7000
|
heap
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409CF88000
|
trusted library allocation
|
page read and write
|
||
2409FBAD000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2409F919000
|
trusted library allocation
|
page read and write
|
||
2409D463000
|
trusted library allocation
|
page read and write
|
||
A80DBBB000
|
stack
|
page read and write
|
||
2408F662000
|
heap
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
240999F6000
|
trusted library allocation
|
page read and write
|
||
2409DD97000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
2408F76E000
|
heap
|
page read and write
|
||
2409D172000
|
trusted library allocation
|
page read and write
|
||
24099181000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409AA8A000
|
trusted library allocation
|
page read and write
|
||
2409EB81000
|
trusted library allocation
|
page read and write
|
||
2409CF97000
|
trusted library allocation
|
page read and write
|
||
240993EE000
|
trusted library allocation
|
page read and write
|
||
A808A7A000
|
stack
|
page read and write
|
||
2409CCB6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409E55C000
|
trusted library allocation
|
page read and write
|
||
2409D343000
|
trusted library allocation
|
page read and write
|
||
2409CB2D000
|
trusted library allocation
|
page read and write
|
||
2409DD7C000
|
trusted library allocation
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
B55A3FE000
|
stack
|
page read and write
|
||
2409B3F6000
|
trusted library allocation
|
page read and write
|
||
2409CB80000
|
trusted library allocation
|
page read and write
|
||
2409CB87000
|
trusted library allocation
|
page read and write
|
||
2409D084000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
2408F728000
|
heap
|
page read and write
|
||
B557958000
|
stack
|
page read and write
|
||
2409DBEE000
|
trusted library allocation
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
2071B400000
|
trusted library allocation
|
page read and write
|
||
24099DD7000
|
trusted library allocation
|
page read and write
|
||
2409D90B000
|
trusted library allocation
|
page read and write
|
||
2071B51E000
|
trusted library allocation
|
page read and write
|
||
2409D15B000
|
trusted library allocation
|
page read and write
|
||
18443900000
|
trusted library allocation
|
page read and write
|
||
2409D4C6000
|
trusted library allocation
|
page read and write
|
||
A8067FF000
|
stack
|
page read and write
|
||
24099181000
|
trusted library allocation
|
page read and write
|
||
18443580000
|
heap
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409F781000
|
trusted library allocation
|
page read and write
|
||
2409CC64000
|
trusted library allocation
|
page read and write
|
||
2409E590000
|
trusted library allocation
|
page read and write
|
||
2409F934000
|
trusted library allocation
|
page read and write
|
||
240A0C4E000
|
trusted library allocation
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
B81000
|
unkown
|
page execute read
|
||
2409CED3000
|
trusted library allocation
|
page read and write
|
||
2409CF48000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
A80DDBB000
|
stack
|
page read and write
|
||
2409FBC1000
|
trusted library allocation
|
page read and write
|
||
2409DE47000
|
trusted library allocation
|
page read and write
|
||
2409D174000
|
trusted library allocation
|
page read and write
|
||
2409D9BA000
|
trusted library allocation
|
page read and write
|
||
2409DAD3000
|
trusted library allocation
|
page read and write
|
||
2409DAC2000
|
trusted library allocation
|
page read and write
|
||
2409DD36000
|
trusted library allocation
|
page read and write
|
||
240A0D48000
|
trusted library allocation
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
24099167000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
240A0D42000
|
trusted library allocation
|
page read and write
|
||
2409CB98000
|
trusted library allocation
|
page read and write
|
||
24099D7E000
|
trusted library allocation
|
page read and write
|
||
18444569000
|
heap
|
page read and write
|
||
2409D3F6000
|
trusted library allocation
|
page read and write
|
||
2409D197000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D377000
|
trusted library allocation
|
page read and write
|
||
2409CED2000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2408F741000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
240A0A59000
|
trusted library allocation
|
page read and write
|
||
240A0A7C000
|
trusted library allocation
|
page read and write
|
||
2409FF44000
|
trusted library allocation
|
page read and write
|
||
240A001F000
|
trusted library allocation
|
page read and write
|
||
2408F74A000
|
heap
|
page read and write
|
||
24099187000
|
trusted library allocation
|
page read and write
|
||
2409D070000
|
trusted library allocation
|
page read and write
|
||
18443700000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2071B1AF000
|
unclassified section
|
page read and write
|
||
2409CC4C000
|
trusted library allocation
|
page read and write
|
||
2409DC4E000
|
trusted library allocation
|
page read and write
|
||
2409CB84000
|
trusted library allocation
|
page read and write
|
||
2409918E000
|
trusted library allocation
|
page read and write
|
||
A80DB7A000
|
stack
|
page read and write
|
||
2409F7BD000
|
trusted library allocation
|
page read and write
|
||
2409F940000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
2409D085000
|
trusted library allocation
|
page read and write
|
||
2409FFA4000
|
trusted library allocation
|
page read and write
|
||
2409DADA000
|
trusted library allocation
|
page read and write
|
||
1DFF000
|
stack
|
page read and write
|
||
2409DCF9000
|
trusted library allocation
|
page read and write
|
||
2409AA7C000
|
trusted library allocation
|
page read and write
|
||
2408F76F000
|
heap
|
page read and write
|
||
2409DF92000
|
trusted library allocation
|
page read and write
|
||
2409CFCA000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
2430003F000
|
trusted library allocation
|
page read and write
|
||
240A001F000
|
trusted library allocation
|
page read and write
|
||
2409D534000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
2409F957000
|
trusted library allocation
|
page read and write
|
||
240999FE000
|
trusted library allocation
|
page read and write
|
||
2409DD29000
|
trusted library allocation
|
page read and write
|
||
2409DC7E000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409D880000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
240A0097000
|
trusted library allocation
|
page read and write
|
||
2409DDC2000
|
trusted library allocation
|
page read and write
|
||
2409E5C7000
|
trusted library allocation
|
page read and write
|
||
2409E5D9000
|
trusted library allocation
|
page read and write
|
||
2409D05F000
|
trusted library allocation
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
2409CF43000
|
trusted library allocation
|
page read and write
|
||
2409CCCD000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2409FA29000
|
trusted library allocation
|
page read and write
|
||
2409D145000
|
trusted library allocation
|
page read and write
|
||
2409CE62000
|
trusted library allocation
|
page read and write
|
||
2409E553000
|
trusted library allocation
|
page read and write
|
||
240A0AB3000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
2409D564000
|
trusted library allocation
|
page read and write
|
||
240999F6000
|
trusted library allocation
|
page read and write
|
||
2408CB03000
|
trusted library allocation
|
page read and write
|
||
18443E88000
|
heap
|
page read and write
|
||
24099DEE000
|
trusted library allocation
|
page read and write
|
||
2409D373000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409B3F9000
|
trusted library allocation
|
page read and write
|
||
2409DAF4000
|
trusted library allocation
|
page read and write
|
||
240999F6000
|
trusted library allocation
|
page read and write
|
||
2409D9AD000
|
trusted library allocation
|
page read and write
|
||
213BF50A000
|
trusted library allocation
|
page read and write
|
||
2409AA66000
|
trusted library allocation
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
24099159000
|
trusted library allocation
|
page read and write
|
||
240A0CF6000
|
trusted library allocation
|
page read and write
|
||
2409D1BB000
|
trusted library allocation
|
page read and write
|
||
24099187000
|
trusted library allocation
|
page read and write
|
||
2408CB49000
|
trusted library allocation
|
page read and write
|
||
2409FFE1000
|
trusted library allocation
|
page read and write
|
||
2409FAA1000
|
trusted library allocation
|
page read and write
|
||
2071AF40000
|
unclassified section
|
page readonly
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
2409FA33000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
240A0B28000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
2409DC91000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
2409D319000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409DD32000
|
trusted library allocation
|
page read and write
|
||
2409DC3F000
|
trusted library allocation
|
page read and write
|
||
240991E1000
|
trusted library allocation
|
page read and write
|
||
2409B3F9000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409CCAE000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409DC51000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
2409CCA5000
|
trusted library allocation
|
page read and write
|
||
240991AE000
|
trusted library allocation
|
page read and write
|
||
213BF210000
|
heap
|
page read and write
|
||
2409D06C000
|
trusted library allocation
|
page read and write
|
||
2409D1C4000
|
trusted library allocation
|
page read and write
|
||
2409D329000
|
trusted library allocation
|
page read and write
|
||
24099DFD000
|
trusted library allocation
|
page read and write
|
||
2408F6E9000
|
heap
|
page read and write
|
||
240A0D10000
|
trusted library allocation
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
24099085000
|
trusted library allocation
|
page read and write
|
||
18444598000
|
heap
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
240993F0000
|
trusted library allocation
|
page read and write
|
||
2409E754000
|
trusted library allocation
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2409D186000
|
trusted library allocation
|
page read and write
|
||
2409DAFB000
|
trusted library allocation
|
page read and write
|
||
2409CCA5000
|
trusted library allocation
|
page read and write
|
||
2409FAC1000
|
trusted library allocation
|
page read and write
|
||
17EB96F2000
|
heap
|
page read and write
|
||
2409CE67000
|
trusted library allocation
|
page read and write
|
||
A80AB3F000
|
stack
|
page read and write
|
||
18444520000
|
heap
|
page read and write
|
||
2FC7DFF000
|
stack
|
page read and write
|
||
2409F7E0000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409DCC0000
|
trusted library allocation
|
page read and write
|
||
2408C7F0000
|
heap
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
24099DE7000
|
trusted library allocation
|
page read and write
|
||
2409D5F2000
|
trusted library allocation
|
page read and write
|
||
2409E763000
|
trusted library allocation
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
2409FF82000
|
trusted library allocation
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
2409D1C1000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
240A00E6000
|
trusted library allocation
|
page read and write
|
||
2409FBBC000
|
trusted library allocation
|
page read and write
|
||
2409D557000
|
trusted library allocation
|
page read and write
|
||
240A00A5000
|
trusted library allocation
|
page read and write
|
||
2409CF4C000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DCEF000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2409FFBA000
|
trusted library allocation
|
page read and write
|
||
2409FF38000
|
trusted library allocation
|
page read and write
|
||
18444528000
|
heap
|
page read and write
|
||
2409DD22000
|
trusted library allocation
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
2409D5D5000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
unkown
|
page write copy
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
2409F8B4000
|
trusted library allocation
|
page read and write
|
||
240A00F1000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2409E5C0000
|
trusted library allocation
|
page read and write
|
||
2409AA56000
|
trusted library allocation
|
page read and write
|
||
2409B327000
|
trusted library allocation
|
page read and write
|
||
2409DF45000
|
trusted library allocation
|
page read and write
|
||
17EB9620000
|
heap
|
page read and write
|
||
2409FF41000
|
trusted library allocation
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
24099DBA000
|
trusted library allocation
|
page read and write
|
||
2409F100000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409FBD4000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409FFC2000
|
trusted library allocation
|
page read and write
|
||
2409F950000
|
trusted library allocation
|
page read and write
|
||
A80C93E000
|
stack
|
page read and write
|
||
2409AD08000
|
trusted library allocation
|
page read and write
|
||
2409CFF3000
|
trusted library allocation
|
page read and write
|
||
1844456D000
|
heap
|
page read and write
|
||
A80DE3E000
|
stack
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409D5AE000
|
trusted library allocation
|
page read and write
|
||
2409FA3E000
|
trusted library allocation
|
page read and write
|
||
240993C7000
|
trusted library allocation
|
page read and write
|
||
2409CF8A000
|
trusted library allocation
|
page read and write
|
||
240A0C4C000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409EC21000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
184444A9000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2408F6C7000
|
heap
|
page read and write
|
||
240A0A8C000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2408F787000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
2409CFD3000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
240A0A53000
|
trusted library allocation
|
page read and write
|
||
2409F90C000
|
trusted library allocation
|
page read and write
|
||
2409DD20000
|
trusted library allocation
|
page read and write
|
||
24099DD9000
|
trusted library allocation
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
240993FD000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409D4ED000
|
trusted library allocation
|
page read and write
|
||
2409FF3C000
|
trusted library allocation
|
page read and write
|
||
184444F2000
|
heap
|
page read and write
|
||
2408C740000
|
unclassified section
|
page readonly
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409D3F3000
|
trusted library allocation
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
2409DCA5000
|
trusted library allocation
|
page read and write
|
||
2409DC51000
|
trusted library allocation
|
page read and write
|
||
2409D5EE000
|
trusted library allocation
|
page read and write
|
||
2409DF2B000
|
trusted library allocation
|
page read and write
|
||
2409AB08000
|
trusted library allocation
|
page read and write
|
||
2409B3D9000
|
trusted library allocation
|
page read and write
|
||
2409CE67000
|
trusted library allocation
|
page read and write
|
||
2409DCCE000
|
trusted library allocation
|
page read and write
|
||
2408CB00000
|
trusted library allocation
|
page read and write
|
||
2409CB8E000
|
trusted library allocation
|
page read and write
|
||
C42000
|
unkown
|
page readonly
|
||
2409B20A000
|
trusted library allocation
|
page read and write
|
||
2409CF43000
|
trusted library allocation
|
page read and write
|
||
2409CFF3000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409D1C4000
|
trusted library allocation
|
page read and write
|
||
2409CC11000
|
trusted library allocation
|
page read and write
|
||
240A0C48000
|
trusted library allocation
|
page read and write
|
||
2409CF5E000
|
trusted library allocation
|
page read and write
|
||
24099AE4000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
2409CFD3000
|
trusted library allocation
|
page read and write
|
||
2408CB5F000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409CB87000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
240993EC000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
2409FA30000
|
trusted library allocation
|
page read and write
|
||
240991E6000
|
trusted library allocation
|
page read and write
|
||
240990C4000
|
trusted library allocation
|
page read and write
|
||
240A0C7A000
|
trusted library allocation
|
page read and write
|
||
A804FD8000
|
stack
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409FBA7000
|
trusted library allocation
|
page read and write
|
||
3400FFE000
|
unkown
|
page readonly
|
||
2409D171000
|
trusted library allocation
|
page read and write
|
||
2409B342000
|
trusted library allocation
|
page read and write
|
||
2409D59E000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409AA86000
|
trusted library allocation
|
page read and write
|
||
2409F77B000
|
trusted library allocation
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
51CC000
|
stack
|
page read and write
|
||
2409FA68000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2408F73B000
|
heap
|
page read and write
|
||
240A0A8C000
|
trusted library allocation
|
page read and write
|
||
240A0A74000
|
trusted library allocation
|
page read and write
|
||
24099A26000
|
trusted library allocation
|
page read and write
|
||
2409E5DA000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409DC84000
|
trusted library allocation
|
page read and write
|
||
2409F771000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
2409D5B7000
|
trusted library allocation
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
184435CA000
|
heap
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
2409E11C000
|
trusted library allocation
|
page read and write
|
||
184439CD000
|
trusted library allocation
|
page read and write
|
||
2409CE58000
|
trusted library allocation
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
2409DFB9000
|
trusted library allocation
|
page read and write
|
||
2409F9EF000
|
trusted library allocation
|
page read and write
|
||
2409DE33000
|
trusted library allocation
|
page read and write
|
||
240A0CB3000
|
trusted library allocation
|
page read and write
|
||
2071B600000
|
heap
|
page read and write
|
||
2409D540000
|
trusted library allocation
|
page read and write
|
||
2409FF8F000
|
trusted library allocation
|
page read and write
|
||
24099052000
|
trusted library allocation
|
page read and write
|
||
24099A82000
|
trusted library allocation
|
page read and write
|
||
2409CC69000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240991DE000
|
trusted library allocation
|
page read and write
|
||
184444A9000
|
heap
|
page read and write
|
||
18444569000
|
heap
|
page read and write
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
2409E585000
|
trusted library allocation
|
page read and write
|
||
2409DF45000
|
trusted library allocation
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
240A0A78000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408E7D0000
|
heap
|
page read and write
|
||
240A0D4A000
|
trusted library allocation
|
page read and write
|
||
240A00C6000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
2409D936000
|
trusted library allocation
|
page read and write
|
||
240A0C52000
|
trusted library allocation
|
page read and write
|
||
2409CE67000
|
trusted library allocation
|
page read and write
|
||
2409F947000
|
trusted library allocation
|
page read and write
|
||
2409F95F000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409E773000
|
trusted library allocation
|
page read and write
|
||
2409D512000
|
trusted library allocation
|
page read and write
|
||
2409AA80000
|
trusted library allocation
|
page read and write
|
||
240A0AAC000
|
trusted library allocation
|
page read and write
|
||
A80D17C000
|
stack
|
page read and write
|
||
2409D5F2000
|
trusted library allocation
|
page read and write
|
||
24099D7E000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2409D1C4000
|
trusted library allocation
|
page read and write
|
||
A80DD7B000
|
stack
|
page read and write
|
||
2408C82A000
|
heap
|
page read and write
|
||
1844452E000
|
heap
|
page read and write
|
||
240993C6000
|
trusted library allocation
|
page read and write
|
||
2409D037000
|
trusted library allocation
|
page read and write
|
||
2409D061000
|
trusted library allocation
|
page read and write
|
||
2409CF43000
|
trusted library allocation
|
page read and write
|
||
1844453C000
|
heap
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2409DD32000
|
trusted library allocation
|
page read and write
|
||
2071B0D0000
|
heap
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
240A0D44000
|
trusted library allocation
|
page read and write
|
||
24099A13000
|
trusted library allocation
|
page read and write
|
||
240A0CBF000
|
trusted library allocation
|
page read and write
|
||
2409DAB2000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409FA33000
|
trusted library allocation
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
240A0017000
|
trusted library allocation
|
page read and write
|
||
24099056000
|
trusted library allocation
|
page read and write
|
||
2409F7F2000
|
trusted library allocation
|
page read and write
|
||
2409F421000
|
trusted library allocation
|
page read and write
|
||
240A0D44000
|
trusted library allocation
|
page read and write
|
||
2409CCBE000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409FB76000
|
trusted library allocation
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
240A0A5F000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409D5D6000
|
trusted library allocation
|
page read and write
|
||
18444561000
|
heap
|
page read and write
|
||
2409CBA6000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409D9C7000
|
trusted library allocation
|
page read and write
|
||
2409D9CB000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FA9A000
|
trusted library allocation
|
page read and write
|
||
2409D174000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
240A0095000
|
trusted library allocation
|
page read and write
|
||
2409D05D000
|
trusted library allocation
|
page read and write
|
||
2408F72D000
|
heap
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
2409D06C000
|
trusted library allocation
|
page read and write
|
||
2409FB83000
|
trusted library allocation
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409DCB5000
|
trusted library allocation
|
page read and write
|
||
2409CB22000
|
trusted library allocation
|
page read and write
|
||
240A0B52000
|
trusted library allocation
|
page read and write
|
||
2071B1A2000
|
unclassified section
|
page read and write
|
||
2409CB78000
|
trusted library allocation
|
page read and write
|
||
2409CE5B000
|
trusted library allocation
|
page read and write
|
||
2409CD38000
|
trusted library allocation
|
page read and write
|
||
240A0C50000
|
trusted library allocation
|
page read and write
|
||
2071B46E000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
240A0D4E000
|
trusted library allocation
|
page read and write
|
||
2409D16A000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
240A0A61000
|
trusted library allocation
|
page read and write
|
||
2409E565000
|
trusted library allocation
|
page read and write
|
||
24099A26000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2071B1B6000
|
heap
|
page read and write
|
||
2409E55E000
|
trusted library allocation
|
page read and write
|
||
A806635000
|
stack
|
page read and write
|
||
2409D1D4000
|
trusted library allocation
|
page read and write
|
||
2409D1B5000
|
trusted library allocation
|
page read and write
|
||
2409E5F2000
|
trusted library allocation
|
page read and write
|
||
240A0A63000
|
trusted library allocation
|
page read and write
|
||
2409DADA000
|
trusted library allocation
|
page read and write
|
||
2409DD3F000
|
trusted library allocation
|
page read and write
|
||
240A00ED000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
18443840000
|
heap
|
page read and write
|
||
18444528000
|
heap
|
page read and write
|
||
2409CB80000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D44E000
|
trusted library allocation
|
page read and write
|
||
2409CC3B000
|
trusted library allocation
|
page read and write
|
||
A80BF3D000
|
stack
|
page read and write
|
||
2409CEE4000
|
trusted library allocation
|
page read and write
|
||
2409FF8B000
|
trusted library allocation
|
page read and write
|
||
2409D074000
|
trusted library allocation
|
page read and write
|
||
2409D13B000
|
trusted library allocation
|
page read and write
|
||
2409D13B000
|
trusted library allocation
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
2409DE33000
|
trusted library allocation
|
page read and write
|
||
2409F9CC000
|
trusted library allocation
|
page read and write
|
||
2408F613000
|
heap
|
page read and write
|
||
240A0AB3000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
240A001A000
|
trusted library allocation
|
page read and write
|
||
2409EBC1000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2409DCC9000
|
trusted library allocation
|
page read and write
|
||
2409D1A4000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2409EB5F000
|
trusted library allocation
|
page read and write
|
||
2409F8FD000
|
trusted library allocation
|
page read and write
|
||
2409F8FD000
|
trusted library allocation
|
page read and write
|
||
2409D4C6000
|
trusted library allocation
|
page read and write
|
||
15FD000
|
stack
|
page read and write
|
||
2071B1B0000
|
heap
|
page read and write
|
||
240A003D000
|
trusted library allocation
|
page read and write
|
||
2409FAAB000
|
trusted library allocation
|
page read and write
|
||
2409D191000
|
trusted library allocation
|
page read and write
|
||
340307E000
|
unkown
|
page readonly
|
||
2409CF95000
|
trusted library allocation
|
page read and write
|
||
2409DFB9000
|
trusted library allocation
|
page read and write
|
||
2409DAFD000
|
trusted library allocation
|
page read and write
|
||
240991B6000
|
trusted library allocation
|
page read and write
|
||
2409CE58000
|
trusted library allocation
|
page read and write
|
||
563D000
|
stack
|
page read and write
|
||
2409D1EA000
|
trusted library allocation
|
page read and write
|
||
2409FA40000
|
trusted library allocation
|
page read and write
|
||
2409FB92000
|
trusted library allocation
|
page read and write
|
||
2409CBE8000
|
trusted library allocation
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
2409E5CB000
|
trusted library allocation
|
page read and write
|
||
2409CB80000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2409D9F7000
|
trusted library allocation
|
page read and write
|
||
2409CC9C000
|
trusted library allocation
|
page read and write
|
||
A8045CD000
|
stack
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240A0DC6000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
24099DA1000
|
trusted library allocation
|
page read and write
|
||
184444E1000
|
heap
|
page read and write
|
||
1844392F000
|
trusted library allocation
|
page read and write
|
||
24099D63000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409CFD3000
|
trusted library allocation
|
page read and write
|
||
2409FA70000
|
trusted library allocation
|
page read and write
|
||
240A0A74000
|
trusted library allocation
|
page read and write
|
||
2409D936000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2409D365000
|
trusted library allocation
|
page read and write
|
||
2409B34D000
|
trusted library allocation
|
page read and write
|
||
2409F7BD000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409FFCA000
|
trusted library allocation
|
page read and write
|
||
2408F5F0000
|
heap
|
page read and write
|
||
2408F73A000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CC62000
|
trusted library allocation
|
page read and write
|
||
2409FBCA000
|
trusted library allocation
|
page read and write
|
||
2409DFFC000
|
trusted library allocation
|
page read and write
|
||
2409DCCE000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240A0CEC000
|
trusted library allocation
|
page read and write
|
||
2409FF41000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
2409D40D000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409FBFC000
|
trusted library allocation
|
page read and write
|
||
2408F72D000
|
heap
|
page read and write
|
||
B55789D000
|
stack
|
page read and write
|
||
1844452E000
|
heap
|
page read and write
|
||
2409CF2F000
|
trusted library allocation
|
page read and write
|
||
2409DD8E000
|
trusted library allocation
|
page read and write
|
||
2071B140000
|
heap
|
page read and write
|
||
2409E5D8000
|
trusted library allocation
|
page read and write
|
||
2409D873000
|
trusted library allocation
|
page read and write
|
||
240A0D06000
|
trusted library allocation
|
page read and write
|
||
2409D9C0000
|
trusted library allocation
|
page read and write
|
||
2409F947000
|
trusted library allocation
|
page read and write
|
||
2408CB0E000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
213BF1B0000
|
heap
|
page read and write
|
||
24099DB7000
|
trusted library allocation
|
page read and write
|
||
18444585000
|
heap
|
page read and write
|
||
18443E60000
|
heap
|
page read and write
|
||
18444532000
|
heap
|
page read and write
|
||
240991E1000
|
trusted library allocation
|
page read and write
|
||
24099976000
|
trusted library allocation
|
page read and write
|
||
2409DAA0000
|
trusted library allocation
|
page read and write
|
||
2409FB9D000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409DC5B000
|
trusted library allocation
|
page read and write
|
||
2409FF4B000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409CC4A000
|
trusted library allocation
|
page read and write
|
||
24099DA1000
|
trusted library allocation
|
page read and write
|
||
240A0D48000
|
trusted library allocation
|
page read and write
|
||
A80B93D000
|
stack
|
page read and write
|
||
240A0A8E000
|
trusted library allocation
|
page read and write
|
||
2409D550000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DC51000
|
trusted library allocation
|
page read and write
|
||
240A0AFA000
|
trusted library allocation
|
page read and write
|
||
2409F940000
|
trusted library allocation
|
page read and write
|
||
2409CEC7000
|
trusted library allocation
|
page read and write
|
||
2409F957000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
240A0D21000
|
trusted library allocation
|
page read and write
|
||
2409DD19000
|
trusted library allocation
|
page read and write
|
||
2409D5B8000
|
trusted library allocation
|
page read and write
|
||
240A0D46000
|
trusted library allocation
|
page read and write
|
||
2409E7F8000
|
trusted library allocation
|
page read and write
|
||
2409D940000
|
trusted library allocation
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
240A0C50000
|
trusted library allocation
|
page read and write
|
||
2409D1E3000
|
trusted library allocation
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409FFBC000
|
trusted library allocation
|
page read and write
|
||
2409CC98000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
24099157000
|
trusted library allocation
|
page read and write
|
||
2409AE09000
|
trusted library allocation
|
page read and write
|
||
2409CC75000
|
trusted library allocation
|
page read and write
|
||
240A0A5D000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
24099061000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
A80F70E000
|
stack
|
page read and write
|
||
347ED8E000
|
stack
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2409D527000
|
trusted library allocation
|
page read and write
|
||
2409CDA6000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
184444F9000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
240A0B55000
|
trusted library allocation
|
page read and write
|
||
240A0D16000
|
trusted library allocation
|
page read and write
|
||
2409FAC4000
|
trusted library allocation
|
page read and write
|
||
240A0B4A000
|
trusted library allocation
|
page read and write
|
||
2409E5D2000
|
trusted library allocation
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
2409DCC9000
|
trusted library allocation
|
page read and write
|
||
2409DD36000
|
trusted library allocation
|
page read and write
|
||
240A0B8E000
|
trusted library allocation
|
page read and write
|
||
2409CC9C000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
240A0069000
|
trusted library allocation
|
page read and write
|
||
2409D36C000
|
trusted library allocation
|
page read and write
|
||
2409E5F2000
|
trusted library allocation
|
page read and write
|
||
347ECCE000
|
unkown
|
page readonly
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F76C000
|
heap
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
184444A9000
|
heap
|
page read and write
|
||
2409CBAB000
|
trusted library allocation
|
page read and write
|
||
240990A4000
|
trusted library allocation
|
page read and write
|
||
240A0A78000
|
trusted library allocation
|
page read and write
|
||
2409FF38000
|
trusted library allocation
|
page read and write
|
||
2409CF8F000
|
trusted library allocation
|
page read and write
|
||
240A0A88000
|
trusted library allocation
|
page read and write
|
||
240A004F000
|
trusted library allocation
|
page read and write
|
||
2408F738000
|
heap
|
page read and write
|
||
2409F728000
|
trusted library allocation
|
page read and write
|
||
18443F88000
|
unkown
|
page execute read
|
||
2071AFF0000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240990CA000
|
trusted library allocation
|
page read and write
|
||
2409FF8B000
|
trusted library allocation
|
page read and write
|
||
2409CBA1000
|
trusted library allocation
|
page read and write
|
||
2409F98F000
|
trusted library allocation
|
page read and write
|
||
2409D44F000
|
trusted library allocation
|
page read and write
|
||
24099DD9000
|
trusted library allocation
|
page read and write
|
||
240A0AB3000
|
trusted library allocation
|
page read and write
|
||
2409B3F6000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
240A0A78000
|
trusted library allocation
|
page read and write
|
||
24099090000
|
trusted library allocation
|
page read and write
|
||
2409CC1B000
|
trusted library allocation
|
page read and write
|
||
2409E5DD000
|
trusted library allocation
|
page read and write
|
||
2071B4AA000
|
trusted library allocation
|
page read and write
|
||
2409AA9C000
|
trusted library allocation
|
page read and write
|
||
240A0B20000
|
trusted library allocation
|
page read and write
|
||
240991E1000
|
trusted library allocation
|
page read and write
|
||
240A0A82000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409D56B000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409DDB6000
|
trusted library allocation
|
page read and write
|
||
240A00D3000
|
trusted library allocation
|
page read and write
|
||
2409D3F9000
|
trusted library allocation
|
page read and write
|
||
240A0AE6000
|
trusted library allocation
|
page read and write
|
||
24099098000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409D1CC000
|
trusted library allocation
|
page read and write
|
||
2409D1DB000
|
trusted library allocation
|
page read and write
|
||
2409CC9C000
|
trusted library allocation
|
page read and write
|
||
2071B50C000
|
trusted library allocation
|
page read and write
|
||
2071B500000
|
trusted library allocation
|
page read and write
|
||
2409D139000
|
trusted library allocation
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
2409B340000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409AA68000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2409CFB1000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
240A0BC2000
|
trusted library allocation
|
page read and write
|
||
B55795B000
|
stack
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409E6E0000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409CE73000
|
trusted library allocation
|
page read and write
|
||
2409CDD0000
|
trusted library allocation
|
page read and write
|
||
2409D8CB000
|
trusted library allocation
|
page read and write
|
||
2408F74D000
|
heap
|
page read and write
|
||
2409FF8F000
|
trusted library allocation
|
page read and write
|
||
2409DBF2000
|
trusted library allocation
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
24099A8C000
|
trusted library allocation
|
page read and write
|
||
2409CFD3000
|
trusted library allocation
|
page read and write
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
240A00D9000
|
trusted library allocation
|
page read and write
|
||
24099A80000
|
trusted library allocation
|
page read and write
|
||
2409D5DC000
|
trusted library allocation
|
page read and write
|
||
2409F96E000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409D35E000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
240A0AB3000
|
trusted library allocation
|
page read and write
|
||
2409D1E6000
|
trusted library allocation
|
page read and write
|
||
18443914000
|
trusted library allocation
|
page read and write
|
||
2409D08B000
|
trusted library allocation
|
page read and write
|
||
18444531000
|
heap
|
page read and write
|
||
240993C6000
|
trusted library allocation
|
page read and write
|
||
2071B47B000
|
trusted library allocation
|
page read and write
|
||
2409FA61000
|
trusted library allocation
|
page read and write
|
||
2409CBE0000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CF59000
|
trusted library allocation
|
page read and write
|
||
2409D5F8000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2409F8CF000
|
trusted library allocation
|
page read and write
|
||
2409D90B000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
240A0D50000
|
trusted library allocation
|
page read and write
|
||
2409DFB7000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
C1C000
|
unkown
|
page readonly
|
||
2409CBD0000
|
trusted library allocation
|
page read and write
|
||
2409B3F0000
|
trusted library allocation
|
page read and write
|
||
2071B403000
|
trusted library allocation
|
page read and write
|
||
2409CF97000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
A8071FE000
|
stack
|
page read and write
|
||
2409CC18000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
240993C6000
|
trusted library allocation
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
24099DF5000
|
trusted library allocation
|
page read and write
|
||
2409FA27000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409F9EF000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409DACF000
|
trusted library allocation
|
page read and write
|
||
2409FA05000
|
trusted library allocation
|
page read and write
|
||
2409D4D7000
|
trusted library allocation
|
page read and write
|
||
A80933D000
|
stack
|
page read and write
|
||
A80A33E000
|
stack
|
page read and write
|
||
240A0ABD000
|
trusted library allocation
|
page read and write
|
||
2408F739000
|
heap
|
page read and write
|
||
2409CF63000
|
trusted library allocation
|
page read and write
|
||
2409DD83000
|
trusted library allocation
|
page read and write
|
||
2409992F000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409D1ED000
|
trusted library allocation
|
page read and write
|
||
2408C750000
|
unclassified section
|
page readonly
|
||
2409CB1D000
|
trusted library allocation
|
page read and write
|
||
2409D1AB000
|
trusted library allocation
|
page read and write
|
||
2409D174000
|
trusted library allocation
|
page read and write
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409D1CC000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DADE000
|
trusted library allocation
|
page read and write
|
||
2409FA32000
|
trusted library allocation
|
page read and write
|
||
2409E824000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
240A0A82000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
240991E6000
|
trusted library allocation
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
240A0A70000
|
trusted library allocation
|
page read and write
|
||
2409CCA5000
|
trusted library allocation
|
page read and write
|
||
2409EC08000
|
trusted library allocation
|
page read and write
|
||
2409D59A000
|
trusted library allocation
|
page read and write
|
||
2409D184000
|
trusted library allocation
|
page read and write
|
||
184444CA000
|
heap
|
page read and write
|
||
240990CD000
|
trusted library allocation
|
page read and write
|
||
24099D86000
|
trusted library allocation
|
page read and write
|
||
2409D9CB000
|
trusted library allocation
|
page read and write
|
||
240A0D4A000
|
trusted library allocation
|
page read and write
|
||
2409D354000
|
trusted library allocation
|
page read and write
|
||
240A0B84000
|
trusted library allocation
|
page read and write
|
||
240991B6000
|
trusted library allocation
|
page read and write
|
||
2409D5DE000
|
trusted library allocation
|
page read and write
|
||
3411DFF000
|
stack
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
1844452E000
|
heap
|
page read and write
|
||
2409B387000
|
trusted library allocation
|
page read and write
|
||
240A0024000
|
trusted library allocation
|
page read and write
|
||
2409D1AB000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409B3E8000
|
trusted library allocation
|
page read and write
|
||
2409DBF2000
|
trusted library allocation
|
page read and write
|
||
240A0CF5000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
24099D63000
|
trusted library allocation
|
page read and write
|
||
A8045FE000
|
stack
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409DC9D000
|
trusted library allocation
|
page read and write
|
||
2409D1E8000
|
trusted library allocation
|
page read and write
|
||
18444531000
|
heap
|
page read and write
|
||
2409D5F9000
|
trusted library allocation
|
page read and write
|
||
2408F738000
|
heap
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
24099AA0000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409CF88000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409B332000
|
trusted library allocation
|
page read and write
|
||
2409FBA2000
|
trusted library allocation
|
page read and write
|
||
2409E6EA000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409D069000
|
trusted library allocation
|
page read and write
|
||
2408C980000
|
heap
|
page readonly
|
||
240A00CF000
|
trusted library allocation
|
page read and write
|
||
2409FAE3000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D92B000
|
trusted library allocation
|
page read and write
|
||
2409FBD4000
|
trusted library allocation
|
page read and write
|
||
24099D9F000
|
trusted library allocation
|
page read and write
|
||
2409D873000
|
trusted library allocation
|
page read and write
|
||
2409D16E000
|
trusted library allocation
|
page read and write
|
||
2409AA8A000
|
trusted library allocation
|
page read and write
|
||
2409D5D6000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
A808B0E000
|
stack
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
240993F0000
|
trusted library allocation
|
page read and write
|
||
2409CF5E000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DF23000
|
trusted library allocation
|
page read and write
|
||
240A0D90000
|
trusted library allocation
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
2409D5D4000
|
trusted library allocation
|
page read and write
|
||
240A0CBD000
|
trusted library allocation
|
page read and write
|
||
2409DFE8000
|
trusted library allocation
|
page read and write
|
||
2409E547000
|
trusted library allocation
|
page read and write
|
||
2409DABF000
|
trusted library allocation
|
page read and write
|
||
240A0ADF000
|
trusted library allocation
|
page read and write
|
||
A80DDFE000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2409CEE7000
|
trusted library allocation
|
page read and write
|
||
2409B3F0000
|
trusted library allocation
|
page read and write
|
||
2409F7B7000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
240A0CE6000
|
trusted library allocation
|
page read and write
|
||
2409CCB8000
|
trusted library allocation
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
240A0CBD000
|
trusted library allocation
|
page read and write
|
||
2409B3B4000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2409CB78000
|
trusted library allocation
|
page read and write
|
||
2409D392000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
2409AA86000
|
trusted library allocation
|
page read and write
|
||
2409AA6F000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
240A0D06000
|
trusted library allocation
|
page read and write
|
||
2409FA6D000
|
trusted library allocation
|
page read and write
|
||
24099098000
|
trusted library allocation
|
page read and write
|
||
2409CB7B000
|
trusted library allocation
|
page read and write
|
||
2409D1A9000
|
trusted library allocation
|
page read and write
|
||
2409D53D000
|
trusted library allocation
|
page read and write
|
||
2409E800000
|
trusted library allocation
|
page read and write
|
||
2409CB2D000
|
trusted library allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
2409DAC3000
|
trusted library allocation
|
page read and write
|
||
240A00FE000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
18443948000
|
trusted library allocation
|
page read and write
|
||
2409D5F2000
|
trusted library allocation
|
page read and write
|
||
240990DB000
|
trusted library allocation
|
page read and write
|
||
2071AF50000
|
unclassified section
|
page readonly
|
||
240A0C85000
|
trusted library allocation
|
page read and write
|
||
240993E1000
|
trusted library allocation
|
page read and write
|
||
2409E585000
|
trusted library allocation
|
page read and write
|
||
2409EB08000
|
trusted library allocation
|
page read and write
|
||
24099181000
|
trusted library allocation
|
page read and write
|
||
240990B4000
|
trusted library allocation
|
page read and write
|
||
2409CB1D000
|
trusted library allocation
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
2071B53D000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240A0BC2000
|
trusted library allocation
|
page read and write
|
||
240A0095000
|
trusted library allocation
|
page read and write
|
||
2409FF5C000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409CE67000
|
trusted library allocation
|
page read and write
|
||
3410DFC000
|
stack
|
page read and write
|
||
2409F9B8000
|
trusted library allocation
|
page read and write
|
||
2409DD24000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
24099DEE000
|
trusted library allocation
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2409D9AD000
|
trusted library allocation
|
page read and write
|
||
2409DDFD000
|
trusted library allocation
|
page read and write
|
||
240A0D21000
|
trusted library allocation
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
2409B3F0000
|
trusted library allocation
|
page read and write
|
||
1844457C000
|
heap
|
page read and write
|
||
240A0A5F000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2408F725000
|
heap
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
2409DACF000
|
trusted library allocation
|
page read and write
|
||
18443994000
|
trusted library allocation
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
CAD000
|
stack
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409DA9B000
|
trusted library allocation
|
page read and write
|
||
2409F98F000
|
trusted library allocation
|
page read and write
|
||
2409E565000
|
trusted library allocation
|
page read and write
|
||
2409DFD4000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CC3B000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D1DB000
|
trusted library allocation
|
page read and write
|
||
2409FA40000
|
trusted library allocation
|
page read and write
|
||
A8066FD000
|
stack
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
240A0A6C000
|
trusted library allocation
|
page read and write
|
||
2409E5DA000
|
trusted library allocation
|
page read and write
|
||
2409DC22000
|
trusted library allocation
|
page read and write
|
||
2408F778000
|
heap
|
page read and write
|
||
2409B008000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409CBEA000
|
trusted library allocation
|
page read and write
|
||
240A0AA8000
|
trusted library allocation
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409FA13000
|
trusted library allocation
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
24099DD7000
|
trusted library allocation
|
page read and write
|
||
2409DCA5000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409FBAF000
|
trusted library allocation
|
page read and write
|
||
24099081000
|
trusted library allocation
|
page read and write
|
||
B5578DE000
|
unkown
|
page readonly
|
||
2408F768000
|
heap
|
page read and write
|
||
24099971000
|
trusted library allocation
|
page read and write
|
||
240A0CBF000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409CB22000
|
trusted library allocation
|
page read and write
|
||
3F40000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409918A000
|
trusted library allocation
|
page read and write
|
||
17EB9A65000
|
heap
|
page read and write
|
||
2409FB9D000
|
trusted library allocation
|
page read and write
|
||
2409DAF4000
|
trusted library allocation
|
page read and write
|
||
2409D1B5000
|
trusted library allocation
|
page read and write
|
||
2409D5C4000
|
trusted library allocation
|
page read and write
|
||
240990BF000
|
trusted library allocation
|
page read and write
|
||
2409F9EF000
|
trusted library allocation
|
page read and write
|
||
2409DBE1000
|
trusted library allocation
|
page read and write
|
||
A8057FE000
|
stack
|
page read and write
|
||
2409F9C7000
|
trusted library allocation
|
page read and write
|
||
2409CB10000
|
trusted library allocation
|
page read and write
|
||
2409CF53000
|
trusted library allocation
|
page read and write
|
||
2409DAF4000
|
trusted library allocation
|
page read and write
|
||
17EB9800000
|
trusted library allocation
|
page read and write
|
||
2409DCC0000
|
trusted library allocation
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
240A0B76000
|
trusted library allocation
|
page read and write
|
||
184444A0000
|
heap
|
page read and write
|
||
C54000
|
unkown
|
page readonly
|
||
2409E589000
|
trusted library allocation
|
page read and write
|
||
2409D5F2000
|
trusted library allocation
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
2409AF0A000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
347ED0C000
|
stack
|
page read and write
|
||
2409CFD3000
|
trusted library allocation
|
page read and write
|
||
2409F8B4000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
240A0C4A000
|
trusted library allocation
|
page read and write
|
||
24099D9F000
|
trusted library allocation
|
page read and write
|
||
2409CCB8000
|
trusted library allocation
|
page read and write
|
||
240A0A41000
|
trusted library allocation
|
page read and write
|
||
2409918A000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
2409DCD0000
|
trusted library allocation
|
page read and write
|
||
2409CB98000
|
trusted library allocation
|
page read and write
|
||
17EB96DA000
|
heap
|
page read and write
|
||
2409DC84000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
240A0B4A000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
24099AE4000
|
trusted library allocation
|
page read and write
|
||
240A0CEC000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DF2B000
|
trusted library allocation
|
page read and write
|
||
2409D37F000
|
trusted library allocation
|
page read and write
|
||
2409FA77000
|
trusted library allocation
|
page read and write
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
2409DD20000
|
trusted library allocation
|
page read and write
|
||
2409B3F6000
|
trusted library allocation
|
page read and write
|
||
2409CC6F000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409CC78000
|
trusted library allocation
|
page read and write
|
||
2071AFB0000
|
remote allocation
|
page read and write
|
||
2409F7B7000
|
trusted library allocation
|
page read and write
|
||
2409DCF9000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
1844453C000
|
heap
|
page read and write
|
||
24099183000
|
trusted library allocation
|
page read and write
|
||
24099088000
|
trusted library allocation
|
page read and write
|
||
2409DCD0000
|
trusted library allocation
|
page read and write
|
||
1844452E000
|
heap
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
24099DB7000
|
trusted library allocation
|
page read and write
|
||
2409D1FE000
|
trusted library allocation
|
page read and write
|
||
2409F421000
|
trusted library allocation
|
page read and write
|
||
2409D5B8000
|
trusted library allocation
|
page read and write
|
||
2409FAAB000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
240A0CB5000
|
trusted library allocation
|
page read and write
|
||
18444531000
|
heap
|
page read and write
|
||
2409E5E8000
|
trusted library allocation
|
page read and write
|
||
2409DAD3000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
240A0A70000
|
trusted library allocation
|
page read and write
|
||
2409907D000
|
trusted library allocation
|
page read and write
|
||
2408F72D000
|
heap
|
page read and write
|
||
18443999000
|
trusted library allocation
|
page read and write
|
||
2409FFF9000
|
trusted library allocation
|
page read and write
|
||
2408F74A000
|
heap
|
page read and write
|
||
2409FB87000
|
trusted library allocation
|
page read and write
|
||
240A0CBB000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
240990EF000
|
trusted library allocation
|
page read and write
|
||
2409D59A000
|
trusted library allocation
|
page read and write
|
||
2409E5C0000
|
trusted library allocation
|
page read and write
|
||
2409E120000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409DD7C000
|
trusted library allocation
|
page read and write
|
||
2409D9F4000
|
trusted library allocation
|
page read and write
|
||
2409FAC2000
|
trusted library allocation
|
page read and write
|
||
24099DD7000
|
trusted library allocation
|
page read and write
|
||
2409D8CB000
|
trusted library allocation
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
18444000000
|
trusted library allocation
|
page read and write
|
||
2409FFF9000
|
trusted library allocation
|
page read and write
|
||
240A0A8C000
|
trusted library allocation
|
page read and write
|
||
240A0A8E000
|
trusted library allocation
|
page read and write
|
||
2409CF09000
|
trusted library allocation
|
page read and write
|
||
2409CCF0000
|
trusted library allocation
|
page read and write
|
||
2409D399000
|
trusted library allocation
|
page read and write
|
||
2409DDDE000
|
trusted library allocation
|
page read and write
|
||
24099A1E000
|
trusted library allocation
|
page read and write
|
||
2071B42E000
|
trusted library allocation
|
page read and write
|
||
2409AA9A000
|
trusted library allocation
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
2409D597000
|
trusted library allocation
|
page read and write
|
||
240A00DF000
|
trusted library allocation
|
page read and write
|
||
4DCB000
|
stack
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409CF43000
|
trusted library allocation
|
page read and write
|
||
2409DFA8000
|
trusted library allocation
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
2409907A000
|
trusted library allocation
|
page read and write
|
||
2408F77A000
|
heap
|
page read and write
|
||
2409DD3A000
|
trusted library allocation
|
page read and write
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
2409FBF5000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409DC6B000
|
trusted library allocation
|
page read and write
|
||
2409DD3A000
|
trusted library allocation
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
240A0024000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
2409D158000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409AAB1000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
2409CB4B000
|
trusted library allocation
|
page read and write
|
||
2409D4D7000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
240A0B8C000
|
trusted library allocation
|
page read and write
|
||
213BF190000
|
heap
|
page read and write
|
||
2409DAF4000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
240A0AAC000
|
trusted library allocation
|
page read and write
|
||
279BA05000
|
trusted library allocation
|
page read and write
|
||
18444520000
|
heap
|
page read and write
|
||
2409CEE7000
|
trusted library allocation
|
page read and write
|
||
24099157000
|
trusted library allocation
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
240A0C56000
|
trusted library allocation
|
page read and write
|
||
18443F70000
|
trusted library allocation
|
page read and write
|
||
18444531000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409F8C0000
|
trusted library allocation
|
page read and write
|
||
2409FAA1000
|
trusted library allocation
|
page read and write
|
||
24099DBA000
|
trusted library allocation
|
page read and write
|
||
2408F778000
|
heap
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
184438F0000
|
trusted library allocation
|
page read and write
|
||
240A0ADF000
|
trusted library allocation
|
page read and write
|
||
17EB96F8000
|
heap
|
page read and write
|
||
2409D5ED000
|
trusted library allocation
|
page read and write
|
||
2409DDFD000
|
trusted library allocation
|
page read and write
|
||
240A0B1B000
|
trusted library allocation
|
page read and write
|
||
240A0AD1000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DD7E000
|
trusted library allocation
|
page read and write
|
||
2408F76C000
|
heap
|
page read and write
|
||
240A0AAC000
|
trusted library allocation
|
page read and write
|
||
2409CCE6000
|
trusted library allocation
|
page read and write
|
||
2409CC3B000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FAEB000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409FFBA000
|
trusted library allocation
|
page read and write
|
||
2408F6D4000
|
heap
|
page read and write
|
||
2409DAD0000
|
trusted library allocation
|
page read and write
|
||
2408F787000
|
heap
|
page read and write
|
||
240993D8000
|
trusted library allocation
|
page read and write
|
||
184444A3000
|
heap
|
page read and write
|
||
2409DD1A000
|
trusted library allocation
|
page read and write
|
||
2409DF61000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CC1F000
|
trusted library allocation
|
page read and write
|
||
2409D540000
|
trusted library allocation
|
page read and write
|
||
2409DFE8000
|
trusted library allocation
|
page read and write
|
||
2409DDC2000
|
trusted library allocation
|
page read and write
|
||
240A0CC1000
|
trusted library allocation
|
page read and write
|
||
2409E58E000
|
trusted library allocation
|
page read and write
|
||
2409FA11000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
240A0C54000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409F947000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
240991DE000
|
trusted library allocation
|
page read and write
|
||
240A0A8E000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
184444F9000
|
heap
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
2408F75B000
|
heap
|
page read and write
|
||
2409D593000
|
trusted library allocation
|
page read and write
|
||
2409FFF7000
|
trusted library allocation
|
page read and write
|
||
2409CB04000
|
trusted library allocation
|
page read and write
|
||
A80677C000
|
stack
|
page read and write
|
||
2409CC1F000
|
trusted library allocation
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
2409D186000
|
trusted library allocation
|
page read and write
|
||
2409D5D4000
|
trusted library allocation
|
page read and write
|
||
2409DD2B000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
2408F763000
|
heap
|
page read and write
|
||
B5593FE000
|
stack
|
page read and write
|
||
2409DBEE000
|
trusted library allocation
|
page read and write
|
||
2408F76E000
|
heap
|
page read and write
|
||
2409D063000
|
trusted library allocation
|
page read and write
|
||
240A0CC1000
|
trusted library allocation
|
page read and write
|
||
2409F8FD000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2409D05E000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240A0081000
|
trusted library allocation
|
page read and write
|
||
2409D323000
|
trusted library allocation
|
page read and write
|
||
2409D1ED000
|
trusted library allocation
|
page read and write
|
||
347ED4E000
|
unkown
|
page readonly
|
||
2409D158000
|
trusted library allocation
|
page read and write
|
||
2409E565000
|
trusted library allocation
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
213BF219000
|
heap
|
page read and write
|
||
2408CB69000
|
trusted library allocation
|
page read and write
|
||
2409D377000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409D1C1000
|
trusted library allocation
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409DDE1000
|
trusted library allocation
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D450000
|
trusted library allocation
|
page read and write
|
||
24099AB0000
|
trusted library allocation
|
page read and write
|
||
2409F957000
|
trusted library allocation
|
page read and write
|
||
2409FBA5000
|
trusted library allocation
|
page read and write
|
||
2409AA9A000
|
trusted library allocation
|
page read and write
|
||
240A0B55000
|
trusted library allocation
|
page read and write
|
||
2409B3F9000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409B32C000
|
trusted library allocation
|
page read and write
|
||
2409D5E1000
|
trusted library allocation
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
1844453C000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
2409CB10000
|
trusted library allocation
|
page read and write
|
||
2409D069000
|
trusted library allocation
|
page read and write
|
||
17EB9640000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
2409DC7E000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409FA0B000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2071B423000
|
trusted library allocation
|
page read and write
|
||
240A0A74000
|
trusted library allocation
|
page read and write
|
||
2409AAAB000
|
trusted library allocation
|
page read and write
|
||
2409FBCA000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2409FF8B000
|
trusted library allocation
|
page read and write
|
||
184444E8000
|
heap
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2409DFA2000
|
trusted library allocation
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
2409AAC3000
|
trusted library allocation
|
page read and write
|
||
2409E546000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409FA58000
|
trusted library allocation
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
240A0AB8000
|
trusted library allocation
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
240A0A63000
|
trusted library allocation
|
page read and write
|
||
2409B3E6000
|
trusted library allocation
|
page read and write
|
||
24099B00000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
2409DDF5000
|
trusted library allocation
|
page read and write
|
||
2409F9BD000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409DA72000
|
trusted library allocation
|
page read and write
|
||
240A0AAC000
|
trusted library allocation
|
page read and write
|
||
A806236000
|
stack
|
page read and write
|
||
240991E2000
|
trusted library allocation
|
page read and write
|
||
17EBB2DF000
|
heap
|
page read and write
|
||
2409D3B4000
|
trusted library allocation
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
2409D365000
|
trusted library allocation
|
page read and write
|
||
2409F728000
|
trusted library allocation
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
2409FF9A000
|
trusted library allocation
|
page read and write
|
||
2409CF63000
|
trusted library allocation
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
2409D5D9000
|
trusted library allocation
|
page read and write
|
||
2409DD97000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409CD3F000
|
trusted library allocation
|
page read and write
|
||
240A00E6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409DD2B000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
2409DFA5000
|
trusted library allocation
|
page read and write
|
||
213BF3C0000
|
heap
|
page read and write
|
||
17EBB2E7000
|
heap
|
page read and write
|
||
2409DC9D000
|
trusted library allocation
|
page read and write
|
||
2409D18B000
|
trusted library allocation
|
page read and write
|
||
2409F950000
|
trusted library allocation
|
page read and write
|
||
2409FAA1000
|
trusted library allocation
|
page read and write
|
||
2409EBD7000
|
trusted library allocation
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
2409AAF2000
|
trusted library allocation
|
page read and write
|
||
2409AA9C000
|
trusted library allocation
|
page read and write
|
||
A80F78B000
|
stack
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
24099DEE000
|
trusted library allocation
|
page read and write
|
||
240A0AD1000
|
trusted library allocation
|
page read and write
|
||
2409F9A3000
|
trusted library allocation
|
page read and write
|
||
2409DFE5000
|
trusted library allocation
|
page read and write
|
||
2409DE95000
|
trusted library allocation
|
page read and write
|
||
2409AABD000
|
trusted library allocation
|
page read and write
|
||
2409FFDA000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
2409FA9A000
|
trusted library allocation
|
page read and write
|
||
2409D9C0000
|
trusted library allocation
|
page read and write
|
||
A808AFE000
|
stack
|
page read and write
|
||
2409D084000
|
trusted library allocation
|
page read and write
|
||
2409F781000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409DC25000
|
trusted library allocation
|
page read and write
|
||
2409D19F000
|
trusted library allocation
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
24099DD9000
|
trusted library allocation
|
page read and write
|
||
18444008000
|
trusted library allocation
|
page read and write
|
||
18444526000
|
heap
|
page read and write
|
||
2409FA48000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409CC25000
|
trusted library allocation
|
page read and write
|
||
2409CB8E000
|
trusted library allocation
|
page read and write
|
||
2408C9F0000
|
trusted library allocation
|
page execute read
|
||
2409FA48000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2409CF39000
|
trusted library allocation
|
page read and write
|
||
24099DA1000
|
trusted library allocation
|
page read and write
|
||
2409D1ED000
|
trusted library allocation
|
page read and write
|
||
A8045DF000
|
stack
|
page read and write
|
||
2409B3DD000
|
trusted library allocation
|
page read and write
|
||
184444AC000
|
heap
|
page read and write
|
||
2409DD1D000
|
trusted library allocation
|
page read and write
|
||
240A0A70000
|
trusted library allocation
|
page read and write
|
||
2FC4DFF000
|
stack
|
page read and write
|
||
240A0AA8000
|
trusted library allocation
|
page read and write
|
||
2409DD8B000
|
trusted library allocation
|
page read and write
|
||
240A0A74000
|
trusted library allocation
|
page read and write
|
||
240991E6000
|
trusted library allocation
|
page read and write
|
||
24099183000
|
trusted library allocation
|
page read and write
|
||
240A0ABD000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2071B463000
|
trusted library allocation
|
page read and write
|
||
184444AC000
|
heap
|
page read and write
|
||
2409E56A000
|
trusted library allocation
|
page read and write
|
||
2409D51E000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2409E76E000
|
trusted library allocation
|
page read and write
|
||
240990EF000
|
trusted library allocation
|
page read and write
|
||
2409FF8F000
|
trusted library allocation
|
page read and write
|
||
240A0A88000
|
trusted library allocation
|
page read and write
|
||
2409D5DD000
|
trusted library allocation
|
page read and write
|
||
2409DFFC000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
240A0C85000
|
trusted library allocation
|
page read and write
|
||
2409FF53000
|
trusted library allocation
|
page read and write
|
||
1844449F000
|
heap
|
page read and write
|
||
2409E542000
|
trusted library allocation
|
page read and write
|
||
24099D7E000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
240991AE000
|
trusted library allocation
|
page read and write
|
||
2409FAC6000
|
trusted library allocation
|
page read and write
|
||
2409E892000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409DA82000
|
trusted library allocation
|
page read and write
|
||
2409DCD0000
|
trusted library allocation
|
page read and write
|
||
2409DF73000
|
trusted library allocation
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
2409DFA2000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
2409FA0F000
|
trusted library allocation
|
page read and write
|
||
240A0CB3000
|
trusted library allocation
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2409DAF6000
|
trusted library allocation
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
2408F74D000
|
heap
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
2409D354000
|
trusted library allocation
|
page read and write
|
||
2408F728000
|
heap
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409AA9A000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
184444EA000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2408F74A000
|
heap
|
page read and write
|
||
2409D1E6000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
18443977000
|
trusted library allocation
|
page read and write
|
||
240A007C000
|
trusted library allocation
|
page read and write
|
||
2409DC3F000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409CB2D000
|
trusted library allocation
|
page read and write
|
||
2409CCF1000
|
trusted library allocation
|
page read and write
|
||
2409918A000
|
trusted library allocation
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
240A0CF6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409F9C7000
|
trusted library allocation
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
2409E550000
|
trusted library allocation
|
page read and write
|
||
2409DADA000
|
trusted library allocation
|
page read and write
|
||
184444BF000
|
heap
|
page read and write
|
||
B55ABFE000
|
unkown
|
page readonly
|
||
2409CC98000
|
trusted library allocation
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D882000
|
trusted library allocation
|
page read and write
|
||
240A00D3000
|
trusted library allocation
|
page read and write
|
||
2409DDE1000
|
trusted library allocation
|
page read and write
|
||
2409DAB2000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409D1DB000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409E5A9000
|
trusted library allocation
|
page read and write
|
||
2409FF96000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2409F921000
|
trusted library allocation
|
page read and write
|
||
2409DF40000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409FFFD000
|
trusted library allocation
|
page read and write
|
||
2409DC22000
|
trusted library allocation
|
page read and write
|
||
2408F731000
|
heap
|
page read and write
|
||
240A0CFD000
|
trusted library allocation
|
page read and write
|
||
2409CB53000
|
trusted library allocation
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
2409DD32000
|
trusted library allocation
|
page read and write
|
||
240A0044000
|
trusted library allocation
|
page read and write
|
||
240A004F000
|
trusted library allocation
|
page read and write
|
||
240A00BF000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409B3FC000
|
trusted library allocation
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
240A0AB8000
|
trusted library allocation
|
page read and write
|
||
24099052000
|
trusted library allocation
|
page read and write
|
||
2409FFBC000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
2409CED3000
|
trusted library allocation
|
page read and write
|
||
2409FFAA000
|
trusted library allocation
|
page read and write
|
||
2409DC91000
|
trusted library allocation
|
page read and write
|
||
240999F6000
|
trusted library allocation
|
page read and write
|
||
2409F7BD000
|
trusted library allocation
|
page read and write
|
||
2409CCAB000
|
trusted library allocation
|
page read and write
|
||
2409DDF3000
|
trusted library allocation
|
page read and write
|
||
2408F737000
|
heap
|
page read and write
|
||
240A0AD1000
|
trusted library allocation
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2409CFD3000
|
trusted library allocation
|
page read and write
|
||
2409FA4F000
|
trusted library allocation
|
page read and write
|
||
2409CC1C000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409908B000
|
trusted library allocation
|
page read and write
|
||
2409FB83000
|
trusted library allocation
|
page read and write
|
||
2409E5CE000
|
trusted library allocation
|
page read and write
|
||
240A0081000
|
trusted library allocation
|
page read and write
|
||
2409D9C0000
|
trusted library allocation
|
page read and write
|
||
A80D1BA000
|
stack
|
page read and write
|
||
2409CF85000
|
trusted library allocation
|
page read and write
|
||
2409FBA7000
|
trusted library allocation
|
page read and write
|
||
24099159000
|
trusted library allocation
|
page read and write
|
||
240A0B39000
|
trusted library allocation
|
page read and write
|
||
2409D398000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409AA9C000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CE56000
|
trusted library allocation
|
page read and write
|
||
2409D055000
|
trusted library allocation
|
page read and write
|
||
240993F0000
|
trusted library allocation
|
page read and write
|
||
2409B38F000
|
trusted library allocation
|
page read and write
|
||
2409FA33000
|
trusted library allocation
|
page read and write
|
||
18444003000
|
trusted library allocation
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
2409FFB5000
|
trusted library allocation
|
page read and write
|
||
2409F771000
|
trusted library allocation
|
page read and write
|
||
2409CC09000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409DFF9000
|
trusted library allocation
|
page read and write
|
||
2409D3CC000
|
trusted library allocation
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
2409D31C000
|
trusted library allocation
|
page read and write
|
||
2409CBB0000
|
trusted library allocation
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
A80FD8A000
|
stack
|
page read and write
|
||
2409CEB9000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2409FA70000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409D557000
|
trusted library allocation
|
page read and write
|
||
2409DFA8000
|
trusted library allocation
|
page read and write
|
||
2409AA9A000
|
trusted library allocation
|
page read and write
|
||
2409AA60000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
2409DBEB000
|
trusted library allocation
|
page read and write
|
||
2409F929000
|
trusted library allocation
|
page read and write
|
||
240993D8000
|
trusted library allocation
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2071B4CA000
|
trusted library allocation
|
page read and write
|
||
2409D161000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240A0ABD000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409CCC6000
|
trusted library allocation
|
page read and write
|
||
2409FFCA000
|
trusted library allocation
|
page read and write
|
||
240A0ABD000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2409FA68000
|
trusted library allocation
|
page read and write
|
||
2409DD1A000
|
trusted library allocation
|
page read and write
|
||
2409FA13000
|
trusted library allocation
|
page read and write
|
||
18444448000
|
heap
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409FA28000
|
trusted library allocation
|
page read and write
|
||
2409D39E000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
2409DCEF000
|
trusted library allocation
|
page read and write
|
||
2408F738000
|
heap
|
page read and write
|
||
B81000
|
unkown
|
page execute read
|
||
2408F745000
|
heap
|
page read and write
|
||
2409DC6B000
|
trusted library allocation
|
page read and write
|
||
24099061000
|
trusted library allocation
|
page read and write
|
||
240993FD000
|
trusted library allocation
|
page read and write
|
||
2409D139000
|
trusted library allocation
|
page read and write
|
||
2409D084000
|
trusted library allocation
|
page read and write
|
||
2408F76F000
|
heap
|
page read and write
|
||
2409FFC2000
|
trusted library allocation
|
page read and write
|
||
2408CB6D000
|
trusted library allocation
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
2409DC51000
|
trusted library allocation
|
page read and write
|
||
2409D16D000
|
trusted library allocation
|
page read and write
|
||
2409FF40000
|
trusted library allocation
|
page read and write
|
||
240A0054000
|
trusted library allocation
|
page read and write
|
||
2071B472000
|
trusted library allocation
|
page read and write
|
||
2409E5DA000
|
trusted library allocation
|
page read and write
|
||
2409DFFC000
|
trusted library allocation
|
page read and write
|
||
2409DCE6000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409D1B0000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2071B1E0000
|
unclassified section
|
page readonly
|
||
B5579DE000
|
unkown
|
page readonly
|
||
2409916C000
|
trusted library allocation
|
page read and write
|
||
240993EC000
|
trusted library allocation
|
page read and write
|
||
24099DFD000
|
trusted library allocation
|
page read and write
|
||
2409CCCD000
|
trusted library allocation
|
page read and write
|
||
2409CF62000
|
trusted library allocation
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
2409FA05000
|
trusted library allocation
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
2409CC3B000
|
trusted library allocation
|
page read and write
|
||
18444599000
|
heap
|
page read and write
|
||
2409D1BA000
|
trusted library allocation
|
page read and write
|
||
2409FBCA000
|
trusted library allocation
|
page read and write
|
||
240A0CBB000
|
trusted library allocation
|
page read and write
|
||
240A009A000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409F77E000
|
trusted library allocation
|
page read and write
|
||
2409DD24000
|
trusted library allocation
|
page read and write
|
||
184438C0000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
A80DAFC000
|
stack
|
page read and write
|
||
2409D07D000
|
trusted library allocation
|
page read and write
|
||
2409EB1B000
|
trusted library allocation
|
page read and write
|
||
2409E580000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409DFD4000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409E589000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F75B000
|
heap
|
page read and write
|
||
2409E565000
|
trusted library allocation
|
page read and write
|
||
2409FF9A000
|
trusted library allocation
|
page read and write
|
||
18444569000
|
heap
|
page read and write
|
||
2409DD24000
|
trusted library allocation
|
page read and write
|
||
2409CB9E000
|
trusted library allocation
|
page read and write
|
||
1709EA81000
|
trusted library allocation
|
page execute read
|
||
2409AABD000
|
trusted library allocation
|
page read and write
|
||
2409E5CB000
|
trusted library allocation
|
page read and write
|
||
2409D56F000
|
trusted library allocation
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
2409DADC000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409D172000
|
trusted library allocation
|
page read and write
|
||
240A00B8000
|
trusted library allocation
|
page read and write
|
||
B55AC7E000
|
unkown
|
page readonly
|
||
2409DD29000
|
trusted library allocation
|
page read and write
|
||
2409CCC9000
|
trusted library allocation
|
page read and write
|
||
240A0C90000
|
trusted library allocation
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
2409D01C000
|
trusted library allocation
|
page read and write
|
||
2409D884000
|
trusted library allocation
|
page read and write
|
||
240A0D4C000
|
trusted library allocation
|
page read and write
|
||
17EBB2EA000
|
heap
|
page read and write
|
||
2409E5D2000
|
trusted library allocation
|
page read and write
|
||
2409F8F6000
|
trusted library allocation
|
page read and write
|
||
184444AC000
|
heap
|
page read and write
|
||
2409DD80000
|
trusted library allocation
|
page read and write
|
||
2071B503000
|
trusted library allocation
|
page read and write
|
||
2408F72F000
|
heap
|
page read and write
|
||
2409FA30000
|
trusted library allocation
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
240A007C000
|
trusted library allocation
|
page read and write
|
||
2409DD19000
|
trusted library allocation
|
page read and write
|
||
2409DC25000
|
trusted library allocation
|
page read and write
|
||
2409D1C1000
|
trusted library allocation
|
page read and write
|
||
2409EB5B000
|
trusted library allocation
|
page read and write
|
||
240A0A88000
|
trusted library allocation
|
page read and write
|
||
240A0B58000
|
trusted library allocation
|
page read and write
|
||
2409E55C000
|
trusted library allocation
|
page read and write
|
||
18444561000
|
heap
|
page read and write
|
||
A80DC7E000
|
stack
|
page read and write
|
||
2409D1ED000
|
trusted library allocation
|
page read and write
|
||
2409FF7A000
|
trusted library allocation
|
page read and write
|
||
240A0A6C000
|
trusted library allocation
|
page read and write
|
||
2409CF20000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
2409CFF3000
|
trusted library allocation
|
page read and write
|
||
240A0AB8000
|
trusted library allocation
|
page read and write
|
||
2409FA68000
|
trusted library allocation
|
page read and write
|
||
2409E6E0000
|
trusted library allocation
|
page read and write
|
||
2409DAEE000
|
trusted library allocation
|
page read and write
|
||
2409D377000
|
trusted library allocation
|
page read and write
|
||
2409DAC2000
|
trusted library allocation
|
page read and write
|
||
2409F100000
|
trusted library allocation
|
page read and write
|
||
34007FE000
|
stack
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
240A003D000
|
trusted library allocation
|
page read and write
|
||
2409915F000
|
trusted library allocation
|
page read and write
|
||
240A0D4E000
|
trusted library allocation
|
page read and write
|
||
A80D1FE000
|
stack
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
2409D92B000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409D3B4000
|
trusted library allocation
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
240A00A5000
|
trusted library allocation
|
page read and write
|
||
184444A0000
|
heap
|
page read and write
|
||
2409D14D000
|
trusted library allocation
|
page read and write
|
||
2409FF50000
|
trusted library allocation
|
page read and write
|
||
1844449C000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
240A0A5D000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240A0CB9000
|
trusted library allocation
|
page read and write
|
||
2408F778000
|
heap
|
page read and write
|
||
24099D9F000
|
trusted library allocation
|
page read and write
|
||
2071B45D000
|
trusted library allocation
|
page read and write
|
||
2408F605000
|
heap
|
page read and write
|
||
2409CCE6000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
24099DB2000
|
trusted library allocation
|
page read and write
|
||
2409D5AE000
|
trusted library allocation
|
page read and write
|
||
2409D155000
|
trusted library allocation
|
page read and write
|
||
2409D06C000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
17EB9703000
|
heap
|
page read and write
|
||
2409E7F8000
|
trusted library allocation
|
page read and write
|
||
1844457C000
|
heap
|
page read and write
|
||
2071B479000
|
trusted library allocation
|
page read and write
|
||
240A00C6000
|
trusted library allocation
|
page read and write
|
||
B55ACFE000
|
unkown
|
page readonly
|
||
2409FA2C000
|
trusted library allocation
|
page read and write
|
||
2409DAF1000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409DFA8000
|
trusted library allocation
|
page read and write
|
||
2409FAA2000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409CE56000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
unkown
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409915F000
|
trusted library allocation
|
page read and write
|
||
2409D074000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
2409D1A0000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
2409DCB2000
|
trusted library allocation
|
page read and write
|
||
2409E553000
|
trusted library allocation
|
page read and write
|
||
240A0C54000
|
trusted library allocation
|
page read and write
|
||
2409F8B4000
|
trusted library allocation
|
page read and write
|
||
2409D9C7000
|
trusted library allocation
|
page read and write
|
||
2409D4ED000
|
trusted library allocation
|
page read and write
|
||
2409CB64000
|
trusted library allocation
|
page read and write
|
||
34115FF000
|
stack
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409D5EE000
|
trusted library allocation
|
page read and write
|
||
240A0AE6000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409D936000
|
trusted library allocation
|
page read and write
|
||
2408F76E000
|
heap
|
page read and write
|
||
2071B120000
|
heap
|
page read and write
|
||
1F46C854F000
|
trusted library allocation
|
page read and write
|
||
240993EE000
|
trusted library allocation
|
page read and write
|
||
2409F76F000
|
trusted library allocation
|
page read and write
|
||
2409D90B000
|
trusted library allocation
|
page read and write
|
||
2409DC3F000
|
trusted library allocation
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
240A0A88000
|
trusted library allocation
|
page read and write
|
||
2409AAAB000
|
trusted library allocation
|
page read and write
|
||
2409FF4C000
|
trusted library allocation
|
page read and write
|
||
2409E56A000
|
trusted library allocation
|
page read and write
|
||
2409D1BC000
|
trusted library allocation
|
page read and write
|
||
2409D3E7000
|
trusted library allocation
|
page read and write
|
||
2409F78A000
|
trusted library allocation
|
page read and write
|
||
2409CCBE000
|
trusted library allocation
|
page read and write
|
||
18444520000
|
heap
|
page read and write
|
||
2409F96E000
|
trusted library allocation
|
page read and write
|
||
2409F981000
|
trusted library allocation
|
page read and write
|
||
2409D084000
|
trusted library allocation
|
page read and write
|
||
2409CD3F000
|
trusted library allocation
|
page read and write
|
||
2408F72D000
|
heap
|
page read and write
|
||
2409DD6D000
|
trusted library allocation
|
page read and write
|
||
2409D1E1000
|
trusted library allocation
|
page read and write
|
||
2409D09B000
|
trusted library allocation
|
page read and write
|
||
24099A66000
|
trusted library allocation
|
page read and write
|
||
2409F75A000
|
trusted library allocation
|
page read and write
|
||
2409CF8C000
|
trusted library allocation
|
page read and write
|
||
24099D67000
|
trusted library allocation
|
page read and write
|
||
2409FA48000
|
trusted library allocation
|
page read and write
|
||
2409D07E000
|
trusted library allocation
|
page read and write
|
||
2409DF23000
|
trusted library allocation
|
page read and write
|
||
2409CF20000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2408F730000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FAA1000
|
trusted library allocation
|
page read and write
|
||
2409D3F9000
|
trusted library allocation
|
page read and write
|
||
2409D809000
|
trusted library allocation
|
page read and write
|
||
2409D9F9000
|
trusted library allocation
|
page read and write
|
||
240A0D13000
|
trusted library allocation
|
page read and write
|
||
2409CF1E000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409D5D5000
|
trusted library allocation
|
page read and write
|
||
2408F732000
|
heap
|
page read and write
|
||
2409DFFB000
|
trusted library allocation
|
page read and write
|
||
1844449C000
|
heap
|
page read and write
|
||
2409FA6D000
|
trusted library allocation
|
page read and write
|
||
2FC6DFF000
|
stack
|
page read and write
|
||
A809B3E000
|
stack
|
page read and write
|
||
2409B3EB000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
1844449C000
|
heap
|
page read and write
|
||
A8089FF000
|
stack
|
page read and write
|
||
2409D4C3000
|
trusted library allocation
|
page read and write
|
||
184436D0000
|
heap
|
page read and write
|
||
24099DF5000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409DAE3000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
184444A0000
|
heap
|
page read and write
|
||
B55AC3E000
|
stack
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
184444A4000
|
heap
|
page read and write
|
||
2409DAC3000
|
trusted library allocation
|
page read and write
|
||
240990BF000
|
trusted library allocation
|
page read and write
|
||
2409FF82000
|
trusted library allocation
|
page read and write
|
||
2409CBA6000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409DD80000
|
trusted library allocation
|
page read and write
|
||
240A0A61000
|
trusted library allocation
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
2409FB89000
|
trusted library allocation
|
page read and write
|
||
2409CF4C000
|
trusted library allocation
|
page read and write
|
||
2409EBE8000
|
trusted library allocation
|
page read and write
|
||
2409FF96000
|
trusted library allocation
|
page read and write
|
||
2409B3D0000
|
trusted library allocation
|
page read and write
|
||
2409F940000
|
trusted library allocation
|
page read and write
|
||
24099DE7000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
240991DE000
|
trusted library allocation
|
page read and write
|
||
2409DC51000
|
trusted library allocation
|
page read and write
|
||
2409F9EA000
|
trusted library allocation
|
page read and write
|
||
2409CB7D000
|
trusted library allocation
|
page read and write
|
||
240A0AFA000
|
trusted library allocation
|
page read and write
|
||
2409CBA1000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409D158000
|
trusted library allocation
|
page read and write
|
||
24099AE4000
|
trusted library allocation
|
page read and write
|
||
18444598000
|
heap
|
page read and write
|
||
2409D052000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240A0B76000
|
trusted library allocation
|
page read and write
|
||
240A0B2C000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2409AAB2000
|
trusted library allocation
|
page read and write
|
||
2409CBB0000
|
trusted library allocation
|
page read and write
|
||
2FC4DFA000
|
stack
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409AA86000
|
trusted library allocation
|
page read and write
|
||
2409E549000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
2409D9F4000
|
trusted library allocation
|
page read and write
|
||
2409D1CC000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409CB9B000
|
trusted library allocation
|
page read and write
|
||
2409FF7E000
|
trusted library allocation
|
page read and write
|
||
2409E5E5000
|
trusted library allocation
|
page read and write
|
||
24099136000
|
trusted library allocation
|
page read and write
|
||
2409AACC000
|
trusted library allocation
|
page read and write
|
||
240990D8000
|
trusted library allocation
|
page read and write
|
||
2409CC73000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F626000
|
heap
|
page read and write
|
||
240990EF000
|
trusted library allocation
|
page read and write
|
||
2409D543000
|
trusted library allocation
|
page read and write
|
||
240993FD000
|
trusted library allocation
|
page read and write
|
||
2409CB4B000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
2409FB8F000
|
trusted library allocation
|
page read and write
|
||
213BF21F000
|
heap
|
page read and write
|
||
2409AA6F000
|
trusted library allocation
|
page read and write
|
||
2409E5E1000
|
trusted library allocation
|
page read and write
|
||
24099BFE000
|
trusted library allocation
|
page read and write
|
||
240A0B5C000
|
trusted library allocation
|
page read and write
|
||
2409FF7A000
|
trusted library allocation
|
page read and write
|
||
2409CBAB000
|
trusted library allocation
|
page read and write
|
||
2409F8EC000
|
trusted library allocation
|
page read and write
|
||
240A0B8B000
|
trusted library allocation
|
page read and write
|
||
240A0B89000
|
trusted library allocation
|
page read and write
|
||
B55B4FE000
|
stack
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
2409CCE2000
|
trusted library allocation
|
page read and write
|
||
2071AFD0000
|
unclassified section
|
page readonly
|
||
2409E5C5000
|
trusted library allocation
|
page read and write
|
||
2409B35F000
|
trusted library allocation
|
page read and write
|
||
2409DFB9000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
240A0AA8000
|
trusted library allocation
|
page read and write
|
||
2409CF96000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DD1A000
|
trusted library allocation
|
page read and write
|
||
2409D0A1000
|
trusted library allocation
|
page read and write
|
||
2409CFCC000
|
trusted library allocation
|
page read and write
|
||
2408CA00000
|
trusted library allocation
|
page read and write
|
||
2409D186000
|
trusted library allocation
|
page read and write
|
||
2409CB89000
|
trusted library allocation
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
2409D3FE000
|
trusted library allocation
|
page read and write
|
||
2409DAC2000
|
trusted library allocation
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2409D361000
|
trusted library allocation
|
page read and write
|
||
2409D178000
|
trusted library allocation
|
page read and write
|
||
A80912E000
|
stack
|
page read and write
|
||
2409F9B8000
|
trusted library allocation
|
page read and write
|
||
A80C13D000
|
stack
|
page read and write
|
||
2408F64F000
|
heap
|
page read and write
|
||
2409B3ED000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2408C830000
|
heap
|
page read and write
|
||
2409D1F2000
|
trusted library allocation
|
page read and write
|
||
2409D1E9000
|
trusted library allocation
|
page read and write
|
||
2408F757000
|
heap
|
page read and write
|
||
2408F694000
|
heap
|
page read and write
|
||
2408F778000
|
heap
|
page read and write
|
||
2409DAE7000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
240A001A000
|
trusted library allocation
|
page read and write
|
||
340187E000
|
stack
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
24099D86000
|
trusted library allocation
|
page read and write
|
||
2409DDDE000
|
trusted library allocation
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409D4F9000
|
trusted library allocation
|
page read and write
|
||
2409CF2F000
|
trusted library allocation
|
page read and write
|
||
2409FA7F000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2409D055000
|
trusted library allocation
|
page read and write
|
||
2409DD83000
|
trusted library allocation
|
page read and write
|
||
2409DE77000
|
trusted library allocation
|
page read and write
|
||
2409DADA000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409E5EC000
|
trusted library allocation
|
page read and write
|
||
2408CB32000
|
trusted library allocation
|
page read and write
|
||
2409FF3C000
|
trusted library allocation
|
page read and write
|
||
2409D4ED000
|
trusted library allocation
|
page read and write
|
||
18444531000
|
heap
|
page read and write
|
||
240A0B71000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
240A006B000
|
trusted library allocation
|
page read and write
|
||
1844355A000
|
remote allocation
|
page execute read
|
||
2408F77A000
|
heap
|
page read and write
|
||
2409D936000
|
trusted library allocation
|
page read and write
|
||
410D000
|
stack
|
page read and write
|
||
1844449F000
|
heap
|
page read and write
|
||
B55C4FE000
|
stack
|
page read and write
|
||
184439C4000
|
trusted library allocation
|
page read and write
|
||
2409FF96000
|
trusted library allocation
|
page read and write
|
||
24099183000
|
trusted library allocation
|
page read and write
|
||
2409F9C7000
|
trusted library allocation
|
page read and write
|
||
A80B53D000
|
stack
|
page read and write
|
||
240990DF000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
240A0D13000
|
trusted library allocation
|
page read and write
|
||
2409D07D000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
2409F8FD000
|
trusted library allocation
|
page read and write
|
||
2409CCF0000
|
trusted library allocation
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
2409E5B0000
|
trusted library allocation
|
page read and write
|
||
2409CFCC000
|
trusted library allocation
|
page read and write
|
||
2409FF4C000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
A808A78000
|
stack
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
240A0054000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
2409DF9E000
|
trusted library allocation
|
page read and write
|
||
2409F8F6000
|
trusted library allocation
|
page read and write
|
||
2409D9AB000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
240A00B8000
|
trusted library allocation
|
page read and write
|
||
2409CCE6000
|
trusted library allocation
|
page read and write
|
||
1844395F000
|
trusted library allocation
|
page read and write
|
||
A806433000
|
stack
|
page read and write
|
||
2409CF88000
|
trusted library allocation
|
page read and write
|
||
2409FF41000
|
trusted library allocation
|
page read and write
|
||
2409DDB6000
|
trusted library allocation
|
page read and write
|
||
2409FA5A000
|
trusted library allocation
|
page read and write
|
||
2409D5EE000
|
trusted library allocation
|
page read and write
|
||
2071B494000
|
trusted library allocation
|
page read and write
|
||
2409CF1C000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
2409AA9A000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409FAAC000
|
trusted library allocation
|
page read and write
|
||
2408F74D000
|
heap
|
page read and write
|
||
184445A7000
|
heap
|
page read and write
|
||
2408F76E000
|
heap
|
page read and write
|
||
2FC55FE000
|
stack
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2409D1BF000
|
trusted library allocation
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2409CC12000
|
trusted library allocation
|
page read and write
|
||
2408F72A000
|
heap
|
page read and write
|
||
2408F742000
|
heap
|
page read and write
|
||
2409CB9B000
|
trusted library allocation
|
page read and write
|
||
2409CCB1000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
24099A7D000
|
trusted library allocation
|
page read and write
|
||
2409CC98000
|
trusted library allocation
|
page read and write
|
||
2409DC22000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
2409FBA2000
|
trusted library allocation
|
page read and write
|
||
2409F77B000
|
trusted library allocation
|
page read and write
|
||
2FC5DFF000
|
stack
|
page read and write
|
||
2408F736000
|
heap
|
page read and write
|
||
2409DADE000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
240993F0000
|
trusted library allocation
|
page read and write
|
||
2408F607000
|
heap
|
page read and write
|
||
2409D153000
|
trusted library allocation
|
page read and write
|
||
2409DD2B000
|
trusted library allocation
|
page read and write
|
||
2408F750000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408C9A0000
|
heap
|
page read and write
|
||
2409FF3C000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240A0D46000
|
trusted library allocation
|
page read and write
|
||
240990EF000
|
trusted library allocation
|
page read and write
|
||
2409D3E7000
|
trusted library allocation
|
page read and write
|
||
2408F74D000
|
heap
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
2409B33B000
|
trusted library allocation
|
page read and write
|
||
2408F73A000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
A80BD3D000
|
stack
|
page read and write
|
||
2409907A000
|
trusted library allocation
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2408F727000
|
heap
|
page read and write
|
||
2409CBA1000
|
trusted library allocation
|
page read and write
|
||
2409CCCB000
|
trusted library allocation
|
page read and write
|
||
2409CF7D000
|
trusted library allocation
|
page read and write
|
||
2409D166000
|
trusted library allocation
|
page read and write
|
||
2408F72C000
|
heap
|
page read and write
|
||
2409FA2C000
|
trusted library allocation
|
page read and write
|
||
2408F768000
|
heap
|
page read and write
|
||
2409FA3E000
|
trusted library allocation
|
page read and write
|
||
2409F95F000
|
trusted library allocation
|
page read and write
|
||
2409D4ED000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409DD20000
|
trusted library allocation
|
page read and write
|
||
2409DBF3000
|
trusted library allocation
|
page read and write
|
||
2409CCE6000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409E5D2000
|
trusted library allocation
|
page read and write
|
||
2409DD7E000
|
trusted library allocation
|
page read and write
|
||
2409E590000
|
trusted library allocation
|
page read and write
|
||
2409D066000
|
trusted library allocation
|
page read and write
|
||
2408F733000
|
heap
|
page read and write
|
||
2409CB98000
|
trusted library allocation
|
page read and write
|
||
2409916C000
|
trusted library allocation
|
page read and write
|
||
2409DCD0000
|
trusted library allocation
|
page read and write
|
||
24099D67000
|
trusted library allocation
|
page read and write
|
||
240A0AB3000
|
trusted library allocation
|
page read and write
|
||
2071B513000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
240993E1000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
240A0CB9000
|
trusted library allocation
|
page read and write
|
||
2408F643000
|
heap
|
page read and write
|
||
2408C7B0000
|
unclassified section
|
page readonly
|
||
2409DA86000
|
trusted library allocation
|
page read and write
|
||
2409AB0F000
|
trusted library allocation
|
page read and write
|
||
2409DDF5000
|
trusted library allocation
|
page read and write
|
||
2409CCDE000
|
trusted library allocation
|
page read and write
|
||
2409D405000
|
trusted library allocation
|
page read and write
|
||
240A00FE000
|
trusted library allocation
|
page read and write
|
||
240A0B36000
|
trusted library allocation
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409DDF3000
|
trusted library allocation
|
page read and write
|
||
240A0D10000
|
trusted library allocation
|
page read and write
|
||
2409D5A1000
|
trusted library allocation
|
page read and write
|
||
24099ADB000
|
trusted library allocation
|
page read and write
|
||
2409CFCD000
|
trusted library allocation
|
page read and write
|
||
2409D15B000
|
trusted library allocation
|
page read and write
|
||
2409AA60000
|
trusted library allocation
|
page read and write
|
||
2409D16E000
|
trusted library allocation
|
page read and write
|
||
2409FAD7000
|
trusted library allocation
|
page read and write
|
||
1844448D000
|
heap
|
page read and write
|
||
240A0D13000
|
trusted library allocation
|
page read and write
|
||
2409E5C7000
|
trusted library allocation
|
page read and write
|
||
2071B461000
|
trusted library allocation
|
page read and write
|
||
2409DD9C000
|
trusted library allocation
|
page read and write
|
||
2408F72E000
|
heap
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2409D0CA000
|
trusted library allocation
|
page read and write
|
||
2409CF69000
|
trusted library allocation
|
page read and write
|
||
2408F76C000
|
heap
|
page read and write
|
||
2409FAA1000
|
trusted library allocation
|
page read and write
|
||
2409D195000
|
trusted library allocation
|
page read and write
|
||
C42000
|
unkown
|
page readonly
|
||
2409FA52000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
B34000
|
heap
|
page read and write
|
||
2409918E000
|
trusted library allocation
|
page read and write
|
||
2409DCEF000
|
trusted library allocation
|
page read and write
|
||
24099159000
|
trusted library allocation
|
page read and write
|
||
2409D3FB000
|
trusted library allocation
|
page read and write
|
||
240A008B000
|
trusted library allocation
|
page read and write
|
||
2409FF5C000
|
trusted library allocation
|
page read and write
|
||
18444540000
|
heap
|
page read and write
|
||
240A0A78000
|
trusted library allocation
|
page read and write
|
||
2408F743000
|
heap
|
page read and write
|
||
240A0B60000
|
trusted library allocation
|
page read and write
|
||
2409D92B000
|
trusted library allocation
|
page read and write
|
||
2409DAFC000
|
trusted library allocation
|
page read and write
|
||
2408F726000
|
heap
|
page read and write
|
||
2409CB7D000
|
trusted library allocation
|
page read and write
|
||
2408F745000
|
heap
|
page read and write
|
||
24099E5F000
|
trusted library allocation
|
page read and write
|
||
2408F72B000
|
heap
|
page read and write
|
||
3E9000
|
stack
|
page read and write
|
||
2409CB9E000
|
trusted library allocation
|
page read and write
|
||
2E4BBD640000
|
trusted library allocation
|
page read and write
|
||
17EB9907000
|
trusted library allocation
|
page read and write
|
||
2409CCA7000
|
trusted library allocation
|
page read and write
|
||
2408F744000
|
heap
|
page read and write
|
||
2409E590000
|
trusted library allocation
|
page read and write
|
||
240A00CA000
|
trusted library allocation
|
page read and write
|
There are 3412 hidden memdumps, click here to show them.