IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_4d666f67-10b5-405b-8844-922ee1773494.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_4d666f67-10b5-405b-8844-922ee1773494.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\16a73249-6c99-43b3-b639-4a5eef0ee402.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\18040e10-a581-403d-9f6f-cfa1fbf7818b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4885a36e-a371-48c6-8c09-d0f80e760ccd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\75c9fa31-5b4a-45e3-a4e6-677e095abe56.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7b91fb6c-8e26-49c1-a9a6-23cd71aa7572.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\73dad07c-6633-4ba6-8756-fc2879b35d23.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D9A48C-173C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\12a18608-0976-479b-9427-bb63dd725c19.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1cd20c98-0f91-4f70-9b78-1a352222de74.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\31aabcfb-9026-4872-954c-0e10f9ff5ff2.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\4be7b9a9-3e05-4db7-82d2-3d0a7853af00.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\581f24fb-013e-488d-986f-7ef1b87098b8.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8c89ad1f-07c7-4fdb-ab79-25e4b10bdcaa.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9c806900-d04b-4268-b92a-dda7e39c83f9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9f302c3b-5635-42fe-a8d9-bd85cfeb9187.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DashTrackerDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000004.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000005.ldb
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 11, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\MediaDeviceSalts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 6, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\14f51c3d-8b0b-4803-b3fa-d58e55ebcdd4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\450d4fc0-69dc-4fff-8635-8d3994500d83.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\65c04d9f-6c5f-4311-be65-911690178863.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\77c1d812-c358-4781-a098-6dae93accbee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\7d217164-fcb2-4fcc-952d-ff338187d180.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF44bda.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF34595.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF36236.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF364b6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF46b1a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\ba8bc3a4-eb42-4a35-89fc-96395d696325.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e3c0fdc0-c844-4064-b466-04bf84bc3d30.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fb3b03aa-47f4-4c1a-8ea7-c8e58258159a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\fc0c8301-c114-45e8-b7c5-3411d6b56eeb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3807c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3cb5f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3f6b5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF440af.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PriceComparison\PriceComparisonAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF387bf.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13370013070951362
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\044d7ad8-5253-47f6-baec-4ec1fd1d8e70.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\3736a277-3739-421d-a18d-dd7fac265fd9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF36236.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF364b6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x7, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\c838f2fc-95b6-40fd-92b7-b18e122ed6b1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\db636191-38c0-4f0f-a5f9-f8b11060742a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\f83e2c43-ab17-42d2-a0ac-cf56b5c7fa41.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 91, cookie 0x36, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 11, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\b8589818-9671-442f-b145-f325edb3d817.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\fd8e1f13-c2fa-4f77-9e6e-fed6445657a6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF32d89.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF32da8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF32fac.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3568d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF44032.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF49b81.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b3a56ec2-141d-4cb9-85aa-54a80526bf75.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ecf1adaa-459e-4887-bce3-3d7d441049c7.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\142faec3-441d-4d56-ba92-348598620b17.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\3e6cdc9f-2ce2-4cab-8b7d-7b2a59dadf23.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\6858cfc7-817a-44a9-82de-848b98f5839e.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\dc70ea12-5045-4ff5-9c82-44d96c1dd843.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\e0b51882-a32d-4bf6-8fa3-6caa8570dcb9.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 693860
dropped
C:\Users\user\AppData\Local\Temp\e26b7634-2604-4558-ba58-a53049e2bfeb.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\fcafbaa8-aa33-42c6-a532-cea333bfdf02.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41900
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_1607228590\dc70ea12-5045-4ff5-9c82-44d96c1dd843.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\3e6cdc9f-2ce2-4cab-8b7d-7b2a59dadf23.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir5948_881351672\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\49409584-9cbe-40a8-9057-948720249a2c (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\saved-telemetry-pings\49409584-9cbe-40a8-9057-948720249a2c.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 301 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 301 bytes
dropped
There are 268 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2056,i,6247163367441240488,2576398707470590896,262144 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2688 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:3
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2248 -parentBuildID 20230927232528 -prefsHandle 2196 -prefMapHandle 2188 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccf95cfb-f749-4af2-904e-7994877402df} 1816 "\\.\pipe\gecko-crash-server-pipe.1816" 2408cb6db10 socket
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6532 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6736 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:8
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4456 -parentBuildID 20230927232528 -prefsHandle 4340 -prefMapHandle 4336 -prefsLen 26273 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f8d3111-a88f-4b01-91e4-af2e9be1c464} 1816 "\\.\pipe\gecko-crash-server-pipe.1816" 2409f819410 rdd
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-GB --service-sandbox-type=audio --mojo-platform-channel-handle=8500 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8648 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=price_comparison_service.mojom.DataProcessor --lang=en-GB --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=8496 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=8780 --field-trial-handle=2732,i,2053604425234520121,15701562997204502456,262144 /prefetch:8
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://www.msn.comZ
unknown
https://services.addons.mozilla.org
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://csp.withgoogle.com/csp/report-to/apps-themes
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://docs.google.com/
unknown
https://screenshots.firefox.com
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://www.instagram.com
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
https://outlook.office.com/mail/compose?isExtension=true
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
http://exslt.org/dates-and-timesP5
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
https://web.telegram.org/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://drive-daily-2.corp.google.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://drive-daily-1.corp.google.com/
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.251.35.164
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://bard.google.com/
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
142.250.185.65
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://www.office.com
unknown
https://outlook.live.com/mail/0/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://www.tsn.caZ
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://www.tsn.ca
unknown
https://tidal.com/
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.openh264.org/
unknown
https://gaana.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://outlook.live.com/mail/compose?isExtension=true
unknown
https://blocked.cdn.mozilla.net/
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
chrome.cloudflare-dns.com
172.64.41.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
ipv4only.arpa
192.0.0.170
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
94.245.104.56
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
googlehosted.l.googleusercontent.com
142.250.185.65
sni1gl.wpc.nucdn.net
152.199.21.175
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
detectportal.firefox.com
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
firefox.settings.services.mozilla.com
unknown
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.107.246.40
unknown
United States
23.55.235.170
unknown
United States
152.195.19.97
unknown
United States
23.59.250.72
unknown
United States
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown
162.159.61.3
unknown
United States
52.222.236.23
services.addons.mozilla.org
United States
142.251.40.174
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
142.250.185.65
googlehosted.l.googleusercontent.com
United States
64.233.180.84
unknown
United States
142.250.65.174
unknown
United States
94.245.104.56
ssl.bingadsedgeextension-prod-europe.azurewebsites.net
United Kingdom
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
239.255.255.250
unknown
Reserved
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.251.35.164
unknown
United States
127.0.0.1
unknown
unknown
There are 12 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gcinnojdebelpnodghnoicmcdmamjoch
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jgcbloklkllbkmkbfckchanipicejgah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ojmnomejplkgljjhjindfoilnmobmihe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197710
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
There are 139 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2409D18D000
trusted library allocation
page read and write
2409FFC2000
trusted library allocation
page read and write
2409E55E000
trusted library allocation
page read and write
2409AABD000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2409F78A000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
B559BFE000
unkown
page readonly
184434E0000
unclassified section
page readonly
2409EB9B000
trusted library allocation
page read and write
450E000
stack
page read and write
2409FBC1000
trusted library allocation
page read and write
240A0D06000
trusted library allocation
page read and write
240A0D86000
trusted library allocation
page read and write
18443560000
unclassified section
page readonly
2409D5EE000
trusted library allocation
page read and write
2409CF97000
trusted library allocation
page read and write
19FE000
stack
page read and write
240A0B84000
trusted library allocation
page read and write
2409D3F5000
trusted library allocation
page read and write
2409CCC7000
trusted library allocation
page read and write
2408F739000
heap
page read and write
240A0D42000
trusted library allocation
page read and write
2409DD3F000
trusted library allocation
page read and write
2409FAC2000
trusted library allocation
page read and write
18443850000
unclassified section
page read and write
2408F744000
heap
page read and write
240991AE000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
1F46C8589000
trusted library allocation
page read and write
2409FF7A000
trusted library allocation
page read and write
2409CCAE000
trusted library allocation
page read and write
2408F778000
heap
page read and write
2409F9EA000
trusted library allocation
page read and write
2409D171000
trusted library allocation
page read and write
2409FA32000
trusted library allocation
page read and write
2409B36B000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409DAE3000
trusted library allocation
page read and write
2409CEB9000
trusted library allocation
page read and write
2409FBD4000
trusted library allocation
page read and write
2409F950000
trusted library allocation
page read and write
E33000
heap
page read and write
2408F757000
heap
page read and write
2408F750000
heap
page read and write
240A001A000
trusted library allocation
page read and write
2409DAF8000
trusted library allocation
page read and write
2409F9BD000
trusted library allocation
page read and write
2409E564000
trusted library allocation
page read and write
2409DAEE000
trusted library allocation
page read and write
2409F9CC000
trusted library allocation
page read and write
2409CCC2000
trusted library allocation
page read and write
240A0A8C000
trusted library allocation
page read and write
2409D1E8000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
240A0C4C000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
2409D1D4000
trusted library allocation
page read and write
2409CCAE000
trusted library allocation
page read and write
2409D3F5000
trusted library allocation
page read and write
2409B3DD000
trusted library allocation
page read and write
2409DD29000
trusted library allocation
page read and write
2409D06B000
trusted library allocation
page read and write
2409FF50000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409FFF7000
trusted library allocation
page read and write
2409F981000
trusted library allocation
page read and write
24099DB2000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409FF82000
trusted library allocation
page read and write
2409CB4B000
trusted library allocation
page read and write
2409D564000
trusted library allocation
page read and write
240A0B84000
trusted library allocation
page read and write
2409CB84000
trusted library allocation
page read and write
2409D92B000
trusted library allocation
page read and write
2409AA50000
trusted library allocation
page read and write
2409CCA7000
trusted library allocation
page read and write
240A0CEF000
trusted library allocation
page read and write
2409FA68000
trusted library allocation
page read and write
2409DC51000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2408F733000
heap
page read and write
2409FAB2000
trusted library allocation
page read and write
2409CB98000
trusted library allocation
page read and write
A80DBFB000
stack
page read and write
B34000
heap
page read and write
2409CD35000
trusted library allocation
page read and write
240A005D000
trusted library allocation
page read and write
240A0C4E000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
240A0A82000
trusted library allocation
page read and write
2409D940000
trusted library allocation
page read and write
2408F733000
heap
page read and write
C54000
unkown
page readonly
3A00000
heap
page read and write
184445A7000
heap
page read and write
18443903000
trusted library allocation
page read and write
2409D552000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
2409DDFD000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
18444585000
heap
page read and write
2409F9B8000
trusted library allocation
page read and write
2409CB22000
trusted library allocation
page read and write
523B000
stack
page read and write
2409E79D000
trusted library allocation
page read and write
2409CBEA000
trusted library allocation
page read and write
2409CC0C000
trusted library allocation
page read and write
2409E5E1000
trusted library allocation
page read and write
2071B1B4000
heap
page read and write
2408F745000
heap
page read and write
2408F744000
heap
page read and write
240A0B4D000
trusted library allocation
page read and write
2409F8FD000
trusted library allocation
page read and write
2409CB7D000
trusted library allocation
page read and write
2409D9BC000
trusted library allocation
page read and write
2409DE80000
trusted library allocation
page read and write
2071B532000
trusted library allocation
page read and write
2409B3ED000
trusted library allocation
page read and write
2409F8F6000
trusted library allocation
page read and write
2409B3E6000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
2409D5D9000
trusted library allocation
page read and write
184439D6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
240A0AAA000
trusted library allocation
page read and write
B34000
heap
page read and write
2409E590000
trusted library allocation
page read and write
18443974000
trusted library allocation
page read and write
2409D1E1000
trusted library allocation
page read and write
240A0CE6000
trusted library allocation
page read and write
2409E55E000
trusted library allocation
page read and write
240A0AFA000
trusted library allocation
page read and write
2409DC2C000
trusted library allocation
page read and write
2409FF44000
trusted library allocation
page read and write
240A0063000
trusted library allocation
page read and write
1844452E000
heap
page read and write
1844456B000
heap
page read and write
A810189000
stack
page read and write
18443820000
heap
page readonly
2408CBF0000
trusted library allocation
page read and write
3A01000
heap
page read and write
240A0B26000
trusted library allocation
page read and write
2409A9B8000
trusted library allocation
page read and write
2409B3F4000
trusted library allocation
page read and write
184445A7000
heap
page read and write
240A0B8E000
trusted library allocation
page read and write
2408C869000
heap
page read and write
2409F9C7000
trusted library allocation
page read and write
2409CB53000
trusted library allocation
page read and write
17EB9600000
heap
page read and write
2409DAF4000
trusted library allocation
page read and write
2409AA9C000
trusted library allocation
page read and write
B34000
heap
page read and write
2409DAD0000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409E555000
trusted library allocation
page read and write
2409FBA5000
trusted library allocation
page read and write
240A0B35000
trusted library allocation
page read and write
240A0A8E000
trusted library allocation
page read and write
2409DCB2000
trusted library allocation
page read and write
2409D4EC000
trusted library allocation
page read and write
2409D3E7000
trusted library allocation
page read and write
2409F9A3000
trusted library allocation
page read and write
2409CE73000
trusted library allocation
page read and write
24099BA3000
trusted library allocation
page read and write
240A005D000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2409D1FC000
trusted library allocation
page read and write
2409FF7E000
trusted library allocation
page read and write
24099D67000
trusted library allocation
page read and write
2409CF63000
trusted library allocation
page read and write
240A00CA000
trusted library allocation
page read and write
2409CF4F000
trusted library allocation
page read and write
24099A1B000
trusted library allocation
page read and write
2409FF7E000
trusted library allocation
page read and write
18444528000
heap
page read and write
2409D5D9000
trusted library allocation
page read and write
2409FBCA000
trusted library allocation
page read and write
2409D170000
trusted library allocation
page read and write
24099DFD000
trusted library allocation
page read and write
2FC65FF000
stack
page read and write
2408F750000
heap
page read and write
2409D519000
trusted library allocation
page read and write
2409FA0B000
trusted library allocation
page read and write
2409FAAC000
trusted library allocation
page read and write
2409AA66000
trusted library allocation
page read and write
18443F66000
unkown
page execute read
2408F736000
heap
page read and write
2408F72E000
heap
page read and write
18443923000
trusted library allocation
page read and write
3A11000
heap
page read and write
2409D3AC000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
E26000
heap
page read and write
2409CB19000
trusted library allocation
page read and write
2409D16A000
trusted library allocation
page read and write
A50000
heap
page read and write
2409D9A3000
trusted library allocation
page read and write
2409D552000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
2408CBE9000
trusted library allocation
page read and write
2409E594000
trusted library allocation
page read and write
184444BD000
heap
page read and write
2408F72C000
heap
page read and write
2409DFFC000
trusted library allocation
page read and write
2409CCAE000
trusted library allocation
page read and write
2409B3EB000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409CB87000
trusted library allocation
page read and write
2409E581000
trusted library allocation
page read and write
18444526000
heap
page read and write
2409CB7D000
trusted library allocation
page read and write
2409E5D9000
trusted library allocation
page read and write
2409CF85000
trusted library allocation
page read and write
2409F79E000
trusted library allocation
page read and write
2409F75A000
trusted library allocation
page read and write
2409E520000
trusted library allocation
page read and write
2409CF63000
trusted library allocation
page read and write
2409E56A000
trusted library allocation
page read and write
2409F8CF000
trusted library allocation
page read and write
18444598000
heap
page read and write
18444523000
heap
page read and write
18444529000
heap
page read and write
2409AA50000
trusted library allocation
page read and write
240A0A6C000
trusted library allocation
page read and write
2409E5EA000
trusted library allocation
page read and write
2409AA8A000
trusted library allocation
page read and write
2409AA5E000
trusted library allocation
page read and write
2409D5D9000
trusted library allocation
page read and write
240A0B39000
trusted library allocation
page read and write
240A0B7E000
trusted library allocation
page read and write
240A0AD1000
trusted library allocation
page read and write
2409CB98000
trusted library allocation
page read and write
2409CCA5000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
2409FA51000
trusted library allocation
page read and write
2408F76F000
heap
page read and write
240A0AD1000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409FFFD000
trusted library allocation
page read and write
2409D373000
trusted library allocation
page read and write
2409F8F6000
trusted library allocation
page read and write
2409FFAA000
trusted library allocation
page read and write
2409D5AE000
trusted library allocation
page read and write
24099143000
trusted library allocation
page read and write
494F000
stack
page read and write
2409DD7E000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409CCCB000
trusted library allocation
page read and write
2409FF3C000
trusted library allocation
page read and write
2408F744000
heap
page read and write
A80D13E000
stack
page read and write
240A0B60000
trusted library allocation
page read and write
240990BF000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
2409DD9C000
trusted library allocation
page read and write
2409CC33000
trusted library allocation
page read and write
184444BD000
heap
page read and write
2408F726000
heap
page read and write
240A0D81000
trusted library allocation
page read and write
B30000
heap
page read and write
2409918A000
trusted library allocation
page read and write
2409B3DD000
trusted library allocation
page read and write
A80673E000
stack
page read and write
2409D1E6000
trusted library allocation
page read and write
2409FAEB000
trusted library allocation
page read and write
2409D5AB000
trusted library allocation
page read and write
2409FB8F000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2071B0DA000
heap
page read and write
2409B3D9000
trusted library allocation
page read and write
240A00E1000
trusted library allocation
page read and write
184445A7000
heap
page read and write
2409D5DD000
trusted library allocation
page read and write
2409FA9A000
trusted library allocation
page read and write
2409DD83000
trusted library allocation
page read and write
2409E562000
trusted library allocation
page read and write
240A0B60000
trusted library allocation
page read and write
2409B3FC000
trusted library allocation
page read and write
2409DFF9000
trusted library allocation
page read and write
2409D9C7000
trusted library allocation
page read and write
2409FF44000
trusted library allocation
page read and write
24099AE4000
trusted library allocation
page read and write
2409D15B000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
240A00ED000
trusted library allocation
page read and write
1844402F000
trusted library allocation
page read and write
2408F737000
heap
page read and write
2409DFA8000
trusted library allocation
page read and write
2409D52C000
trusted library allocation
page read and write
2409D06B000
trusted library allocation
page read and write
2409CBEA000
trusted library allocation
page read and write
2408C860000
heap
page read and write
2409FA52000
trusted library allocation
page read and write
B34000
heap
page read and write
2409CB80000
trusted library allocation
page read and write
2408C7D0000
heap
page read and write
2409AAAB000
trusted library allocation
page read and write
240A0B7E000
trusted library allocation
page read and write
2409DCC0000
trusted library allocation
page read and write
240A001F000
trusted library allocation
page read and write
2409F957000
trusted library allocation
page read and write
2071B4B7000
trusted library allocation
page read and write
2409FFAA000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409D5D9000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
240999FB000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409CBB0000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409FA13000
trusted library allocation
page read and write
2409F8CF000
trusted library allocation
page read and write
2409DDDE000
trusted library allocation
page read and write
240A0AFA000
trusted library allocation
page read and write
2409DAE7000
trusted library allocation
page read and write
2408F731000
heap
page read and write
9FE000
stack
page read and write
2409D873000
trusted library allocation
page read and write
2409F919000
trusted library allocation
page read and write
B55BCFE000
unkown
page readonly
240A0CFD000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2071B4A2000
trusted library allocation
page read and write
2409D9C0000
trusted library allocation
page read and write
2408F745000
heap
page read and write
B34000
heap
page read and write
2409CF2B000
trusted library allocation
page read and write
2409D156000
trusted library allocation
page read and write
24099085000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
2409CF63000
trusted library allocation
page read and write
A8067BC000
stack
page read and write
240A0D50000
trusted library allocation
page read and write
2071B4BA000
trusted library allocation
page read and write
213BF500000
trusted library allocation
page read and write
240A0063000
trusted library allocation
page read and write
240A0B84000
trusted library allocation
page read and write
2408F736000
heap
page read and write
A80E50A000
stack
page read and write
2409D05E000
trusted library allocation
page read and write
2409CB98000
trusted library allocation
page read and write
1BDB7304000
trusted library allocation
page read and write
240991B6000
trusted library allocation
page read and write
B34000
heap
page read and write
3A01000
heap
page read and write
2409CB64000
trusted library allocation
page read and write
2409AA9C000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409E55A000
trusted library allocation
page read and write
184445A7000
heap
page read and write
2408F750000
heap
page read and write
2409DFE8000
trusted library allocation
page read and write
240A0B6C000
trusted library allocation
page read and write
2408F736000
heap
page read and write
240A0B8E000
trusted library allocation
page read and write
2409FBFC000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D55B000
trusted library allocation
page read and write
240A0A7C000
trusted library allocation
page read and write
2409DD8E000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
2409D38B000
trusted library allocation
page read and write
2071B412000
trusted library allocation
page read and write
18443969000
trusted library allocation
page read and write
2409DFE5000
trusted library allocation
page read and write
B34000
heap
page read and write
2409D39C000
trusted library allocation
page read and write
2408F744000
heap
page read and write
3A01000
heap
page read and write
2071B481000
trusted library allocation
page read and write
A8081FE000
stack
page read and write
2409F947000
trusted library allocation
page read and write
2409AAAB000
trusted library allocation
page read and write
2409CB8E000
trusted library allocation
page read and write
2409916C000
trusted library allocation
page read and write
2408F757000
heap
page read and write
240A0D90000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409EB7B000
trusted library allocation
page read and write
2408F742000
heap
page read and write
240A0AE6000
trusted library allocation
page read and write
2408F74E000
heap
page read and write
E79000
heap
page read and write
B34000
heap
page read and write
2409F79E000
trusted library allocation
page read and write
B34000
heap
page read and write
2409B3F6000
trusted library allocation
page read and write
B34000
heap
page read and write
2409B3E6000
trusted library allocation
page read and write
2409B342000
trusted library allocation
page read and write
B7E000
stack
page read and write
2409B3ED000
trusted library allocation
page read and write
2409CEE4000
trusted library allocation
page read and write
2409CED3000
trusted library allocation
page read and write
240A0ABD000
trusted library allocation
page read and write
2408F768000
heap
page read and write
2408F72E000
heap
page read and write
2409FA68000
trusted library allocation
page read and write
2409DC2C000
trusted library allocation
page read and write
240A00E1000
trusted library allocation
page read and write
2409D5F0000
trusted library allocation
page read and write
2409D163000
trusted library allocation
page read and write
2409FFBA000
trusted library allocation
page read and write
17EB9A60000
heap
page read and write
2409D1ED000
trusted library allocation
page read and write
2409FB87000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2409DAEE000
trusted library allocation
page read and write
2409F76F000
trusted library allocation
page read and write
2409E5D9000
trusted library allocation
page read and write
2409DCE6000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
2408F694000
heap
page read and write
2409CCE2000
trusted library allocation
page read and write
2071B467000
trusted library allocation
page read and write
2409F7AD000
trusted library allocation
page read and write
2409DFE5000
trusted library allocation
page read and write
17EBB2D0000
heap
page read and write
2409E563000
trusted library allocation
page read and write
2409B3EB000
trusted library allocation
page read and write
2409DD6D000
trusted library allocation
page read and write
2409D5F9000
trusted library allocation
page read and write
240A0C4A000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409AA56000
trusted library allocation
page read and write
2409DD80000
trusted library allocation
page read and write
2409D061000
trusted library allocation
page read and write
2409E5D7000
trusted library allocation
page read and write
2409D936000
trusted library allocation
page read and write
240991AE000
trusted library allocation
page read and write
18444585000
heap
page read and write
2409F9BD000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409914B000
trusted library allocation
page read and write
2409D5AE000
trusted library allocation
page read and write
2409CCCD000
trusted library allocation
page read and write
240A0D4C000
trusted library allocation
page read and write
2408F78E000
heap
page read and write
3F057CA03000
trusted library allocation
page read and write
240A0B86000
trusted library allocation
page read and write
B34000
heap
page read and write
2409D0CA000
trusted library allocation
page read and write
2409CEE1000
trusted library allocation
page read and write
A80BB3D000
stack
page read and write
2409FB92000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
B34000
heap
page read and write
240A0CB7000
trusted library allocation
page read and write
D46000
heap
page read and write
2409FAAC000
trusted library allocation
page read and write
240A0D4C000
trusted library allocation
page read and write
2409FA70000
trusted library allocation
page read and write
2409E557000
trusted library allocation
page read and write
2409B379000
trusted library allocation
page read and write
2409DD6D000
trusted library allocation
page read and write
B35000
heap
page read and write
2409D3FB000
trusted library allocation
page read and write
B55CCFE000
unkown
page readonly
2409AA5E000
trusted library allocation
page read and write
2409CC1F000
trusted library allocation
page read and write
2409FAEB000
trusted library allocation
page read and write
240A0D50000
trusted library allocation
page read and write
2409CC75000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F768000
heap
page read and write
240993EE000
trusted library allocation
page read and write
240A0044000
trusted library allocation
page read and write
2409D178000
trusted library allocation
page read and write
24099163000
trusted library allocation
page read and write
2408F738000
heap
page read and write
2409DE2C000
trusted library allocation
page read and write
2409D1CC000
trusted library allocation
page read and write
2409CB4B000
trusted library allocation
page read and write
2409AC09000
trusted library allocation
page read and write
240A0A6C000
trusted library allocation
page read and write
1844395C000
trusted library allocation
page read and write
A80DE7E000
stack
page read and write
2FC75FF000
stack
page read and write
2408F744000
heap
page read and write
2409CB53000
trusted library allocation
page read and write
240A009A000
trusted library allocation
page read and write
B34000
heap
page read and write
240A0037000
trusted library allocation
page read and write
1F46C851E000
trusted library allocation
page read and write
2408F725000
heap
page read and write
2408F739000
heap
page read and write
2409D884000
trusted library allocation
page read and write
2409F9EF000
trusted library allocation
page read and write
2409D191000
trusted library allocation
page read and write
240A0D42000
trusted library allocation
page read and write
2409F9CC000
trusted library allocation
page read and write
2409D39B000
trusted library allocation
page read and write
24099065000
trusted library allocation
page read and write
2409D195000
trusted library allocation
page read and write
2409FAE3000
trusted library allocation
page read and write
2408F727000
heap
page read and write
240A0B58000
trusted library allocation
page read and write
240A0D10000
trusted library allocation
page read and write
240A0B4F000
trusted library allocation
page read and write
240993E1000
trusted library allocation
page read and write
2409F9CC000
trusted library allocation
page read and write
2409DD8E000
trusted library allocation
page read and write
A80458B000
stack
page read and write
240A0C7A000
trusted library allocation
page read and write
2409FFCA000
trusted library allocation
page read and write
2409CB22000
trusted library allocation
page read and write
2409D167000
trusted library allocation
page read and write
2408F733000
heap
page read and write
17EB96D0000
heap
page read and write
2409CF96000
trusted library allocation
page read and write
2409E575000
trusted library allocation
page read and write
2409CB22000
trusted library allocation
page read and write
2408CBFE000
trusted library allocation
page read and write
18444036000
trusted library allocation
page read and write
2409F8B4000
trusted library allocation
page read and write
2409D1E8000
trusted library allocation
page read and write
2409CF8A000
trusted library allocation
page read and write
2409D1CF000
trusted library allocation
page read and write
184434F0000
unclassified section
page readonly
24099167000
trusted library allocation
page read and write
2409DD8B000
trusted library allocation
page read and write
2409CBAB000
trusted library allocation
page read and write
A80DCBF000
stack
page read and write
2409D084000
trusted library allocation
page read and write
2409DAF6000
trusted library allocation
page read and write
B5583D8000
stack
page read and write
2409DFA2000
trusted library allocation
page read and write
2409CB4B000
trusted library allocation
page read and write
2409CF97000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
2408C850000
trusted library allocation
page read and write
2409DBFC000
trusted library allocation
page read and write
184438B0000
trusted library allocation
page read and write
240A0D48000
trusted library allocation
page read and write
2409CE00000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
18443963000
trusted library allocation
page read and write
2409D90B000
trusted library allocation
page read and write
2409DCC0000
trusted library allocation
page read and write
1844449F000
heap
page read and write
240A0D21000
trusted library allocation
page read and write
240A0069000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
18443852000
unclassified section
page read and write
2408F744000
heap
page read and write
2071B1C0000
heap
page read and write
18444529000
heap
page read and write
E33000
heap
page read and write
2408F750000
heap
page read and write
2409E550000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
18444598000
heap
page read and write
2409FF53000
trusted library allocation
page read and write
2409DAEE000
trusted library allocation
page read and write
2408F739000
heap
page read and write
B34000
heap
page read and write
240990A1000
trusted library allocation
page read and write
2408F743000
heap
page read and write
240A0B5C000
trusted library allocation
page read and write
2409FA0B000
trusted library allocation
page read and write
2408F730000
heap
page read and write
18444598000
heap
page read and write
17EB9900000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2408F6D4000
heap
page read and write
2409FBF5000
trusted library allocation
page read and write
2409CCAE000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
2409D1B0000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2408F733000
heap
page read and write
2408F742000
heap
page read and write
1844449F000
heap
page read and write
3A01000
heap
page read and write
3A01000
heap
page read and write
A80DC3F000
stack
page read and write
240A00F6000
trusted library allocation
page read and write
240A0AE6000
trusted library allocation
page read and write
2409CB53000
trusted library allocation
page read and write
2409FA52000
trusted library allocation
page read and write
240993EE000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
240991DE000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F744000
heap
page read and write
24099DAE000
trusted library allocation
page read and write
240A0AA8000
trusted library allocation
page read and write
240A0A70000
trusted library allocation
page read and write
2409D37F000
trusted library allocation
page read and write
2409DAF6000
trusted library allocation
page read and write
2409AA7C000
trusted library allocation
page read and write
184439C6000
trusted library allocation
page read and write
2409F9EA000
trusted library allocation
page read and write
2409D90B000
trusted library allocation
page read and write
2409D597000
trusted library allocation
page read and write
2071B410000
trusted library allocation
page read and write
2408F739000
heap
page read and write
18443F61000
unkown
page execute read
240A0B8B000
trusted library allocation
page read and write
2409B3F4000
trusted library allocation
page read and write
2409FB99000
trusted library allocation
page read and write
2409D1AD000
trusted library allocation
page read and write
2409DDAD000
trusted library allocation
page read and write
240A0AAC000
trusted library allocation
page read and write
240A0ADF000
trusted library allocation
page read and write
240A0B2C000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
2409D1E9000
trusted library allocation
page read and write
2071B190000
heap
page readonly
2409CC3B000
trusted library allocation
page read and write
2409DAE8000
trusted library allocation
page read and write
2071B51C000
trusted library allocation
page read and write
2409CB78000
trusted library allocation
page read and write
2409D370000
trusted library allocation
page read and write
2409AA7C000
trusted library allocation
page read and write
2409CB7D000
trusted library allocation
page read and write
2409E5C5000
trusted library allocation
page read and write
2409D325000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
2409B35F000
trusted library allocation
page read and write
2409E547000
trusted library allocation
page read and write
2409B3ED000
trusted library allocation
page read and write
2409D189000
trusted library allocation
page read and write
240A0CEF000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409CF0E000
trusted library allocation
page read and write
2409CC75000
trusted library allocation
page read and write
18444598000
heap
page read and write
2409D1C2000
trusted library allocation
page read and write
3A01000
heap
page read and write
240A0B84000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D0CA000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
2409FF41000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2409FA4F000
trusted library allocation
page read and write
2409FFBC000
trusted library allocation
page read and write
1844452E000
heap
page read and write
240A00BD000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
240993FD000
trusted library allocation
page read and write
2409DAFD000
trusted library allocation
page read and write
2409FFDA000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409DD1A000
trusted library allocation
page read and write
24099A93000
trusted library allocation
page read and write
2409D5F9000
trusted library allocation
page read and write
2409DDC2000
trusted library allocation
page read and write
2409B3F0000
trusted library allocation
page read and write
2409FA48000
trusted library allocation
page read and write
2409AABD000
trusted library allocation
page read and write
2409CE67000
trusted library allocation
page read and write
2409CCC9000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409D329000
trusted library allocation
page read and write
2409CC3B000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
2409CCF1000
trusted library allocation
page read and write
2409992F000
trusted library allocation
page read and write
24099DC5000
trusted library allocation
page read and write
1844456B000
heap
page read and write
2409FFE1000
trusted library allocation
page read and write
2409FBFC000
trusted library allocation
page read and write
2409CB22000
trusted library allocation
page read and write
2409F9BD000
trusted library allocation
page read and write
24099167000
trusted library allocation
page read and write
2408F736000
heap
page read and write
24099DBA000
trusted library allocation
page read and write
2409A9B8000
trusted library allocation
page read and write
24099D63000
trusted library allocation
page read and write
18443912000
trusted library allocation
page read and write
2409DDAD000
trusted library allocation
page read and write
213BF400000
trusted library allocation
page read and write
2408F73F000
heap
page read and write
24099163000
trusted library allocation
page read and write
2409D1BA000
trusted library allocation
page read and write
2409DDF5000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
240A0AB8000
trusted library allocation
page read and write
2409AABD000
trusted library allocation
page read and write
3A01000
heap
page read and write
2408F72D000
heap
page read and write
2071B517000
trusted library allocation
page read and write
240A00DF000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409DCD0000
trusted library allocation
page read and write
2409D34E000
trusted library allocation
page read and write
2409FA4F000
trusted library allocation
page read and write
240A0B6E000
trusted library allocation
page read and write
2409AAB1000
trusted library allocation
page read and write
2409FA2F000
trusted library allocation
page read and write
2409E55C000
trusted library allocation
page read and write
2409CF22000
trusted library allocation
page read and write
240990BF000
trusted library allocation
page read and write
347EDCE000
unkown
page readonly
2408F72E000
heap
page read and write
2409D5D6000
trusted library allocation
page read and write
2409E580000
trusted library allocation
page read and write
2409FA52000
trusted library allocation
page read and write
240A0D4E000
trusted library allocation
page read and write
240993EC000
trusted library allocation
page read and write
2409DCC9000
trusted library allocation
page read and write
240993FD000
trusted library allocation
page read and write
2409D365000
trusted library allocation
page read and write
17EB96E0000
heap
page read and write
2408F733000
heap
page read and write
2409DAFB000
trusted library allocation
page read and write
24099ACB000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409F8CF000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409E555000
trusted library allocation
page read and write
2409FFA4000
trusted library allocation
page read and write
240A0B2A000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
2409D22E000
trusted library allocation
page read and write
1844385F000
unclassified section
page read and write
2408F745000
heap
page read and write
2409CB2D000
trusted library allocation
page read and write
24099AAB000
trusted library allocation
page read and write
2409D1C8000
trusted library allocation
page read and write
2409FBFC000
trusted library allocation
page read and write
2409CF97000
trusted library allocation
page read and write
2409E5B6000
trusted library allocation
page read and write
24099A75000
trusted library allocation
page read and write
2409CE34000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D3FB000
trusted library allocation
page read and write
2409CB87000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
2409DDE1000
trusted library allocation
page read and write
240A0024000
trusted library allocation
page read and write
2409F8CF000
trusted library allocation
page read and write
2409D14A000
trusted library allocation
page read and write
2408F743000
heap
page read and write
A805FFE000
stack
page read and write
2409D398000
trusted library allocation
page read and write
2409DFFC000
trusted library allocation
page read and write
240A0B8B000
trusted library allocation
page read and write
240A00EA000
trusted library allocation
page read and write
39D0000
heap
page read and write
2408F733000
heap
page read and write
2408F730000
heap
page read and write
240A00CF000
trusted library allocation
page read and write
2409DCB5000
trusted library allocation
page read and write
2409D884000
trusted library allocation
page read and write
E40000
heap
page read and write
2409CCE2000
trusted library allocation
page read and write
2409F7BD000
trusted library allocation
page read and write
2409DAE7000
trusted library allocation
page read and write
A80E70E000
stack
page read and write
2E4BBD680000
trusted library allocation
page read and write
2408F750000
heap
page read and write
24099923000
trusted library allocation
page read and write
2409E590000
trusted library allocation
page read and write
2409D9A3000
trusted library allocation
page read and write
A8079FD000
stack
page read and write
2409DAF6000
trusted library allocation
page read and write
2409CF52000
trusted library allocation
page read and write
24099163000
trusted library allocation
page read and write
2409D1E0000
trusted library allocation
page read and write
2409D03D000
trusted library allocation
page read and write
2409FAA2000
trusted library allocation
page read and write
2409D153000
trusted library allocation
page read and write
2409FB89000
trusted library allocation
page read and write
184444CA000
heap
page read and write
2409B108000
trusted library allocation
page read and write
240A0B1B000
trusted library allocation
page read and write
2409FBB8000
trusted library allocation
page read and write
213BF1D0000
heap
page read and write
2409FFDA000
trusted library allocation
page read and write
2408F73A000
heap
page read and write
2408F745000
heap
page read and write
184445A9000
heap
page read and write
18444521000
heap
page read and write
24099DAE000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F72E000
heap
page read and write
A80EF0E000
stack
page read and write
2409DBFA000
trusted library allocation
page read and write
2408F752000
heap
page read and write
2409FF38000
trusted library allocation
page read and write
2409DCC9000
trusted library allocation
page read and write
2409F8CF000
trusted library allocation
page read and write
240A0C48000
trusted library allocation
page read and write
2409D5D6000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409B36F000
trusted library allocation
page read and write
2408F745000
heap
page read and write
340207E000
unkown
page readonly
2409CCDE000
trusted library allocation
page read and write
2409D5ED000
trusted library allocation
page read and write
2409D4F0000
trusted library allocation
page read and write
24099971000
trusted library allocation
page read and write
17EB990A000
trusted library allocation
page read and write
2409D9C0000
trusted library allocation
page read and write
2071B263000
heap
page read and write
2409CF85000
trusted library allocation
page read and write
2409CC69000
trusted library allocation
page read and write
2409CB89000
trusted library allocation
page read and write
2409DD8B000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D06C000
trusted library allocation
page read and write
24099DB7000
trusted library allocation
page read and write
2409F77E000
trusted library allocation
page read and write
2409AAE2000
trusted library allocation
page read and write
2409F421000
trusted library allocation
page read and write
2409CB89000
trusted library allocation
page read and write
D40000
heap
page read and write
2409E5EC000
trusted library allocation
page read and write
2409DDB6000
trusted library allocation
page read and write
2409F7F2000
trusted library allocation
page read and write
2409D39C000
trusted library allocation
page read and write
2408F731000
heap
page read and write
17EB96F7000
heap
page read and write
2409FA5A000
trusted library allocation
page read and write
2071B1A0000
unclassified section
page read and write
2409FBD4000
trusted library allocation
page read and write
2409D16F000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409FB99000
trusted library allocation
page read and write
B34000
heap
page read and write
1844396F000
trusted library allocation
page read and write
2409D1C4000
trusted library allocation
page read and write
18444528000
heap
page read and write
2408F743000
heap
page read and write
2409AABD000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D4F9000
trusted library allocation
page read and write
240A0B5C000
trusted library allocation
page read and write
2409D1C4000
trusted library allocation
page read and write
240A00BD000
trusted library allocation
page read and write
2408F6D6000
heap
page read and write
24099DC5000
trusted library allocation
page read and write
2409DABD000
trusted library allocation
page read and write
2409FBFB000
trusted library allocation
page read and write
2409D550000
trusted library allocation
page read and write
2409B3ED000
trusted library allocation
page read and write
2409D92B000
trusted library allocation
page read and write
2409D5AE000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DD36000
trusted library allocation
page read and write
240A0ADF000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409DAF6000
trusted library allocation
page read and write
2409D9C7000
trusted library allocation
page read and write
17EBB2C0000
heap
page read and write
2409FFFD000
trusted library allocation
page read and write
240A0A53000
trusted library allocation
page read and write
240A0B58000
trusted library allocation
page read and write
240A0AAA000
trusted library allocation
page read and write
240990EF000
trusted library allocation
page read and write
2409FA68000
trusted library allocation
page read and write
2409DFA5000
trusted library allocation
page read and write
2409B3F4000
trusted library allocation
page read and write
18443860000
heap
page read and write
2409CCA0000
trusted library allocation
page read and write
2409DAB0000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
2409DD3F000
trusted library allocation
page read and write
2409F95F000
trusted library allocation
page read and write
2409FA4F000
trusted library allocation
page read and write
24099DC5000
trusted library allocation
page read and write
24099A17000
trusted library allocation
page read and write
2409D148000
trusted library allocation
page read and write
2409DE70000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
2409F8F6000
trusted library allocation
page read and write
2409E5E2000
trusted library allocation
page read and write
2409F957000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409F421000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
240A0B60000
trusted library allocation
page read and write
2409FC00000
trusted library allocation
page read and write
2409E6DE000
trusted library allocation
page read and write
2409FBDA000
trusted library allocation
page read and write
2408EDF0000
trusted library allocation
page read and write
2409DFF9000
trusted library allocation
page read and write
340287E000
stack
page read and write
240A0B53000
trusted library allocation
page read and write
2409DAEE000
trusted library allocation
page read and write
240A0A57000
trusted library allocation
page read and write
2408F72F000
heap
page read and write
240A0B2A000
trusted library allocation
page read and write
2409CBA6000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409CCA0000
trusted library allocation
page read and write
2409CF34000
trusted library allocation
page read and write
2409CFC7000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
2409DD9C000
trusted library allocation
page read and write
2409DAF4000
trusted library allocation
page read and write
2409E5D5000
trusted library allocation
page read and write
240A0097000
trusted library allocation
page read and write
A80DD3B000
stack
page read and write
24099187000
trusted library allocation
page read and write
279BA00000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409B3E6000
trusted library allocation
page read and write
2409D5D6000
trusted library allocation
page read and write
2409AA6F000
trusted library allocation
page read and write
240A0044000
trusted library allocation
page read and write
2409FA48000
trusted library allocation
page read and write
2409DCCE000
trusted library allocation
page read and write
2409D3F6000
trusted library allocation
page read and write
2409CB84000
trusted library allocation
page read and write
2409EB2F000
trusted library allocation
page read and write
2409FBCA000
trusted library allocation
page read and write
2409F986000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2071B300000
trusted library allocation
page read and write
2409CC98000
trusted library allocation
page read and write
2409E5D5000
trusted library allocation
page read and write
18443910000
trusted library allocation
page read and write
240993EC000
trusted library allocation
page read and write
2409E79D000
trusted library allocation
page read and write
2409E5D8000
trusted library allocation
page read and write
2409CD28000
trusted library allocation
page read and write
24099DAE000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2408F733000
heap
page read and write
A80450E000
stack
page read and write
2408F72F000
heap
page read and write
2409D936000
trusted library allocation
page read and write
1844457C000
heap
page read and write
2409DD3A000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2408F745000
heap
page read and write
2408F730000
heap
page read and write
2409D1E3000
trusted library allocation
page read and write
2409F8B4000
trusted library allocation
page read and write
2409D343000
trusted library allocation
page read and write
2409AAAD000
trusted library allocation
page read and write
A80F74B000
stack
page read and write
2409AA8A000
trusted library allocation
page read and write
240A0ADF000
trusted library allocation
page read and write
2409D061000
trusted library allocation
page read and write
240A0CB7000
trusted library allocation
page read and write
2408F731000
heap
page read and write
2409D809000
trusted library allocation
page read and write
2409CE67000
trusted library allocation
page read and write
2409D065000
trusted library allocation
page read and write
2409D1BA000
trusted library allocation
page read and write
2409DAEE000
trusted library allocation
page read and write
2408F736000
heap
page read and write
24099DBD000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F733000
heap
page read and write
24099098000
trusted library allocation
page read and write
2409FAB7000
trusted library allocation
page read and write
2409DFB9000
trusted library allocation
page read and write
2409CFB1000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
17EB96ED000
heap
page read and write
240A0CB5000
trusted library allocation
page read and write
2409CCB8000
trusted library allocation
page read and write
2409AA8A000
trusted library allocation
page read and write
2409F7AD000
trusted library allocation
page read and write
2408F757000
heap
page read and write
240A0CFD000
trusted library allocation
page read and write
2409CC6F000
trusted library allocation
page read and write
2409F947000
trusted library allocation
page read and write
2408F739000
heap
page read and write
2409D16F000
trusted library allocation
page read and write
2409D3FB000
trusted library allocation
page read and write
240993EE000
trusted library allocation
page read and write
2409DA89000
trusted library allocation
page read and write
2408F744000
heap
page read and write
18444523000
heap
page read and write
240A0A82000
trusted library allocation
page read and write
2409CB9B000
trusted library allocation
page read and write
2409CC64000
trusted library allocation
page read and write
2409AA9C000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409F96E000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409FA11000
trusted library allocation
page read and write
184444A9000
heap
page read and write
24099923000
trusted library allocation
page read and write
2408F76D000
heap
page read and write
2409E800000
trusted library allocation
page read and write
240990F5000
trusted library allocation
page read and write
240A0AB8000
trusted library allocation
page read and write
24099183000
trusted library allocation
page read and write
240A0A7C000
trusted library allocation
page read and write
240A003D000
trusted library allocation
page read and write
2409CF59000
trusted library allocation
page read and write
240A0A7C000
trusted library allocation
page read and write
2409CC4B000
trusted library allocation
page read and write
2409DF57000
trusted library allocation
page read and write
240A00F6000
trusted library allocation
page read and write
24099187000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409CCB8000
trusted library allocation
page read and write
2409F934000
trusted library allocation
page read and write
347EC8B000
stack
page read and write
240A0D44000
trusted library allocation
page read and write
240A0037000
trusted library allocation
page read and write
24099D86000
trusted library allocation
page read and write
C50000
unkown
page write copy
2409D1FE000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409CCA5000
trusted library allocation
page read and write
A808D32000
stack
page read and write
2408F72D000
heap
page read and write
18444441000
heap
page read and write
2409CD3F000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2409CBA6000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409FF9A000
trusted library allocation
page read and write
2409E547000
trusted library allocation
page read and write
2409D3E7000
trusted library allocation
page read and write
2409CC09000
trusted library allocation
page read and write
240991B6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DAB2000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409CF8A000
trusted library allocation
page read and write
2409E555000
trusted library allocation
page read and write
2409D4ED000
trusted library allocation
page read and write
2409D5ED000
trusted library allocation
page read and write
2409DCF9000
trusted library allocation
page read and write
240A0C56000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
347F7D8000
stack
page read and write
2409D1AD000
trusted library allocation
page read and write
184435A0000
heap
page read and write
2409FAEB000
trusted library allocation
page read and write
24099DE7000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409FA0F000
trusted library allocation
page read and write
E79000
heap
page read and write
2408F737000
heap
page read and write
240A0B84000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409CCC7000
trusted library allocation
page read and write
2409CCB1000
trusted library allocation
page read and write
A80454E000
stack
page read and write
2409FA33000
trusted library allocation
page read and write
2409B3DD000
trusted library allocation
page read and write
2409D873000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
2409E800000
trusted library allocation
page read and write
B34000
heap
page read and write
2409B3E3000
trusted library allocation
page read and write
2409B3DD000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2071AFC5000
remote allocation
page execute read
2409CC0C000
trusted library allocation
page read and write
2409E580000
trusted library allocation
page read and write
2409CB53000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2071B447000
trusted library allocation
page read and write
2409E874000
trusted library allocation
page read and write
2409DC26000
trusted library allocation
page read and write
2409FFF9000
trusted library allocation
page read and write
2409CEC7000
trusted library allocation
page read and write
24099DF5000
trusted library allocation
page read and write
2409F9EA000
trusted library allocation
page read and write
2409D3E1000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
240A00EA000
trusted library allocation
page read and write
2409FBAD000
trusted library allocation
page read and write
2409F9B8000
trusted library allocation
page read and write
2409FF4C000
trusted library allocation
page read and write
2408F733000
heap
page read and write
24099DB2000
trusted library allocation
page read and write
2409D562000
trusted library allocation
page read and write
2409CC6C000
trusted library allocation
page read and write
B55ACBE000
stack
page read and write
A80B73D000
stack
page read and write
2409FBBE000
trusted library allocation
page read and write
18443870000
trusted library section
page readonly
2409B34D000
trusted library allocation
page read and write
2409D169000
trusted library allocation
page read and write
2409DD1D000
trusted library allocation
page read and write
2409D3F3000
trusted library allocation
page read and write
2409D5A1000
trusted library allocation
page read and write
2409B340000
trusted library allocation
page read and write
2409909E000
trusted library allocation
page read and write
2409DDF3000
trusted library allocation
page read and write
2408F742000
heap
page read and write
240993F0000
trusted library allocation
page read and write
498E000
stack
page read and write
2408F741000
heap
page read and write
2408F744000
heap
page read and write
240990EF000
trusted library allocation
page read and write
2409CB4B000
trusted library allocation
page read and write
17EBB2E0000
heap
page read and write
240A0C52000
trusted library allocation
page read and write
2409D1A0000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409CD29000
trusted library allocation
page read and write
2409FA08000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DAAE000
trusted library allocation
page read and write
C1C000
unkown
page readonly
A806FFF000
stack
page read and write
24099065000
trusted library allocation
page read and write
2409F8CF000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2071B4E9000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2408C9A3000
heap
page read and write
2409DAF6000
trusted library allocation
page read and write
2409E599000
trusted library allocation
page read and write
2408CB94000
trusted library allocation
page read and write
184445A7000
heap
page read and write
240A0037000
trusted library allocation
page read and write
2409DAF1000
trusted library allocation
page read and write
240A0B60000
trusted library allocation
page read and write
2409CB19000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409D59E000
trusted library allocation
page read and write
2408F733000
heap
page read and write
240A008B000
trusted library allocation
page read and write
2409FF4C000
trusted library allocation
page read and write
2409DC5B000
trusted library allocation
page read and write
2409D922000
trusted library allocation
page read and write
2409D1B0000
trusted library allocation
page read and write
2409CB7D000
trusted library allocation
page read and write
2409CC4C000
trusted library allocation
page read and write
2409DD7C000
trusted library allocation
page read and write
2409F7BD000
trusted library allocation
page read and write
240A0B60000
trusted library allocation
page read and write
240A0B8A000
trusted library allocation
page read and write
240993E1000
trusted library allocation
page read and write
2409DCE6000
trusted library allocation
page read and write
2408F733000
heap
page read and write
B34000
heap
page read and write
240A0C90000
trusted library allocation
page read and write
2409E555000
trusted library allocation
page read and write
2409CCA7000
trusted library allocation
page read and write
2409DFA2000
trusted library allocation
page read and write
2409FAC1000
trusted library allocation
page read and write
2409CEC4000
trusted library allocation
page read and write
2409913D000
trusted library allocation
page read and write
2409FBFC000
trusted library allocation
page read and write
2409FA33000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F740000
heap
page read and write
2409D9F7000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2071B260000
heap
page read and write
2408F642000
heap
page read and write
184444A0000
heap
page read and write
2409FAEB000
trusted library allocation
page read and write
1844456B000
heap
page read and write
2408F77A000
heap
page read and write
2409FFF7000
trusted library allocation
page read and write
2409FAE1000
trusted library allocation
page read and write
2408C820000
heap
page read and write
2409D31F000
trusted library allocation
page read and write
2409FFE1000
trusted library allocation
page read and write
18444531000
heap
page read and write
3410DFF000
stack
page read and write
2409D92B000
trusted library allocation
page read and write
2409E6EA000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409DAF6000
trusted library allocation
page read and write
240A0AE6000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409D5ED000
trusted library allocation
page read and write
2409CEE1000
trusted library allocation
page read and write
2408C825000
heap
page read and write
24099DBD000
trusted library allocation
page read and write
2409E5B8000
trusted library allocation
page read and write
2409F7E0000
trusted library allocation
page read and write
213BF507000
trusted library allocation
page read and write
17EB9701000
heap
page read and write
2409B3A4000
trusted library allocation
page read and write
2409FA4F000
trusted library allocation
page read and write
18444440000
heap
page read and write
2409CCDE000
trusted library allocation
page read and write
2409CCBE000
trusted library allocation
page read and write
2409DDAD000
trusted library allocation
page read and write
240A0D4A000
trusted library allocation
page read and write
2409FB76000
trusted library allocation
page read and write
2409E5F2000
trusted library allocation
page read and write
2409CBE4000
trusted library allocation
page read and write
2409E5B6000
trusted library allocation
page read and write
2408F731000
heap
page read and write
2408F72C000
heap
page read and write
B35000
heap
page read and write
18443844000
heap
page read and write
2409D080000
trusted library allocation
page read and write
2409E5D8000
trusted library allocation
page read and write
2409CE34000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2409E590000
trusted library allocation
page read and write
2409D1AB000
trusted library allocation
page read and write
2409D3E7000
trusted library allocation
page read and write
2409F986000
trusted library allocation
page read and write
9DB000
stack
page read and write
2408F733000
heap
page read and write
A80FF8F000
stack
page read and write
2409D56F000
trusted library allocation
page read and write
2409E55C000
trusted library allocation
page read and write
24099DBD000
trusted library allocation
page read and write
2408F742000
heap
page read and write
2409DBEE000
trusted library allocation
page read and write
2409D166000
trusted library allocation
page read and write
2409CCB1000
trusted library allocation
page read and write
184435C0000
heap
page read and write
2409D90B000
trusted library allocation
page read and write
2409DD22000
trusted library allocation
page read and write
2409FBDA000
trusted library allocation
page read and write
24099AB0000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2071B45B000
trusted library allocation
page read and write
2409D070000
trusted library allocation
page read and write
2409CF8A000
trusted library allocation
page read and write
2409E565000
trusted library allocation
page read and write
2409F90C000
trusted library allocation
page read and write
2409CC98000
trusted library allocation
page read and write
2408F752000
heap
page read and write
240A0D46000
trusted library allocation
page read and write
A80DABB000
stack
page read and write
2409E542000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DD97000
trusted library allocation
page read and write
240A006B000
trusted library allocation
page read and write
240A0A46000
trusted library allocation
page read and write
2409D5EE000
trusted library allocation
page read and write
2409FBFC000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2408CBD9000
trusted library allocation
page read and write
2409CB9E000
trusted library allocation
page read and write
2071B4C8000
trusted library allocation
page read and write
2409E5D8000
trusted library allocation
page read and write
240A00BF000
trusted library allocation
page read and write
240A0CEF000
trusted library allocation
page read and write
2409AAAB000
trusted library allocation
page read and write
2409D5D7000
trusted library allocation
page read and write
2408C810000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2409B33B000
trusted library allocation
page read and write
240A00F1000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
240A0AFA000
trusted library allocation
page read and write
A80B33B000
stack
page read and write
2408F76C000
heap
page read and write
2409CDA6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409FFA4000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2408F72E000
heap
page read and write
2409D5A5000
trusted library allocation
page read and write
2409FBAF000
trusted library allocation
page read and write
2409914B000
trusted library allocation
page read and write
240990B3000
trusted library allocation
page read and write
2409D57D000
trusted library allocation
page read and write
2408F6C7000
heap
page read and write
2409D09B000
trusted library allocation
page read and write
2409CF88000
trusted library allocation
page read and write
2409FBAD000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2409F919000
trusted library allocation
page read and write
2409D463000
trusted library allocation
page read and write
A80DBBB000
stack
page read and write
2408F662000
heap
page read and write
2409CF8A000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
240999F6000
trusted library allocation
page read and write
2409DD97000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
2408F76E000
heap
page read and write
2409D172000
trusted library allocation
page read and write
24099181000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409AA8A000
trusted library allocation
page read and write
2409EB81000
trusted library allocation
page read and write
2409CF97000
trusted library allocation
page read and write
240993EE000
trusted library allocation
page read and write
A808A7A000
stack
page read and write
2409CCB6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409E55C000
trusted library allocation
page read and write
2409D343000
trusted library allocation
page read and write
2409CB2D000
trusted library allocation
page read and write
2409DD7C000
trusted library allocation
page read and write
4D8F000
stack
page read and write
B55A3FE000
stack
page read and write
2409B3F6000
trusted library allocation
page read and write
2409CB80000
trusted library allocation
page read and write
2409CB87000
trusted library allocation
page read and write
2409D084000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409D4F9000
trusted library allocation
page read and write
2408F728000
heap
page read and write
B557958000
stack
page read and write
2409DBEE000
trusted library allocation
page read and write
2408F72F000
heap
page read and write
2071B400000
trusted library allocation
page read and write
24099DD7000
trusted library allocation
page read and write
2409D90B000
trusted library allocation
page read and write
2071B51E000
trusted library allocation
page read and write
2409D15B000
trusted library allocation
page read and write
18443900000
trusted library allocation
page read and write
2409D4C6000
trusted library allocation
page read and write
A8067FF000
stack
page read and write
24099181000
trusted library allocation
page read and write
18443580000
heap
page read and write
2408F736000
heap
page read and write
2408F757000
heap
page read and write
2409F781000
trusted library allocation
page read and write
2409CC64000
trusted library allocation
page read and write
2409E590000
trusted library allocation
page read and write
2409F934000
trusted library allocation
page read and write
240A0C4E000
trusted library allocation
page read and write
2409E580000
trusted library allocation
page read and write
B81000
unkown
page execute read
2409CED3000
trusted library allocation
page read and write
2409CF48000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409CF8A000
trusted library allocation
page read and write
2409CF8A000
trusted library allocation
page read and write
A80DDBB000
stack
page read and write
2409FBC1000
trusted library allocation
page read and write
2409DE47000
trusted library allocation
page read and write
2409D174000
trusted library allocation
page read and write
2409D9BA000
trusted library allocation
page read and write
2409DAD3000
trusted library allocation
page read and write
2409DAC2000
trusted library allocation
page read and write
2409DD36000
trusted library allocation
page read and write
240A0D48000
trusted library allocation
page read and write
454E000
stack
page read and write
24099167000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
240A0D42000
trusted library allocation
page read and write
2409CB98000
trusted library allocation
page read and write
24099D7E000
trusted library allocation
page read and write
18444569000
heap
page read and write
2409D3F6000
trusted library allocation
page read and write
2409D197000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D377000
trusted library allocation
page read and write
2409CED2000
trusted library allocation
page read and write
2408F742000
heap
page read and write
2408F741000
heap
page read and write
2408F745000
heap
page read and write
240A0A59000
trusted library allocation
page read and write
240A0A7C000
trusted library allocation
page read and write
2409FF44000
trusted library allocation
page read and write
240A001F000
trusted library allocation
page read and write
2408F74A000
heap
page read and write
24099187000
trusted library allocation
page read and write
2409D070000
trusted library allocation
page read and write
18443700000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2071B1AF000
unclassified section
page read and write
2409CC4C000
trusted library allocation
page read and write
2409DC4E000
trusted library allocation
page read and write
2409CB84000
trusted library allocation
page read and write
2409918E000
trusted library allocation
page read and write
A80DB7A000
stack
page read and write
2409F7BD000
trusted library allocation
page read and write
2409F940000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D09B000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
2409D085000
trusted library allocation
page read and write
2409FFA4000
trusted library allocation
page read and write
2409DADA000
trusted library allocation
page read and write
1DFF000
stack
page read and write
2409DCF9000
trusted library allocation
page read and write
2409AA7C000
trusted library allocation
page read and write
2408F76F000
heap
page read and write
2409DF92000
trusted library allocation
page read and write
2409CFCA000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
2430003F000
trusted library allocation
page read and write
240A001F000
trusted library allocation
page read and write
2409D534000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2409F8C0000
trusted library allocation
page read and write
2409F957000
trusted library allocation
page read and write
240999FE000
trusted library allocation
page read and write
2409DD29000
trusted library allocation
page read and write
2409DC7E000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2408F733000
heap
page read and write
2409D880000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
240A0097000
trusted library allocation
page read and write
2409DDC2000
trusted library allocation
page read and write
2409E5C7000
trusted library allocation
page read and write
2409E5D9000
trusted library allocation
page read and write
2409D05F000
trusted library allocation
page read and write
E26000
heap
page read and write
2409CF43000
trusted library allocation
page read and write
2409CCCD000
trusted library allocation
page read and write
E00000
heap
page read and write
2408F72A000
heap
page read and write
2409FA29000
trusted library allocation
page read and write
2409D145000
trusted library allocation
page read and write
2409CE62000
trusted library allocation
page read and write
2409E553000
trusted library allocation
page read and write
240A0AB3000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
2409D564000
trusted library allocation
page read and write
240999F6000
trusted library allocation
page read and write
2408CB03000
trusted library allocation
page read and write
18443E88000
heap
page read and write
24099DEE000
trusted library allocation
page read and write
2409D373000
trusted library allocation
page read and write
B34000
heap
page read and write
2409B3F9000
trusted library allocation
page read and write
2409DAF4000
trusted library allocation
page read and write
240999F6000
trusted library allocation
page read and write
2409D9AD000
trusted library allocation
page read and write
213BF50A000
trusted library allocation
page read and write
2409AA66000
trusted library allocation
page read and write
2409DAE7000
trusted library allocation
page read and write
24099159000
trusted library allocation
page read and write
240A0CF6000
trusted library allocation
page read and write
2409D1BB000
trusted library allocation
page read and write
24099187000
trusted library allocation
page read and write
2408CB49000
trusted library allocation
page read and write
2409FFE1000
trusted library allocation
page read and write
2409FAA1000
trusted library allocation
page read and write
2071AF40000
unclassified section
page readonly
2409FAD7000
trusted library allocation
page read and write
2409FA33000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F742000
heap
page read and write
240A0B28000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
2409DC91000
trusted library allocation
page read and write
2408F731000
heap
page read and write
2409D319000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2409DD32000
trusted library allocation
page read and write
2409DC3F000
trusted library allocation
page read and write
240991E1000
trusted library allocation
page read and write
2409B3F9000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
2409CCAE000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409DC51000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409CB64000
trusted library allocation
page read and write
2409CCA5000
trusted library allocation
page read and write
240991AE000
trusted library allocation
page read and write
213BF210000
heap
page read and write
2409D06C000
trusted library allocation
page read and write
2409D1C4000
trusted library allocation
page read and write
2409D329000
trusted library allocation
page read and write
24099DFD000
trusted library allocation
page read and write
2408F6E9000
heap
page read and write
240A0D10000
trusted library allocation
page read and write
184445A7000
heap
page read and write
24099085000
trusted library allocation
page read and write
18444598000
heap
page read and write
2409CF7D000
trusted library allocation
page read and write
240993F0000
trusted library allocation
page read and write
2409E754000
trusted library allocation
page read and write
2409B3EB000
trusted library allocation
page read and write
2409D186000
trusted library allocation
page read and write
2409DAFB000
trusted library allocation
page read and write
2409CCA5000
trusted library allocation
page read and write
2409FAC1000
trusted library allocation
page read and write
17EB96F2000
heap
page read and write
2409CE67000
trusted library allocation
page read and write
A80AB3F000
stack
page read and write
18444520000
heap
page read and write
2FC7DFF000
stack
page read and write
2409F7E0000
trusted library allocation
page read and write
B34000
heap
page read and write
2409DCC0000
trusted library allocation
page read and write
2408C7F0000
heap
page read and write
2408F736000
heap
page read and write
24099DE7000
trusted library allocation
page read and write
2409D5F2000
trusted library allocation
page read and write
2409E763000
trusted library allocation
page read and write
2409E580000
trusted library allocation
page read and write
2409FF82000
trusted library allocation
page read and write
2408F72F000
heap
page read and write
2409D1C1000
trusted library allocation
page read and write
2408F736000
heap
page read and write
240A00E6000
trusted library allocation
page read and write
2409FBBC000
trusted library allocation
page read and write
2409D557000
trusted library allocation
page read and write
240A00A5000
trusted library allocation
page read and write
2409CF4C000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DCEF000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409FBF5000
trusted library allocation
page read and write
2409FFBA000
trusted library allocation
page read and write
2409FF38000
trusted library allocation
page read and write
18444528000
heap
page read and write
2409DD22000
trusted library allocation
page read and write
2409CCB1000
trusted library allocation
page read and write
2409D5D5000
trusted library allocation
page read and write
C4C000
unkown
page write copy
2409CF8A000
trusted library allocation
page read and write
2409F8B4000
trusted library allocation
page read and write
240A00F1000
trusted library allocation
page read and write
2408F742000
heap
page read and write
2409E5C0000
trusted library allocation
page read and write
2409AA56000
trusted library allocation
page read and write
2409B327000
trusted library allocation
page read and write
2409DF45000
trusted library allocation
page read and write
17EB9620000
heap
page read and write
2409FF41000
trusted library allocation
page read and write
2409D4F9000
trusted library allocation
page read and write
2408F745000
heap
page read and write
24099DBA000
trusted library allocation
page read and write
2409F100000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409FBD4000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409FFC2000
trusted library allocation
page read and write
2409F950000
trusted library allocation
page read and write
A80C93E000
stack
page read and write
2409AD08000
trusted library allocation
page read and write
2409CFF3000
trusted library allocation
page read and write
1844456D000
heap
page read and write
A80DE3E000
stack
page read and write
2408F730000
heap
page read and write
2409D5AE000
trusted library allocation
page read and write
2409FA3E000
trusted library allocation
page read and write
240993C7000
trusted library allocation
page read and write
2409CF8A000
trusted library allocation
page read and write
240A0C4C000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409EC21000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F733000
heap
page read and write
184444A9000
heap
page read and write
2408F750000
heap
page read and write
2408F6C7000
heap
page read and write
240A0A8C000
trusted library allocation
page read and write
2408F745000
heap
page read and write
3A01000
heap
page read and write
2409B3ED000
trusted library allocation
page read and write
2408F787000
heap
page read and write
3A01000
heap
page read and write
2409D3FB000
trusted library allocation
page read and write
2409CFD3000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
240A0A53000
trusted library allocation
page read and write
2409F90C000
trusted library allocation
page read and write
2409DD20000
trusted library allocation
page read and write
24099DD9000
trusted library allocation
page read and write
2409DAF1000
trusted library allocation
page read and write
240993FD000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409D4ED000
trusted library allocation
page read and write
2409FF3C000
trusted library allocation
page read and write
184444F2000
heap
page read and write
2408C740000
unclassified section
page readonly
2408F733000
heap
page read and write
2408F727000
heap
page read and write
2409D3F3000
trusted library allocation
page read and write
2409D4F9000
trusted library allocation
page read and write
2409DCA5000
trusted library allocation
page read and write
2409DC51000
trusted library allocation
page read and write
2409D5EE000
trusted library allocation
page read and write
2409DF2B000
trusted library allocation
page read and write
2409AB08000
trusted library allocation
page read and write
2409B3D9000
trusted library allocation
page read and write
2409CE67000
trusted library allocation
page read and write
2409DCCE000
trusted library allocation
page read and write
2408CB00000
trusted library allocation
page read and write
2409CB8E000
trusted library allocation
page read and write
C42000
unkown
page readonly
2409B20A000
trusted library allocation
page read and write
2409CF43000
trusted library allocation
page read and write
2409CFF3000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409D1C4000
trusted library allocation
page read and write
2409CC11000
trusted library allocation
page read and write
240A0C48000
trusted library allocation
page read and write
2409CF5E000
trusted library allocation
page read and write
24099AE4000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
2409CFD3000
trusted library allocation
page read and write
2408CB5F000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2408F727000
heap
page read and write
2409CB87000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
240993EC000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
2409FA30000
trusted library allocation
page read and write
240991E6000
trusted library allocation
page read and write
240990C4000
trusted library allocation
page read and write
240A0C7A000
trusted library allocation
page read and write
A804FD8000
stack
page read and write
2408F736000
heap
page read and write
2409FBA7000
trusted library allocation
page read and write
3400FFE000
unkown
page readonly
2409D171000
trusted library allocation
page read and write
2409B342000
trusted library allocation
page read and write
2409D59E000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
2409AA86000
trusted library allocation
page read and write
2409F77B000
trusted library allocation
page read and write
2409FBFC000
trusted library allocation
page read and write
2409CCA7000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
51CC000
stack
page read and write
2409FA68000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
3A01000
heap
page read and write
2408F73B000
heap
page read and write
240A0A8C000
trusted library allocation
page read and write
240A0A74000
trusted library allocation
page read and write
24099A26000
trusted library allocation
page read and write
2409E5DA000
trusted library allocation
page read and write
B34000
heap
page read and write
2409DC84000
trusted library allocation
page read and write
2409F771000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
2409D5B7000
trusted library allocation
page read and write
2408F739000
heap
page read and write
184435CA000
heap
page read and write
2409E580000
trusted library allocation
page read and write
2409E11C000
trusted library allocation
page read and write
184439CD000
trusted library allocation
page read and write
2409CE58000
trusted library allocation
page read and write
2409FAAC000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
240A0B5C000
trusted library allocation
page read and write
2409DFB9000
trusted library allocation
page read and write
2409F9EF000
trusted library allocation
page read and write
2409DE33000
trusted library allocation
page read and write
240A0CB3000
trusted library allocation
page read and write
2071B600000
heap
page read and write
2409D540000
trusted library allocation
page read and write
2409FF8F000
trusted library allocation
page read and write
24099052000
trusted library allocation
page read and write
24099A82000
trusted library allocation
page read and write
2409CC69000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F745000
heap
page read and write
2408F727000
heap
page read and write
2408F743000
heap
page read and write
240991DE000
trusted library allocation
page read and write
184444A9000
heap
page read and write
18444569000
heap
page read and write
2409FA52000
trusted library allocation
page read and write
2409E585000
trusted library allocation
page read and write
2409DF45000
trusted library allocation
page read and write
2409F8C0000
trusted library allocation
page read and write
240A0A78000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408E7D0000
heap
page read and write
240A0D4A000
trusted library allocation
page read and write
240A00C6000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409FAD7000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
2409D936000
trusted library allocation
page read and write
240A0C52000
trusted library allocation
page read and write
2409CE67000
trusted library allocation
page read and write
2409F947000
trusted library allocation
page read and write
2409F95F000
trusted library allocation
page read and write
B34000
heap
page read and write
2409E773000
trusted library allocation
page read and write
2409D512000
trusted library allocation
page read and write
2409AA80000
trusted library allocation
page read and write
240A0AAC000
trusted library allocation
page read and write
A80D17C000
stack
page read and write
2409D5F2000
trusted library allocation
page read and write
24099D7E000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2409D1C4000
trusted library allocation
page read and write
A80DD7B000
stack
page read and write
2408C82A000
heap
page read and write
1844452E000
heap
page read and write
240993C6000
trusted library allocation
page read and write
2409D037000
trusted library allocation
page read and write
2409D061000
trusted library allocation
page read and write
2409CF43000
trusted library allocation
page read and write
1844453C000
heap
page read and write
2409CCA7000
trusted library allocation
page read and write
2409DD32000
trusted library allocation
page read and write
2071B0D0000
heap
page read and write
2409E5E5000
trusted library allocation
page read and write
240A0D44000
trusted library allocation
page read and write
24099A13000
trusted library allocation
page read and write
240A0CBF000
trusted library allocation
page read and write
2409DAB2000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2409FA33000
trusted library allocation
page read and write
2409D1B0000
trusted library allocation
page read and write
240A0017000
trusted library allocation
page read and write
24099056000
trusted library allocation
page read and write
2409F7F2000
trusted library allocation
page read and write
2409F421000
trusted library allocation
page read and write
240A0D44000
trusted library allocation
page read and write
2409CCBE000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2409CCDE000
trusted library allocation
page read and write
2409FB76000
trusted library allocation
page read and write
240A0B84000
trusted library allocation
page read and write
240A0A5F000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409D5D6000
trusted library allocation
page read and write
18444561000
heap
page read and write
2409CBA6000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409D9C7000
trusted library allocation
page read and write
2409D9CB000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F733000
heap
page read and write
2409FA9A000
trusted library allocation
page read and write
2409D174000
trusted library allocation
page read and write
2408F730000
heap
page read and write
240A0095000
trusted library allocation
page read and write
2409D05D000
trusted library allocation
page read and write
2408F72D000
heap
page read and write
CFD000
stack
page read and write
2409D06C000
trusted library allocation
page read and write
2409FB83000
trusted library allocation
page read and write
2409F8C0000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409DCB5000
trusted library allocation
page read and write
2409CB22000
trusted library allocation
page read and write
240A0B52000
trusted library allocation
page read and write
2071B1A2000
unclassified section
page read and write
2409CB78000
trusted library allocation
page read and write
2409CE5B000
trusted library allocation
page read and write
2409CD38000
trusted library allocation
page read and write
240A0C50000
trusted library allocation
page read and write
2071B46E000
trusted library allocation
page read and write
2408F768000
heap
page read and write
2408F742000
heap
page read and write
240A0D4E000
trusted library allocation
page read and write
2409D16A000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
240A0A61000
trusted library allocation
page read and write
2409E565000
trusted library allocation
page read and write
24099A26000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2071B1B6000
heap
page read and write
2409E55E000
trusted library allocation
page read and write
A806635000
stack
page read and write
2409D1D4000
trusted library allocation
page read and write
2409D1B5000
trusted library allocation
page read and write
2409E5F2000
trusted library allocation
page read and write
240A0A63000
trusted library allocation
page read and write
2409DADA000
trusted library allocation
page read and write
2409DD3F000
trusted library allocation
page read and write
240A00ED000
trusted library allocation
page read and write
2408F733000
heap
page read and write
18443840000
heap
page read and write
18444528000
heap
page read and write
2409CB80000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D44E000
trusted library allocation
page read and write
2409CC3B000
trusted library allocation
page read and write
A80BF3D000
stack
page read and write
2409CEE4000
trusted library allocation
page read and write
2409FF8B000
trusted library allocation
page read and write
2409D074000
trusted library allocation
page read and write
2409D13B000
trusted library allocation
page read and write
2409D13B000
trusted library allocation
page read and write
2409DAF1000
trusted library allocation
page read and write
2409DE33000
trusted library allocation
page read and write
2409F9CC000
trusted library allocation
page read and write
2408F613000
heap
page read and write
240A0AB3000
trusted library allocation
page read and write
2408F768000
heap
page read and write
240A001A000
trusted library allocation
page read and write
2409EBC1000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F72B000
heap
page read and write
2409DCC9000
trusted library allocation
page read and write
2409D1A4000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409CCDE000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2409EB5F000
trusted library allocation
page read and write
2409F8FD000
trusted library allocation
page read and write
2409F8FD000
trusted library allocation
page read and write
2409D4C6000
trusted library allocation
page read and write
15FD000
stack
page read and write
2071B1B0000
heap
page read and write
240A003D000
trusted library allocation
page read and write
2409FAAB000
trusted library allocation
page read and write
2409D191000
trusted library allocation
page read and write
340307E000
unkown
page readonly
2409CF95000
trusted library allocation
page read and write
2409DFB9000
trusted library allocation
page read and write
2409DAFD000
trusted library allocation
page read and write
240991B6000
trusted library allocation
page read and write
2409CE58000
trusted library allocation
page read and write
563D000
stack
page read and write
2409D1EA000
trusted library allocation
page read and write
2409FA40000
trusted library allocation
page read and write
2409FB92000
trusted library allocation
page read and write
2409CBE8000
trusted library allocation
page read and write
2409DAEE000
trusted library allocation
page read and write
2409E5CB000
trusted library allocation
page read and write
2409CB80000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
2409D9F7000
trusted library allocation
page read and write
2409CC9C000
trusted library allocation
page read and write
A8045CD000
stack
page read and write
2408F743000
heap
page read and write
240A0DC6000
trusted library allocation
page read and write
2408F757000
heap
page read and write
24099DA1000
trusted library allocation
page read and write
184444E1000
heap
page read and write
1844392F000
trusted library allocation
page read and write
24099D63000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409CFD3000
trusted library allocation
page read and write
2409FA70000
trusted library allocation
page read and write
240A0A74000
trusted library allocation
page read and write
2409D936000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
2409D365000
trusted library allocation
page read and write
2409B34D000
trusted library allocation
page read and write
2409F7BD000
trusted library allocation
page read and write
2408F742000
heap
page read and write
2409D0CA000
trusted library allocation
page read and write
2409FFCA000
trusted library allocation
page read and write
2408F5F0000
heap
page read and write
2408F73A000
heap
page read and write
2408F733000
heap
page read and write
2409CC62000
trusted library allocation
page read and write
2409FBCA000
trusted library allocation
page read and write
2409DFFC000
trusted library allocation
page read and write
2409DCCE000
trusted library allocation
page read and write
2408F744000
heap
page read and write
240A0CEC000
trusted library allocation
page read and write
2409FF41000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F743000
heap
page read and write
2408F742000
heap
page read and write
2408F72F000
heap
page read and write
2409D40D000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409FBFC000
trusted library allocation
page read and write
2408F72D000
heap
page read and write
B55789D000
stack
page read and write
1844452E000
heap
page read and write
2409CF2F000
trusted library allocation
page read and write
2409DD8E000
trusted library allocation
page read and write
2071B140000
heap
page read and write
2409E5D8000
trusted library allocation
page read and write
2409D873000
trusted library allocation
page read and write
240A0D06000
trusted library allocation
page read and write
2409D9C0000
trusted library allocation
page read and write
2409F947000
trusted library allocation
page read and write
2408CB0E000
trusted library allocation
page read and write
2408F744000
heap
page read and write
213BF1B0000
heap
page read and write
24099DB7000
trusted library allocation
page read and write
18444585000
heap
page read and write
18443E60000
heap
page read and write
18444532000
heap
page read and write
240991E1000
trusted library allocation
page read and write
24099976000
trusted library allocation
page read and write
2409DAA0000
trusted library allocation
page read and write
2409FB9D000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2409DC5B000
trusted library allocation
page read and write
2409FF4B000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409CC4A000
trusted library allocation
page read and write
24099DA1000
trusted library allocation
page read and write
240A0D48000
trusted library allocation
page read and write
A80B93D000
stack
page read and write
240A0A8E000
trusted library allocation
page read and write
2409D550000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409DC51000
trusted library allocation
page read and write
240A0AFA000
trusted library allocation
page read and write
2409F940000
trusted library allocation
page read and write
2409CEC7000
trusted library allocation
page read and write
2409F957000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
240A0D21000
trusted library allocation
page read and write
2409DD19000
trusted library allocation
page read and write
2409D5B8000
trusted library allocation
page read and write
240A0D46000
trusted library allocation
page read and write
2409E7F8000
trusted library allocation
page read and write
2409D940000
trusted library allocation
page read and write
2409D884000
trusted library allocation
page read and write
240A0C50000
trusted library allocation
page read and write
2409D1E3000
trusted library allocation
page read and write
240A0B58000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409FFBC000
trusted library allocation
page read and write
2409CC98000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
9CF000
stack
page read and write
2408F726000
heap
page read and write
24099157000
trusted library allocation
page read and write
2409AE09000
trusted library allocation
page read and write
2409CC75000
trusted library allocation
page read and write
240A0A5D000
trusted library allocation
page read and write
2408F745000
heap
page read and write
24099061000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2408F731000
heap
page read and write
2408F733000
heap
page read and write
A80F70E000
stack
page read and write
347ED8E000
stack
page read and write
2408F768000
heap
page read and write
2409D527000
trusted library allocation
page read and write
2409CDA6000
trusted library allocation
page read and write
3A01000
heap
page read and write
184444F9000
heap
page read and write
2408F745000
heap
page read and write
240A0B55000
trusted library allocation
page read and write
240A0D16000
trusted library allocation
page read and write
2409FAC4000
trusted library allocation
page read and write
240A0B4A000
trusted library allocation
page read and write
2409E5D2000
trusted library allocation
page read and write
2409FAAC000
trusted library allocation
page read and write
2409DCC9000
trusted library allocation
page read and write
2409DD36000
trusted library allocation
page read and write
240A0B8E000
trusted library allocation
page read and write
2409CC9C000
trusted library allocation
page read and write
2408F742000
heap
page read and write
240A0069000
trusted library allocation
page read and write
2409D36C000
trusted library allocation
page read and write
2409E5F2000
trusted library allocation
page read and write
347ECCE000
unkown
page readonly
2408F733000
heap
page read and write
2408F76C000
heap
page read and write
2409DCE6000
trusted library allocation
page read and write
184444A9000
heap
page read and write
2409CBAB000
trusted library allocation
page read and write
240990A4000
trusted library allocation
page read and write
240A0A78000
trusted library allocation
page read and write
2409FF38000
trusted library allocation
page read and write
2409CF8F000
trusted library allocation
page read and write
240A0A88000
trusted library allocation
page read and write
240A004F000
trusted library allocation
page read and write
2408F738000
heap
page read and write
2409F728000
trusted library allocation
page read and write
18443F88000
unkown
page execute read
2071AFF0000
heap
page read and write
B34000
heap
page read and write
240990CA000
trusted library allocation
page read and write
2409FF8B000
trusted library allocation
page read and write
2409CBA1000
trusted library allocation
page read and write
2409F98F000
trusted library allocation
page read and write
2409D44F000
trusted library allocation
page read and write
24099DD9000
trusted library allocation
page read and write
240A0AB3000
trusted library allocation
page read and write
2409B3F6000
trusted library allocation
page read and write
2408F733000
heap
page read and write
240A0A78000
trusted library allocation
page read and write
24099090000
trusted library allocation
page read and write
2409CC1B000
trusted library allocation
page read and write
2409E5DD000
trusted library allocation
page read and write
2071B4AA000
trusted library allocation
page read and write
2409AA9C000
trusted library allocation
page read and write
240A0B20000
trusted library allocation
page read and write
240991E1000
trusted library allocation
page read and write
240A0A82000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409D56B000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409DDB6000
trusted library allocation
page read and write
240A00D3000
trusted library allocation
page read and write
2409D3F9000
trusted library allocation
page read and write
240A0AE6000
trusted library allocation
page read and write
24099098000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409D1CC000
trusted library allocation
page read and write
2409D1DB000
trusted library allocation
page read and write
2409CC9C000
trusted library allocation
page read and write
2071B50C000
trusted library allocation
page read and write
2071B500000
trusted library allocation
page read and write
2409D139000
trusted library allocation
page read and write
2409B3E6000
trusted library allocation
page read and write
2409B340000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2409AA68000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2409CFB1000
trusted library allocation
page read and write
2408F727000
heap
page read and write
240A0BC2000
trusted library allocation
page read and write
B55795B000
stack
page read and write
2408F727000
heap
page read and write
2409E6E0000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409CE73000
trusted library allocation
page read and write
2409CDD0000
trusted library allocation
page read and write
2409D8CB000
trusted library allocation
page read and write
2408F74D000
heap
page read and write
2409FF8F000
trusted library allocation
page read and write
2409DBF2000
trusted library allocation
page read and write
B35000
heap
page read and write
24099A8C000
trusted library allocation
page read and write
2409CFD3000
trusted library allocation
page read and write
240A0B8B000
trusted library allocation
page read and write
240A00D9000
trusted library allocation
page read and write
24099A80000
trusted library allocation
page read and write
2409D5DC000
trusted library allocation
page read and write
2409F96E000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
2408F733000
heap
page read and write
2409D35E000
trusted library allocation
page read and write
2408F732000
heap
page read and write
240A0AB3000
trusted library allocation
page read and write
2409D1E6000
trusted library allocation
page read and write
18443914000
trusted library allocation
page read and write
2409D08B000
trusted library allocation
page read and write
18444531000
heap
page read and write
240993C6000
trusted library allocation
page read and write
2071B47B000
trusted library allocation
page read and write
2409FA61000
trusted library allocation
page read and write
2409CBE0000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409CF59000
trusted library allocation
page read and write
2409D5F8000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
2409F8CF000
trusted library allocation
page read and write
2409D90B000
trusted library allocation
page read and write
3A01000
heap
page read and write
240A0D50000
trusted library allocation
page read and write
2409DFB7000
trusted library allocation
page read and write
2408F731000
heap
page read and write
C1C000
unkown
page readonly
2409CBD0000
trusted library allocation
page read and write
2409B3F0000
trusted library allocation
page read and write
2071B403000
trusted library allocation
page read and write
2409CF97000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
A8071FE000
stack
page read and write
2409CC18000
trusted library allocation
page read and write
2408F733000
heap
page read and write
240993C6000
trusted library allocation
page read and write
2409F8C0000
trusted library allocation
page read and write
24099DF5000
trusted library allocation
page read and write
2409FA27000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409F9EF000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409DACF000
trusted library allocation
page read and write
2409FA05000
trusted library allocation
page read and write
2409D4D7000
trusted library allocation
page read and write
A80933D000
stack
page read and write
A80A33E000
stack
page read and write
240A0ABD000
trusted library allocation
page read and write
2408F739000
heap
page read and write
2409CF63000
trusted library allocation
page read and write
2409DD83000
trusted library allocation
page read and write
2409992F000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2409D1ED000
trusted library allocation
page read and write
2408C750000
unclassified section
page readonly
2409CB1D000
trusted library allocation
page read and write
2409D1AB000
trusted library allocation
page read and write
2409D174000
trusted library allocation
page read and write
2409FA52000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409D1CC000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DADE000
trusted library allocation
page read and write
2409FA32000
trusted library allocation
page read and write
2409E824000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
240A0A82000
trusted library allocation
page read and write
2408F736000
heap
page read and write
240991E6000
trusted library allocation
page read and write
2409D884000
trusted library allocation
page read and write
240A0A70000
trusted library allocation
page read and write
2409CCA5000
trusted library allocation
page read and write
2409EC08000
trusted library allocation
page read and write
2409D59A000
trusted library allocation
page read and write
2409D184000
trusted library allocation
page read and write
184444CA000
heap
page read and write
240990CD000
trusted library allocation
page read and write
24099D86000
trusted library allocation
page read and write
2409D9CB000
trusted library allocation
page read and write
240A0D4A000
trusted library allocation
page read and write
2409D354000
trusted library allocation
page read and write
240A0B84000
trusted library allocation
page read and write
240991B6000
trusted library allocation
page read and write
2409D5DE000
trusted library allocation
page read and write
3411DFF000
stack
page read and write
2408F733000
heap
page read and write
2409CF69000
trusted library allocation
page read and write
1844452E000
heap
page read and write
2409B387000
trusted library allocation
page read and write
240A0024000
trusted library allocation
page read and write
2409D1AB000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F744000
heap
page read and write
2408F745000
heap
page read and write
E32000
heap
page read and write
2408F750000
heap
page read and write
2409B3E8000
trusted library allocation
page read and write
2409DBF2000
trusted library allocation
page read and write
240A0CF5000
trusted library allocation
page read and write
2408F744000
heap
page read and write
B35000
heap
page read and write
2408F72F000
heap
page read and write
24099D63000
trusted library allocation
page read and write
A8045FE000
stack
page read and write
2409CCE2000
trusted library allocation
page read and write
2409DC9D000
trusted library allocation
page read and write
2409D1E8000
trusted library allocation
page read and write
18444531000
heap
page read and write
2409D5F9000
trusted library allocation
page read and write
2408F738000
heap
page read and write
2408F72A000
heap
page read and write
24099AA0000
trusted library allocation
page read and write
B34000
heap
page read and write
2409CF88000
trusted library allocation
page read and write
B34000
heap
page read and write
2409B332000
trusted library allocation
page read and write
2409FBA2000
trusted library allocation
page read and write
2409E6EA000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409D069000
trusted library allocation
page read and write
2408C980000
heap
page readonly
240A00CF000
trusted library allocation
page read and write
2409FAE3000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D92B000
trusted library allocation
page read and write
2409FBD4000
trusted library allocation
page read and write
24099D9F000
trusted library allocation
page read and write
2409D873000
trusted library allocation
page read and write
2409D16E000
trusted library allocation
page read and write
2409AA8A000
trusted library allocation
page read and write
2409D5D6000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2409E5E5000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2408F733000
heap
page read and write
A808B0E000
stack
page read and write
2408F768000
heap
page read and write
240993F0000
trusted library allocation
page read and write
2409CF5E000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DF23000
trusted library allocation
page read and write
240A0D90000
trusted library allocation
page read and write
2409D884000
trusted library allocation
page read and write
2409D5D4000
trusted library allocation
page read and write
240A0CBD000
trusted library allocation
page read and write
2409DFE8000
trusted library allocation
page read and write
2409E547000
trusted library allocation
page read and write
2409DABF000
trusted library allocation
page read and write
240A0ADF000
trusted library allocation
page read and write
A80DDFE000
stack
page read and write
E40000
heap
page read and write
2409CEE7000
trusted library allocation
page read and write
2409B3F0000
trusted library allocation
page read and write
2409F7B7000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
240A0CE6000
trusted library allocation
page read and write
2409CCB8000
trusted library allocation
page read and write
2409D4F9000
trusted library allocation
page read and write
240A0CBD000
trusted library allocation
page read and write
2409B3B4000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
2409CB78000
trusted library allocation
page read and write
2409D392000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
2409AA86000
trusted library allocation
page read and write
2409AA6F000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
240A0D06000
trusted library allocation
page read and write
2409FA6D000
trusted library allocation
page read and write
24099098000
trusted library allocation
page read and write
2409CB7B000
trusted library allocation
page read and write
2409D1A9000
trusted library allocation
page read and write
2409D53D000
trusted library allocation
page read and write
2409E800000
trusted library allocation
page read and write
2409CB2D000
trusted library allocation
page read and write
E79000
heap
page read and write
2409DAC3000
trusted library allocation
page read and write
240A00FE000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
18443948000
trusted library allocation
page read and write
2409D5F2000
trusted library allocation
page read and write
240990DB000
trusted library allocation
page read and write
2071AF50000
unclassified section
page readonly
240A0C85000
trusted library allocation
page read and write
240993E1000
trusted library allocation
page read and write
2409E585000
trusted library allocation
page read and write
2409EB08000
trusted library allocation
page read and write
24099181000
trusted library allocation
page read and write
240990B4000
trusted library allocation
page read and write
2409CB1D000
trusted library allocation
page read and write
2409CB64000
trusted library allocation
page read and write
2071B53D000
trusted library allocation
page read and write
2408F743000
heap
page read and write
240A0BC2000
trusted library allocation
page read and write
240A0095000
trusted library allocation
page read and write
2409FF5C000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
2409CE67000
trusted library allocation
page read and write
3410DFC000
stack
page read and write
2409F9B8000
trusted library allocation
page read and write
2409DD24000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
2409B3E6000
trusted library allocation
page read and write
24099DEE000
trusted library allocation
page read and write
2409B3EB000
trusted library allocation
page read and write
2409D9AD000
trusted library allocation
page read and write
2409DDFD000
trusted library allocation
page read and write
240A0D21000
trusted library allocation
page read and write
2409CB53000
trusted library allocation
page read and write
2409B3F0000
trusted library allocation
page read and write
1844457C000
heap
page read and write
240A0A5F000
trusted library allocation
page read and write
3A01000
heap
page read and write
2408F725000
heap
page read and write
2409D1B0000
trusted library allocation
page read and write
2409DACF000
trusted library allocation
page read and write
18443994000
trusted library allocation
page read and write
2409FAAC000
trusted library allocation
page read and write
CAD000
stack
page read and write
2408F730000
heap
page read and write
2409DA9B000
trusted library allocation
page read and write
2409F98F000
trusted library allocation
page read and write
2409E565000
trusted library allocation
page read and write
2409DFD4000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409CC3B000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D1DB000
trusted library allocation
page read and write
2409FA40000
trusted library allocation
page read and write
A8066FD000
stack
page read and write
2408F768000
heap
page read and write
2409CF7D000
trusted library allocation
page read and write
2409D884000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
240A0A6C000
trusted library allocation
page read and write
2409E5DA000
trusted library allocation
page read and write
2409DC22000
trusted library allocation
page read and write
2408F778000
heap
page read and write
2409B008000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409CBEA000
trusted library allocation
page read and write
240A0AA8000
trusted library allocation
page read and write
2409CB64000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409FA13000
trusted library allocation
page read and write
2409D1BA000
trusted library allocation
page read and write
24099DD7000
trusted library allocation
page read and write
2409DCA5000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409FBAF000
trusted library allocation
page read and write
24099081000
trusted library allocation
page read and write
B5578DE000
unkown
page readonly
2408F768000
heap
page read and write
24099971000
trusted library allocation
page read and write
240A0CBF000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2408F744000
heap
page read and write
2409CB22000
trusted library allocation
page read and write
3F40000
heap
page read and write
2408F733000
heap
page read and write
2409918A000
trusted library allocation
page read and write
17EB9A65000
heap
page read and write
2409FB9D000
trusted library allocation
page read and write
2409DAF4000
trusted library allocation
page read and write
2409D1B5000
trusted library allocation
page read and write
2409D5C4000
trusted library allocation
page read and write
240990BF000
trusted library allocation
page read and write
2409F9EF000
trusted library allocation
page read and write
2409DBE1000
trusted library allocation
page read and write
A8057FE000
stack
page read and write
2409F9C7000
trusted library allocation
page read and write
2409CB10000
trusted library allocation
page read and write
2409CF53000
trusted library allocation
page read and write
2409DAF4000
trusted library allocation
page read and write
17EB9800000
trusted library allocation
page read and write
2409DCC0000
trusted library allocation
page read and write
3B00000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
240A0B76000
trusted library allocation
page read and write
184444A0000
heap
page read and write
C54000
unkown
page readonly
2409E589000
trusted library allocation
page read and write
2409D5F2000
trusted library allocation
page read and write
2409F8C0000
trusted library allocation
page read and write
2409AF0A000
trusted library allocation
page read and write
B34000
heap
page read and write
347ED0C000
stack
page read and write
2409CFD3000
trusted library allocation
page read and write
2409F8B4000
trusted library allocation
page read and write
2408F733000
heap
page read and write
240A0C4A000
trusted library allocation
page read and write
24099D9F000
trusted library allocation
page read and write
2409CCB8000
trusted library allocation
page read and write
240A0A41000
trusted library allocation
page read and write
2409918A000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409DAF1000
trusted library allocation
page read and write
2409DCD0000
trusted library allocation
page read and write
2409CB98000
trusted library allocation
page read and write
17EB96DA000
heap
page read and write
2409DC84000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409FAD7000
trusted library allocation
page read and write
240A0B4A000
trusted library allocation
page read and write
2408F743000
heap
page read and write
24099AE4000
trusted library allocation
page read and write
240A0CEC000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409DF2B000
trusted library allocation
page read and write
2409D37F000
trusted library allocation
page read and write
2409FA77000
trusted library allocation
page read and write
240A0B8B000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2408F745000
heap
page read and write
2408F727000
heap
page read and write
2409CB64000
trusted library allocation
page read and write
2409DD20000
trusted library allocation
page read and write
2409B3F6000
trusted library allocation
page read and write
2409CC6F000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2408F744000
heap
page read and write
2409CC78000
trusted library allocation
page read and write
2071AFB0000
remote allocation
page read and write
2409F7B7000
trusted library allocation
page read and write
2409DCF9000
trusted library allocation
page read and write
2408F733000
heap
page read and write
1844453C000
heap
page read and write
24099183000
trusted library allocation
page read and write
24099088000
trusted library allocation
page read and write
2409DCD0000
trusted library allocation
page read and write
1844452E000
heap
page read and write
2409DCE6000
trusted library allocation
page read and write
240A0B5C000
trusted library allocation
page read and write
24099DB7000
trusted library allocation
page read and write
2409D1FE000
trusted library allocation
page read and write
2409F421000
trusted library allocation
page read and write
2409D5B8000
trusted library allocation
page read and write
2409FAAB000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409FAEB000
trusted library allocation
page read and write
240A0CB5000
trusted library allocation
page read and write
18444531000
heap
page read and write
2409E5E8000
trusted library allocation
page read and write
2409DAD3000
trusted library allocation
page read and write
2408F750000
heap
page read and write
240A0A70000
trusted library allocation
page read and write
2409907D000
trusted library allocation
page read and write
2408F72D000
heap
page read and write
18443999000
trusted library allocation
page read and write
2409FFF9000
trusted library allocation
page read and write
2408F74A000
heap
page read and write
2409FB87000
trusted library allocation
page read and write
240A0CBB000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D09B000
trusted library allocation
page read and write
2409FAEB000
trusted library allocation
page read and write
240990EF000
trusted library allocation
page read and write
2409D59A000
trusted library allocation
page read and write
2409E5C0000
trusted library allocation
page read and write
2409E120000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409DD7C000
trusted library allocation
page read and write
2409D9F4000
trusted library allocation
page read and write
2409FAC2000
trusted library allocation
page read and write
24099DD7000
trusted library allocation
page read and write
2409D8CB000
trusted library allocation
page read and write
2409FAEB000
trusted library allocation
page read and write
18444000000
trusted library allocation
page read and write
2409FFF9000
trusted library allocation
page read and write
240A0A8C000
trusted library allocation
page read and write
240A0A8E000
trusted library allocation
page read and write
2409CF09000
trusted library allocation
page read and write
2409CCF0000
trusted library allocation
page read and write
2409D399000
trusted library allocation
page read and write
2409DDDE000
trusted library allocation
page read and write
24099A1E000
trusted library allocation
page read and write
2071B42E000
trusted library allocation
page read and write
2409AA9A000
trusted library allocation
page read and write
2409F8C0000
trusted library allocation
page read and write
2409D597000
trusted library allocation
page read and write
240A00DF000
trusted library allocation
page read and write
4DCB000
stack
page read and write
2408F72E000
heap
page read and write
2409CF43000
trusted library allocation
page read and write
2409DFA8000
trusted library allocation
page read and write
2409D1B0000
trusted library allocation
page read and write
2409907A000
trusted library allocation
page read and write
2408F77A000
heap
page read and write
2409DD3A000
trusted library allocation
page read and write
240A0B8B000
trusted library allocation
page read and write
2409FA52000
trusted library allocation
page read and write
2409FBF5000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2409DC6B000
trusted library allocation
page read and write
2409DD3A000
trusted library allocation
page read and write
E35000
heap
page read and write
2409DADC000
trusted library allocation
page read and write
240A0024000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2408F750000
heap
page read and write
2408F727000
heap
page read and write
2409B3DD000
trusted library allocation
page read and write
2409D158000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409AAB1000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2408F726000
heap
page read and write
2409D1BA000
trusted library allocation
page read and write
2409CB4B000
trusted library allocation
page read and write
2409D4D7000
trusted library allocation
page read and write
2408F768000
heap
page read and write
240A0B8C000
trusted library allocation
page read and write
213BF190000
heap
page read and write
2409DAF4000
trusted library allocation
page read and write
2408F736000
heap
page read and write
240A0AAC000
trusted library allocation
page read and write
279BA05000
trusted library allocation
page read and write
18444520000
heap
page read and write
2409CEE7000
trusted library allocation
page read and write
24099157000
trusted library allocation
page read and write
2409B3E6000
trusted library allocation
page read and write
240A0C56000
trusted library allocation
page read and write
18443F70000
trusted library allocation
page read and write
18444531000
heap
page read and write
2408F744000
heap
page read and write
2409F8C0000
trusted library allocation
page read and write
2409FAA1000
trusted library allocation
page read and write
24099DBA000
trusted library allocation
page read and write
2408F778000
heap
page read and write
2409B3EB000
trusted library allocation
page read and write
2408F744000
heap
page read and write
184438F0000
trusted library allocation
page read and write
240A0ADF000
trusted library allocation
page read and write
17EB96F8000
heap
page read and write
2409D5ED000
trusted library allocation
page read and write
2409DDFD000
trusted library allocation
page read and write
240A0B1B000
trusted library allocation
page read and write
240A0AD1000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DD7E000
trusted library allocation
page read and write
2408F76C000
heap
page read and write
240A0AAC000
trusted library allocation
page read and write
2409CCE6000
trusted library allocation
page read and write
2409CC3B000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409FAEB000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409FFBA000
trusted library allocation
page read and write
2408F6D4000
heap
page read and write
2409DAD0000
trusted library allocation
page read and write
2408F787000
heap
page read and write
240993D8000
trusted library allocation
page read and write
184444A3000
heap
page read and write
2409DD1A000
trusted library allocation
page read and write
2409DF61000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409CC1F000
trusted library allocation
page read and write
2409D540000
trusted library allocation
page read and write
2409DFE8000
trusted library allocation
page read and write
2409DDC2000
trusted library allocation
page read and write
240A0CC1000
trusted library allocation
page read and write
2409E58E000
trusted library allocation
page read and write
2409FA11000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F72B000
heap
page read and write
2409D3FB000
trusted library allocation
page read and write
240A0C54000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409F947000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
B34000
heap
page read and write
DE0000
heap
page read and write
2409E5E5000
trusted library allocation
page read and write
240991DE000
trusted library allocation
page read and write
240A0A8E000
trusted library allocation
page read and write
2408F750000
heap
page read and write
184444F9000
heap
page read and write
2409CF7D000
trusted library allocation
page read and write
2408F75B000
heap
page read and write
2409D593000
trusted library allocation
page read and write
2409FFF7000
trusted library allocation
page read and write
2409CB04000
trusted library allocation
page read and write
A80677C000
stack
page read and write
2409CC1F000
trusted library allocation
page read and write
2409DCE6000
trusted library allocation
page read and write
2409D186000
trusted library allocation
page read and write
2409D5D4000
trusted library allocation
page read and write
2409DD2B000
trusted library allocation
page read and write
2408F744000
heap
page read and write
E08000
heap
page read and write
DE4000
heap
page read and write
2408F763000
heap
page read and write
B5593FE000
stack
page read and write
2409DBEE000
trusted library allocation
page read and write
2408F76E000
heap
page read and write
2409D063000
trusted library allocation
page read and write
240A0CC1000
trusted library allocation
page read and write
2409F8FD000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2409D05E000
trusted library allocation
page read and write
2408F743000
heap
page read and write
240A0081000
trusted library allocation
page read and write
2409D323000
trusted library allocation
page read and write
2409D1ED000
trusted library allocation
page read and write
347ED4E000
unkown
page readonly
2409D158000
trusted library allocation
page read and write
2409E565000
trusted library allocation
page read and write
2409CCB1000
trusted library allocation
page read and write
2409CCA7000
trusted library allocation
page read and write
213BF219000
heap
page read and write
2408CB69000
trusted library allocation
page read and write
2409D377000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2409D1C1000
trusted library allocation
page read and write
2409DAE7000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2409DDE1000
trusted library allocation
page read and write
2409E580000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D450000
trusted library allocation
page read and write
24099AB0000
trusted library allocation
page read and write
2409F957000
trusted library allocation
page read and write
2409FBA5000
trusted library allocation
page read and write
2409AA9A000
trusted library allocation
page read and write
240A0B55000
trusted library allocation
page read and write
2409B3F9000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2408F733000
heap
page read and write
2409B32C000
trusted library allocation
page read and write
2409D5E1000
trusted library allocation
page read and write
2409CCB1000
trusted library allocation
page read and write
1844453C000
heap
page read and write
2408F750000
heap
page read and write
2409DAF1000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
2409CB10000
trusted library allocation
page read and write
2409D069000
trusted library allocation
page read and write
17EB9640000
heap
page read and write
B35000
heap
page read and write
2409DC7E000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409FA0B000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2071B423000
trusted library allocation
page read and write
240A0A74000
trusted library allocation
page read and write
2409AAAB000
trusted library allocation
page read and write
2409FBCA000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
2409FF8B000
trusted library allocation
page read and write
184444E8000
heap
page read and write
2409CCA7000
trusted library allocation
page read and write
2409DFA2000
trusted library allocation
page read and write
2409FAAC000
trusted library allocation
page read and write
2409FA4F000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
2409AAC3000
trusted library allocation
page read and write
2409E546000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409FA58000
trusted library allocation
page read and write
2409D1B0000
trusted library allocation
page read and write
240A0AB8000
trusted library allocation
page read and write
2409FAAC000
trusted library allocation
page read and write
240A0A63000
trusted library allocation
page read and write
2409B3E6000
trusted library allocation
page read and write
24099B00000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
2409DDF5000
trusted library allocation
page read and write
2409F9BD000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409DA72000
trusted library allocation
page read and write
240A0AAC000
trusted library allocation
page read and write
A806236000
stack
page read and write
240991E2000
trusted library allocation
page read and write
17EBB2DF000
heap
page read and write
2409D3B4000
trusted library allocation
page read and write
2409FA4F000
trusted library allocation
page read and write
2409D365000
trusted library allocation
page read and write
2409F728000
trusted library allocation
page read and write
2409D3FB000
trusted library allocation
page read and write
2409FF9A000
trusted library allocation
page read and write
2409CF63000
trusted library allocation
page read and write
240A0B60000
trusted library allocation
page read and write
2409D5D9000
trusted library allocation
page read and write
2409DD97000
trusted library allocation
page read and write
2408F736000
heap
page read and write
B34000
heap
page read and write
2409CD3F000
trusted library allocation
page read and write
240A00E6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409DD2B000
trusted library allocation
page read and write
B34000
heap
page read and write
2409B3DD000
trusted library allocation
page read and write
2409DFA5000
trusted library allocation
page read and write
213BF3C0000
heap
page read and write
17EBB2E7000
heap
page read and write
2409DC9D000
trusted library allocation
page read and write
2409D18B000
trusted library allocation
page read and write
2409F950000
trusted library allocation
page read and write
2409FAA1000
trusted library allocation
page read and write
2409EBD7000
trusted library allocation
page read and write
2408F72F000
heap
page read and write
2409AAF2000
trusted library allocation
page read and write
2409AA9C000
trusted library allocation
page read and write
A80F78B000
stack
page read and write
2409D1B0000
trusted library allocation
page read and write
24099DEE000
trusted library allocation
page read and write
240A0AD1000
trusted library allocation
page read and write
2409F9A3000
trusted library allocation
page read and write
2409DFE5000
trusted library allocation
page read and write
2409DE95000
trusted library allocation
page read and write
2409AABD000
trusted library allocation
page read and write
2409FFDA000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
2409FA9A000
trusted library allocation
page read and write
2409D9C0000
trusted library allocation
page read and write
A808AFE000
stack
page read and write
2409D084000
trusted library allocation
page read and write
2409F781000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409DC25000
trusted library allocation
page read and write
2409D19F000
trusted library allocation
page read and write
2409DAE7000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
24099DD9000
trusted library allocation
page read and write
18444008000
trusted library allocation
page read and write
18444526000
heap
page read and write
2409FA48000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2409CC25000
trusted library allocation
page read and write
2409CB8E000
trusted library allocation
page read and write
2408C9F0000
trusted library allocation
page execute read
2409FA48000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2409CF39000
trusted library allocation
page read and write
24099DA1000
trusted library allocation
page read and write
2409D1ED000
trusted library allocation
page read and write
A8045DF000
stack
page read and write
2409B3DD000
trusted library allocation
page read and write
184444AC000
heap
page read and write
2409DD1D000
trusted library allocation
page read and write
240A0A70000
trusted library allocation
page read and write
2FC4DFF000
stack
page read and write
240A0AA8000
trusted library allocation
page read and write
2409DD8B000
trusted library allocation
page read and write
240A0A74000
trusted library allocation
page read and write
240991E6000
trusted library allocation
page read and write
24099183000
trusted library allocation
page read and write
240A0ABD000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2071B463000
trusted library allocation
page read and write
184444AC000
heap
page read and write
2409E56A000
trusted library allocation
page read and write
2409D51E000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2408F742000
heap
page read and write
2409E76E000
trusted library allocation
page read and write
240990EF000
trusted library allocation
page read and write
2409FF8F000
trusted library allocation
page read and write
240A0A88000
trusted library allocation
page read and write
2409D5DD000
trusted library allocation
page read and write
2409DFFC000
trusted library allocation
page read and write
2408F727000
heap
page read and write
240A0C85000
trusted library allocation
page read and write
2409FF53000
trusted library allocation
page read and write
1844449F000
heap
page read and write
2409E542000
trusted library allocation
page read and write
24099D7E000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
240991AE000
trusted library allocation
page read and write
2409FAC6000
trusted library allocation
page read and write
2409E892000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409FA7F000
trusted library allocation
page read and write
2409DA82000
trusted library allocation
page read and write
2409DCD0000
trusted library allocation
page read and write
2409DF73000
trusted library allocation
page read and write
184445A7000
heap
page read and write
2409DFA2000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
2409FA0F000
trusted library allocation
page read and write
240A0CB3000
trusted library allocation
page read and write
240A0B5C000
trusted library allocation
page read and write
2409DCE6000
trusted library allocation
page read and write
2409B3ED000
trusted library allocation
page read and write
2409DAF6000
trusted library allocation
page read and write
240A0B58000
trusted library allocation
page read and write
2408F74D000
heap
page read and write
2409DAE7000
trusted library allocation
page read and write
2409D354000
trusted library allocation
page read and write
2408F728000
heap
page read and write
2408F732000
heap
page read and write
2409AA9A000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
184444EA000
heap
page read and write
2408F745000
heap
page read and write
2408F750000
heap
page read and write
2408F74A000
heap
page read and write
2409D1E6000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
240A0B58000
trusted library allocation
page read and write
18443977000
trusted library allocation
page read and write
240A007C000
trusted library allocation
page read and write
2409DC3F000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409CB2D000
trusted library allocation
page read and write
2409CCF1000
trusted library allocation
page read and write
2409918A000
trusted library allocation
page read and write
2409CF7D000
trusted library allocation
page read and write
240A0CF6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409F9C7000
trusted library allocation
page read and write
2409CF7D000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F731000
heap
page read and write
2409E550000
trusted library allocation
page read and write
2409DADA000
trusted library allocation
page read and write
184444BF000
heap
page read and write
B55ABFE000
unkown
page readonly
2409CC98000
trusted library allocation
page read and write
2409CB53000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D882000
trusted library allocation
page read and write
240A00D3000
trusted library allocation
page read and write
2409DDE1000
trusted library allocation
page read and write
2409DAB2000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409D1DB000
trusted library allocation
page read and write
2408F733000
heap
page read and write
51F0000
heap
page read and write
2408F736000
heap
page read and write
2409E5A9000
trusted library allocation
page read and write
2409FF96000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2409F921000
trusted library allocation
page read and write
2409DF40000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2409FFFD000
trusted library allocation
page read and write
2409DC22000
trusted library allocation
page read and write
2408F731000
heap
page read and write
240A0CFD000
trusted library allocation
page read and write
2409CB53000
trusted library allocation
page read and write
240A0B60000
trusted library allocation
page read and write
2409DD32000
trusted library allocation
page read and write
240A0044000
trusted library allocation
page read and write
240A004F000
trusted library allocation
page read and write
240A00BF000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409DAF1000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409B3FC000
trusted library allocation
page read and write
2409B3ED000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
240A0AB8000
trusted library allocation
page read and write
24099052000
trusted library allocation
page read and write
2409FFBC000
trusted library allocation
page read and write
CB0000
heap
page read and write
2409CED3000
trusted library allocation
page read and write
2409FFAA000
trusted library allocation
page read and write
2409DC91000
trusted library allocation
page read and write
240999F6000
trusted library allocation
page read and write
2409F7BD000
trusted library allocation
page read and write
2409CCAB000
trusted library allocation
page read and write
2409DDF3000
trusted library allocation
page read and write
2408F737000
heap
page read and write
240A0AD1000
trusted library allocation
page read and write
2409B3EB000
trusted library allocation
page read and write
2409CFD3000
trusted library allocation
page read and write
2409FA4F000
trusted library allocation
page read and write
2409CC1C000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409908B000
trusted library allocation
page read and write
2409FB83000
trusted library allocation
page read and write
2409E5CE000
trusted library allocation
page read and write
240A0081000
trusted library allocation
page read and write
2409D9C0000
trusted library allocation
page read and write
A80D1BA000
stack
page read and write
2409CF85000
trusted library allocation
page read and write
2409FBA7000
trusted library allocation
page read and write
24099159000
trusted library allocation
page read and write
240A0B39000
trusted library allocation
page read and write
2409D398000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409AA9C000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409CE56000
trusted library allocation
page read and write
2409D055000
trusted library allocation
page read and write
240993F0000
trusted library allocation
page read and write
2409B38F000
trusted library allocation
page read and write
2409FA33000
trusted library allocation
page read and write
18444003000
trusted library allocation
page read and write
2409DAE3000
trusted library allocation
page read and write
2409FFB5000
trusted library allocation
page read and write
2409F771000
trusted library allocation
page read and write
2409CC09000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409DFF9000
trusted library allocation
page read and write
2409D3CC000
trusted library allocation
page read and write
2409D4F9000
trusted library allocation
page read and write
2409D31C000
trusted library allocation
page read and write
2409CBB0000
trusted library allocation
page read and write
2409D1BA000
trusted library allocation
page read and write
A80FD8A000
stack
page read and write
2409CEB9000
trusted library allocation
page read and write
2408F768000
heap
page read and write
2409FA70000
trusted library allocation
page read and write
B34000
heap
page read and write
2409D09B000
trusted library allocation
page read and write
2409D557000
trusted library allocation
page read and write
2409DFA8000
trusted library allocation
page read and write
2409AA9A000
trusted library allocation
page read and write
2409AA60000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409FAD7000
trusted library allocation
page read and write
2409DBEB000
trusted library allocation
page read and write
2409F929000
trusted library allocation
page read and write
240993D8000
trusted library allocation
page read and write
2409DCE6000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
2409D3FB000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
2071B4CA000
trusted library allocation
page read and write
2409D161000
trusted library allocation
page read and write
2408F733000
heap
page read and write
B34000
heap
page read and write
240A0ABD000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409CCC6000
trusted library allocation
page read and write
2409FFCA000
trusted library allocation
page read and write
240A0ABD000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
2409FA68000
trusted library allocation
page read and write
2409DD1A000
trusted library allocation
page read and write
2409FA13000
trusted library allocation
page read and write
18444448000
heap
page read and write
2409DADC000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409FA28000
trusted library allocation
page read and write
2409D39E000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
2409DCEF000
trusted library allocation
page read and write
2408F738000
heap
page read and write
B81000
unkown
page execute read
2408F745000
heap
page read and write
2409DC6B000
trusted library allocation
page read and write
24099061000
trusted library allocation
page read and write
240993FD000
trusted library allocation
page read and write
2409D139000
trusted library allocation
page read and write
2409D084000
trusted library allocation
page read and write
2408F76F000
heap
page read and write
2409FFC2000
trusted library allocation
page read and write
2408CB6D000
trusted library allocation
page read and write
E32000
heap
page read and write
2409DC51000
trusted library allocation
page read and write
2409D16D000
trusted library allocation
page read and write
2409FF40000
trusted library allocation
page read and write
240A0054000
trusted library allocation
page read and write
2071B472000
trusted library allocation
page read and write
2409E5DA000
trusted library allocation
page read and write
2409DFFC000
trusted library allocation
page read and write
2409DCE6000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409D1B0000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2071B1E0000
unclassified section
page readonly
B5579DE000
unkown
page readonly
2409916C000
trusted library allocation
page read and write
240993EC000
trusted library allocation
page read and write
24099DFD000
trusted library allocation
page read and write
2409CCCD000
trusted library allocation
page read and write
2409CF62000
trusted library allocation
page read and write
2409D1BA000
trusted library allocation
page read and write
2409FA05000
trusted library allocation
page read and write
240A0B58000
trusted library allocation
page read and write
2409CC3B000
trusted library allocation
page read and write
18444599000
heap
page read and write
2409D1BA000
trusted library allocation
page read and write
2409FBCA000
trusted library allocation
page read and write
240A0CBB000
trusted library allocation
page read and write
240A009A000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409F77E000
trusted library allocation
page read and write
2409DD24000
trusted library allocation
page read and write
184438C0000
heap
page read and write
3A01000
heap
page read and write
A80DAFC000
stack
page read and write
2409D07D000
trusted library allocation
page read and write
2409EB1B000
trusted library allocation
page read and write
2409E580000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D1BF000
trusted library allocation
page read and write
2409DFD4000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409E589000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F75B000
heap
page read and write
2409E565000
trusted library allocation
page read and write
2409FF9A000
trusted library allocation
page read and write
18444569000
heap
page read and write
2409DD24000
trusted library allocation
page read and write
2409CB9E000
trusted library allocation
page read and write
1709EA81000
trusted library allocation
page execute read
2409AABD000
trusted library allocation
page read and write
2409E5CB000
trusted library allocation
page read and write
2409D56F000
trusted library allocation
page read and write
240A0B5C000
trusted library allocation
page read and write
2409DADC000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2409D1BF000
trusted library allocation
page read and write
2409D172000
trusted library allocation
page read and write
240A00B8000
trusted library allocation
page read and write
B55AC7E000
unkown
page readonly
2409DD29000
trusted library allocation
page read and write
2409CCC9000
trusted library allocation
page read and write
240A0C90000
trusted library allocation
page read and write
2408F730000
heap
page read and write
2408F743000
heap
page read and write
240A0B8B000
trusted library allocation
page read and write
2409D01C000
trusted library allocation
page read and write
2409D884000
trusted library allocation
page read and write
240A0D4C000
trusted library allocation
page read and write
17EBB2EA000
heap
page read and write
2409E5D2000
trusted library allocation
page read and write
2409F8F6000
trusted library allocation
page read and write
184444AC000
heap
page read and write
2409DD80000
trusted library allocation
page read and write
2071B503000
trusted library allocation
page read and write
2408F72F000
heap
page read and write
2409FA30000
trusted library allocation
page read and write
2409CF7D000
trusted library allocation
page read and write
3A01000
heap
page read and write
240A007C000
trusted library allocation
page read and write
2409DD19000
trusted library allocation
page read and write
2409DC25000
trusted library allocation
page read and write
2409D1C1000
trusted library allocation
page read and write
2409EB5B000
trusted library allocation
page read and write
240A0A88000
trusted library allocation
page read and write
240A0B58000
trusted library allocation
page read and write
2409E55C000
trusted library allocation
page read and write
18444561000
heap
page read and write
A80DC7E000
stack
page read and write
2409D1ED000
trusted library allocation
page read and write
2409FF7A000
trusted library allocation
page read and write
240A0A6C000
trusted library allocation
page read and write
2409CF20000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
2409CFF3000
trusted library allocation
page read and write
240A0AB8000
trusted library allocation
page read and write
2409FA68000
trusted library allocation
page read and write
2409E6E0000
trusted library allocation
page read and write
2409DAEE000
trusted library allocation
page read and write
2409D377000
trusted library allocation
page read and write
2409DAC2000
trusted library allocation
page read and write
2409F100000
trusted library allocation
page read and write
34007FE000
stack
page read and write
2409CF7D000
trusted library allocation
page read and write
240A003D000
trusted library allocation
page read and write
2409915F000
trusted library allocation
page read and write
240A0D4E000
trusted library allocation
page read and write
A80D1FE000
stack
page read and write
2408F726000
heap
page read and write
2409D92B000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409D3B4000
trusted library allocation
page read and write
2409CB64000
trusted library allocation
page read and write
240A00A5000
trusted library allocation
page read and write
184444A0000
heap
page read and write
2409D14D000
trusted library allocation
page read and write
2409FF50000
trusted library allocation
page read and write
1844449C000
heap
page read and write
9BF000
stack
page read and write
2408F727000
heap
page read and write
2408F733000
heap
page read and write
2409D0A1000
trusted library allocation
page read and write
240A0A5D000
trusted library allocation
page read and write
2408F744000
heap
page read and write
240A0CB9000
trusted library allocation
page read and write
2408F778000
heap
page read and write
24099D9F000
trusted library allocation
page read and write
2071B45D000
trusted library allocation
page read and write
2408F605000
heap
page read and write
2409CCE6000
trusted library allocation
page read and write
2408F727000
heap
page read and write
24099DB2000
trusted library allocation
page read and write
2409D5AE000
trusted library allocation
page read and write
2409D155000
trusted library allocation
page read and write
2409D06C000
trusted library allocation
page read and write
2408F733000
heap
page read and write
17EB9703000
heap
page read and write
2409E7F8000
trusted library allocation
page read and write
1844457C000
heap
page read and write
2071B479000
trusted library allocation
page read and write
240A00C6000
trusted library allocation
page read and write
B55ACFE000
unkown
page readonly
2409FA2C000
trusted library allocation
page read and write
2409DAF1000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409DFA8000
trusted library allocation
page read and write
2409FAA2000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409CE56000
trusted library allocation
page read and write
C4C000
unkown
page read and write
B34000
heap
page read and write
2409915F000
trusted library allocation
page read and write
2409D074000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
B80000
unkown
page readonly
2409D1A0000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
2409DCB2000
trusted library allocation
page read and write
2409E553000
trusted library allocation
page read and write
240A0C54000
trusted library allocation
page read and write
2409F8B4000
trusted library allocation
page read and write
2409D9C7000
trusted library allocation
page read and write
2409D4ED000
trusted library allocation
page read and write
2409CB64000
trusted library allocation
page read and write
34115FF000
stack
page read and write
2408F736000
heap
page read and write
2409D5EE000
trusted library allocation
page read and write
240A0AE6000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409D936000
trusted library allocation
page read and write
2408F76E000
heap
page read and write
2071B120000
heap
page read and write
1F46C854F000
trusted library allocation
page read and write
240993EE000
trusted library allocation
page read and write
2409F76F000
trusted library allocation
page read and write
2409D90B000
trusted library allocation
page read and write
2409DC3F000
trusted library allocation
page read and write
2409B3EB000
trusted library allocation
page read and write
240A0A88000
trusted library allocation
page read and write
2409AAAB000
trusted library allocation
page read and write
2409FF4C000
trusted library allocation
page read and write
2409E56A000
trusted library allocation
page read and write
2409D1BC000
trusted library allocation
page read and write
2409D3E7000
trusted library allocation
page read and write
2409F78A000
trusted library allocation
page read and write
2409CCBE000
trusted library allocation
page read and write
18444520000
heap
page read and write
2409F96E000
trusted library allocation
page read and write
2409F981000
trusted library allocation
page read and write
2409D084000
trusted library allocation
page read and write
2409CD3F000
trusted library allocation
page read and write
2408F72D000
heap
page read and write
2409DD6D000
trusted library allocation
page read and write
2409D1E1000
trusted library allocation
page read and write
2409D09B000
trusted library allocation
page read and write
24099A66000
trusted library allocation
page read and write
2409F75A000
trusted library allocation
page read and write
2409CF8C000
trusted library allocation
page read and write
24099D67000
trusted library allocation
page read and write
2409FA48000
trusted library allocation
page read and write
2409D07E000
trusted library allocation
page read and write
2409DF23000
trusted library allocation
page read and write
2409CF20000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F736000
heap
page read and write
B34000
heap
page read and write
2408F730000
heap
page read and write
2408F733000
heap
page read and write
2409FAA1000
trusted library allocation
page read and write
2409D3F9000
trusted library allocation
page read and write
2409D809000
trusted library allocation
page read and write
2409D9F9000
trusted library allocation
page read and write
240A0D13000
trusted library allocation
page read and write
2409CF1E000
trusted library allocation
page read and write
2408F745000
heap
page read and write
2409D5D5000
trusted library allocation
page read and write
2408F732000
heap
page read and write
2409DFFB000
trusted library allocation
page read and write
1844449C000
heap
page read and write
2409FA6D000
trusted library allocation
page read and write
2FC6DFF000
stack
page read and write
A809B3E000
stack
page read and write
2409B3EB000
trusted library allocation
page read and write
2408F743000
heap
page read and write
1844449C000
heap
page read and write
A8089FF000
stack
page read and write
2409D4C3000
trusted library allocation
page read and write
184436D0000
heap
page read and write
24099DF5000
trusted library allocation
page read and write
B34000
heap
page read and write
2409DAE3000
trusted library allocation
page read and write
2408F733000
heap
page read and write
184444A0000
heap
page read and write
B55AC3E000
stack
page read and write
2409D0CA000
trusted library allocation
page read and write
184444A4000
heap
page read and write
2409DAC3000
trusted library allocation
page read and write
240990BF000
trusted library allocation
page read and write
2409FF82000
trusted library allocation
page read and write
2409CBA6000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409DD80000
trusted library allocation
page read and write
240A0A61000
trusted library allocation
page read and write
2409D4F9000
trusted library allocation
page read and write
2409FB89000
trusted library allocation
page read and write
2409CF4C000
trusted library allocation
page read and write
2409EBE8000
trusted library allocation
page read and write
2409FF96000
trusted library allocation
page read and write
2409B3D0000
trusted library allocation
page read and write
2409F940000
trusted library allocation
page read and write
24099DE7000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
240991DE000
trusted library allocation
page read and write
2409DC51000
trusted library allocation
page read and write
2409F9EA000
trusted library allocation
page read and write
2409CB7D000
trusted library allocation
page read and write
240A0AFA000
trusted library allocation
page read and write
2409CBA1000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409D158000
trusted library allocation
page read and write
24099AE4000
trusted library allocation
page read and write
18444598000
heap
page read and write
2409D052000
trusted library allocation
page read and write
2408F744000
heap
page read and write
240A0B76000
trusted library allocation
page read and write
240A0B2C000
trusted library allocation
page read and write
B34000
heap
page read and write
2408F733000
heap
page read and write
2409FA7F000
trusted library allocation
page read and write
2409AAB2000
trusted library allocation
page read and write
2409CBB0000
trusted library allocation
page read and write
2FC4DFA000
stack
page read and write
2408F733000
heap
page read and write
2409AA86000
trusted library allocation
page read and write
2409E549000
trusted library allocation
page read and write
B80000
unkown
page readonly
2409D9F4000
trusted library allocation
page read and write
2409D1CC000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409CB9B000
trusted library allocation
page read and write
2409FF7E000
trusted library allocation
page read and write
2409E5E5000
trusted library allocation
page read and write
24099136000
trusted library allocation
page read and write
2409AACC000
trusted library allocation
page read and write
240990D8000
trusted library allocation
page read and write
2409CC73000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2408F626000
heap
page read and write
240990EF000
trusted library allocation
page read and write
2409D543000
trusted library allocation
page read and write
240993FD000
trusted library allocation
page read and write
2409CB4B000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2408F726000
heap
page read and write
2409FB8F000
trusted library allocation
page read and write
213BF21F000
heap
page read and write
2409AA6F000
trusted library allocation
page read and write
2409E5E1000
trusted library allocation
page read and write
24099BFE000
trusted library allocation
page read and write
240A0B5C000
trusted library allocation
page read and write
2409FF7A000
trusted library allocation
page read and write
2409CBAB000
trusted library allocation
page read and write
2409F8EC000
trusted library allocation
page read and write
240A0B8B000
trusted library allocation
page read and write
240A0B89000
trusted library allocation
page read and write
B55B4FE000
stack
page read and write
2409CCB1000
trusted library allocation
page read and write
2409CCE2000
trusted library allocation
page read and write
2071AFD0000
unclassified section
page readonly
2409E5C5000
trusted library allocation
page read and write
2409B35F000
trusted library allocation
page read and write
2409DFB9000
trusted library allocation
page read and write
2408F757000
heap
page read and write
240A0AA8000
trusted library allocation
page read and write
2409CF96000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409DD1A000
trusted library allocation
page read and write
2409D0A1000
trusted library allocation
page read and write
2409CFCC000
trusted library allocation
page read and write
2408CA00000
trusted library allocation
page read and write
2409D186000
trusted library allocation
page read and write
2409CB89000
trusted library allocation
page read and write
2409DAE7000
trusted library allocation
page read and write
2409D3FE000
trusted library allocation
page read and write
2409DAC2000
trusted library allocation
page read and write
2408F742000
heap
page read and write
2409D361000
trusted library allocation
page read and write
2409D178000
trusted library allocation
page read and write
A80912E000
stack
page read and write
2409F9B8000
trusted library allocation
page read and write
A80C13D000
stack
page read and write
2408F64F000
heap
page read and write
2409B3ED000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2408C830000
heap
page read and write
2409D1F2000
trusted library allocation
page read and write
2409D1E9000
trusted library allocation
page read and write
2408F757000
heap
page read and write
2408F694000
heap
page read and write
2408F778000
heap
page read and write
2409DAE7000
trusted library allocation
page read and write
2408F733000
heap
page read and write
240A001A000
trusted library allocation
page read and write
340187E000
stack
page read and write
2408F743000
heap
page read and write
24099D86000
trusted library allocation
page read and write
2409DDDE000
trusted library allocation
page read and write
2408F736000
heap
page read and write
2409D4F9000
trusted library allocation
page read and write
2409CF2F000
trusted library allocation
page read and write
2409FA7F000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2409D055000
trusted library allocation
page read and write
2409DD83000
trusted library allocation
page read and write
2409DE77000
trusted library allocation
page read and write
2409DADA000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409E5EC000
trusted library allocation
page read and write
2408CB32000
trusted library allocation
page read and write
2409FF3C000
trusted library allocation
page read and write
2409D4ED000
trusted library allocation
page read and write
18444531000
heap
page read and write
240A0B71000
trusted library allocation
page read and write
2408F744000
heap
page read and write
240A006B000
trusted library allocation
page read and write
1844355A000
remote allocation
page execute read
2408F77A000
heap
page read and write
2409D936000
trusted library allocation
page read and write
410D000
stack
page read and write
1844449F000
heap
page read and write
B55C4FE000
stack
page read and write
184439C4000
trusted library allocation
page read and write
2409FF96000
trusted library allocation
page read and write
24099183000
trusted library allocation
page read and write
2409F9C7000
trusted library allocation
page read and write
A80B53D000
stack
page read and write
240990DF000
trusted library allocation
page read and write
2408F733000
heap
page read and write
240A0D13000
trusted library allocation
page read and write
2409D07D000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
2409F8FD000
trusted library allocation
page read and write
2409CCF0000
trusted library allocation
page read and write
2408F726000
heap
page read and write
2409E5B0000
trusted library allocation
page read and write
2409CFCC000
trusted library allocation
page read and write
2409FF4C000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
A808A78000
stack
page read and write
2408F750000
heap
page read and write
240A0054000
trusted library allocation
page read and write
9EF000
stack
page read and write
2409DF9E000
trusted library allocation
page read and write
2409F8F6000
trusted library allocation
page read and write
2409D9AB000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
240A00B8000
trusted library allocation
page read and write
2409CCE6000
trusted library allocation
page read and write
1844395F000
trusted library allocation
page read and write
A806433000
stack
page read and write
2409CF88000
trusted library allocation
page read and write
2409FF41000
trusted library allocation
page read and write
2409DDB6000
trusted library allocation
page read and write
2409FA5A000
trusted library allocation
page read and write
2409D5EE000
trusted library allocation
page read and write
2071B494000
trusted library allocation
page read and write
2409CF1C000
trusted library allocation
page read and write
3A01000
heap
page read and write
2409AA9A000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409FAAC000
trusted library allocation
page read and write
2408F74D000
heap
page read and write
184445A7000
heap
page read and write
2408F76E000
heap
page read and write
2FC55FE000
stack
page read and write
2408F768000
heap
page read and write
2409D1BF000
trusted library allocation
page read and write
2409CCA7000
trusted library allocation
page read and write
2409CC12000
trusted library allocation
page read and write
2408F72A000
heap
page read and write
2408F742000
heap
page read and write
2409CB9B000
trusted library allocation
page read and write
2409CCB1000
trusted library allocation
page read and write
2408F768000
heap
page read and write
2408F72B000
heap
page read and write
24099A7D000
trusted library allocation
page read and write
2409CC98000
trusted library allocation
page read and write
2409DC22000
trusted library allocation
page read and write
2408F743000
heap
page read and write
2409FBA2000
trusted library allocation
page read and write
2409F77B000
trusted library allocation
page read and write
2FC5DFF000
stack
page read and write
2408F736000
heap
page read and write
2409DADE000
trusted library allocation
page read and write
2408F745000
heap
page read and write
240993F0000
trusted library allocation
page read and write
2408F607000
heap
page read and write
2409D153000
trusted library allocation
page read and write
2409DD2B000
trusted library allocation
page read and write
2408F750000
heap
page read and write
2408F733000
heap
page read and write
2408C9A0000
heap
page read and write
2409FF3C000
trusted library allocation
page read and write
B34000
heap
page read and write
240A0D46000
trusted library allocation
page read and write
240990EF000
trusted library allocation
page read and write
2409D3E7000
trusted library allocation
page read and write
2408F74D000
heap
page read and write
2408F733000
heap
page read and write
2408F745000
heap
page read and write
2409B33B000
trusted library allocation
page read and write
2408F73A000
heap
page read and write
2408F744000
heap
page read and write
A80BD3D000
stack
page read and write
2409907A000
trusted library allocation
page read and write
2408F727000
heap
page read and write
2408F744000
heap
page read and write
2408F727000
heap
page read and write
2409CBA1000
trusted library allocation
page read and write
2409CCCB000
trusted library allocation
page read and write
2409CF7D000
trusted library allocation
page read and write
2409D166000
trusted library allocation
page read and write
2408F72C000
heap
page read and write
2409FA2C000
trusted library allocation
page read and write
2408F768000
heap
page read and write
2409FA3E000
trusted library allocation
page read and write
2409F95F000
trusted library allocation
page read and write
2409D4ED000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409DD20000
trusted library allocation
page read and write
2409DBF3000
trusted library allocation
page read and write
2409CCE6000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409E5D2000
trusted library allocation
page read and write
2409DD7E000
trusted library allocation
page read and write
2409E590000
trusted library allocation
page read and write
2409D066000
trusted library allocation
page read and write
2408F733000
heap
page read and write
2409CB98000
trusted library allocation
page read and write
2409916C000
trusted library allocation
page read and write
2409DCD0000
trusted library allocation
page read and write
24099D67000
trusted library allocation
page read and write
240A0AB3000
trusted library allocation
page read and write
2071B513000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
240993E1000
trusted library allocation
page read and write
B34000
heap
page read and write
240A0CB9000
trusted library allocation
page read and write
2408F643000
heap
page read and write
2408C7B0000
unclassified section
page readonly
2409DA86000
trusted library allocation
page read and write
2409AB0F000
trusted library allocation
page read and write
2409DDF5000
trusted library allocation
page read and write
2409CCDE000
trusted library allocation
page read and write
2409D405000
trusted library allocation
page read and write
240A00FE000
trusted library allocation
page read and write
240A0B36000
trusted library allocation
page read and write
B34000
heap
page read and write
2409DDF3000
trusted library allocation
page read and write
240A0D10000
trusted library allocation
page read and write
2409D5A1000
trusted library allocation
page read and write
24099ADB000
trusted library allocation
page read and write
2409CFCD000
trusted library allocation
page read and write
2409D15B000
trusted library allocation
page read and write
2409AA60000
trusted library allocation
page read and write
2409D16E000
trusted library allocation
page read and write
2409FAD7000
trusted library allocation
page read and write
1844448D000
heap
page read and write
240A0D13000
trusted library allocation
page read and write
2409E5C7000
trusted library allocation
page read and write
2071B461000
trusted library allocation
page read and write
2409DD9C000
trusted library allocation
page read and write
2408F72E000
heap
page read and write
2409CCA7000
trusted library allocation
page read and write
2409D0CA000
trusted library allocation
page read and write
2409CF69000
trusted library allocation
page read and write
2408F76C000
heap
page read and write
2409FAA1000
trusted library allocation
page read and write
2409D195000
trusted library allocation
page read and write
C42000
unkown
page readonly
2409FA52000
trusted library allocation
page read and write
2408F743000
heap
page read and write
B34000
heap
page read and write
2409918E000
trusted library allocation
page read and write
2409DCEF000
trusted library allocation
page read and write
24099159000
trusted library allocation
page read and write
2409D3FB000
trusted library allocation
page read and write
240A008B000
trusted library allocation
page read and write
2409FF5C000
trusted library allocation
page read and write
18444540000
heap
page read and write
240A0A78000
trusted library allocation
page read and write
2408F743000
heap
page read and write
240A0B60000
trusted library allocation
page read and write
2409D92B000
trusted library allocation
page read and write
2409DAFC000
trusted library allocation
page read and write
2408F726000
heap
page read and write
2409CB7D000
trusted library allocation
page read and write
2408F745000
heap
page read and write
24099E5F000
trusted library allocation
page read and write
2408F72B000
heap
page read and write
3E9000
stack
page read and write
2409CB9E000
trusted library allocation
page read and write
2E4BBD640000
trusted library allocation
page read and write
17EB9907000
trusted library allocation
page read and write
2409CCA7000
trusted library allocation
page read and write
2408F744000
heap
page read and write
2409E590000
trusted library allocation
page read and write
240A00CA000
trusted library allocation
page read and write
There are 3412 hidden memdumps, click here to show them.