Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_529ab124-c947-4aec-89b5-3f71d9fbdac3.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_529ab124-c947-4aec-89b5-3f71d9fbdac3.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\12db0a05-bb53-4865-af08-4aeec09c62ce.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3b219e0b-5e7b-46ae-b202-05343b04f5d2.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\453a6db7-4669-4f77-b40a-9814f1471149.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\67ae3a70-3fb5-43a7-9da8-c0eca4f019f9.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\74bed03b-d041-4bd7-a5c6-b5d878ac1167.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7a2af48a-5860-4960-a588-04b0c4000679.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\c35ade92-f586-4ed2-8835-97cba56db08d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B845-1168.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B845-1C24.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B859-21E8.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B861-E14.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\065580ab-c5f8-4d6e-8c08-76ffa057f7b2.tmp
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1193e7e8-b934-497f-a72f-43fcc3230f8f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\35523baf-69b4-4175-b6f1-a2cb57e7468f.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\41146758-f5e8-4460-8dbb-8b6df984544b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\64ecbe40-9e7f-413b-a117-f55aa6734266.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\73359451-9387-4199-a403-86749fa141ee.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8a4026ec-8955-4e1c-a041-d8719f17b93f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8ce15003-ac76-4731-92c1-0248f0ca31a8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9060a730-f3c2-4880-bbfc-33b2bcb7aa37.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8,
version-valid-for 14
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free
pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 11, cookie 0x3, schema 4, UTF-8,
version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie
0x1d, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\272e0c42-3f46-4fe7-8a85-900df68999fd.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\6266b573-be7f-4880-b141-4ac5b8a88fc8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\644a078f-d1ef-4569-a03e-8944dec91ca4.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\83625de1-c8a3-43d2-8a1c-23a41273cfa4.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\970a7702-a2e8-437c-bb7d-66a07ffd4b7c.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2cf0e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3b96e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a9e2.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2bea3.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2c9be.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3d003.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c01d80a6-9e85-46c1-a552-82a8e7ddc5a1.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e2d17422-16ce-4afd-aee3-dbc5a833fa37.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f84f3ec3-ba11-4701-80e5-db433c200462.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2e2f3.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF316f4.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3569d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3a44f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2e68d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3130c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369690441613360
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1ffccc63-ca69-4a73-afde-8184f507e6bf.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\35e6f141-002f-431b-bff4-4e91ea188b00.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State~RF3c0a1.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting
and NEL
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports~RF2bea3.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch
Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust
Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\e89551d9-d3ba-4529-a888-a5dbb9c803bf.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\ea950c69-ba4e-4581-a1bb-1b213b330294.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages
2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie
0x66, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie
0xb, schema 4, UTF-8, version-valid-for 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a6c88677-fc5f-4b78-970c-c652a42d4bef.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
|
ASCII text, with very long lines (3951), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f4c9672a-9f15-46d4-9e2d-ff90f4ce1805.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28da0.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF292ef.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2930e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2ba0f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2da29.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2daa6.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2dab6.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2fb0f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2fb1f.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a3d2.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3caf2.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF400d7.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a360abba-ffb9-4d23-8aae-88c57703f36e.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b14f5add-b3b9-4cf7-9493-adaef7c1f435.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bd9aed54-2025-4cfc-ac37-77bc24b19715.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c56bd8db-4fbb-4e39-8fb0-8c7c48eccf70.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e47e4265-ff15-4a1c-a8c6-caea56eabc1d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ebefe4df-1f9a-4eb3-9a44-3a822e85be0e.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\21713cf7-670c-451e-a39b-43372bada497.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8b2e48a6-d6e1-4afa-a9d8-2dc0072111e0.tmp
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8f7775e7-b3e8-4b23-b876-70494a73f6d6.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\b33b5721-7963-486a-bc72-8581a8e2c560.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\b6ac9416-56fe-4e52-868b-ce7c878a4ad9.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cv_debug.log
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\da195d32-5721-4763-9bad-58dd30fffab7.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 603003
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ece79c27-4711-43f7-9649-f8d2597dd574.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\af\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\am\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ar\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\az\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\be\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\bg\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\bn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ca\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\cs\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\cy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\da\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\de\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\el\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en_GB\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en_US\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\es\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\es_419\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\et\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\eu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fil\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fr_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\gl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\gu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\id\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\is\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\it\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\iw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ja\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ka\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\kk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\km\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\kn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ko\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\lo\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\lt\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\lv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ml\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\mn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\mr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ms\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\my\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ne\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\nl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\no\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pt_BR\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pt_PT\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ro\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ru\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\si\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ta\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\te\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\th\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\tr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\uk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ur\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\vi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zh_CN\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zh_HK\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zh_TW\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\dasherSettingSchema.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\offscreendocument.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\offscreendocument_main.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\page_embed_script.js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\service_worker_bin_prod.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\b33b5721-7963-486a-bc72-8581a8e2c560.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\8f7775e7-b3e8-4b23-b876-70494a73f6d6.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\content.js
|
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\content_new.js
|
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
|
Mozilla lz4 compressed data, originally 5952 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 5952 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 5952 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
There are 338 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=2176,i,7983970190078579778,15414779449484211005,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2452 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService
--lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6428 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor
--lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6688 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6984 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6984 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2068,i,13160541813465607293,2712023220913971906,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2020,i,12803728955632511086,9893143217689161617,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker
--lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7080 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144
/prefetch:8
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
--attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2324 -parentBuildID 20230927232528 -prefsHandle 2264
-prefMapHandle 2260 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {b2c51076-e2ba-496a-8a5d-bad7f0b747df} 7172 "\\.\pipe\gecko-crash-server-pipe.7172" 1e9e0c6d310 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3504 -parentBuildID 20230927232528 -prefsHandle 2852
-prefMapHandle 3480 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {df1c462e-2999-4128-a5ee-18d3d60123b5}
7172 "\\.\pipe\gecko-crash-server-pipe.7172" 1e9f2c64d10 rdd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -parentBuildID 20230927232528 -sandboxingKind 0
-prefsHandle 5652 -prefMapHandle 5592 -prefsLen 33976 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla
Firefox\browser" - {e87c3b9e-4be0-4f77-84ea-de9f8ccec19d} 7172 "\\.\pipe\gecko-crash-server-pipe.7172" 1e9f2c92110 utility
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://datastudio.google.com/embed/reporting/
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://json-schema.org/draft/2019-09/schema.
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/apps-themes
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://www.leboncoin.fr/
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://screenshots.firefox.com
|
unknown
|
||
https://shavar.services.mozilla.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://identity.mozilla.com/ids/ecosystem_telemetryU
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://github.com/w3c/csswg-drafts/issues/4650
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://profiler.firefox.com/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
http://exslt.org/sets
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://content-signature-2.cdn.mozilla.net/
|
unknown
|
||
https://json-schema.org/draft/2020-12/schema/=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
http://exslt.org/common
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://www.amazon.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://fpn.firefox.com
|
unknown
|
||
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://exslt.org/dates-and-times
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://www.google.com/favicon.ico
|
142.251.35.164
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://MD8.mozilla.org/1/m
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://addons.mozilla.org/firefox/addon/to-google-translate/
|
unknown
|
||
https://bzib.nelreports.net/api/report?cat=bingbusiness
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
|
unknown
|
||
https://bugzilla.mo
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://amazon.com
|
unknown
|
||
https://shavar.services.mozilla.com/
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
|
216.58.206.65
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://addons.mozilla.org/
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggestabout
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
|
unknown
|
||
https://play.google.com
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
http://www.inbox.lv/rfc2368/?value=%su
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://www.openh264.org/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
chrome.cloudflare-dns.com
|
172.64.41.3
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
52.222.236.23
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
sni1gl.wpc.nucdn.net
|
152.199.21.175
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
googlehosted.l.googleusercontent.com
|
216.58.206.65
|
||
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
spocs.getpocket.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
clients2.googleusercontent.com
|
unknown
|
||
bzib.nelreports.net
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
There are 15 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.246.40
|
unknown
|
United States
|
||
152.195.19.97
|
unknown
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
13.107.246.60
|
s-part-0032.t-0009.t-msedge.net
|
United States
|
||
142.250.81.238
|
unknown
|
United States
|
||
23.59.250.96
|
unknown
|
United States
|
||
162.159.61.3
|
unknown
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
52.222.236.23
|
services.addons.mozilla.org
|
United States
|
||
23.223.209.207
|
unknown
|
United States
|
||
172.64.41.3
|
chrome.cloudflare-dns.com
|
United States
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
||
142.251.35.170
|
unknown
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
216.58.206.65
|
googlehosted.l.googleusercontent.com
|
United States
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
142.251.35.164
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
172.253.115.84
|
unknown
|
United States
|
There are 14 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
|
lw_13bbe73648289fe96dfa1aa1bf23b3da
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseenversion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseen
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_dse_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_startup_page_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
|
Enabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
|
ShortcutName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
|
ProfileErrorState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
|
EnhancedLinkOpeningDefault
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jmjflgjpcpepeafmmgdpfkogkghcpiha
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
There are 198 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E9F2E74000
|
trusted library allocation
|
page read and write
|
||
EEE210E000
|
stack
|
page read and write
|
||
130C8A30000
|
unkown
|
page execute read
|
||
1E9F40A9000
|
trusted library allocation
|
page read and write
|
||
1E9F363C000
|
trusted library allocation
|
page read and write
|
||
1E9ECBB1000
|
trusted library allocation
|
page read and write
|
||
2D8D7803000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F40C0000
|
trusted library allocation
|
page read and write
|
||
130C8919000
|
trusted library allocation
|
page read and write
|
||
1E9FA9ED000
|
trusted library allocation
|
page read and write
|
||
1E9F2EE7000
|
trusted library allocation
|
page read and write
|
||
130C93E0000
|
heap
|
page read and write
|
||
28D05B0D000
|
trusted library allocation
|
page read and write
|
||
1E9ECDE1000
|
trusted library allocation
|
page read and write
|
||
1E9F9CD1000
|
trusted library allocation
|
page read and write
|
||
1E9F9F99000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9FA688000
|
trusted library allocation
|
page read and write
|
||
1E9F0D27000
|
trusted library allocation
|
page read and write
|
||
1E9ECDDD000
|
trusted library allocation
|
page read and write
|
||
1E9F0A78000
|
trusted library allocation
|
page read and write
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9EEC55000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F18C0000
|
trusted library allocation
|
page read and write
|
||
130C9769000
|
heap
|
page read and write
|
||
1E9EC182000
|
heap
|
page read and write
|
||
1E9ECDC8000
|
trusted library allocation
|
page read and write
|
||
1E9F0AF4000
|
trusted library allocation
|
page read and write
|
||
1E9FA3D6000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1593000
|
heap
|
page read and write
|
||
1E9F17C8000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F2A49000
|
trusted library allocation
|
page read and write
|
||
1593000
|
heap
|
page read and write
|
||
1E9FADEE000
|
trusted library allocation
|
page read and write
|
||
1E9F4099000
|
trusted library allocation
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9FA390000
|
trusted library allocation
|
page read and write
|
||
1E9FAAA7000
|
trusted library allocation
|
page read and write
|
||
1E9EDBBD000
|
trusted library allocation
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
1E9F0AC5000
|
trusted library allocation
|
page read and write
|
||
1E9F36D8000
|
trusted library allocation
|
page read and write
|
||
1E9FA6FE000
|
trusted library allocation
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9F0DD9000
|
trusted library allocation
|
page read and write
|
||
1E9FABF8000
|
trusted library allocation
|
page read and write
|
||
1E9F0BA8000
|
trusted library allocation
|
page read and write
|
||
1E9F25EC000
|
trusted library allocation
|
page read and write
|
||
1E9EE1CC000
|
trusted library allocation
|
page read and write
|
||
1E9F0626000
|
trusted library allocation
|
page read and write
|
||
1E9F34F3000
|
trusted library allocation
|
page read and write
|
||
1E9FA7C9000
|
trusted library allocation
|
page read and write
|
||
1E9EDCEB000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9F12E0000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9F30F2000
|
trusted library allocation
|
page read and write
|
||
1E9FA73C000
|
trusted library allocation
|
page read and write
|
||
1E9F9F5F000
|
trusted library allocation
|
page read and write
|
||
1E9F2E74000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
1E9F09D8000
|
trusted library allocation
|
page read and write
|
||
1E9F2FDA000
|
trusted library allocation
|
page read and write
|
||
1E9FA7FA000
|
trusted library allocation
|
page read and write
|
||
1E9F2EBE000
|
trusted library allocation
|
page read and write
|
||
1E9F2E3E000
|
trusted library allocation
|
page read and write
|
||
1E9F9FFE000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F3445000
|
trusted library allocation
|
page read and write
|
||
1E9FB47D000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9F34B3000
|
trusted library allocation
|
page read and write
|
||
1E9ECA13000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFB000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F0AED000
|
trusted library allocation
|
page read and write
|
||
1E9F46FE000
|
trusted library allocation
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
1E9EC39E000
|
trusted library allocation
|
page read and write
|
||
1E9FAB14000
|
trusted library allocation
|
page read and write
|
||
1E9F2EBE000
|
trusted library allocation
|
page read and write
|
||
1E9FBCB8000
|
heap
|
page read and write
|
||
1E9F36DE000
|
trusted library allocation
|
page read and write
|
||
1E9F34ED000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC171000
|
heap
|
page read and write
|
||
1E9FA493000
|
trusted library allocation
|
page read and write
|
||
1E9F0518000
|
trusted library allocation
|
page read and write
|
||
1E9F9C8E000
|
trusted library allocation
|
page read and write
|
||
1E9FA475000
|
trusted library allocation
|
page read and write
|
||
1E9FABD6000
|
trusted library allocation
|
page read and write
|
||
1E9EDBC9000
|
trusted library allocation
|
page read and write
|
||
1E9EEC8F000
|
trusted library allocation
|
page read and write
|
||
1E9FABC3000
|
trusted library allocation
|
page read and write
|
||
1E9ECB26000
|
trusted library allocation
|
page read and write
|
||
1E9F9CDC000
|
trusted library allocation
|
page read and write
|
||
1E9EDBEE000
|
trusted library allocation
|
page read and write
|
||
1E9FA3E3000
|
trusted library allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
1E9EE36D000
|
trusted library allocation
|
page read and write
|
||
1E9EC186000
|
heap
|
page read and write
|
||
1E9F365C000
|
trusted library allocation
|
page read and write
|
||
1E9F4689000
|
trusted library allocation
|
page read and write
|
||
1E9F35A1000
|
trusted library allocation
|
page read and write
|
||
1E9FB478000
|
trusted library allocation
|
page read and write
|
||
1556000
|
heap
|
page read and write
|
||
1E9F357D000
|
trusted library allocation
|
page read and write
|
||
1E9EC352000
|
trusted library allocation
|
page read and write
|
||
1E9F46B7000
|
trusted library allocation
|
page read and write
|
||
1E9FBBE9000
|
trusted library allocation
|
page read and write
|
||
1E9F4043000
|
trusted library allocation
|
page read and write
|
||
1E9F3666000
|
trusted library allocation
|
page read and write
|
||
1E9EDB05000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F09CF000
|
trusted library allocation
|
page read and write
|
||
1E9FACB1000
|
trusted library allocation
|
page read and write
|
||
1E9F2E7A000
|
trusted library allocation
|
page read and write
|
||
1E9F0D40000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F34AD000
|
trusted library allocation
|
page read and write
|
||
1E9F4692000
|
trusted library allocation
|
page read and write
|
||
1E9ECB7B000
|
trusted library allocation
|
page read and write
|
||
1E9FA7B2000
|
trusted library allocation
|
page read and write
|
||
1E9FADA1000
|
trusted library allocation
|
page read and write
|
||
1E9FA79E000
|
trusted library allocation
|
page read and write
|
||
1E9F2F8D000
|
trusted library allocation
|
page read and write
|
||
1E9F3436000
|
trusted library allocation
|
page read and write
|
||
1E9F9CC1000
|
trusted library allocation
|
page read and write
|
||
1E9FA4B4000
|
trusted library allocation
|
page read and write
|
||
1E9EDA93000
|
trusted library allocation
|
page read and write
|
||
1E9EC186000
|
heap
|
page read and write
|
||
1E9EC4DB000
|
trusted library allocation
|
page read and write
|
||
1E9FA60F000
|
trusted library allocation
|
page read and write
|
||
1E9FABDD000
|
trusted library allocation
|
page read and write
|
||
2D8D7616000
|
trusted library allocation
|
page read and write
|
||
1E9F2F7D000
|
trusted library allocation
|
page read and write
|
||
1E9EC17D000
|
heap
|
page read and write
|
||
1E9EDB80000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9EC3B3000
|
trusted library allocation
|
page read and write
|
||
A8C85D8000
|
stack
|
page read and write
|
||
1E9EC385000
|
trusted library allocation
|
page read and write
|
||
1E9FAB6D000
|
trusted library allocation
|
page read and write
|
||
1E9F36AD000
|
trusted library allocation
|
page read and write
|
||
1E9F35CC000
|
trusted library allocation
|
page read and write
|
||
1E9FA712000
|
trusted library allocation
|
page read and write
|
||
1E9FA9AF000
|
trusted library allocation
|
page read and write
|
||
1E9ECB0A000
|
trusted library allocation
|
page read and write
|
||
3870000
|
trusted library allocation
|
page read and write
|
||
1E9FAAAE000
|
trusted library allocation
|
page read and write
|
||
1E9F36F8000
|
trusted library allocation
|
page read and write
|
||
1E9EC42D000
|
trusted library allocation
|
page read and write
|
||
1E9F2CA8000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFD000
|
trusted library allocation
|
page read and write
|
||
1E9EDC45000
|
trusted library allocation
|
page read and write
|
||
FDC4DFF000
|
stack
|
page read and write
|
||
1E9FA67A000
|
trusted library allocation
|
page read and write
|
||
1E9F0868000
|
heap
|
page read and write
|
||
130C9781000
|
heap
|
page read and write
|
||
1E9FA088000
|
trusted library allocation
|
page read and write
|
||
1E9F3637000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9FAB79000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FB070000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
130C922B000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F2A28000
|
trusted library allocation
|
page read and write
|
||
130C8900000
|
trusted library allocation
|
page read and write
|
||
1E9F2D9A000
|
trusted library allocation
|
page read and write
|
||
130C93F1000
|
heap
|
page read and write
|
||
1E9F0A84000
|
trusted library allocation
|
page read and write
|
||
1E9F12A5000
|
trusted library allocation
|
page read and write
|
||
1E9FAEC5000
|
trusted library allocation
|
page read and write
|
||
1E9FAAB6000
|
trusted library allocation
|
page read and write
|
||
1E9F08BC000
|
heap
|
page read and write
|
||
1E9F2FA3000
|
trusted library allocation
|
page read and write
|
||
1E9EDFCD000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA7DF000
|
trusted library allocation
|
page read and write
|
||
1E9F0985000
|
trusted library allocation
|
page read and write
|
||
1E9EC487000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9EEA08000
|
trusted library allocation
|
page read and write
|
||
1E9F308A000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
28D05BCB000
|
trusted library allocation
|
page read and write
|
||
1E9F2DD0000
|
trusted library allocation
|
page read and write
|
||
1E9F1376000
|
trusted library allocation
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1E9FA619000
|
trusted library allocation
|
page read and write
|
||
1E9F30F2000
|
trusted library allocation
|
page read and write
|
||
130C87AF000
|
unclassified section
|
page read and write
|
||
1E9F17FE000
|
trusted library allocation
|
page read and write
|
||
1E9F3063000
|
trusted library allocation
|
page read and write
|
||
1E9F0A6F000
|
trusted library allocation
|
page read and write
|
||
1E9FAFD9000
|
trusted library allocation
|
page read and write
|
||
566BA24000
|
trusted library allocation
|
page read and write
|
||
1E9F30BC000
|
trusted library allocation
|
page read and write
|
||
1E9F36D3000
|
trusted library allocation
|
page read and write
|
||
1E9FB0CF000
|
trusted library allocation
|
page read and write
|
||
1E9F367C000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9F308A000
|
trusted library allocation
|
page read and write
|
||
1E9EC923000
|
trusted library allocation
|
page read and write
|
||
1E9F9F9B000
|
trusted library allocation
|
page read and write
|
||
1E9EEC8F000
|
trusted library allocation
|
page read and write
|
||
1E9F3430000
|
trusted library allocation
|
page read and write
|
||
1E9FA92C000
|
trusted library allocation
|
page read and write
|
||
1E9F0D69000
|
trusted library allocation
|
page read and write
|
||
1E9FB0B0000
|
trusted library allocation
|
page read and write
|
||
1E9F9C5D000
|
trusted library allocation
|
page read and write
|
||
1E9F0A46000
|
trusted library allocation
|
page read and write
|
||
1E9EECC5000
|
trusted library allocation
|
page read and write
|
||
1E9FA3E0000
|
trusted library allocation
|
page read and write
|
||
1E9FABDE000
|
trusted library allocation
|
page read and write
|
||
130C898B000
|
trusted library allocation
|
page read and write
|
||
1E9EC36F000
|
trusted library allocation
|
page read and write
|
||
1E9FA327000
|
trusted library allocation
|
page read and write
|
||
1E9FAD88000
|
trusted library allocation
|
page read and write
|
||
1E9FAACB000
|
trusted library allocation
|
page read and write
|
||
1E9EDCDB000
|
trusted library allocation
|
page read and write
|
||
1E9F29F6000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9EC5D9000
|
trusted library allocation
|
page read and write
|
||
1E9F11D3000
|
trusted library allocation
|
page read and write
|
||
1E9ECBC6000
|
trusted library allocation
|
page read and write
|
||
1E9F2F97000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F0B6E000
|
trusted library allocation
|
page read and write
|
||
1E9F36FE000
|
trusted library allocation
|
page read and write
|
||
1E9ED92A000
|
trusted library allocation
|
page read and write
|
||
1E9EDA53000
|
trusted library allocation
|
page read and write
|
||
1E9F13C1000
|
trusted library allocation
|
page read and write
|
||
1E9F36CF000
|
trusted library allocation
|
page read and write
|
||
1E9F13C1000
|
trusted library allocation
|
page read and write
|
||
1E9FABD6000
|
trusted library allocation
|
page read and write
|
||
A8C7B1E000
|
unkown
|
page readonly
|
||
1E9FA4B4000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F2EA6000
|
trusted library allocation
|
page read and write
|
||
1E9FAADA000
|
trusted library allocation
|
page read and write
|
||
130C9798000
|
heap
|
page read and write
|
||
1E9FA51B000
|
trusted library allocation
|
page read and write
|
||
1E9F0877000
|
heap
|
page read and write
|
||
1E9F0868000
|
heap
|
page read and write
|
||
1E9F36D8000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EDABB000
|
trusted library allocation
|
page read and write
|
||
1E9F40C0000
|
trusted library allocation
|
page read and write
|
||
1E9F0DC3000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC8000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
130C87B0000
|
trusted library section
|
page readonly
|
||
1E9F3063000
|
trusted library allocation
|
page read and write
|
||
1E9F9FC5000
|
trusted library allocation
|
page read and write
|
||
1E9F3486000
|
trusted library allocation
|
page read and write
|
||
2D8D7710000
|
heap
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9F1347000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
130C93F1000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F1273000
|
trusted library allocation
|
page read and write
|
||
1E9F0D54000
|
trusted library allocation
|
page read and write
|
||
28D05C32000
|
trusted library allocation
|
page read and write
|
||
1E9EDF06000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC183000
|
heap
|
page read and write
|
||
1E9FAD44000
|
trusted library allocation
|
page read and write
|
||
1E9EE317000
|
trusted library allocation
|
page read and write
|
||
1E9F9FD6000
|
trusted library allocation
|
page read and write
|
||
1E9EC5EB000
|
trusted library allocation
|
page read and write
|
||
1E9F9CEF000
|
trusted library allocation
|
page read and write
|
||
1E9EDAF8000
|
trusted library allocation
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F2EE7000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EDAE8000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F0ADD000
|
trusted library allocation
|
page read and write
|
||
1E9F9F8B000
|
trusted library allocation
|
page read and write
|
||
3DF1F2E4F000
|
trusted library allocation
|
page read and write
|
||
1E9F0BA6000
|
trusted library allocation
|
page read and write
|
||
1E9EE1BB000
|
trusted library allocation
|
page read and write
|
||
1E9FA296000
|
trusted library allocation
|
page read and write
|
||
1E9FB900000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9FAFA5000
|
trusted library allocation
|
page read and write
|
||
1E9EECE0000
|
trusted library allocation
|
page read and write
|
||
1E9FB997000
|
trusted library allocation
|
page read and write
|
||
1E9F3449000
|
trusted library allocation
|
page read and write
|
||
1E9EE1BB000
|
trusted library allocation
|
page read and write
|
||
1E9F0BFA000
|
trusted library allocation
|
page read and write
|
||
1E9FA4AA000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9FBC6D000
|
heap
|
page read and write
|
||
1E9FABB9000
|
trusted library allocation
|
page read and write
|
||
1E9ECB30000
|
trusted library allocation
|
page read and write
|
||
1E9FA4CE000
|
trusted library allocation
|
page read and write
|
||
1E9F0ADB000
|
trusted library allocation
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
1E9F3451000
|
trusted library allocation
|
page read and write
|
||
1E9FA628000
|
trusted library allocation
|
page read and write
|
||
DEC000
|
unkown
|
page write copy
|
||
1E9F25AA000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F46E6000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F40FD000
|
trusted library allocation
|
page read and write
|
||
1E9F34EF000
|
trusted library allocation
|
page read and write
|
||
1E9FA659000
|
trusted library allocation
|
page read and write
|
||
1E9FA4AB000
|
trusted library allocation
|
page read and write
|
||
1E9F9FB8000
|
trusted library allocation
|
page read and write
|
||
1E9F08D1000
|
heap
|
page read and write
|
||
1E9F46B7000
|
trusted library allocation
|
page read and write
|
||
1E9F3697000
|
trusted library allocation
|
page read and write
|
||
1E9F30F4000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9FA498000
|
trusted library allocation
|
page read and write
|
||
130C8A40000
|
heap
|
page read and write
|
||
1E9EC9F6000
|
trusted library allocation
|
page read and write
|
||
1E9F258B000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F0D98000
|
trusted library allocation
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
1E9EDFF8000
|
trusted library allocation
|
page read and write
|
||
1E9FA24A000
|
trusted library allocation
|
page read and write
|
||
1E9F9C4F000
|
trusted library allocation
|
page read and write
|
||
1E9FA999000
|
trusted library allocation
|
page read and write
|
||
1E9FAC43000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFD000
|
trusted library allocation
|
page read and write
|
||
130C93A1000
|
heap
|
page read and write
|
||
1E9ECB56000
|
trusted library allocation
|
page read and write
|
||
1E9F47BB000
|
trusted library allocation
|
page read and write
|
||
28D0594F000
|
unclassified section
|
page read and write
|
||
1E9EDF09000
|
trusted library allocation
|
page read and write
|
||
1E9F0D81000
|
trusted library allocation
|
page read and write
|
||
1E9F2EBE000
|
trusted library allocation
|
page read and write
|
||
1E9F3055000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAEFB000
|
trusted library allocation
|
page read and write
|
||
1E9F35BE000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0CA5000
|
trusted library allocation
|
page read and write
|
||
1E9F12EF000
|
trusted library allocation
|
page read and write
|
||
1E9F11EB000
|
trusted library allocation
|
page read and write
|
||
1E9FA0DA000
|
trusted library allocation
|
page read and write
|
||
1E9F36FE000
|
trusted library allocation
|
page read and write
|
||
1E9F09E7000
|
trusted library allocation
|
page read and write
|
||
1E9F0C87000
|
trusted library allocation
|
page read and write
|
||
1E9EC16C000
|
heap
|
page read and write
|
||
1E9F18C0000
|
trusted library allocation
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1E9F303A000
|
trusted library allocation
|
page read and write
|
||
28D05B12000
|
trusted library allocation
|
page read and write
|
||
1E9F26A1000
|
trusted library allocation
|
page read and write
|
||
1E9ECAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F2DF8000
|
trusted library allocation
|
page read and write
|
||
1E9F9CBC000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF8000
|
trusted library allocation
|
page read and write
|
||
1E9F1254000
|
trusted library allocation
|
page read and write
|
||
1E9FA688000
|
trusted library allocation
|
page read and write
|
||
1E9F258B000
|
trusted library allocation
|
page read and write
|
||
1E9F46EC000
|
trusted library allocation
|
page read and write
|
||
1E9FABF8000
|
trusted library allocation
|
page read and write
|
||
1E9F2F97000
|
trusted library allocation
|
page read and write
|
||
1E9F12F9000
|
trusted library allocation
|
page read and write
|
||
1E9F367C000
|
trusted library allocation
|
page read and write
|
||
1E9EDBFC000
|
trusted library allocation
|
page read and write
|
||
1E9F1768000
|
trusted library allocation
|
page read and write
|
||
2D8D766A000
|
trusted library allocation
|
page read and write
|
||
130C9760000
|
heap
|
page read and write
|
||
1E9F35C1000
|
trusted library allocation
|
page read and write
|
||
1E9F36E0000
|
trusted library allocation
|
page read and write
|
||
1E9F365C000
|
trusted library allocation
|
page read and write
|
||
1E9EECFB000
|
trusted library allocation
|
page read and write
|
||
1E9FB0C9000
|
trusted library allocation
|
page read and write
|
||
1E9F1751000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9F2DBB000
|
trusted library allocation
|
page read and write
|
||
1E9FABAF000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9EDCC1000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F303A000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD2000
|
trusted library allocation
|
page read and write
|
||
1E9ECB9B000
|
trusted library allocation
|
page read and write
|
||
1E9EDC64000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F3486000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
28D05B66000
|
trusted library allocation
|
page read and write
|
||
1E9F05FA000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F0AEF000
|
trusted library allocation
|
page read and write
|
||
130C9785000
|
heap
|
page read and write
|
||
1E9F34EF000
|
trusted library allocation
|
page read and write
|
||
1E9F09A1000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9F3591000
|
trusted library allocation
|
page read and write
|
||
1E9F1C05000
|
trusted library allocation
|
page read and write
|
||
1E9F12BA000
|
trusted library allocation
|
page read and write
|
||
1E9F36AA000
|
trusted library allocation
|
page read and write
|
||
1E9F0DDF000
|
trusted library allocation
|
page read and write
|
||
1E9F3432000
|
trusted library allocation
|
page read and write
|
||
1E9F1354000
|
trusted library allocation
|
page read and write
|
||
1E9FA7B7000
|
trusted library allocation
|
page read and write
|
||
1E9FBC4D000
|
heap
|
page read and write
|
||
1E9EC19A000
|
heap
|
page read and write
|
||
1E9F0D69000
|
trusted library allocation
|
page read and write
|
||
28D05730000
|
remote allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9EC5F2000
|
trusted library allocation
|
page read and write
|
||
1E9F3015000
|
trusted library allocation
|
page read and write
|
||
130C895C000
|
trusted library allocation
|
page read and write
|
||
1E9F0D5B000
|
trusted library allocation
|
page read and write
|
||
1E9EDBEE000
|
trusted library allocation
|
page read and write
|
||
1E9F359E000
|
trusted library allocation
|
page read and write
|
||
1E9F36B6000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F05DA000
|
trusted library allocation
|
page read and write
|
||
1E9FAAAF000
|
trusted library allocation
|
page read and write
|
||
1E9F3432000
|
trusted library allocation
|
page read and write
|
||
1E9F36E0000
|
trusted library allocation
|
page read and write
|
||
1E9F46B2000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F2ECC000
|
trusted library allocation
|
page read and write
|
||
1E9F46EC000
|
trusted library allocation
|
page read and write
|
||
1E9F35B4000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FA995000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE1000
|
trusted library allocation
|
page read and write
|
||
1E9F0A84000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F0974000
|
trusted library allocation
|
page read and write
|
||
1E9F2E7A000
|
trusted library allocation
|
page read and write
|
||
1E9EECF3000
|
trusted library allocation
|
page read and write
|
||
1E9F36EB000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F088A000
|
heap
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9F0AED000
|
trusted library allocation
|
page read and write
|
||
1E9F25A7000
|
trusted library allocation
|
page read and write
|
||
1E9F35BC000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FB062000
|
trusted library allocation
|
page read and write
|
||
1E9EC3DF000
|
trusted library allocation
|
page read and write
|
||
1E9F0AD6000
|
trusted library allocation
|
page read and write
|
||
130C8903000
|
trusted library allocation
|
page read and write
|
||
1E9FABEC000
|
trusted library allocation
|
page read and write
|
||
1E9EC4DB000
|
trusted library allocation
|
page read and write
|
||
1E9FA833000
|
trusted library allocation
|
page read and write
|
||
130C8EC6000
|
unkown
|
page execute read
|
||
1E9F3637000
|
trusted library allocation
|
page read and write
|
||
1E9F36E9000
|
trusted library allocation
|
page read and write
|
||
1E9F0937000
|
trusted library allocation
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9FBBFB000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
1E9F0651000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
22D4B900000
|
trusted library allocation
|
page read and write
|
||
1E9FAAB6000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
28D05C14000
|
trusted library allocation
|
page read and write
|
||
1E9FBC89000
|
heap
|
page read and write
|
||
1E9F363B000
|
trusted library allocation
|
page read and write
|
||
1E9FABDE000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFB000
|
trusted library allocation
|
page read and write
|
||
1E9FA155000
|
trusted library allocation
|
page read and write
|
||
1E9F3486000
|
trusted library allocation
|
page read and write
|
||
1E9F08D1000
|
heap
|
page read and write
|
||
1E9F0869000
|
heap
|
page read and write
|
||
1E9EDBE8000
|
trusted library allocation
|
page read and write
|
||
130C8EB0000
|
trusted library allocation
|
page read and write
|
||
1E9F9CEF000
|
trusted library allocation
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
1E9F361B000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EC19A000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F1263000
|
trusted library allocation
|
page read and write
|
||
1E9F17C8000
|
trusted library allocation
|
page read and write
|
||
1E9F9FDE000
|
trusted library allocation
|
page read and write
|
||
1E9F3568000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9EC16C000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9ECAFE000
|
trusted library allocation
|
page read and write
|
||
1E9F11D2000
|
trusted library allocation
|
page read and write
|
||
1E9F2CFB000
|
trusted library allocation
|
page read and write
|
||
1E9F2CD0000
|
trusted library allocation
|
page read and write
|
||
1E9FBCE3000
|
heap
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9F2E80000
|
trusted library allocation
|
page read and write
|
||
1E9EC5FD000
|
trusted library allocation
|
page read and write
|
||
1E9EC378000
|
trusted library allocation
|
page read and write
|
||
1E9EC175000
|
heap
|
page read and write
|
||
1E9F0899000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F05CB000
|
trusted library allocation
|
page read and write
|
||
1E9ECB26000
|
trusted library allocation
|
page read and write
|
||
1E9F1391000
|
trusted library allocation
|
page read and write
|
||
1E9F3644000
|
trusted library allocation
|
page read and write
|
||
1E9FAAE6000
|
trusted library allocation
|
page read and write
|
||
130C86F0000
|
heap
|
page read and write
|
||
1E9EEC98000
|
trusted library allocation
|
page read and write
|
||
1E9EC198000
|
heap
|
page read and write
|
||
130C9200000
|
trusted library allocation
|
page read and write
|
||
1E9FB0C1000
|
trusted library allocation
|
page read and write
|
||
1E9FA91A000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1E9F0D7B000
|
trusted library allocation
|
page read and write
|
||
1E9F057A000
|
trusted library allocation
|
page read and write
|
||
1E9F11CE000
|
trusted library allocation
|
page read and write
|
||
1E9FA613000
|
trusted library allocation
|
page read and write
|
||
1E9F9FAE000
|
trusted library allocation
|
page read and write
|
||
1E9EDB8F000
|
trusted library allocation
|
page read and write
|
||
1E9F46B2000
|
trusted library allocation
|
page read and write
|
||
1E9F2E17000
|
trusted library allocation
|
page read and write
|
||
1E9FA2BF000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA6DC000
|
trusted library allocation
|
page read and write
|
||
1E9EDCAA000
|
trusted library allocation
|
page read and write
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9FA7DC000
|
trusted library allocation
|
page read and write
|
||
1E9F472F000
|
trusted library allocation
|
page read and write
|
||
1E9FAD9C000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9F46EE000
|
trusted library allocation
|
page read and write
|
||
1E9FA774000
|
trusted library allocation
|
page read and write
|
||
1E9FA1AA000
|
trusted library allocation
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1E9FA833000
|
trusted library allocation
|
page read and write
|
||
1E9FA4A5000
|
trusted library allocation
|
page read and write
|
||
1E9FA53B000
|
trusted library allocation
|
page read and write
|
||
1E9FA152000
|
trusted library allocation
|
page read and write
|
||
28D0574B000
|
remote allocation
|
page execute read
|
||
1E9F08D1000
|
heap
|
page read and write
|
||
1E9F9FCF000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F127D000
|
trusted library allocation
|
page read and write
|
||
1E9F2E17000
|
trusted library allocation
|
page read and write
|
||
1E9F2E80000
|
trusted library allocation
|
page read and write
|
||
1E9F2ED6000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F34F3000
|
trusted library allocation
|
page read and write
|
||
2D8D7402000
|
unclassified section
|
page read and write
|
||
1E9F0A66000
|
trusted library allocation
|
page read and write
|
||
1E9F2DE6000
|
trusted library allocation
|
page read and write
|
||
1E9F0868000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA67A000
|
trusted library allocation
|
page read and write
|
||
1E9F0A65000
|
trusted library allocation
|
page read and write
|
||
1E9F0CFA000
|
trusted library allocation
|
page read and write
|
||
1E9F30F4000
|
trusted library allocation
|
page read and write
|
||
1E9F2D65000
|
trusted library allocation
|
page read and write
|
||
1E9FA78A000
|
trusted library allocation
|
page read and write
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
28D05B00000
|
trusted library allocation
|
page read and write
|
||
1E9ECD8E000
|
trusted library allocation
|
page read and write
|
||
1E9F9FD2000
|
trusted library allocation
|
page read and write
|
||
1E9F12FD000
|
trusted library allocation
|
page read and write
|
||
1E9F0D72000
|
trusted library allocation
|
page read and write
|
||
1E9F3504000
|
trusted library allocation
|
page read and write
|
||
1E9F2F8D000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9FA7DC000
|
trusted library allocation
|
page read and write
|
||
1E9EC41F000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9F364A000
|
trusted library allocation
|
page read and write
|
||
1E9F46EA000
|
trusted library allocation
|
page read and write
|
||
1E9F05CF000
|
trusted library allocation
|
page read and write
|
||
1E9ECDF4000
|
trusted library allocation
|
page read and write
|
||
1E9FA0EA000
|
trusted library allocation
|
page read and write
|
||
1E9FADD1000
|
trusted library allocation
|
page read and write
|
||
1E9F13A5000
|
trusted library allocation
|
page read and write
|
||
1E9F138A000
|
trusted library allocation
|
page read and write
|
||
1E9FBC47000
|
heap
|
page read and write
|
||
1E9F9CD5000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9FA493000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F13D6000
|
trusted library allocation
|
page read and write
|
||
1E9F36A0000
|
trusted library allocation
|
page read and write
|
||
1E9F9FA8000
|
trusted library allocation
|
page read and write
|
||
1E9ECBC4000
|
trusted library allocation
|
page read and write
|
||
1E9F12E0000
|
trusted library allocation
|
page read and write
|
||
1E9F3430000
|
trusted library allocation
|
page read and write
|
||
130C8550000
|
unclassified section
|
page readonly
|
||
1E9F4027000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
1E9F0D54000
|
trusted library allocation
|
page read and write
|
||
1E9F0AF6000
|
trusted library allocation
|
page read and write
|
||
2D8D7700000
|
heap
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9F0D7B000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
EEE547E000
|
unkown
|
page readonly
|
||
130C9363000
|
heap
|
page read and write
|
||
1E9F2E74000
|
trusted library allocation
|
page read and write
|
||
1E9EDA6D000
|
trusted library allocation
|
page read and write
|
||
1E9F2FD5000
|
trusted library allocation
|
page read and write
|
||
1E9EC16E000
|
heap
|
page read and write
|
||
1E9EEC8F000
|
trusted library allocation
|
page read and write
|
||
1E9F34ED000
|
trusted library allocation
|
page read and write
|
||
28D05C00000
|
trusted library allocation
|
page read and write
|
||
1E9F46E3000
|
trusted library allocation
|
page read and write
|
||
1E9F35AB000
|
trusted library allocation
|
page read and write
|
||
1E9F29CF000
|
trusted library allocation
|
page read and write
|
||
1E9F25D7000
|
trusted library allocation
|
page read and write
|
||
1E9F36F8000
|
trusted library allocation
|
page read and write
|
||
1E9F12F7000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9F36E9000
|
trusted library allocation
|
page read and write
|
||
1E9F36AD000
|
trusted library allocation
|
page read and write
|
||
1E9F12C3000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA699000
|
trusted library allocation
|
page read and write
|
||
1E9F2EAF000
|
trusted library allocation
|
page read and write
|
||
1E9F2D9D000
|
trusted library allocation
|
page read and write
|
||
1E9F3443000
|
trusted library allocation
|
page read and write
|
||
1E9F4094000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
1E9ED9C6000
|
trusted library allocation
|
page read and write
|
||
1593000
|
heap
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
1E9F9CC7000
|
trusted library allocation
|
page read and write
|
||
2D8D7210000
|
remote allocation
|
page read and write
|
||
1E9FABC7000
|
trusted library allocation
|
page read and write
|
||
1E9EDCDB000
|
trusted library allocation
|
page read and write
|
||
1E9EDBF5000
|
trusted library allocation
|
page read and write
|
||
1E9F0DDE000
|
trusted library allocation
|
page read and write
|
||
1E9FAF94000
|
trusted library allocation
|
page read and write
|
||
1E9FAC57000
|
trusted library allocation
|
page read and write
|
||
1E9EC19C000
|
heap
|
page read and write
|
||
1E9FBC3F000
|
heap
|
page read and write
|
||
1E9EEC6B000
|
trusted library allocation
|
page read and write
|
||
1E9FA7F9000
|
trusted library allocation
|
page read and write
|
||
1E9EDB63000
|
trusted library allocation
|
page read and write
|
||
1E9F40A1000
|
trusted library allocation
|
page read and write
|
||
28D05923000
|
heap
|
page read and write
|
||
1E9FAD3D000
|
trusted library allocation
|
page read and write
|
||
1E9EDAF8000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EDBC9000
|
trusted library allocation
|
page read and write
|
||
1E9EDA77000
|
trusted library allocation
|
page read and write
|
||
1E9EC44C000
|
trusted library allocation
|
page read and write
|
||
1E9F9FA0000
|
trusted library allocation
|
page read and write
|
||
1E9FB034000
|
trusted library allocation
|
page read and write
|
||
1E9F4695000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9F0A7E000
|
trusted library allocation
|
page read and write
|
||
528D000
|
stack
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FAEFD000
|
trusted library allocation
|
page read and write
|
||
1E9F0CFE000
|
trusted library allocation
|
page read and write
|
||
1E9F25AA000
|
trusted library allocation
|
page read and write
|
||
1E9FA4C3000
|
trusted library allocation
|
page read and write
|
||
1E9F0BB1000
|
trusted library allocation
|
page read and write
|
||
1E9F05B0000
|
trusted library allocation
|
page read and write
|
||
28D05A00000
|
trusted library allocation
|
page read and write
|
||
1E9F0580000
|
trusted library allocation
|
page read and write
|
||
1E9F3624000
|
trusted library allocation
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9F34BB000
|
trusted library allocation
|
page read and write
|
||
1E9F0866000
|
heap
|
page read and write
|
||
1E9F1786000
|
trusted library allocation
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE1000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FBBFB000
|
trusted library allocation
|
page read and write
|
||
1E9F1B24000
|
trusted library allocation
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
1E9EECF1000
|
trusted library allocation
|
page read and write
|
||
1E9F4055000
|
trusted library allocation
|
page read and write
|
||
1E9F1391000
|
trusted library allocation
|
page read and write
|
||
1E9F3599000
|
trusted library allocation
|
page read and write
|
||
1E9F9FFE000
|
trusted library allocation
|
page read and write
|
||
2D8D76F0000
|
trusted library allocation
|
page read and write
|
||
1E9F05B3000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F4080000
|
trusted library allocation
|
page read and write
|
||
1E9EE32C000
|
trusted library allocation
|
page read and write
|
||
1E9EC381000
|
trusted library allocation
|
page read and write
|
||
1E9F0D42000
|
trusted library allocation
|
page read and write
|
||
1E9ECB42000
|
trusted library allocation
|
page read and write
|
||
1E9EEC98000
|
trusted library allocation
|
page read and write
|
||
1E9F36D1000
|
trusted library allocation
|
page read and write
|
||
1E9F9FAE000
|
trusted library allocation
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F35AF000
|
trusted library allocation
|
page read and write
|
||
1E9F0896000
|
heap
|
page read and write
|
||
1E9F3445000
|
trusted library allocation
|
page read and write
|
||
1E9F17FE000
|
trusted library allocation
|
page read and write
|
||
1E9F0868000
|
heap
|
page read and write
|
||
1E9F2DA8000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
1E9FA475000
|
trusted library allocation
|
page read and write
|
||
1E9FA479000
|
trusted library allocation
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
DEC000
|
unkown
|
page read and write
|
||
1E9FB0F5000
|
trusted library allocation
|
page read and write
|
||
1E9EC164000
|
heap
|
page read and write
|
||
1E9F0DA5000
|
trusted library allocation
|
page read and write
|
||
1E9F46A2000
|
trusted library allocation
|
page read and write
|
||
1E9F2F5F000
|
trusted library allocation
|
page read and write
|
||
1E9EDFC9000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0CFA000
|
trusted library allocation
|
page read and write
|
||
1E9F46F0000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FA999000
|
trusted library allocation
|
page read and write
|
||
1E9F2DAD000
|
trusted library allocation
|
page read and write
|
||
1E9F2FCD000
|
trusted library allocation
|
page read and write
|
||
EEE647E000
|
unkown
|
page readonly
|
||
1E9F29DE000
|
trusted library allocation
|
page read and write
|
||
1E9FC348000
|
trusted library allocation
|
page read and write
|
||
1E9FA2AC000
|
trusted library allocation
|
page read and write
|
||
1E9F0D83000
|
trusted library allocation
|
page read and write
|
||
1E9F358B000
|
trusted library allocation
|
page read and write
|
||
1E9F4699000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD1000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FBBDF000
|
trusted library allocation
|
page read and write
|
||
1E9F3494000
|
trusted library allocation
|
page read and write
|
||
1E9F09AD000
|
trusted library allocation
|
page read and write
|
||
1E9F0DBF000
|
trusted library allocation
|
page read and write
|
||
2D8D74E0000
|
heap
|
page read and write
|
||
1E9EDC3B000
|
trusted library allocation
|
page read and write
|
||
1E9ECDC8000
|
trusted library allocation
|
page read and write
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9F9FED000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9FB07A000
|
trusted library allocation
|
page read and write
|
||
1E9FA91E000
|
trusted library allocation
|
page read and write
|
||
1E9F09D8000
|
trusted library allocation
|
page read and write
|
||
1E9EDAF8000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF8000
|
trusted library allocation
|
page read and write
|
||
1E9F1246000
|
trusted library allocation
|
page read and write
|
||
1E9F2D7B000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFA000
|
trusted library allocation
|
page read and write
|
||
1E9F3697000
|
trusted library allocation
|
page read and write
|
||
1E9FBBF6000
|
trusted library allocation
|
page read and write
|
||
1E9EDCC7000
|
trusted library allocation
|
page read and write
|
||
1E9F3011000
|
trusted library allocation
|
page read and write
|
||
1E9FAFCC000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9FABDC000
|
trusted library allocation
|
page read and write
|
||
1E9EDBF9000
|
trusted library allocation
|
page read and write
|
||
1E9ECDC4000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
1E9F0A75000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9FACBB000
|
trusted library allocation
|
page read and write
|
||
1E9F34D8000
|
trusted library allocation
|
page read and write
|
||
1E9F0AD1000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F13A5000
|
trusted library allocation
|
page read and write
|
||
1E9EC198000
|
heap
|
page read and write
|
||
1E9F17D2000
|
trusted library allocation
|
page read and write
|
||
1E9F3481000
|
trusted library allocation
|
page read and write
|
||
1E9EEC70000
|
trusted library allocation
|
page read and write
|
||
1E9FB070000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
1E9F0D8B000
|
trusted library allocation
|
page read and write
|
||
1E9F0A57000
|
trusted library allocation
|
page read and write
|
||
1E9EDB63000
|
trusted library allocation
|
page read and write
|
||
23F961C0000
|
heap
|
page read and write
|
||
1E9EC186000
|
heap
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
1E9F138E000
|
trusted library allocation
|
page read and write
|
||
130C93A8000
|
heap
|
page read and write
|
||
23F960D0000
|
heap
|
page read and write
|
||
1E9FA761000
|
trusted library allocation
|
page read and write
|
||
1E9F1289000
|
trusted library allocation
|
page read and write
|
||
1E9F138E000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F9BAD000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF5000
|
trusted library allocation
|
page read and write
|
||
1E9F468B000
|
trusted library allocation
|
page read and write
|
||
1E9F12E4000
|
trusted library allocation
|
page read and write
|
||
1E9EC18A000
|
heap
|
page read and write
|
||
1E9FAAB7000
|
trusted library allocation
|
page read and write
|
||
1E9F0874000
|
heap
|
page read and write
|
||
130C8923000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E12DFE000
|
unkown
|
page readonly
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F1265000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
1E9FADFC000
|
trusted library allocation
|
page read and write
|
||
1E9F40D6000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9EE381000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F2DCD000
|
trusted library allocation
|
page read and write
|
||
1E9FA1B6000
|
trusted library allocation
|
page read and write
|
||
28D05B96000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
1E9FA775000
|
trusted library allocation
|
page read and write
|
||
1E9F0CFE000
|
trusted library allocation
|
page read and write
|
||
1E9F12E0000
|
trusted library allocation
|
page read and write
|
||
130C977B000
|
heap
|
page read and write
|
||
1E9F0ADD000
|
trusted library allocation
|
page read and write
|
||
1E9EDB73000
|
trusted library allocation
|
page read and write
|
||
1E9FAB35000
|
trusted library allocation
|
page read and write
|
||
28D05BEB000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A0000
|
heap
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
2D8D740F000
|
unclassified section
|
page read and write
|
||
1E9F3025000
|
trusted library allocation
|
page read and write
|
||
130C89B4000
|
trusted library allocation
|
page read and write
|
||
130C8F70000
|
heap
|
page read and write
|
||
1E9EDF62000
|
trusted library allocation
|
page read and write
|
||
1E9FACD9000
|
trusted library allocation
|
page read and write
|
||
1E9FA68F000
|
trusted library allocation
|
page read and write
|
||
1E9F347D000
|
trusted library allocation
|
page read and write
|
||
1E9FA2B6000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9EDF3D000
|
trusted library allocation
|
page read and write
|
||
1E9FAD5E000
|
trusted library allocation
|
page read and write
|
||
1E9F30E3000
|
trusted library allocation
|
page read and write
|
||
A8C9DFE000
|
unkown
|
page readonly
|
||
1E9FAAFD000
|
trusted library allocation
|
page read and write
|
||
1E9F2FD5000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0CAA000
|
trusted library allocation
|
page read and write
|
||
1E9F13D6000
|
trusted library allocation
|
page read and write
|
||
1E9FC326000
|
trusted library allocation
|
page read and write
|
||
1E9F369C000
|
trusted library allocation
|
page read and write
|
||
1E9EDC48000
|
trusted library allocation
|
page read and write
|
||
1E9F2D9C000
|
trusted library allocation
|
page read and write
|
||
1E9FA3E3000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFB000
|
trusted library allocation
|
page read and write
|
||
1E9F40B3000
|
trusted library allocation
|
page read and write
|
||
1E9F0C32000
|
trusted library allocation
|
page read and write
|
||
1E9F36D3000
|
trusted library allocation
|
page read and write
|
||
1E9F46B7000
|
trusted library allocation
|
page read and write
|
||
130C8730000
|
heap
|
page read and write
|
||
1E9EC1A0000
|
heap
|
page read and write
|
||
1E9ECD6B000
|
trusted library allocation
|
page read and write
|
||
1E9F2D5F000
|
trusted library allocation
|
page read and write
|
||
1E9FAEC9000
|
trusted library allocation
|
page read and write
|
||
1E9F36EB000
|
trusted library allocation
|
page read and write
|
||
1E9EEC7F000
|
trusted library allocation
|
page read and write
|
||
1E9F0D81000
|
trusted library allocation
|
page read and write
|
||
1E9F3061000
|
trusted library allocation
|
page read and write
|
||
1E9EDAEA000
|
trusted library allocation
|
page read and write
|
||
1E9F1287000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A0000
|
heap
|
page read and write
|
||
1E9FA7A0000
|
trusted library allocation
|
page read and write
|
||
23F97DAB000
|
heap
|
page read and write
|
||
130C89FA000
|
trusted library allocation
|
page read and write
|
||
1E9F47DB000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9ECDAB000
|
trusted library allocation
|
page read and write
|
||
1E9EC195000
|
heap
|
page read and write
|
||
1E9FA0BA000
|
trusted library allocation
|
page read and write
|
||
1E9FA0CB000
|
trusted library allocation
|
page read and write
|
||
1E9FA995000
|
trusted library allocation
|
page read and write
|
||
1E9FB977000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAB79000
|
trusted library allocation
|
page read and write
|
||
1E9F46A7000
|
trusted library allocation
|
page read and write
|
||
1E9F0A63000
|
trusted library allocation
|
page read and write
|
||
1E9F9CC7000
|
trusted library allocation
|
page read and write
|
||
1E9EDF18000
|
trusted library allocation
|
page read and write
|
||
1E9F36E9000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9EDF62000
|
trusted library allocation
|
page read and write
|
||
1E9EDC38000
|
trusted library allocation
|
page read and write
|
||
1E9F12EE000
|
trusted library allocation
|
page read and write
|
||
1E9EDA9C000
|
trusted library allocation
|
page read and write
|
||
1E9F4080000
|
trusted library allocation
|
page read and write
|
||
28D05B7B000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9F09AD000
|
trusted library allocation
|
page read and write
|
||
1E9F09CF000
|
trusted library allocation
|
page read and write
|
||
1E9EDBD2000
|
trusted library allocation
|
page read and write
|
||
1E9FA4A3000
|
trusted library allocation
|
page read and write
|
||
1E9EC18C000
|
heap
|
page read and write
|
||
9DD000
|
stack
|
page read and write
|
||
1E9EDF5D000
|
trusted library allocation
|
page read and write
|
||
1E9EDFA7000
|
trusted library allocation
|
page read and write
|
||
1E9FA4AB000
|
trusted library allocation
|
page read and write
|
||
1E14F7E000
|
unkown
|
page readonly
|
||
1E9FA183000
|
trusted library allocation
|
page read and write
|
||
1E9F46E6000
|
trusted library allocation
|
page read and write
|
||
1E9F2ED6000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EDCA1000
|
trusted library allocation
|
page read and write
|
||
1E9F2EFC000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F35CF000
|
trusted library allocation
|
page read and write
|
||
1E9FABAA000
|
trusted library allocation
|
page read and write
|
||
1E9FA15D000
|
trusted library allocation
|
page read and write
|
||
1E9F30E5000
|
trusted library allocation
|
page read and write
|
||
1E9F4048000
|
trusted library allocation
|
page read and write
|
||
1E9FADE3000
|
trusted library allocation
|
page read and write
|
||
1E9FB9FB000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
130C8977000
|
trusted library allocation
|
page read and write
|
||
1E9EC185000
|
heap
|
page read and write
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9F0874000
|
heap
|
page read and write
|
||
1E9F2D90000
|
trusted library allocation
|
page read and write
|
||
1E9F0AEF000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9EC1A4000
|
heap
|
page read and write
|
||
1E9F0D5B000
|
trusted library allocation
|
page read and write
|
||
1E9F2D70000
|
trusted library allocation
|
page read and write
|
||
1E9F13C5000
|
trusted library allocation
|
page read and write
|
||
1E9FA13E000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FA45F000
|
trusted library allocation
|
page read and write
|
||
1E9F2E74000
|
trusted library allocation
|
page read and write
|
||
1E9FC32B000
|
trusted library allocation
|
page read and write
|
||
1E9F0863000
|
heap
|
page read and write
|
||
1E9F36FE000
|
trusted library allocation
|
page read and write
|
||
1E9FA49C000
|
trusted library allocation
|
page read and write
|
||
1E9EDCBC000
|
trusted library allocation
|
page read and write
|
||
1E9EC19C000
|
heap
|
page read and write
|
||
1E9F0D96000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9F05D7000
|
trusted library allocation
|
page read and write
|
||
1E9F0DBA000
|
trusted library allocation
|
page read and write
|
||
1E9F2EFC000
|
trusted library allocation
|
page read and write
|
||
1E9F405D000
|
trusted library allocation
|
page read and write
|
||
23F961E0000
|
heap
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9F4031000
|
trusted library allocation
|
page read and write
|
||
1E9FA629000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F9CF4000
|
trusted library allocation
|
page read and write
|
||
2D8D74E3000
|
heap
|
page read and write
|
||
1E9EDBDF000
|
trusted library allocation
|
page read and write
|
||
130C93F2000
|
heap
|
page read and write
|
||
1E9EDFF1000
|
trusted library allocation
|
page read and write
|
||
1E9F2EFC000
|
trusted library allocation
|
page read and write
|
||
1E9F3486000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F0874000
|
heap
|
page read and write
|
||
1E9FB09F000
|
trusted library allocation
|
page read and write
|
||
1E9F0868000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
130C976D000
|
heap
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F2F5A000
|
trusted library allocation
|
page read and write
|
||
1E9F9FED000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F2DF9000
|
trusted library allocation
|
page read and write
|
||
1E9EC3AA000
|
trusted library allocation
|
page read and write
|
||
1E9EC186000
|
heap
|
page read and write
|
||
3DF1F2E89000
|
trusted library allocation
|
page read and write
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9EC390000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0CDB000
|
trusted library allocation
|
page read and write
|
||
1E9F0AB9000
|
trusted library allocation
|
page read and write
|
||
1E9F13C5000
|
trusted library allocation
|
page read and write
|
||
1E9EC432000
|
trusted library allocation
|
page read and write
|
||
2D8D7230000
|
unclassified section
|
page readonly
|
||
1E9F1924000
|
trusted library allocation
|
page read and write
|
||
1E9EE381000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9F0D2F000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE1000
|
trusted library allocation
|
page read and write
|
||
1E9F3057000
|
trusted library allocation
|
page read and write
|
||
1E9F185B000
|
trusted library allocation
|
page read and write
|
||
1E9F2CFB000
|
trusted library allocation
|
page read and write
|
||
1E9EDAEA000
|
trusted library allocation
|
page read and write
|
||
1E9F36E5000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9F0D72000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9F35C6000
|
trusted library allocation
|
page read and write
|
||
1E9F352D000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F4043000
|
trusted library allocation
|
page read and write
|
||
1E9EDADC000
|
trusted library allocation
|
page read and write
|
||
23F97DA7000
|
heap
|
page read and write
|
||
1E9EC46E000
|
trusted library allocation
|
page read and write
|
||
1E9F11FE000
|
trusted library allocation
|
page read and write
|
||
1E9ED94A000
|
trusted library allocation
|
page read and write
|
||
1E9FA151000
|
trusted library allocation
|
page read and write
|
||
1E9ECBC4000
|
trusted library allocation
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1E9F34FB000
|
trusted library allocation
|
page read and write
|
||
1E9EDBE8000
|
trusted library allocation
|
page read and write
|
||
1E9F0DFE000
|
trusted library allocation
|
page read and write
|
||
28D05D00000
|
heap
|
page read and write
|
||
1E9FB05D000
|
trusted library allocation
|
page read and write
|
||
1E9F136E000
|
trusted library allocation
|
page read and write
|
||
1E9F0DC3000
|
trusted library allocation
|
page read and write
|
||
1E9F40A1000
|
trusted library allocation
|
page read and write
|
||
1E9EDB20000
|
trusted library allocation
|
page read and write
|
||
1E9FA498000
|
trusted library allocation
|
page read and write
|
||
1E9EE381000
|
trusted library allocation
|
page read and write
|
||
1E9F343D000
|
trusted library allocation
|
page read and write
|
||
1E9FA496000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9F0D16000
|
trusted library allocation
|
page read and write
|
||
1E9EC971000
|
trusted library allocation
|
page read and write
|
||
1E9F0866000
|
heap
|
page read and write
|
||
130C9799000
|
heap
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9FAC88000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FA7F9000
|
trusted library allocation
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F4699000
|
trusted library allocation
|
page read and write
|
||
1E9FC300000
|
trusted library allocation
|
page read and write
|
||
1E9EC180000
|
heap
|
page read and write
|
||
1E9F3486000
|
trusted library allocation
|
page read and write
|
||
1E9FA7CF000
|
trusted library allocation
|
page read and write
|
||
130C9797000
|
heap
|
page read and write
|
||
1E9F3432000
|
trusted library allocation
|
page read and write
|
||
1E9F0CAA000
|
trusted library allocation
|
page read and write
|
||
1E9F0534000
|
trusted library allocation
|
page read and write
|
||
130C93E0000
|
heap
|
page read and write
|
||
4E8B000
|
stack
|
page read and write
|
||
1E9F9FC5000
|
trusted library allocation
|
page read and write
|
||
1E9ECBB5000
|
trusted library allocation
|
page read and write
|
||
1E9F2E35000
|
trusted library allocation
|
page read and write
|
||
1E9F30BA000
|
trusted library allocation
|
page read and write
|
||
130C93FC000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EDBDF000
|
trusted library allocation
|
page read and write
|
||
1E9F061F000
|
trusted library allocation
|
page read and write
|
||
1E9FA49F000
|
trusted library allocation
|
page read and write
|
||
1E9EC5D9000
|
trusted library allocation
|
page read and write
|
||
1E9FA45F000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FB062000
|
trusted library allocation
|
page read and write
|
||
1E9EC4AD000
|
trusted library allocation
|
page read and write
|
||
1E9F0D2F000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA068000
|
trusted library allocation
|
page read and write
|
||
1E9F3473000
|
trusted library allocation
|
page read and write
|
||
1E9ECA9F000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFC000
|
trusted library allocation
|
page read and write
|
||
1E9F0964000
|
trusted library allocation
|
page read and write
|
||
2D8D7486000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F3666000
|
trusted library allocation
|
page read and write
|
||
2D8D7410000
|
heap
|
page read and write
|
||
2D8D7672000
|
trusted library allocation
|
page read and write
|
||
2D8D71A0000
|
unclassified section
|
page readonly
|
||
1E9F1C02000
|
trusted library allocation
|
page read and write
|
||
1E9FB47D000
|
trusted library allocation
|
page read and write
|
||
1E9FA636000
|
trusted library allocation
|
page read and write
|
||
1E9FA7B4000
|
trusted library allocation
|
page read and write
|
||
1E9F344A000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F4744000
|
trusted library allocation
|
page read and write
|
||
1E9FBCBC000
|
heap
|
page read and write
|
||
1E9F175D000
|
trusted library allocation
|
page read and write
|
||
2D8D71B0000
|
unclassified section
|
page readonly
|
||
1E9F0CFE000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9ECDC1000
|
trusted library allocation
|
page read and write
|
||
1E9F36A7000
|
trusted library allocation
|
page read and write
|
||
130C935F000
|
heap
|
page read and write
|
||
DE2000
|
unkown
|
page readonly
|
||
1E9F05DC000
|
trusted library allocation
|
page read and write
|
||
1E12EBE000
|
stack
|
page read and write
|
||
1E9F47F2000
|
trusted library allocation
|
page read and write
|
||
1E9F46A6000
|
trusted library allocation
|
page read and write
|
||
1E9F0A0C000
|
trusted library allocation
|
page read and write
|
||
1E9F25C3000
|
trusted library allocation
|
page read and write
|
||
1E9F36FE000
|
trusted library allocation
|
page read and write
|
||
130C8980000
|
trusted library allocation
|
page read and write
|
||
1E9FA944000
|
trusted library allocation
|
page read and write
|
||
1E9FAF94000
|
trusted library allocation
|
page read and write
|
||
1E9F18C0000
|
trusted library allocation
|
page read and write
|
||
2D8D790C000
|
trusted library allocation
|
page read and write
|
||
1E9F9CEB000
|
trusted library allocation
|
page read and write
|
||
1E9F4090000
|
trusted library allocation
|
page read and write
|
||
1E9ED9B4000
|
trusted library allocation
|
page read and write
|
||
1E9FA90F000
|
trusted library allocation
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9FA67A000
|
trusted library allocation
|
page read and write
|
||
1E9F05F7000
|
trusted library allocation
|
page read and write
|
||
1E9EC186000
|
heap
|
page read and write
|
||
1E9F343D000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F12EA000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F2FAD000
|
trusted library allocation
|
page read and write
|
||
1E9F3441000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9F9F63000
|
trusted library allocation
|
page read and write
|
||
1E9F18A8000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC8000
|
trusted library allocation
|
page read and write
|
||
1E9F0D9D000
|
trusted library allocation
|
page read and write
|
||
1E9F2F6A000
|
trusted library allocation
|
page read and write
|
||
1E9F0D81000
|
trusted library allocation
|
page read and write
|
||
1E9F0D8F000
|
trusted library allocation
|
page read and write
|
||
1E9F46A2000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F0B1F000
|
trusted library allocation
|
page read and write
|
||
1E9F30E3000
|
trusted library allocation
|
page read and write
|
||
1E9EDB6E000
|
trusted library allocation
|
page read and write
|
||
1E9F2F91000
|
trusted library allocation
|
page read and write
|
||
28D05920000
|
heap
|
page read and write
|
||
1E9F409D000
|
trusted library allocation
|
page read and write
|
||
1E9F2CE1000
|
trusted library allocation
|
page read and write
|
||
1E9FAB44000
|
trusted library allocation
|
page read and write
|
||
1E9F0A28000
|
trusted library allocation
|
page read and write
|
||
1E9FABCE000
|
trusted library allocation
|
page read and write
|
||
1E9EECEC000
|
trusted library allocation
|
page read and write
|
||
1E9ECBC8000
|
trusted library allocation
|
page read and write
|
||
1E9F0981000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
1E9FAAB7000
|
trusted library allocation
|
page read and write
|
||
130C9203000
|
trusted library allocation
|
page read and write
|
||
1E9F0DEC000
|
trusted library allocation
|
page read and write
|
||
1E9F25CF000
|
trusted library allocation
|
page read and write
|
||
1E9F0D84000
|
trusted library allocation
|
page read and write
|
||
1E9F305B000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA07F000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
DF4000
|
unkown
|
page readonly
|
||
1E9F4027000
|
trusted library allocation
|
page read and write
|
||
1E9F2E80000
|
trusted library allocation
|
page read and write
|
||
130C87A0000
|
unclassified section
|
page read and write
|
||
1E9F2EFC000
|
trusted library allocation
|
page read and write
|
||
1E9ECA1B000
|
trusted library allocation
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9ECAFE000
|
trusted library allocation
|
page read and write
|
||
130C93ED000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EEC98000
|
trusted library allocation
|
page read and write
|
||
1E9F9C76000
|
trusted library allocation
|
page read and write
|
||
1E9FAB5B000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F0DCF000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A4000
|
heap
|
page read and write
|
||
EEE443E000
|
stack
|
page read and write
|
||
1E9F9B5B000
|
trusted library allocation
|
page read and write
|
||
1E9FBBE9000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F9CF7000
|
trusted library allocation
|
page read and write
|
||
130C936C000
|
heap
|
page read and write
|
||
1E9FAAAF000
|
trusted library allocation
|
page read and write
|
||
1E9F9FFA000
|
trusted library allocation
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
1E9EECD5000
|
trusted library allocation
|
page read and write
|
||
1E9F0AEF000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0D42000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC1000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
A8C7B9B000
|
stack
|
page read and write
|
||
1E9EDBF5000
|
trusted library allocation
|
page read and write
|
||
1E9FAACB000
|
trusted library allocation
|
page read and write
|
||
1E9F0AB0000
|
trusted library allocation
|
page read and write
|
||
1E9F05CB000
|
trusted library allocation
|
page read and write
|
||
1E9F402B000
|
trusted library allocation
|
page read and write
|
||
1E9EE15D000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F35AF000
|
trusted library allocation
|
page read and write
|
||
1E9F09A1000
|
trusted library allocation
|
page read and write
|
||
1E9F34D2000
|
trusted library allocation
|
page read and write
|
||
1E9F0D5B000
|
trusted library allocation
|
page read and write
|
||
2D8D765D000
|
trusted library allocation
|
page read and write
|
||
1E9F0DFD000
|
trusted library allocation
|
page read and write
|
||
1E9EC9F6000
|
trusted library allocation
|
page read and write
|
||
1E9F099F000
|
trusted library allocation
|
page read and write
|
||
28D05B72000
|
trusted library allocation
|
page read and write
|
||
1E9EDA8B000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FA9A1000
|
trusted library allocation
|
page read and write
|
||
1E9FAD60000
|
trusted library allocation
|
page read and write
|
||
1E9FA4C7000
|
trusted library allocation
|
page read and write
|
||
FDC5DFE000
|
stack
|
page read and write
|
||
1E9F346D000
|
trusted library allocation
|
page read and write
|
||
1E9F305D000
|
trusted library allocation
|
page read and write
|
||
1E9FABDA000
|
trusted library allocation
|
page read and write
|
||
1E9EDCF6000
|
trusted library allocation
|
page read and write
|
||
1E9EECFB000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1593000
|
heap
|
page read and write
|
||
1E9F088A000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9ECB9F000
|
trusted library allocation
|
page read and write
|
||
1E9EC4B5000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1E9F9B92000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F1900000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9EDC9A000
|
trusted library allocation
|
page read and write
|
||
1E9F46E3000
|
trusted library allocation
|
page read and write
|
||
1E9EC36D000
|
trusted library allocation
|
page read and write
|
||
1E9FAC26000
|
trusted library allocation
|
page read and write
|
||
1E9EECF5000
|
trusted library allocation
|
page read and write
|
||
1E9F30F4000
|
trusted library allocation
|
page read and write
|
||
28D05B23000
|
trusted library allocation
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
1E9F0B1F000
|
trusted library allocation
|
page read and write
|
||
1E9EE909000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
1E9ECB58000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9F1354000
|
trusted library allocation
|
page read and write
|
||
1E9FACB1000
|
trusted library allocation
|
page read and write
|
||
1E9F4076000
|
trusted library allocation
|
page read and write
|
||
1E9EC450000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A4000
|
heap
|
page read and write
|
||
1E9EECF5000
|
trusted library allocation
|
page read and write
|
||
1E9F34A1000
|
trusted library allocation
|
page read and write
|
||
1E9F2D51000
|
trusted library allocation
|
page read and write
|
||
1E9ECAB0000
|
trusted library allocation
|
page read and write
|
||
1E9FA678000
|
trusted library allocation
|
page read and write
|
||
1E9F0898000
|
heap
|
page read and write
|
||
1E9F3059000
|
trusted library allocation
|
page read and write
|
||
1E9FA4AB000
|
trusted library allocation
|
page read and write
|
||
1E9F29D3000
|
trusted library allocation
|
page read and write
|
||
1E9F46EA000
|
trusted library allocation
|
page read and write
|
||
2D8D7250000
|
heap
|
page read and write
|
||
1E9FA0B2000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F34D2000
|
trusted library allocation
|
page read and write
|
||
1E9F0D72000
|
trusted library allocation
|
page read and write
|
||
1E9F4055000
|
trusted library allocation
|
page read and write
|
||
1E9F2DC4000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9EC384000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FAC13000
|
trusted library allocation
|
page read and write
|
||
11EB000
|
stack
|
page read and write
|
||
1E9F3563000
|
trusted library allocation
|
page read and write
|
||
1E9FAAB7000
|
trusted library allocation
|
page read and write
|
||
1E9FA7C5000
|
trusted library allocation
|
page read and write
|
||
1E9EC5F2000
|
trusted library allocation
|
page read and write
|
||
1E9FB47D000
|
trusted library allocation
|
page read and write
|
||
1E9FAFA5000
|
trusted library allocation
|
page read and write
|
||
1E9EC192000
|
heap
|
page read and write
|
||
1E9F0D46000
|
trusted library allocation
|
page read and write
|
||
1E9ECDDF000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FA7C4000
|
trusted library allocation
|
page read and write
|
||
1E9F30C5000
|
trusted library allocation
|
page read and write
|
||
1E9F9C7A000
|
trusted library allocation
|
page read and write
|
||
1E9F0D85000
|
trusted library allocation
|
page read and write
|
||
1E9FABAF000
|
trusted library allocation
|
page read and write
|
||
1E9F3093000
|
trusted library allocation
|
page read and write
|
||
130C9360000
|
heap
|
page read and write
|
||
1E9F362E000
|
trusted library allocation
|
page read and write
|
||
1E9FA90B000
|
trusted library allocation
|
page read and write
|
||
130C892F000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9FAAC6000
|
trusted library allocation
|
page read and write
|
||
1E9FAD77000
|
trusted library allocation
|
page read and write
|
||
1E9F17DF000
|
trusted library allocation
|
page read and write
|
||
1E9FB98F000
|
trusted library allocation
|
page read and write
|
||
1E9F18DD000
|
trusted library allocation
|
page read and write
|
||
1E9F1273000
|
trusted library allocation
|
page read and write
|
||
1E9FB050000
|
trusted library allocation
|
page read and write
|
||
1E9F2EE7000
|
trusted library allocation
|
page read and write
|
||
1E9F305D000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F46A6000
|
trusted library allocation
|
page read and write
|
||
1E9F9F9D000
|
trusted library allocation
|
page read and write
|
||
1E9F40C6000
|
trusted library allocation
|
page read and write
|
||
1E9F0673000
|
trusted library allocation
|
page read and write
|
||
1E9FA4E7000
|
trusted library allocation
|
page read and write
|
||
1E9ECD24000
|
trusted library allocation
|
page read and write
|
||
1E9F2EAF000
|
trusted library allocation
|
page read and write
|
||
1E9F2AB2000
|
trusted library allocation
|
page read and write
|
||
130C8780000
|
heap
|
page readonly
|
||
1E9ECDEA000
|
trusted library allocation
|
page read and write
|
||
A8CCF3E000
|
unkown
|
page readonly
|
||
1E9ECAD2000
|
trusted library allocation
|
page read and write
|
||
1E9F9CDC000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F2FD5000
|
trusted library allocation
|
page read and write
|
||
1E9EC5E0000
|
trusted library allocation
|
page read and write
|
||
1E9FA316000
|
trusted library allocation
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
1E9F0962000
|
trusted library allocation
|
page read and write
|
||
1E9EC5DC000
|
trusted library allocation
|
page read and write
|
||
1E9F3697000
|
trusted library allocation
|
page read and write
|
||
1E9EDBBD000
|
trusted library allocation
|
page read and write
|
||
1E9ED9D9000
|
trusted library allocation
|
page read and write
|
||
1E9F2ED6000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EDAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F3656000
|
trusted library allocation
|
page read and write
|
||
1E9F2DA8000
|
trusted library allocation
|
page read and write
|
||
1E9F0C12000
|
trusted library allocation
|
page read and write
|
||
1E9F0ADB000
|
trusted library allocation
|
page read and write
|
||
1E9F1783000
|
trusted library allocation
|
page read and write
|
||
1E9FBBDD000
|
trusted library allocation
|
page read and write
|
||
1E9F08D0000
|
heap
|
page read and write
|
||
1E9F0D81000
|
trusted library allocation
|
page read and write
|
||
1E9EE409000
|
trusted library allocation
|
page read and write
|
||
1E9EEC59000
|
trusted library allocation
|
page read and write
|
||
1E9FBC6B000
|
heap
|
page read and write
|
||
1E9F36D3000
|
trusted library allocation
|
page read and write
|
||
1E9EC186000
|
heap
|
page read and write
|
||
1E9F35CC000
|
trusted library allocation
|
page read and write
|
||
1E9F357D000
|
trusted library allocation
|
page read and write
|
||
1E9FA145000
|
trusted library allocation
|
page read and write
|
||
1E9FA9C3000
|
trusted library allocation
|
page read and write
|
||
1E9ECDC4000
|
trusted library allocation
|
page read and write
|
||
1E9F36DE000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
22D4B600000
|
heap
|
page read and write
|
||
1E9FB8C3000
|
trusted library allocation
|
page read and write
|
||
3781000
|
heap
|
page read and write
|
||
1E9F1249000
|
trusted library allocation
|
page read and write
|
||
1E9F2ED6000
|
trusted library allocation
|
page read and write
|
||
1E9FA23C000
|
trusted library allocation
|
page read and write
|
||
130C935C000
|
heap
|
page read and write
|
||
1E9FA99C000
|
trusted library allocation
|
page read and write
|
||
1E9F0DFA000
|
trusted library allocation
|
page read and write
|
||
28D05B7D000
|
trusted library allocation
|
page read and write
|
||
1E9EDBCC000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F25A0000
|
trusted library allocation
|
page read and write
|
||
1E9EDCC1000
|
trusted library allocation
|
page read and write
|
||
2D8D72E0000
|
heap
|
page read and write
|
||
1E9FADEE000
|
trusted library allocation
|
page read and write
|
||
1E9EC180000
|
heap
|
page read and write
|
||
1E9F2F9A000
|
trusted library allocation
|
page read and write
|
||
1E9F35B4000
|
trusted library allocation
|
page read and write
|
||
1E9F0939000
|
trusted library allocation
|
page read and write
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9F357D000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
stack
|
page read and write
|
||
1E9F46E8000
|
trusted library allocation
|
page read and write
|
||
1E9F46F2000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD1000
|
trusted library allocation
|
page read and write
|
||
1DA8B1404000
|
trusted library allocation
|
page read and write
|
||
1E9FA617000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
28D05B98000
|
trusted library allocation
|
page read and write
|
||
1E9FA305000
|
trusted library allocation
|
page read and write
|
||
1E9F0D72000
|
trusted library allocation
|
page read and write
|
||
1E9F3494000
|
trusted library allocation
|
page read and write
|
||
1E9EEC70000
|
trusted library allocation
|
page read and write
|
||
28D05BAD000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F0DE4000
|
trusted library allocation
|
page read and write
|
||
1E9EE708000
|
trusted library allocation
|
page read and write
|
||
1E9F258B000
|
trusted library allocation
|
page read and write
|
||
1E9FBC45000
|
heap
|
page read and write
|
||
1E9FA0A5000
|
trusted library allocation
|
page read and write
|
||
1E9FA4BA000
|
trusted library allocation
|
page read and write
|
||
1E9F36DE000
|
trusted library allocation
|
page read and write
|
||
1EC0003F000
|
trusted library allocation
|
page read and write
|
||
1E9F34B3000
|
trusted library allocation
|
page read and write
|
||
1E9FA66F000
|
trusted library allocation
|
page read and write
|
||
23F965E5000
|
heap
|
page read and write
|
||
1E9EE409000
|
trusted library allocation
|
page read and write
|
||
23F96270000
|
heap
|
page read and write
|
||
1E9EDBDF000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0D46000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9FA483000
|
trusted library allocation
|
page read and write
|
||
1E9EC185000
|
heap
|
page read and write
|
||
1E9F30E5000
|
trusted library allocation
|
page read and write
|
||
1E9FA672000
|
trusted library allocation
|
page read and write
|
||
1E9F3473000
|
trusted library allocation
|
page read and write
|
||
130C896F000
|
trusted library allocation
|
page read and write
|
||
1E9EE609000
|
trusted library allocation
|
page read and write
|
||
A8CAEBE000
|
unkown
|
page readonly
|
||
1E9EC388000
|
trusted library allocation
|
page read and write
|
||
1E9F13C5000
|
trusted library allocation
|
page read and write
|
||
1E9ECDC1000
|
trusted library allocation
|
page read and write
|
||
1E9FA288000
|
trusted library allocation
|
page read and write
|
||
1E9F9F5D000
|
trusted library allocation
|
page read and write
|
||
1E9F0AE6000
|
trusted library allocation
|
page read and write
|
||
1E9F40BE000
|
trusted library allocation
|
page read and write
|
||
1E9F2D90000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9F348C000
|
trusted library allocation
|
page read and write
|
||
1E9F46F0000
|
trusted library allocation
|
page read and write
|
||
1E12E3D000
|
stack
|
page read and write
|
||
1E9F34FB000
|
trusted library allocation
|
page read and write
|
||
1E9F0877000
|
heap
|
page read and write
|
||
1E9F30F2000
|
trusted library allocation
|
page read and write
|
||
1E9F3481000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9EDA7A000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E1377E000
|
stack
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9EC16F000
|
heap
|
page read and write
|
||
1E9F356D000
|
trusted library allocation
|
page read and write
|
||
1E9ED946000
|
trusted library allocation
|
page read and write
|
||
1E9F0DDA000
|
trusted library allocation
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9EC18A000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FA63B000
|
trusted library allocation
|
page read and write
|
||
1E9F359B000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F305F000
|
trusted library allocation
|
page read and write
|
||
28D05B10000
|
trusted library allocation
|
page read and write
|
||
1E9F0D7B000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F3530000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FBBE7000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFC000
|
trusted library allocation
|
page read and write
|
||
1E9F12FD000
|
trusted library allocation
|
page read and write
|
||
1E9FB050000
|
trusted library allocation
|
page read and write
|
||
1E9F11EB000
|
trusted library allocation
|
page read and write
|
||
1E9EC5B7000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F46F0000
|
trusted library allocation
|
page read and write
|
||
1E9FA3CD000
|
trusted library allocation
|
page read and write
|
||
1E9F46A7000
|
trusted library allocation
|
page read and write
|
||
1E9F9F59000
|
trusted library allocation
|
page read and write
|
||
1E9F40CA000
|
trusted library allocation
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
2D8D731D000
|
heap
|
page read and write
|
||
1E9FBBE9000
|
trusted library allocation
|
page read and write
|
||
1E9FAAA4000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF7000
|
trusted library allocation
|
page read and write
|
||
130C97A6000
|
heap
|
page read and write
|
||
1E9FA9BE000
|
trusted library allocation
|
page read and write
|
||
1E9EDB87000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0D42000
|
trusted library allocation
|
page read and write
|
||
1E9EC19C000
|
heap
|
page read and write
|
||
1E9F2ECC000
|
trusted library allocation
|
page read and write
|
||
1E9F2EA6000
|
trusted library allocation
|
page read and write
|
||
1E9EDCBE000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F4729000
|
trusted library allocation
|
page read and write
|
||
1E9F0DCA000
|
trusted library allocation
|
page read and write
|
||
1E9EC4DD000
|
trusted library allocation
|
page read and write
|
||
1E9F1361000
|
trusted library allocation
|
page read and write
|
||
1E9FA61E000
|
trusted library allocation
|
page read and write
|
||
1E9EDBD4000
|
trusted library allocation
|
page read and write
|
||
1E9F34AD000
|
trusted library allocation
|
page read and write
|
||
130C9785000
|
heap
|
page read and write
|
||
1E9FA0FD000
|
trusted library allocation
|
page read and write
|
||
1E9EDA9E000
|
trusted library allocation
|
page read and write
|
||
566BA1E000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F06D6000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F36B3000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
28D056C0000
|
unclassified section
|
page readonly
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F2C9E000
|
trusted library allocation
|
page read and write
|
||
1E9FA254000
|
trusted library allocation
|
page read and write
|
||
1E9F0DDC000
|
trusted library allocation
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
1E9F11EB000
|
trusted library allocation
|
page read and write
|
||
1E9F0572000
|
trusted library allocation
|
page read and write
|
||
1E9F2FAA000
|
trusted library allocation
|
page read and write
|
||
1E9FB484000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9F1783000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F3059000
|
trusted library allocation
|
page read and write
|
||
1E9F361B000
|
trusted library allocation
|
page read and write
|
||
1E9F0580000
|
trusted library allocation
|
page read and write
|
||
1E9F12FA000
|
trusted library allocation
|
page read and write
|
||
1E9F362E000
|
trusted library allocation
|
page read and write
|
||
2D8D7678000
|
trusted library allocation
|
page read and write
|
||
A8C7BDE000
|
stack
|
page read and write
|
||
1E9ECD3E000
|
trusted library allocation
|
page read and write
|
||
1E9F2D65000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9FA9AB000
|
trusted library allocation
|
page read and write
|
||
1E9F12FD000
|
trusted library allocation
|
page read and write
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9ECBDF000
|
trusted library allocation
|
page read and write
|
||
1E9F2D53000
|
trusted library allocation
|
page read and write
|
||
1E9FABA2000
|
trusted library allocation
|
page read and write
|
||
A8CAF3E000
|
unkown
|
page readonly
|
||
22D4B90A000
|
trusted library allocation
|
page read and write
|
||
1E9F25D7000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFB000
|
trusted library allocation
|
page read and write
|
||
1E9F2DA8000
|
trusted library allocation
|
page read and write
|
||
1E9EC483000
|
trusted library allocation
|
page read and write
|
||
28D05C1E000
|
trusted library allocation
|
page read and write
|
||
1E9EECFD000
|
trusted library allocation
|
page read and write
|
||
1E9F2E80000
|
trusted library allocation
|
page read and write
|
||
1E9F09CF000
|
trusted library allocation
|
page read and write
|
||
1E9F088A000
|
heap
|
page read and write
|
||
1E9F2FDA000
|
trusted library allocation
|
page read and write
|
||
1E9F34BB000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC48D000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9ECD8E000
|
trusted library allocation
|
page read and write
|
||
1E9EDA88000
|
trusted library allocation
|
page read and write
|
||
1E9FA7BC000
|
trusted library allocation
|
page read and write
|
||
1E9F13BD000
|
trusted library allocation
|
page read and write
|
||
1E9EDAA7000
|
trusted library allocation
|
page read and write
|
||
1E9F9C68000
|
trusted library allocation
|
page read and write
|
||
1E9FA68F000
|
trusted library allocation
|
page read and write
|
||
130C93FC000
|
heap
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9EC3C2000
|
trusted library allocation
|
page read and write
|
||
1E9EDBD2000
|
trusted library allocation
|
page read and write
|
||
1E9FA459000
|
trusted library allocation
|
page read and write
|
||
1E9F2D62000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F2E3E000
|
trusted library allocation
|
page read and write
|
||
1E9F3661000
|
trusted library allocation
|
page read and write
|
||
1E9F18A8000
|
trusted library allocation
|
page read and write
|
||
130C97A6000
|
heap
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F0A99000
|
trusted library allocation
|
page read and write
|
||
1E9F348C000
|
trusted library allocation
|
page read and write
|
||
1E9F348C000
|
trusted library allocation
|
page read and write
|
||
1E9F46EE000
|
trusted library allocation
|
page read and write
|
||
130C93E0000
|
heap
|
page read and write
|
||
1E9FA9A3000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FA975000
|
trusted library allocation
|
page read and write
|
||
1E9F347D000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F30C5000
|
trusted library allocation
|
page read and write
|
||
1E9FA0BF000
|
trusted library allocation
|
page read and write
|
||
1E9F13D6000
|
trusted library allocation
|
page read and write
|
||
23F96262000
|
heap
|
page read and write
|
||
1E9F2EFC000
|
trusted library allocation
|
page read and write
|
||
1E9F2F9A000
|
trusted library allocation
|
page read and write
|
||
1E9FAAA7000
|
trusted library allocation
|
page read and write
|
||
1E9F361B000
|
trusted library allocation
|
page read and write
|
||
1E9F2EBE000
|
trusted library allocation
|
page read and write
|
||
1E9FA3C0000
|
trusted library allocation
|
page read and write
|
||
1E9EC192000
|
heap
|
page read and write
|
||
1E9EECEC000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9FA496000
|
trusted library allocation
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1E9F2DB8000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9FAB7B000
|
trusted library allocation
|
page read and write
|
||
1E9F364A000
|
trusted library allocation
|
page read and write
|
||
1E9F0D63000
|
trusted library allocation
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9FA238000
|
trusted library allocation
|
page read and write
|
||
1E9F47DE000
|
trusted library allocation
|
page read and write
|
||
EEE2BD8000
|
stack
|
page read and write
|
||
1E9ECAE4000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC4000
|
trusted library allocation
|
page read and write
|
||
1E9EC961000
|
trusted library allocation
|
page read and write
|
||
1E9FAACB000
|
trusted library allocation
|
page read and write
|
||
1E9FB947000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FA47C000
|
trusted library allocation
|
page read and write
|
||
2D8D76F4000
|
trusted library allocation
|
page read and write
|
||
1E9F34D8000
|
trusted library allocation
|
page read and write
|
||
1E9EDC39000
|
trusted library allocation
|
page read and write
|
||
22D4B5E0000
|
heap
|
page read and write
|
||
1E9EC198000
|
heap
|
page read and write
|
||
1E9EE368000
|
trusted library allocation
|
page read and write
|
||
1E9FB0B2000
|
trusted library allocation
|
page read and write
|
||
2D8D7630000
|
trusted library allocation
|
page read and write
|
||
1E9F178B000
|
trusted library allocation
|
page read and write
|
||
130C86D0000
|
heap
|
page read and write
|
||
130C938A000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E10BFE000
|
unkown
|
page readonly
|
||
1E9FA9CE000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9FACD2000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FA752000
|
trusted library allocation
|
page read and write
|
||
1E9EDAA5000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F2DC4000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F2FBF000
|
trusted library allocation
|
page read and write
|
||
1E9F09DE000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1586000
|
heap
|
page read and write
|
||
1E9F9CE1000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9F0C1D000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
130C8948000
|
trusted library allocation
|
page read and write
|
||
1E9F0A6A000
|
trusted library allocation
|
page read and write
|
||
1E9F0D63000
|
trusted library allocation
|
page read and write
|
||
1E9F35F6000
|
trusted library allocation
|
page read and write
|
||
1E9EC16C000
|
heap
|
page read and write
|
||
1E9ED9DD000
|
trusted library allocation
|
page read and write
|
||
1E9FBBE2000
|
trusted library allocation
|
page read and write
|
||
1E9FA79D000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE9000
|
trusted library allocation
|
page read and write
|
||
130C93F1000
|
heap
|
page read and write
|
||
1E9FAD6C000
|
trusted library allocation
|
page read and write
|
||
1E9F2EA6000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
1E9F0D93000
|
trusted library allocation
|
page read and write
|
||
1E9FAEDA000
|
trusted library allocation
|
page read and write
|
||
1E9F2D6C000
|
trusted library allocation
|
page read and write
|
||
1E9FA076000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
1E9FB45D000
|
trusted library allocation
|
page read and write
|
||
1E9F0A84000
|
trusted library allocation
|
page read and write
|
||
1E9FA094000
|
trusted library allocation
|
page read and write
|
||
1E9F2DDD000
|
trusted library allocation
|
page read and write
|
||
130C977B000
|
heap
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9FA49B000
|
trusted library allocation
|
page read and write
|
||
1E9F0617000
|
trusted library allocation
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1E9F9FAC000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F3011000
|
trusted library allocation
|
page read and write
|
||
1E9FAB3F000
|
trusted library allocation
|
page read and write
|
||
2D8D760C000
|
trusted library allocation
|
page read and write
|
||
1E9F2FA0000
|
trusted library allocation
|
page read and write
|
||
1E9FA855000
|
trusted library allocation
|
page read and write
|
||
1E9F0AE9000
|
trusted library allocation
|
page read and write
|
||
1E9F0C26000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
1E9EDF3D000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F40E5000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9EEC55000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F25C3000
|
trusted library allocation
|
page read and write
|
||
1E9F9FD6000
|
trusted library allocation
|
page read and write
|
||
1E9F35D0000
|
trusted library allocation
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9F308E000
|
trusted library allocation
|
page read and write
|
||
1E9F3494000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
stack
|
page read and write
|
||
130C8A20000
|
trusted library allocation
|
page read and write
|
||
1E9F2D82000
|
trusted library allocation
|
page read and write
|
||
1E9F34D8000
|
trusted library allocation
|
page read and write
|
||
1E9FA44F000
|
trusted library allocation
|
page read and write
|
||
1E9F347D000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9EDB51000
|
trusted library allocation
|
page read and write
|
||
1E9FA7E5000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA49F000
|
trusted library allocation
|
page read and write
|
||
1E9F12F7000
|
trusted library allocation
|
page read and write
|
||
2D8D7800000
|
trusted library allocation
|
page read and write
|
||
1E9EE50A000
|
trusted library allocation
|
page read and write
|
||
1E9F17CC000
|
trusted library allocation
|
page read and write
|
||
1E9F1C0A000
|
trusted library allocation
|
page read and write
|
||
1E9EEB08000
|
trusted library allocation
|
page read and write
|
||
1E9F36D3000
|
trusted library allocation
|
page read and write
|
||
130C93E6000
|
heap
|
page read and write
|
||
1E9FA15B000
|
trusted library allocation
|
page read and write
|
||
130C9785000
|
heap
|
page read and write
|
||
28D05B47000
|
trusted library allocation
|
page read and write
|
||
28D05C0C000
|
trusted library allocation
|
page read and write
|
||
23F97D9A000
|
heap
|
page read and write
|
||
1E9F2DB8000
|
trusted library allocation
|
page read and write
|
||
1E9F343B000
|
trusted library allocation
|
page read and write
|
||
130C8F80000
|
heap
|
page read and write
|
||
1E9F2D75000
|
trusted library allocation
|
page read and write
|
||
1E9FAD75000
|
trusted library allocation
|
page read and write
|
||
1E9FA9A3000
|
trusted library allocation
|
page read and write
|
||
1E9F4027000
|
trusted library allocation
|
page read and write
|
||
1E9F0863000
|
heap
|
page read and write
|
||
130C93FC000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
1E9F18ED000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFC000
|
trusted library allocation
|
page read and write
|
||
1E9FA7AC000
|
trusted library allocation
|
page read and write
|
||
1E9F2DAD000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F40B3000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA288000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F40C4000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9FBBF6000
|
trusted library allocation
|
page read and write
|
||
1E9F35A6000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
1E9F9CC7000
|
trusted library allocation
|
page read and write
|
||
1E9F46B2000
|
trusted library allocation
|
page read and write
|
||
1E9EDCF6000
|
trusted library allocation
|
page read and write
|
||
1E9F36DE000
|
trusted library allocation
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
1E9EDA56000
|
trusted library allocation
|
page read and write
|
||
1E9F4729000
|
trusted library allocation
|
page read and write
|
||
1E9FA9CE000
|
trusted library allocation
|
page read and write
|
||
2D8D7611000
|
trusted library allocation
|
page read and write
|
||
1EC0003F000
|
trusted library allocation
|
page read and write
|
||
1E9F36A7000
|
trusted library allocation
|
page read and write
|
||
1E9FB484000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9F0A6A000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EDA9C000
|
trusted library allocation
|
page read and write
|
||
1E9F25F8000
|
trusted library allocation
|
page read and write
|
||
1E9FA7CD000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9F11FE000
|
trusted library allocation
|
page read and write
|
||
1E9FA323000
|
trusted library allocation
|
page read and write
|
||
1E9F2FAD000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9FA483000
|
trusted library allocation
|
page read and write
|
||
1E9F35B6000
|
trusted library allocation
|
page read and write
|
||
1E9EC9FE000
|
trusted library allocation
|
page read and write
|
||
1E9F2ECC000
|
trusted library allocation
|
page read and write
|
||
130C9769000
|
heap
|
page read and write
|
||
1E9F362E000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E12E7E000
|
unkown
|
page readonly
|
||
1E9F136E000
|
trusted library allocation
|
page read and write
|
||
1E9F4076000
|
trusted library allocation
|
page read and write
|
||
1E9FA342000
|
trusted library allocation
|
page read and write
|
||
1E9F402B000
|
trusted library allocation
|
page read and write
|
||
1E9F13A2000
|
trusted library allocation
|
page read and write
|
||
1E9F3093000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F9CC7000
|
trusted library allocation
|
page read and write
|
||
1E9F2EAF000
|
trusted library allocation
|
page read and write
|
||
DBC000
|
unkown
|
page readonly
|
||
1E9F17D3000
|
trusted library allocation
|
page read and write
|
||
2D8D7676000
|
trusted library allocation
|
page read and write
|
||
1E9FA459000
|
trusted library allocation
|
page read and write
|
||
1E9F402B000
|
trusted library allocation
|
page read and write
|
||
1E9F35BC000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F3583000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE1000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F088D000
|
heap
|
page read and write
|
||
1E9FAFF7000
|
trusted library allocation
|
page read and write
|
||
1E9FA4B4000
|
trusted library allocation
|
page read and write
|
||
1E9F1009000
|
trusted library allocation
|
page read and write
|
||
1E9FAB7B000
|
trusted library allocation
|
page read and write
|
||
1E9EC16E000
|
heap
|
page read and write
|
||
1E9FA0DA000
|
trusted library allocation
|
page read and write
|
||
1E9F4027000
|
trusted library allocation
|
page read and write
|
||
2D8D765F000
|
trusted library allocation
|
page read and write
|
||
1E9EE60F000
|
trusted library allocation
|
page read and write
|
||
130C85C0000
|
unclassified section
|
page readonly
|
||
1E9F0BBD000
|
trusted library allocation
|
page read and write
|
||
1E9FAB00000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F9B51000
|
trusted library allocation
|
page read and write
|
||
1E9F36B3000
|
trusted library allocation
|
page read and write
|
||
1E9FAC97000
|
trusted library allocation
|
page read and write
|
||
1E9F3656000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD9000
|
trusted library allocation
|
page read and write
|
||
1E9FA9E5000
|
trusted library allocation
|
page read and write
|
||
1E9EE36C000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FAAB7000
|
trusted library allocation
|
page read and write
|
||
1E9FA955000
|
trusted library allocation
|
page read and write
|
||
1E9FA165000
|
trusted library allocation
|
page read and write
|
||
1E9F402B000
|
trusted library allocation
|
page read and write
|
||
1E9F46E8000
|
trusted library allocation
|
page read and write
|
||
1E1477E000
|
stack
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F0B54000
|
trusted library allocation
|
page read and write
|
||
1E9F0DAB000
|
trusted library allocation
|
page read and write
|
||
1E9F35B4000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
1E9F0893000
|
heap
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9FA7AE000
|
trusted library allocation
|
page read and write
|
||
1E9F0D63000
|
trusted library allocation
|
page read and write
|
||
1E9F0BB1000
|
trusted library allocation
|
page read and write
|
||
1E9F35A6000
|
trusted library allocation
|
page read and write
|
||
1E9EECE4000
|
trusted library allocation
|
page read and write
|
||
1E9FA0FD000
|
trusted library allocation
|
page read and write
|
||
1E9F11F8000
|
trusted library allocation
|
page read and write
|
||
1E9F0626000
|
trusted library allocation
|
page read and write
|
||
1E9F36A4000
|
trusted library allocation
|
page read and write
|
||
1E9F2DCB000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9EDA82000
|
trusted library allocation
|
page read and write
|
||
1E9FA63D000
|
trusted library allocation
|
page read and write
|
||
1E9EDB83000
|
trusted library allocation
|
page read and write
|
||
1E9F40C2000
|
trusted library allocation
|
page read and write
|
||
1E9F0A90000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9ECA17000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9F472F000
|
trusted library allocation
|
page read and write
|
||
1E9FA4A3000
|
trusted library allocation
|
page read and write
|
||
1E9F2DE0000
|
trusted library allocation
|
page read and write
|
||
1E9FABA3000
|
trusted library allocation
|
page read and write
|
||
1E9F12C3000
|
trusted library allocation
|
page read and write
|
||
1E9F47A4000
|
trusted library allocation
|
page read and write
|
||
755E7FE000
|
stack
|
page read and write
|
||
1E9F0BA8000
|
trusted library allocation
|
page read and write
|
||
1E9FA682000
|
trusted library allocation
|
page read and write
|
||
1E9F0CFE000
|
trusted library allocation
|
page read and write
|
||
1E9F30F4000
|
trusted library allocation
|
page read and write
|
||
1E9EDAAC000
|
trusted library allocation
|
page read and write
|
||
1E9F25CF000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F36EB000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F35CF000
|
trusted library allocation
|
page read and write
|
||
1E9F36AA000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9EDBD4000
|
trusted library allocation
|
page read and write
|
||
1E9FA7A9000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F0D27000
|
trusted library allocation
|
page read and write
|
||
1E9F2D70000
|
trusted library allocation
|
page read and write
|
||
1E9F303A000
|
trusted library allocation
|
page read and write
|
||
1E9F4729000
|
trusted library allocation
|
page read and write
|
||
1E9ECDDF000
|
trusted library allocation
|
page read and write
|
||
1E9F46E8000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
1E9F46F0000
|
trusted library allocation
|
page read and write
|
||
130C9764000
|
heap
|
page read and write
|
||
130C8912000
|
trusted library allocation
|
page read and write
|
||
1E9F05FE000
|
trusted library allocation
|
page read and write
|
||
130C8969000
|
trusted library allocation
|
page read and write
|
||
1E9ECB2C000
|
trusted library allocation
|
page read and write
|
||
1E9FA459000
|
trusted library allocation
|
page read and write
|
||
1E9F9F97000
|
trusted library allocation
|
page read and write
|
||
1E9F1727000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
1E9F12AD000
|
trusted library allocation
|
page read and write
|
||
1E9EDABB000
|
trusted library allocation
|
page read and write
|
||
1E9F4090000
|
trusted library allocation
|
page read and write
|
||
1E9F4061000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F3057000
|
trusted library allocation
|
page read and write
|
||
1E9F06D6000
|
trusted library allocation
|
page read and write
|
||
130C9740000
|
heap
|
page read and write
|
||
1E9F3661000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9ECB3F000
|
trusted library allocation
|
page read and write
|
||
1E9EDC88000
|
trusted library allocation
|
page read and write
|
||
1E9F0D96000
|
trusted library allocation
|
page read and write
|
||
1E9F30BA000
|
trusted library allocation
|
page read and write
|
||
1E9F2C6D000
|
trusted library allocation
|
page read and write
|
||
1E9EDF16000
|
trusted library allocation
|
page read and write
|
||
1E9F2DBB000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
130C93B9000
|
heap
|
page read and write
|
||
1E9F40C2000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE9000
|
trusted library allocation
|
page read and write
|
||
1E9F1765000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC4DF000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC1000
|
trusted library allocation
|
page read and write
|
||
1E115D8000
|
stack
|
page read and write
|
||
1E9F09D2000
|
trusted library allocation
|
page read and write
|
||
1E9F46F2000
|
trusted library allocation
|
page read and write
|
||
1E9EEC48000
|
trusted library allocation
|
page read and write
|
||
1E9F46E6000
|
trusted library allocation
|
page read and write
|
||
1E9EDA87000
|
trusted library allocation
|
page read and write
|
||
1E9F46A2000
|
trusted library allocation
|
page read and write
|
||
130C8800000
|
trusted library allocation
|
page read and write
|
||
2D8D7603000
|
trusted library allocation
|
page read and write
|
||
28D05C05000
|
trusted library allocation
|
page read and write
|
||
FDC7DFF000
|
stack
|
page read and write
|
||
1E9FA49C000
|
trusted library allocation
|
page read and write
|
||
1E9F3665000
|
trusted library allocation
|
page read and write
|
||
1E9FA269000
|
trusted library allocation
|
page read and write
|
||
EEE218D000
|
stack
|
page read and write
|
||
1E9ECB42000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F9BC7000
|
trusted library allocation
|
page read and write
|
||
1E9EDF0F000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F356A000
|
trusted library allocation
|
page read and write
|
||
1E9ECDDD000
|
trusted library allocation
|
page read and write
|
||
1E9F0BF3000
|
trusted library allocation
|
page read and write
|
||
1E9FA9DB000
|
trusted library allocation
|
page read and write
|
||
1E9F0D69000
|
trusted library allocation
|
page read and write
|
||
1E9EC16E000
|
heap
|
page read and write
|
||
1E9F40D6000
|
trusted library allocation
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1E9F12C3000
|
trusted library allocation
|
page read and write
|
||
1E9F0AF6000
|
trusted library allocation
|
page read and write
|
||
1E9FABB4000
|
trusted library allocation
|
page read and write
|
||
1E9F36A2000
|
trusted library allocation
|
page read and write
|
||
1E9FB300000
|
trusted library allocation
|
page read and write
|
||
1E9F0D89000
|
trusted library allocation
|
page read and write
|
||
1E13F7E000
|
unkown
|
page readonly
|
||
1E9FAB08000
|
trusted library allocation
|
page read and write
|
||
307BB9903000
|
trusted library allocation
|
page read and write
|
||
1E9FA741000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F357B000
|
trusted library allocation
|
page read and write
|
||
1E9F1292000
|
trusted library allocation
|
page read and write
|
||
1E9EC170000
|
heap
|
page read and write
|
||
1E9F0ADD000
|
trusted library allocation
|
page read and write
|
||
1E9F405D000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
28D05B6E000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F46EC000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9EC175000
|
heap
|
page read and write
|
||
130C93ED000
|
heap
|
page read and write
|
||
1E9F36A4000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
A8CC73E000
|
stack
|
page read and write
|
||
23F97EA0000
|
heap
|
page read and write
|
||
130C937D000
|
heap
|
page read and write
|
||
1E9F0644000
|
trusted library allocation
|
page read and write
|
||
1E9F13DF000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9EE199000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF0000
|
trusted library allocation
|
page read and write
|
||
1E9F4699000
|
trusted library allocation
|
page read and write
|
||
1E9ECB80000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD1000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A4000
|
heap
|
page read and write
|
||
1E9FB0D4000
|
trusted library allocation
|
page read and write
|
||
1E9F364A000
|
trusted library allocation
|
page read and write
|
||
1E9EDB9C000
|
trusted library allocation
|
page read and write
|
||
1E9F47FB000
|
trusted library allocation
|
page read and write
|
||
1E9F2E3E000
|
trusted library allocation
|
page read and write
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9EDCA5000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EDA8A000
|
trusted library allocation
|
page read and write
|
||
1E9E2531000
|
heap
|
page read and write
|
||
1E9F308E000
|
trusted library allocation
|
page read and write
|
||
22D4B65F000
|
heap
|
page read and write
|
||
1E9F9FA4000
|
trusted library allocation
|
page read and write
|
||
1E9F46A2000
|
trusted library allocation
|
page read and write
|
||
1E9EC381000
|
trusted library allocation
|
page read and write
|
||
1E9FAF88000
|
trusted library allocation
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1E9FA4AA000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9F3481000
|
trusted library allocation
|
page read and write
|
||
1E9ECAE4000
|
trusted library allocation
|
page read and write
|
||
130C9369000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
28D05950000
|
heap
|
page read and write
|
||
1E9F0D2B000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F11D3000
|
trusted library allocation
|
page read and write
|
||
EEE43FE000
|
unkown
|
page readonly
|
||
1E9FA6E4000
|
trusted library allocation
|
page read and write
|
||
2D8D7624000
|
trusted library allocation
|
page read and write
|
||
1E9F3093000
|
trusted library allocation
|
page read and write
|
||
1E9F0A6F000
|
trusted library allocation
|
page read and write
|
||
1E9F30C5000
|
trusted library allocation
|
page read and write
|
||
1E9F2D56000
|
trusted library allocation
|
page read and write
|
||
1E9F34B3000
|
trusted library allocation
|
page read and write
|
||
1E9F0AB9000
|
trusted library allocation
|
page read and write
|
||
1E9EDA7C000
|
trusted library allocation
|
page read and write
|
||
1E9EDA78000
|
trusted library allocation
|
page read and write
|
||
1E9FAC3F000
|
trusted library allocation
|
page read and write
|
||
130C8973000
|
trusted library allocation
|
page read and write
|
||
1E9F0AF3000
|
trusted library allocation
|
page read and write
|
||
1E9FAA6A000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
130C937F000
|
heap
|
page read and write
|
||
1E9F2D61000
|
trusted library allocation
|
page read and write
|
||
1E9F2FA3000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9FAAE9000
|
trusted library allocation
|
page read and write
|
||
1E9EE100000
|
trusted library allocation
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
FDC65FE000
|
stack
|
page read and write
|
||
1E9F9C54000
|
trusted library allocation
|
page read and write
|
||
130C93F1000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F34ED000
|
trusted library allocation
|
page read and write
|
||
1E9EC3F9000
|
trusted library allocation
|
page read and write
|
||
1E9F2D54000
|
trusted library allocation
|
page read and write
|
||
1E9F0CFA000
|
trusted library allocation
|
page read and write
|
||
1E9F11C3000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F09C2000
|
trusted library allocation
|
page read and write
|
||
1E9FB9E7000
|
trusted library allocation
|
page read and write
|
||
1E9F342D000
|
trusted library allocation
|
page read and write
|
||
1E9F3473000
|
trusted library allocation
|
page read and write
|
||
1E9ECBF1000
|
trusted library allocation
|
page read and write
|
||
1E9EC4B5000
|
trusted library allocation
|
page read and write
|
||
1E9EECC5000
|
trusted library allocation
|
page read and write
|
||
28D057C4000
|
heap
|
page read and write
|
||
1E9F34BB000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F46FE000
|
trusted library allocation
|
page read and write
|
||
1E9F0A55000
|
trusted library allocation
|
page read and write
|
||
1E9FA799000
|
trusted library allocation
|
page read and write
|
||
1E9F11CE000
|
trusted library allocation
|
page read and write
|
||
1E9EDAE8000
|
trusted library allocation
|
page read and write
|
||
1E9ECDE8000
|
trusted library allocation
|
page read and write
|
||
2D8D7484000
|
heap
|
page read and write
|
||
1E9F30FC000
|
trusted library allocation
|
page read and write
|
||
28D05942000
|
unclassified section
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EDB18000
|
trusted library allocation
|
page read and write
|
||
1E9F2D82000
|
trusted library allocation
|
page read and write
|
||
1E9F9C61000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F35CC000
|
trusted library allocation
|
page read and write
|
||
1E9F09CF000
|
trusted library allocation
|
page read and write
|
||
2D8D722A000
|
remote allocation
|
page execute read
|
||
1E9FA475000
|
trusted library allocation
|
page read and write
|
||
1E9FAAE6000
|
trusted library allocation
|
page read and write
|
||
1E9F09E9000
|
trusted library allocation
|
page read and write
|
||
1E9F09C5000
|
trusted library allocation
|
page read and write
|
||
1E9F3453000
|
trusted library allocation
|
page read and write
|
||
130C85B0000
|
remote allocation
|
page execute read
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EDF78000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F9CF7000
|
trusted library allocation
|
page read and write
|
||
130C9783000
|
heap
|
page read and write
|
||
1E9FAACB000
|
trusted library allocation
|
page read and write
|
||
1E9F47F2000
|
trusted library allocation
|
page read and write
|
||
1E9F08C6000
|
heap
|
page read and write
|
||
1E9F2FB1000
|
trusted library allocation
|
page read and write
|
||
1E9F11D3000
|
trusted library allocation
|
page read and write
|
||
1E9F4695000
|
trusted library allocation
|
page read and write
|
||
130C936C000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F17D8000
|
trusted library allocation
|
page read and write
|
||
2D8D7807000
|
trusted library allocation
|
page read and write
|
||
1E9EC5C0000
|
trusted library allocation
|
page read and write
|
||
1E9EEC7F000
|
trusted library allocation
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
2D8D767A000
|
trusted library allocation
|
page read and write
|
||
1E9F0BA6000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F356D000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9ECDCA000
|
trusted library allocation
|
page read and write
|
||
1E9EE609000
|
trusted library allocation
|
page read and write
|
||
1E9F0C12000
|
trusted library allocation
|
page read and write
|
||
1E9F9D0D000
|
trusted library allocation
|
page read and write
|
||
1E9F05B0000
|
trusted library allocation
|
page read and write
|
||
2D8D76B5000
|
trusted library allocation
|
page read and write
|
||
1E9FA7E3000
|
trusted library allocation
|
page read and write
|
||
1E9F365C000
|
trusted library allocation
|
page read and write
|
||
1E9F2F54000
|
trusted library allocation
|
page read and write
|
||
1E9EDB66000
|
trusted library allocation
|
page read and write
|
||
1E9F13AA000
|
trusted library allocation
|
page read and write
|
||
FDC55FE000
|
stack
|
page read and write
|
||
1E9EC43E000
|
trusted library allocation
|
page read and write
|
||
1E9FB96F000
|
trusted library allocation
|
page read and write
|
||
1E9F40C6000
|
trusted library allocation
|
page read and write
|
||
1E9F347D000
|
trusted library allocation
|
page read and write
|
||
1E9FA2E6000
|
trusted library allocation
|
page read and write
|
||
1E9FA61E000
|
trusted library allocation
|
page read and write
|
||
1E9F36AA000
|
trusted library allocation
|
page read and write
|
||
23F96300000
|
trusted library allocation
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9F2E7A000
|
trusted library allocation
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
130C9369000
|
heap
|
page read and write
|
||
1E9F0ADC000
|
trusted library allocation
|
page read and write
|
||
1E9FAB5F000
|
trusted library allocation
|
page read and write
|
||
1E9F9CED000
|
trusted library allocation
|
page read and write
|
||
1E9F099F000
|
trusted library allocation
|
page read and write
|
||
1E9EDA56000
|
trusted library allocation
|
page read and write
|
||
1E9FA7BB000
|
trusted library allocation
|
page read and write
|
||
1E9F9BFD000
|
trusted library allocation
|
page read and write
|
||
1E9EECFD000
|
trusted library allocation
|
page read and write
|
||
1E9F367C000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
1E9FAC89000
|
trusted library allocation
|
page read and write
|
||
1E9F9B19000
|
trusted library allocation
|
page read and write
|
||
1E9F3644000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F34A1000
|
trusted library allocation
|
page read and write
|
||
1E9EC481000
|
trusted library allocation
|
page read and write
|
||
1E9F0863000
|
heap
|
page read and write
|
||
1E9F0AB0000
|
trusted library allocation
|
page read and write
|
||
1E9F2F7D000
|
trusted library allocation
|
page read and write
|
||
1E9FA955000
|
trusted library allocation
|
page read and write
|
||
1E9F18DD000
|
trusted library allocation
|
page read and write
|
||
1E9ECDAB000
|
trusted library allocation
|
page read and write
|
||
1E9EDBFC000
|
trusted library allocation
|
page read and write
|
||
1E9F0DDD000
|
trusted library allocation
|
page read and write
|
||
1E9EE380000
|
trusted library allocation
|
page read and write
|
||
1E9FB05D000
|
trusted library allocation
|
page read and write
|
||
1E9F9B3C000
|
trusted library allocation
|
page read and write
|
||
1E9F40E5000
|
trusted library allocation
|
page read and write
|
||
1E9FA32C000
|
trusted library allocation
|
page read and write
|
||
1E9F0987000
|
trusted library allocation
|
page read and write
|
||
1E9F0D42000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FB484000
|
trusted library allocation
|
page read and write
|
||
1E9FA7A6000
|
trusted library allocation
|
page read and write
|
||
1E9EC486000
|
trusted library allocation
|
page read and write
|
||
EEE4C7E000
|
stack
|
page read and write
|
||
130C9300000
|
heap
|
page read and write
|
||
1E9FAAFD000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9FA855000
|
trusted library allocation
|
page read and write
|
||
1E9FAA83000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
130C93E8000
|
heap
|
page read and write
|
||
1E9EDAE8000
|
trusted library allocation
|
page read and write
|
||
1E9F12EE000
|
trusted library allocation
|
page read and write
|
||
1E9F11E6000
|
trusted library allocation
|
page read and write
|
||
1E9F34FB000
|
trusted library allocation
|
page read and write
|
||
1E9EDABB000
|
trusted library allocation
|
page read and write
|
||
1E9F0AE6000
|
trusted library allocation
|
page read and write
|
||
1E9F0969000
|
trusted library allocation
|
page read and write
|
||
1E9F40A9000
|
trusted library allocation
|
page read and write
|
||
1E9F088A000
|
heap
|
page read and write
|
||
1E9EEC6B000
|
trusted library allocation
|
page read and write
|
||
1E9FA623000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA9A3000
|
trusted library allocation
|
page read and write
|
||
1E9F364A000
|
trusted library allocation
|
page read and write
|
||
1E9F2E35000
|
trusted library allocation
|
page read and write
|
||
1E9F0988000
|
trusted library allocation
|
page read and write
|
||
28D057C0000
|
heap
|
page read and write
|
||
1E9F0BFA000
|
trusted library allocation
|
page read and write
|
||
1E9FA0CB000
|
trusted library allocation
|
page read and write
|
||
1E9F09D8000
|
trusted library allocation
|
page read and write
|
||
130C934D000
|
heap
|
page read and write
|
||
1E9F13B0000
|
trusted library allocation
|
page read and write
|
||
1E9FA2F5000
|
trusted library allocation
|
page read and write
|
||
1E9F3059000
|
trusted library allocation
|
page read and write
|
||
1E9ECA1E000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F128D000
|
trusted library allocation
|
page read and write
|
||
1E9F308E000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FBC71000
|
heap
|
page read and write
|
||
23F9624A000
|
heap
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9EC92F000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9FA6EC000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A1000
|
heap
|
page read and write
|
||
1E9F34EF000
|
trusted library allocation
|
page read and write
|
||
1E9FA9AB000
|
trusted library allocation
|
page read and write
|
||
1E9F35BE000
|
trusted library allocation
|
page read and write
|
||
1E9F0BBD000
|
trusted library allocation
|
page read and write
|
||
1E9F366E000
|
trusted library allocation
|
page read and write
|
||
1E9FABC5000
|
trusted library allocation
|
page read and write
|
||
1E9FA677000
|
trusted library allocation
|
page read and write
|
||
1E9F2AD3000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F0866000
|
heap
|
page read and write
|
||
1E9EC179000
|
heap
|
page read and write
|
||
23F97D9B000
|
heap
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9FBC7E000
|
heap
|
page read and write
|
||
1E9EC16E000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
2D8D7430000
|
unclassified section
|
page readonly
|
||
3771000
|
heap
|
page read and write
|
||
2D8D76B0000
|
trusted library allocation
|
page read and write
|
||
1E9FA6D8000
|
trusted library allocation
|
page read and write
|
||
1E9F0ADB000
|
trusted library allocation
|
page read and write
|
||
1E9FA688000
|
trusted library allocation
|
page read and write
|
||
1E9EC9FB000
|
trusted library allocation
|
page read and write
|
||
1E9F0893000
|
heap
|
page read and write
|
||
1E9F2DE6000
|
trusted library allocation
|
page read and write
|
||
1E9F13D6000
|
trusted library allocation
|
page read and write
|
||
1E9EECB4000
|
trusted library allocation
|
page read and write
|
||
1E9EC37B000
|
trusted library allocation
|
page read and write
|
||
1E9FA7AC000
|
trusted library allocation
|
page read and write
|
||
1E9FABC5000
|
trusted library allocation
|
page read and write
|
||
130C9364000
|
heap
|
page read and write
|
||
1E9F9F67000
|
trusted library allocation
|
page read and write
|
||
1E9F0BF3000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F0DD7000
|
trusted library allocation
|
page read and write
|
||
1E9FA319000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F36E9000
|
trusted library allocation
|
page read and write
|
||
1E9F0ACC000
|
trusted library allocation
|
page read and write
|
||
130C97A8000
|
heap
|
page read and write
|
||
1E9F0D5B000
|
trusted library allocation
|
page read and write
|
||
1E9F2CC5000
|
trusted library allocation
|
page read and write
|
||
1E9FABE7000
|
trusted library allocation
|
page read and write
|
||
1E9F3591000
|
trusted library allocation
|
page read and write
|
||
1E9F0D93000
|
trusted library allocation
|
page read and write
|
||
1E9FA15B000
|
trusted library allocation
|
page read and write
|
||
1E9EDA76000
|
trusted library allocation
|
page read and write
|
||
1E9F34BB000
|
trusted library allocation
|
page read and write
|
||
1E9F348C000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F30F2000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F9CE9000
|
trusted library allocation
|
page read and write
|
||
23F965E0000
|
heap
|
page read and write
|
||
1E9F46B7000
|
trusted library allocation
|
page read and write
|
||
1E9F1765000
|
trusted library allocation
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9EDF6B000
|
trusted library allocation
|
page read and write
|
||
1E9F0D06000
|
trusted library allocation
|
page read and write
|
||
130C87A2000
|
unclassified section
|
page read and write
|
||
1E9F9D43000
|
trusted library allocation
|
page read and write
|
||
1E9F138E000
|
trusted library allocation
|
page read and write
|
||
1E9EC187000
|
heap
|
page read and write
|
||
1E9F09F1000
|
trusted library allocation
|
page read and write
|
||
1E9F2598000
|
trusted library allocation
|
page read and write
|
||
1E9FA789000
|
trusted library allocation
|
page read and write
|
||
1E9F12E0000
|
trusted library allocation
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
1E9F34F3000
|
trusted library allocation
|
page read and write
|
||
1E9EDF8B000
|
trusted library allocation
|
page read and write
|
||
1E9F34A1000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFB000
|
trusted library allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FACA7000
|
trusted library allocation
|
page read and write
|
||
1E9F409D000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F2E1A000
|
trusted library allocation
|
page read and write
|
||
1E9F088B000
|
heap
|
page read and write
|
||
1E9F40CA000
|
trusted library allocation
|
page read and write
|
||
1E9F365F000
|
trusted library allocation
|
page read and write
|
||
1E9F0899000
|
heap
|
page read and write
|
||
1E9F0617000
|
trusted library allocation
|
page read and write
|
||
1E9FACB9000
|
trusted library allocation
|
page read and write
|
||
1E9F35CF000
|
trusted library allocation
|
page read and write
|
||
1E9E0CF0000
|
trusted library allocation
|
page read and write
|
||
1E9ECBDC000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F134B000
|
trusted library allocation
|
page read and write
|
||
1E9F08BC000
|
heap
|
page read and write
|
||
1E9F369C000
|
trusted library allocation
|
page read and write
|
||
1E9FA23A000
|
trusted library allocation
|
page read and write
|
||
130C93ED000
|
heap
|
page read and write
|
||
1E9F2DCE000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F34A1000
|
trusted library allocation
|
page read and write
|
||
1E9FA7A3000
|
trusted library allocation
|
page read and write
|
||
1E9F3583000
|
trusted library allocation
|
page read and write
|
||
1E9FA45B000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF8000
|
trusted library allocation
|
page read and write
|
||
1E9F0AD6000
|
trusted library allocation
|
page read and write
|
||
130C97A6000
|
heap
|
page read and write
|
||
1E9F08C6000
|
heap
|
page read and write
|
||
1E9F4695000
|
trusted library allocation
|
page read and write
|
||
1E9F3537000
|
trusted library allocation
|
page read and write
|
||
1E9FA615000
|
trusted library allocation
|
page read and write
|
||
1E9EDBEE000
|
trusted library allocation
|
page read and write
|
||
1E9EDAEA000
|
trusted library allocation
|
page read and write
|
||
130C97A6000
|
heap
|
page read and write
|
||
1E9F0DCD000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFD000
|
trusted library allocation
|
page read and write
|
||
1E9F0D54000
|
trusted library allocation
|
page read and write
|
||
1E9F46F2000
|
trusted library allocation
|
page read and write
|
||
1E9F0D5B000
|
trusted library allocation
|
page read and write
|
||
1E9F35D3000
|
trusted library allocation
|
page read and write
|
||
1E9F097C000
|
trusted library allocation
|
page read and write
|
||
1E9EC180000
|
heap
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9F1275000
|
trusted library allocation
|
page read and write
|
||
1E9EC195000
|
heap
|
page read and write
|
||
1E9F0985000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F34A1000
|
trusted library allocation
|
page read and write
|
||
1E9F1B1E000
|
trusted library allocation
|
page read and write
|
||
1E9F9CF4000
|
trusted library allocation
|
page read and write
|
||
1E9ECA93000
|
trusted library allocation
|
page read and write
|
||
1E9F12A3000
|
trusted library allocation
|
page read and write
|
||
1E9F1778000
|
trusted library allocation
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9F357B000
|
trusted library allocation
|
page read and write
|
||
28D057C6000
|
heap
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9F0AED000
|
trusted library allocation
|
page read and write
|
||
1E9F9CD0000
|
trusted library allocation
|
page read and write
|
||
1E9FBBFB000
|
trusted library allocation
|
page read and write
|
||
1E9F05DE000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F9BA2000
|
trusted library allocation
|
page read and write
|
||
1E9FA60A000
|
trusted library allocation
|
page read and write
|
||
1E9EC187000
|
heap
|
page read and write
|
||
1E9EDCC1000
|
trusted library allocation
|
page read and write
|
||
1E9EC4D9000
|
trusted library allocation
|
page read and write
|
||
1E9FA0B4000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F12E0000
|
trusted library allocation
|
page read and write
|
||
1E9F0AB0000
|
trusted library allocation
|
page read and write
|
||
130C8A39000
|
unkown
|
page execute read
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
2D8D7666000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9ECDF4000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9F3591000
|
trusted library allocation
|
page read and write
|
||
1E9F2FDA000
|
trusted library allocation
|
page read and write
|
||
1E9F29C3000
|
trusted library allocation
|
page read and write
|
||
1E9F2E6E000
|
trusted library allocation
|
page read and write
|
||
1E9F3614000
|
trusted library allocation
|
page read and write
|
||
1E9F12FD000
|
trusted library allocation
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
1E9FB0ED000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F4031000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9FBC5C000
|
heap
|
page read and write
|
||
1E9F3061000
|
trusted library allocation
|
page read and write
|
||
1E9EECE0000
|
trusted library allocation
|
page read and write
|
||
1E9EECB4000
|
trusted library allocation
|
page read and write
|
||
1E9EDBD4000
|
trusted library allocation
|
page read and write
|
||
1E9F0BFA000
|
trusted library allocation
|
page read and write
|
||
1E9F9B1E000
|
trusted library allocation
|
page read and write
|
||
A8C95FE000
|
stack
|
page read and write
|
||
1E9FA13E000
|
trusted library allocation
|
page read and write
|
||
1E9F0DB2000
|
trusted library allocation
|
page read and write
|
||
130C9783000
|
heap
|
page read and write
|
||
1E9F09A7000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF0000
|
trusted library allocation
|
page read and write
|
||
1E9F9C5B000
|
trusted library allocation
|
page read and write
|
||
1E9F46EC000
|
trusted library allocation
|
page read and write
|
||
1E9F9FE2000
|
trusted library allocation
|
page read and write
|
||
1E9FA7C9000
|
trusted library allocation
|
page read and write
|
||
1E9F34FB000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A1000
|
heap
|
page read and write
|
||
1E9FA26B000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9F12B5000
|
trusted library allocation
|
page read and write
|
||
1E9F12E0000
|
trusted library allocation
|
page read and write
|
||
1E9F0CA2000
|
trusted library allocation
|
page read and write
|
||
1E9F3614000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F4061000
|
trusted library allocation
|
page read and write
|
||
1E9F474B000
|
trusted library allocation
|
page read and write
|
||
1E9FA9EF000
|
trusted library allocation
|
page read and write
|
||
1E9FAFDE000
|
trusted library allocation
|
page read and write
|
||
1E9ED94C000
|
trusted library allocation
|
page read and write
|
||
130C97A6000
|
heap
|
page read and write
|
||
1E9FC342000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
23F96271000
|
heap
|
page read and write
|
||
1E9F305B000
|
trusted library allocation
|
page read and write
|
||
1E9F17F4000
|
trusted library allocation
|
page read and write
|
||
1E9F2DDD000
|
trusted library allocation
|
page read and write
|
||
1E9FA934000
|
trusted library allocation
|
page read and write
|
||
1E9FBA29000
|
trusted library allocation
|
page read and write
|
||
1E9F46EE000
|
trusted library allocation
|
page read and write
|
||
1E9F2DCB000
|
trusted library allocation
|
page read and write
|
||
FDC6DFE000
|
stack
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F05F8000
|
trusted library allocation
|
page read and write
|
||
28D05790000
|
heap
|
page read and write
|
||
1E9F0878000
|
heap
|
page read and write
|
||
1E9EDA9E000
|
trusted library allocation
|
page read and write
|
||
1E9F2E35000
|
trusted library allocation
|
page read and write
|
||
1E9F2ECC000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FABAA000
|
trusted library allocation
|
page read and write
|
||
1E9FA0A5000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F40FD000
|
trusted library allocation
|
page read and write
|
||
1E9F2200000
|
trusted library allocation
|
page read and write
|
||
1E9FA9EB000
|
trusted library allocation
|
page read and write
|
||
1E9F11D6000
|
trusted library allocation
|
page read and write
|
||
23F96240000
|
heap
|
page read and write
|
||
1E9FA4A3000
|
trusted library allocation
|
page read and write
|
||
1E9F0DE2000
|
trusted library allocation
|
page read and write
|
||
1E9EC3C0000
|
trusted library allocation
|
page read and write
|
||
1E9ECA93000
|
trusted library allocation
|
page read and write
|
||
1E9ECBCC000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
2D8D72EA000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F2E1A000
|
trusted library allocation
|
page read and write
|
||
130C9360000
|
heap
|
page read and write
|
||
1E9EEC48000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9FA26D000
|
trusted library allocation
|
page read and write
|
||
1E9F29D5000
|
trusted library allocation
|
page read and write
|
||
1E9F355C000
|
trusted library allocation
|
page read and write
|
||
1E9F3614000
|
trusted library allocation
|
page read and write
|
||
1E9FA312000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC3000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
FDC4DFA000
|
stack
|
page read and write
|
||
1E9FA2F0000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F2FAA000
|
trusted library allocation
|
page read and write
|
||
130C935F000
|
heap
|
page read and write
|
||
1E9EDBA0000
|
trusted library allocation
|
page read and write
|
||
130C9369000
|
heap
|
page read and write
|
||
1E9F17BC000
|
trusted library allocation
|
page read and write
|
||
28D05B5B000
|
trusted library allocation
|
page read and write
|
||
28D05750000
|
unclassified section
|
page readonly
|
||
1E9EC17F000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
130C9308000
|
heap
|
page read and write
|
||
1E9F308A000
|
trusted library allocation
|
page read and write
|
||
1E9F34D8000
|
trusted library allocation
|
page read and write
|
||
1E9FABB9000
|
trusted library allocation
|
page read and write
|
||
1E9F3061000
|
trusted library allocation
|
page read and write
|
||
1E9ECDB5000
|
trusted library allocation
|
page read and write
|
||
1E9FA853000
|
trusted library allocation
|
page read and write
|
||
1E9EC5DC000
|
trusted library allocation
|
page read and write
|
||
1E9EECD5000
|
trusted library allocation
|
page read and write
|
||
1E9FA9AF000
|
trusted library allocation
|
page read and write
|
||
1E9F18C0000
|
trusted library allocation
|
page read and write
|
||
1E9F367C000
|
trusted library allocation
|
page read and write
|
||
1E9F0CDB000
|
trusted library allocation
|
page read and write
|
||
D21000
|
unkown
|
page execute read
|
||
1E9F36A4000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F7000
|
trusted library allocation
|
page read and write
|
||
1E9F0560000
|
trusted library allocation
|
page read and write
|
||
1E9FA467000
|
trusted library allocation
|
page read and write
|
||
130C93ED000
|
heap
|
page read and write
|
||
1E9F0D14000
|
trusted library allocation
|
page read and write
|
||
1E9FABAA000
|
trusted library allocation
|
page read and write
|
||
1E9F0CFE000
|
trusted library allocation
|
page read and write
|
||
1E9F11E6000
|
trusted library allocation
|
page read and write
|
||
1E9F0B6E000
|
trusted library allocation
|
page read and write
|
||
1E9FB0FB000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9F9CC3000
|
trusted library allocation
|
page read and write
|
||
130C93E8000
|
heap
|
page read and write
|
||
1E9EDAAD000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9FA999000
|
trusted library allocation
|
page read and write
|
||
1E9F40BC000
|
trusted library allocation
|
page read and write
|
||
1E9F35AB000
|
trusted library allocation
|
page read and write
|
||
1E9FAACB000
|
trusted library allocation
|
page read and write
|
||
1E9EC48A000
|
trusted library allocation
|
page read and write
|
||
1E9F0D63000
|
trusted library allocation
|
page read and write
|
||
1E9FC30E000
|
trusted library allocation
|
page read and write
|
||
28D05C39000
|
trusted library allocation
|
page read and write
|
||
1E9FA4B4000
|
trusted library allocation
|
page read and write
|
||
130C9797000
|
heap
|
page read and write
|
||
1E9FA3D4000
|
trusted library allocation
|
page read and write
|
||
1E9FA0BD000
|
trusted library allocation
|
page read and write
|
||
1E9FAFAD000
|
trusted library allocation
|
page read and write
|
||
1E9FA2CA000
|
trusted library allocation
|
page read and write
|
||
1E9F30E3000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
130C977B000
|
heap
|
page read and write
|
||
1E9ECA6A000
|
trusted library allocation
|
page read and write
|
||
1E9FAC0F000
|
trusted library allocation
|
page read and write
|
||
1E9F9CED000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9EC459000
|
trusted library allocation
|
page read and write
|
||
1E9F9C62000
|
trusted library allocation
|
page read and write
|
||
1E9F305B000
|
trusted library allocation
|
page read and write
|
||
1E9FABD0000
|
trusted library allocation
|
page read and write
|
||
1E9EE50A000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF6000
|
trusted library allocation
|
page read and write
|
||
1E9ECD24000
|
trusted library allocation
|
page read and write
|
||
1E9FA467000
|
trusted library allocation
|
page read and write
|
||
28D05770000
|
heap
|
page read and write
|
||
1E9F18F0000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9FA99C000
|
trusted library allocation
|
page read and write
|
||
1E9F36D1000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
130C93F1000
|
heap
|
page read and write
|
||
1E9FBBF6000
|
trusted library allocation
|
page read and write
|
||
2D8D7900000
|
trusted library allocation
|
page read and write
|
||
1E9F1866000
|
trusted library allocation
|
page read and write
|
||
1E9F0D3B000
|
trusted library allocation
|
page read and write
|
||
1E9F0ADB000
|
trusted library allocation
|
page read and write
|
||
1E9F4094000
|
trusted library allocation
|
page read and write
|
||
1E9FA633000
|
trusted library allocation
|
page read and write
|
||
1E9FABF8000
|
trusted library allocation
|
page read and write
|
||
1E9F09EE000
|
trusted library allocation
|
page read and write
|
||
1E9F4037000
|
trusted library allocation
|
page read and write
|
||
1E9F9FAA000
|
trusted library allocation
|
page read and write
|
||
1E9F2DBA000
|
trusted library allocation
|
page read and write
|
||
1E9F0857000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F40BC000
|
trusted library allocation
|
page read and write
|
||
1E9F2EE7000
|
trusted library allocation
|
page read and write
|
||
1E9F2D65000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF3000
|
trusted library allocation
|
page read and write
|
||
1E9F0878000
|
heap
|
page read and write
|
||
130C9783000
|
heap
|
page read and write
|
||
1E9F357B000
|
trusted library allocation
|
page read and write
|
||
1E9EDB9C000
|
trusted library allocation
|
page read and write
|
||
1E9F3015000
|
trusted library allocation
|
page read and write
|
||
1E9EC3EF000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9ECD6B000
|
trusted library allocation
|
page read and write
|
||
1E9FA3C0000
|
trusted library allocation
|
page read and write
|
||
1E9EECFD000
|
trusted library allocation
|
page read and write
|
||
1E9FA955000
|
trusted library allocation
|
page read and write
|
||
1E9F9B77000
|
trusted library allocation
|
page read and write
|
||
1E9FADB2000
|
trusted library allocation
|
page read and write
|
||
1E9FAC97000
|
trusted library allocation
|
page read and write
|
||
1E9F2E7A000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFA000
|
trusted library allocation
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
1E9FAA6C000
|
trusted library allocation
|
page read and write
|
||
1E9EC183000
|
heap
|
page read and write
|
||
1E9EC19C000
|
heap
|
page read and write
|
||
1E9F2D9C000
|
trusted library allocation
|
page read and write
|
||
1E9FABD1000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F2F4E000
|
trusted library allocation
|
page read and write
|
||
1E9F30CD000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0C32000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F474B000
|
trusted library allocation
|
page read and write
|
||
1E9F407B000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC170000
|
heap
|
page read and write
|
||
1E9EE365000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FA000
|
trusted library allocation
|
page read and write
|
||
1E9FA7E8000
|
trusted library allocation
|
page read and write
|
||
1E9F0A78000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA709000
|
trusted library allocation
|
page read and write
|
||
1E9F0DC8000
|
trusted library allocation
|
page read and write
|
||
28D05BA5000
|
trusted library allocation
|
page read and write
|
||
1E9EC18D000
|
heap
|
page read and write
|
||
1E9EEC77000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF7000
|
trusted library allocation
|
page read and write
|
||
1E9ED9E8000
|
trusted library allocation
|
page read and write
|
||
1E9FABAF000
|
trusted library allocation
|
page read and write
|
||
1E9EDB9C000
|
trusted library allocation
|
page read and write
|
||
1E9EC3CE000
|
trusted library allocation
|
page read and write
|
||
23F96400000
|
trusted library allocation
|
page read and write
|
||
1E9FA995000
|
trusted library allocation
|
page read and write
|
||
130C93ED000
|
heap
|
page read and write
|
||
1E9FA94C000
|
trusted library allocation
|
page read and write
|
||
1E9EEC70000
|
trusted library allocation
|
page read and write
|
||
1E9FAD96000
|
trusted library allocation
|
page read and write
|
||
1E9F1166000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD7000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
A8C9E7E000
|
unkown
|
page readonly
|
||
1E9F1723000
|
trusted library allocation
|
page read and write
|
||
130C93AA000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F136E000
|
trusted library allocation
|
page read and write
|
||
1E9F11F8000
|
trusted library allocation
|
page read and write
|
||
1E9F2E74000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F347D000
|
trusted library allocation
|
page read and write
|
||
1E9FA4C3000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9F0644000
|
trusted library allocation
|
page read and write
|
||
1E9FA90D000
|
trusted library allocation
|
page read and write
|
||
1E9F13AA000
|
trusted library allocation
|
page read and write
|
||
1E9F9CCD000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD1000
|
trusted library allocation
|
page read and write
|
||
1E9F0866000
|
heap
|
page read and write
|
||
1E9ECDEA000
|
trusted library allocation
|
page read and write
|
||
1E9ECB80000
|
trusted library allocation
|
page read and write
|
||
1E9FAB33000
|
trusted library allocation
|
page read and write
|
||
23F9625D000
|
heap
|
page read and write
|
||
1E9F36D1000
|
trusted library allocation
|
page read and write
|
||
1E9F2FBF000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
1E9F0DAB000
|
trusted library allocation
|
page read and write
|
||
1E9F406D000
|
trusted library allocation
|
page read and write
|
||
1E9F099C000
|
trusted library allocation
|
page read and write
|
||
1E9F9FBA000
|
trusted library allocation
|
page read and write
|
||
3DF1F2E1E000
|
trusted library allocation
|
page read and write
|
||
1E9F2D5F000
|
trusted library allocation
|
page read and write
|
||
1E9F0DA5000
|
trusted library allocation
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
130C93B2000
|
heap
|
page read and write
|
||
28D05940000
|
unclassified section
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0863000
|
heap
|
page read and write
|
||
1E12EFE000
|
unkown
|
page readonly
|
||
1E9F9FFA000
|
trusted library allocation
|
page read and write
|
||
1E9EE1A1000
|
trusted library allocation
|
page read and write
|
||
1E9FBC36000
|
heap
|
page read and write
|
||
1E9F0D63000
|
trusted library allocation
|
page read and write
|
||
1E9F2F91000
|
trusted library allocation
|
page read and write
|
||
1E9EDBF5000
|
trusted library allocation
|
page read and write
|
||
130C85E0000
|
heap
|
page read and write
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
1E9F1739000
|
trusted library allocation
|
page read and write
|
||
1E9FABB2000
|
trusted library allocation
|
page read and write
|
||
1E9F136B000
|
trusted library allocation
|
page read and write
|
||
1E9FA496000
|
trusted library allocation
|
page read and write
|
||
1E9F0877000
|
heap
|
page read and write
|
||
1E9F0582000
|
trusted library allocation
|
page read and write
|
||
2D8D7480000
|
heap
|
page read and write
|
||
130C8910000
|
trusted library allocation
|
page read and write
|
||
1E9EDF98000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F2F5A000
|
trusted library allocation
|
page read and write
|
||
1E9F46EA000
|
trusted library allocation
|
page read and write
|
||
1E9F2E3E000
|
trusted library allocation
|
page read and write
|
||
FDC75FE000
|
stack
|
page read and write
|
||
1E9F09A7000
|
trusted library allocation
|
page read and write
|
||
1E9FBC71000
|
heap
|
page read and write
|
||
1E9FA2A4000
|
trusted library allocation
|
page read and write
|
||
1E9F34F3000
|
trusted library allocation
|
page read and write
|
||
1E9F30EC000
|
trusted library allocation
|
page read and write
|
||
1E9F088E000
|
heap
|
page read and write
|
||
22D4B650000
|
heap
|
page read and write
|
||
1E9F17D6000
|
trusted library allocation
|
page read and write
|
||
1E9F9B84000
|
trusted library allocation
|
page read and write
|
||
1E9EE357000
|
trusted library allocation
|
page read and write
|
||
1E9F0874000
|
heap
|
page read and write
|
||
1E9F0533000
|
trusted library allocation
|
page read and write
|
||
1E9F3655000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD1000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9FA479000
|
trusted library allocation
|
page read and write
|
||
1E9EC398000
|
trusted library allocation
|
page read and write
|
||
1E9F3025000
|
trusted library allocation
|
page read and write
|
||
1E9F2CD0000
|
trusted library allocation
|
page read and write
|
||
1E9F0D7B000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE1000
|
trusted library allocation
|
page read and write
|
||
130C93E8000
|
heap
|
page read and write
|
||
1E9FA45B000
|
trusted library allocation
|
page read and write
|
||
1E9FB03F000
|
trusted library allocation
|
page read and write
|
||
1E9FBC99000
|
heap
|
page read and write
|
||
1E9FAB58000
|
trusted library allocation
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9F4692000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
unkown
|
page readonly
|
||
1E9F124E000
|
trusted library allocation
|
page read and write
|
||
130C8A44000
|
heap
|
page read and write
|
||
1E9ED925000
|
trusted library allocation
|
page read and write
|
||
1E9EDBD2000
|
trusted library allocation
|
page read and write
|
||
1E9F2DA8000
|
trusted library allocation
|
page read and write
|
||
1E9EEC59000
|
trusted library allocation
|
page read and write
|
||
1E9EC198000
|
heap
|
page read and write
|
||
1E9FAA97000
|
trusted library allocation
|
page read and write
|
||
1E9F0B54000
|
trusted library allocation
|
page read and write
|
||
1E9F13C5000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
2D8D7270000
|
heap
|
page read and write
|
||
1E9F1289000
|
trusted library allocation
|
page read and write
|
||
1E9F0AF8000
|
trusted library allocation
|
page read and write
|
||
1E9F3512000
|
trusted library allocation
|
page read and write
|
||
28D05930000
|
heap
|
page readonly
|
||
1E9FBA0B000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F1292000
|
trusted library allocation
|
page read and write
|
||
1E9F2EAF000
|
trusted library allocation
|
page read and write
|
||
1E9FA6CC000
|
trusted library allocation
|
page read and write
|
||
1E9F3055000
|
trusted library allocation
|
page read and write
|
||
1E9F12BE000
|
trusted library allocation
|
page read and write
|
||
1E9EE37B000
|
trusted library allocation
|
page read and write
|
||
1E9F0D69000
|
trusted library allocation
|
page read and write
|
||
1E9EC4F1000
|
trusted library allocation
|
page read and write
|
||
1E9FAF8B000
|
trusted library allocation
|
page read and write
|
||
1E9F0DED000
|
trusted library allocation
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
1E9EDCBE000
|
trusted library allocation
|
page read and write
|
||
1E9F30B9000
|
trusted library allocation
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
2D8D760E000
|
trusted library allocation
|
page read and write
|
||
1E9F1354000
|
trusted library allocation
|
page read and write
|
||
28D05B64000
|
trusted library allocation
|
page read and write
|
||
1E9F09A7000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9FA479000
|
trusted library allocation
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F17BC000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F30BC000
|
trusted library allocation
|
page read and write
|
||
130C9100000
|
heap
|
page read and write
|
||
1E9F2DD0000
|
trusted library allocation
|
page read and write
|
||
1E9FA69E000
|
trusted library allocation
|
page read and write
|
||
1E9F0877000
|
heap
|
page read and write
|
||
1E9F9FA0000
|
trusted library allocation
|
page read and write
|
||
1E9F9B58000
|
trusted library allocation
|
page read and write
|
||
1E9F2FBF000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FA694000
|
trusted library allocation
|
page read and write
|
||
1E9F468B000
|
trusted library allocation
|
page read and write
|
||
1E9FA3EA000
|
trusted library allocation
|
page read and write
|
||
130C8540000
|
unclassified section
|
page readonly
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F2FE9000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F9F65000
|
trusted library allocation
|
page read and write
|
||
1E9FAFE4000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
22D4B907000
|
trusted library allocation
|
page read and write
|
||
130C935C000
|
heap
|
page read and write
|
||
1E9F2DDD000
|
trusted library allocation
|
page read and write
|
||
1E9F36A0000
|
trusted library allocation
|
page read and write
|
||
A8CA6BE000
|
stack
|
page read and write
|
||
1E9F346D000
|
trusted library allocation
|
page read and write
|
||
1E9F0893000
|
heap
|
page read and write
|
||
1E9EC170000
|
heap
|
page read and write
|
||
1E9ECD21000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD2000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFB000
|
trusted library allocation
|
page read and write
|
||
1E9F2C9E000
|
trusted library allocation
|
page read and write
|
||
1E9F2E35000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9EDB8F000
|
trusted library allocation
|
page read and write
|
||
130C873A000
|
heap
|
page read and write
|
||
1E9F3537000
|
trusted library allocation
|
page read and write
|
||
1E9F12FD000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
1E9F36AA000
|
trusted library allocation
|
page read and write
|
||
1E9F2D75000
|
trusted library allocation
|
page read and write
|
||
1E9F2F4E000
|
trusted library allocation
|
page read and write
|
||
1E9FB700000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9EDBF9000
|
trusted library allocation
|
page read and write
|
||
1E9F3436000
|
trusted library allocation
|
page read and write
|
||
1E9F35CC000
|
trusted library allocation
|
page read and write
|
||
1E9F0ADF000
|
trusted library allocation
|
page read and write
|
||
1E9F13A5000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF0000
|
trusted library allocation
|
page read and write
|
||
1E9EC481000
|
trusted library allocation
|
page read and write
|
||
130C87F0000
|
trusted library allocation
|
page read and write
|
||
1E9F1394000
|
trusted library allocation
|
page read and write
|
||
1E9EDBFC000
|
trusted library allocation
|
page read and write
|
||
130C899D000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F26BC000
|
trusted library allocation
|
page read and write
|
||
1E9ECD3E000
|
trusted library allocation
|
page read and write
|
||
1E9F3624000
|
trusted library allocation
|
page read and write
|
||
1E9FA9A1000
|
trusted library allocation
|
page read and write
|
||
1E9F46E8000
|
trusted library allocation
|
page read and write
|
||
1E9F9CE6000
|
trusted library allocation
|
page read and write
|
||
1E9F0C9E000
|
trusted library allocation
|
page read and write
|
||
1E9F9CEB000
|
trusted library allocation
|
page read and write
|
||
2D8D7600000
|
trusted library allocation
|
page read and write
|
||
1E9ECBDE000
|
trusted library allocation
|
page read and write
|
||
1E9F12F7000
|
trusted library allocation
|
page read and write
|
||
130C8ECE000
|
unkown
|
page execute read
|
||
1E9F36EB000
|
trusted library allocation
|
page read and write
|
||
1E9FBCE1000
|
heap
|
page read and write
|
||
130C935F000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FAB6F000
|
trusted library allocation
|
page read and write
|
||
1E9F9FF0000
|
trusted library allocation
|
page read and write
|
||
1E9EC17D000
|
heap
|
page read and write
|
||
1E9EEC3C000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0DCF000
|
trusted library allocation
|
page read and write
|
||
1E9F0AD0000
|
trusted library allocation
|
page read and write
|
||
1E9F0DFD000
|
trusted library allocation
|
page read and write
|
||
1E9F0D8B000
|
trusted library allocation
|
page read and write
|
||
1E9F30E3000
|
trusted library allocation
|
page read and write
|
||
1E9FA498000
|
trusted library allocation
|
page read and write
|
||
1E9EDFD5000
|
trusted library allocation
|
page read and write
|
||
1E9EE34D000
|
trusted library allocation
|
page read and write
|
||
1E9F9B82000
|
trusted library allocation
|
page read and write
|
||
1E9F085C000
|
heap
|
page read and write
|
||
1E9EDF17000
|
trusted library allocation
|
page read and write
|
||
1E9EEC77000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
1E9F3583000
|
trusted library allocation
|
page read and write
|
||
1E9F0C0B000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FAC7B000
|
trusted library allocation
|
page read and write
|
||
1E9F9FA4000
|
trusted library allocation
|
page read and write
|
||
1E9FBC36000
|
heap
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9F35D3000
|
trusted library allocation
|
page read and write
|
||
1E9FA145000
|
trusted library allocation
|
page read and write
|
||
1E9F34B3000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F3443000
|
trusted library allocation
|
page read and write
|
||
1D5E000
|
stack
|
page read and write
|
||
1E9ECA7D000
|
trusted library allocation
|
page read and write
|
||
1E9FA853000
|
trusted library allocation
|
page read and write
|
||
1E9F46F2000
|
trusted library allocation
|
page read and write
|
||
1E9F0A78000
|
trusted library allocation
|
page read and write
|
||
1E9F2EA6000
|
trusted library allocation
|
page read and write
|
||
1E9F3532000
|
trusted library allocation
|
page read and write
|
||
130C97A6000
|
heap
|
page read and write
|
||
1E9F35BC000
|
trusted library allocation
|
page read and write
|
||
1E9EDF5D000
|
trusted library allocation
|
page read and write
|
||
1E9F099F000
|
trusted library allocation
|
page read and write
|
||
1E9F134B000
|
trusted library allocation
|
page read and write
|
||
1E9F08C6000
|
heap
|
page read and write
|
||
1E9F2CE1000
|
trusted library allocation
|
page read and write
|
||
1E9F26AE000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9FA164000
|
trusted library allocation
|
page read and write
|
||
1E9F35A4000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC1000
|
trusted library allocation
|
page read and write
|
||
1E9FA9EB000
|
trusted library allocation
|
page read and write
|
||
1E9EDB80000
|
trusted library allocation
|
page read and write
|
||
1E9FA9FC000
|
trusted library allocation
|
page read and write
|
||
1E9F08B5000
|
heap
|
page read and write
|
||
1E9F0CA2000
|
trusted library allocation
|
page read and write
|
||
1E9F25F8000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
unkown
|
page write copy
|
||
755DFFC000
|
stack
|
page read and write
|
||
1E9F4037000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFA000
|
trusted library allocation
|
page read and write
|
||
1E9F2E80000
|
trusted library allocation
|
page read and write
|
||
EEE447E000
|
unkown
|
page readonly
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
28D05C1B000
|
trusted library allocation
|
page read and write
|
||
1E9ECBB7000
|
trusted library allocation
|
page read and write
|
||
2D8D73F0000
|
heap
|
page readonly
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9EDF12000
|
trusted library allocation
|
page read and write
|
||
1E9F17D4000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F0A82000
|
trusted library allocation
|
page read and write
|
||
1E9F25A7000
|
trusted library allocation
|
page read and write
|
||
1E9FA6F5000
|
trusted library allocation
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9FB0AD000
|
trusted library allocation
|
page read and write
|
||
1E9ECA82000
|
trusted library allocation
|
page read and write
|
||
1E9F2EAF000
|
trusted library allocation
|
page read and write
|
||
1E9F30F2000
|
trusted library allocation
|
page read and write
|
||
1E9FA9EB000
|
trusted library allocation
|
page read and write
|
||
1E9FAAEB000
|
trusted library allocation
|
page read and write
|
||
1E9FA999000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC3A1000
|
trusted library allocation
|
page read and write
|
||
1E9EDCE0000
|
trusted library allocation
|
page read and write
|
||
1E9EEC77000
|
trusted library allocation
|
page read and write
|
||
1E9F2EE7000
|
trusted library allocation
|
page read and write
|
||
1E9ECA80000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
28D0580A000
|
heap
|
page read and write
|
||
1E9F0C9E000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0F0A000
|
trusted library allocation
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9FA0B6000
|
trusted library allocation
|
page read and write
|
||
1E9EC5FD000
|
trusted library allocation
|
page read and write
|
||
1E9F34AD000
|
trusted library allocation
|
page read and write
|
||
DE2000
|
unkown
|
page readonly
|
||
3771000
|
heap
|
page read and write
|
||
1E9F0DFD000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F9FBA000
|
trusted library allocation
|
page read and write
|
||
1E9F1347000
|
trusted library allocation
|
page read and write
|
||
1E9EDBF9000
|
trusted library allocation
|
page read and write
|
||
1E9EC18E000
|
heap
|
page read and write
|
||
1E9FB0F0000
|
trusted library allocation
|
page read and write
|
||
1E9EC976000
|
trusted library allocation
|
page read and write
|
||
130C93B9000
|
heap
|
page read and write
|
||
1E9F29C3000
|
trusted library allocation
|
page read and write
|
||
1E9FA479000
|
trusted library allocation
|
page read and write
|
||
1E9F34D8000
|
trusted library allocation
|
page read and write
|
||
1E9FA999000
|
trusted library allocation
|
page read and write
|
||
1E9F36E5000
|
trusted library allocation
|
page read and write
|
||
1E9F40BE000
|
trusted library allocation
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9F0895000
|
heap
|
page read and write
|
||
1E9FA387000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F0BFA000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9FA479000
|
trusted library allocation
|
page read and write
|
||
1E9F9CDC000
|
trusted library allocation
|
page read and write
|
||
1E9F34EF000
|
trusted library allocation
|
page read and write
|
||
1E9EE37A000
|
trusted library allocation
|
page read and write
|
||
1E9EC398000
|
trusted library allocation
|
page read and write
|
||
1E9F05FE000
|
trusted library allocation
|
page read and write
|
||
1E9EDAEB000
|
trusted library allocation
|
page read and write
|
||
1E9F1223000
|
trusted library allocation
|
page read and write
|
||
1E9FA15A000
|
trusted library allocation
|
page read and write
|
||
1E9FA242000
|
trusted library allocation
|
page read and write
|
||
1E9FB47D000
|
trusted library allocation
|
page read and write
|
||
1E9F46E3000
|
trusted library allocation
|
page read and write
|
||
A8C9EBE000
|
unkown
|
page readonly
|
||
1E9F2D4D000
|
trusted library allocation
|
page read and write
|
||
1E9F05E5000
|
trusted library allocation
|
page read and write
|
||
1E9F25A0000
|
trusted library allocation
|
page read and write
|
||
1E9EDB83000
|
trusted library allocation
|
page read and write
|
||
1E9EC5C5000
|
trusted library allocation
|
page read and write
|
||
1E9F1252000
|
trusted library allocation
|
page read and write
|
||
1E9F0AEF000
|
trusted library allocation
|
page read and write
|
||
1E9F356A000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9F36E0000
|
trusted library allocation
|
page read and write
|
||
1E9F0CA5000
|
trusted library allocation
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
1E9EDF78000
|
trusted library allocation
|
page read and write
|
||
1E9F0BB1000
|
trusted library allocation
|
page read and write
|
||
1E9FADA6000
|
trusted library allocation
|
page read and write
|
||
1E9F0BB9000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD9000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9F2F54000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F13BD000
|
trusted library allocation
|
page read and write
|
||
1E9F47CF000
|
trusted library allocation
|
page read and write
|
||
1E9F0651000
|
trusted library allocation
|
page read and write
|
||
1E9F3697000
|
trusted library allocation
|
page read and write
|
||
130C9797000
|
heap
|
page read and write
|
||
1E9F1391000
|
trusted library allocation
|
page read and write
|
||
1E9EC4D9000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F0BB9000
|
trusted library allocation
|
page read and write
|
||
1E9F1376000
|
trusted library allocation
|
page read and write
|
||
1E9ECDCA000
|
trusted library allocation
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
1E9F0D0C000
|
trusted library allocation
|
page read and write
|
||
1E9F4070000
|
trusted library allocation
|
page read and write
|
||
1E9FA99C000
|
trusted library allocation
|
page read and write
|
||
1E9F0C87000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1E9F17C8000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAAA1000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F36A4000
|
trusted library allocation
|
page read and write
|
||
1E9F3596000
|
trusted library allocation
|
page read and write
|
||
1E9EC180000
|
heap
|
page read and write
|
||
1E9F3564000
|
trusted library allocation
|
page read and write
|
||
1E9FB08E000
|
trusted library allocation
|
page read and write
|
||
1E9F34BB000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F0D85000
|
trusted library allocation
|
page read and write
|
||
1E9F2EFC000
|
trusted library allocation
|
page read and write
|
||
1E9F305F000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFA000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF7000
|
trusted library allocation
|
page read and write
|
||
130C93E1000
|
heap
|
page read and write
|
||
A8CB73E000
|
stack
|
page read and write
|
||
1E9F9C4C000
|
trusted library allocation
|
page read and write
|
||
1E9F0AD6000
|
trusted library allocation
|
page read and write
|
||
1E9FA623000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9F2EA6000
|
trusted library allocation
|
page read and write
|
||
1E9EDF83000
|
trusted library allocation
|
page read and write
|
||
1E9F34B3000
|
trusted library allocation
|
page read and write
|
||
1E9F05AE000
|
trusted library allocation
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
130C9797000
|
heap
|
page read and write
|
||
38E4000
|
heap
|
page read and write
|
||
1E9F366E000
|
trusted library allocation
|
page read and write
|
||
1E9F343B000
|
trusted library allocation
|
page read and write
|
||
1E9F0673000
|
trusted library allocation
|
page read and write
|
||
1E9F36B5000
|
trusted library allocation
|
page read and write
|
||
1E9F0B6E000
|
trusted library allocation
|
page read and write
|
||
1E9FA475000
|
trusted library allocation
|
page read and write
|
||
1E9F0AE2000
|
trusted library allocation
|
page read and write
|
||
1E9F2F9A000
|
trusted library allocation
|
page read and write
|
||
1E9F1B17000
|
trusted library allocation
|
page read and write
|
||
1E9F2EBE000
|
trusted library allocation
|
page read and write
|
||
1E9EDBC9000
|
trusted library allocation
|
page read and write
|
||
1E9FA7B0000
|
trusted library allocation
|
page read and write
|
||
28D05800000
|
heap
|
page read and write
|
||
1E9F3473000
|
trusted library allocation
|
page read and write
|
||
1E9FA9EF000
|
trusted library allocation
|
page read and write
|
||
28D05B03000
|
trusted library allocation
|
page read and write
|
||
1E9F0D46000
|
trusted library allocation
|
page read and write
|
||
1E125FE000
|
stack
|
page read and write
|
||
1E9EDBCC000
|
trusted library allocation
|
page read and write
|
||
1E9F3055000
|
trusted library allocation
|
page read and write
|
||
1E9EDBA0000
|
trusted library allocation
|
page read and write
|
||
1E9F36D1000
|
trusted library allocation
|
page read and write
|
||
1E9FAA99000
|
trusted library allocation
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
1E9F0AFA000
|
trusted library allocation
|
page read and write
|
||
1E9FA7AE000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F0B54000
|
trusted library allocation
|
page read and write
|
||
1E9F11C9000
|
trusted library allocation
|
page read and write
|
||
1E9EC18E000
|
heap
|
page read and write
|
||
1E9FBC8D000
|
heap
|
page read and write
|
||
1E9F08D1000
|
heap
|
page read and write
|
||
1E9FA9A1000
|
trusted library allocation
|
page read and write
|
||
1E9F3057000
|
trusted library allocation
|
page read and write
|
||
1E9FAAA4000
|
trusted library allocation
|
page read and write
|
||
1E9F30CD000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF1000
|
trusted library allocation
|
page read and write
|
||
1E9EDBBD000
|
trusted library allocation
|
page read and write
|
||
1E9FA798000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF8000
|
trusted library allocation
|
page read and write
|
||
28D05C0F000
|
trusted library allocation
|
page read and write
|
||
1E9EE182000
|
trusted library allocation
|
page read and write
|
||
DBC000
|
unkown
|
page readonly
|
||
1E9EC467000
|
trusted library allocation
|
page read and write
|
||
1E9F13B0000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9F0984000
|
trusted library allocation
|
page read and write
|
||
1E9FA9EB000
|
trusted library allocation
|
page read and write
|
||
22D4B800000
|
trusted library allocation
|
page read and write
|
||
1E9F0A90000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FADB5000
|
trusted library allocation
|
page read and write
|
||
130C897B000
|
trusted library allocation
|
page read and write
|
||
1E9FB997000
|
trusted library allocation
|
page read and write
|
||
1E9F0DB7000
|
trusted library allocation
|
page read and write
|
||
1E9F11EC000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F2D4B000
|
trusted library allocation
|
page read and write
|
||
1E9FAFAD000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F34D2000
|
trusted library allocation
|
page read and write
|
||
1E9FACC0000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9FAD62000
|
trusted library allocation
|
page read and write
|
||
130C9797000
|
heap
|
page read and write
|
||
1E9F3451000
|
trusted library allocation
|
page read and write
|
||
1E9F34AD000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FA0A1000
|
trusted library allocation
|
page read and write
|
||
1E9FADF7000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F30DD000
|
trusted library allocation
|
page read and write
|
||
1E9FA242000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9F4099000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F0987000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAF73000
|
trusted library allocation
|
page read and write
|
||
1E9F30FC000
|
trusted library allocation
|
page read and write
|
||
1E9F05FE000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC1000
|
trusted library allocation
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
22D4B659000
|
heap
|
page read and write
|
||
38E0000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9FA27E000
|
trusted library allocation
|
page read and write
|
||
1E9F089A000
|
heap
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9EDF63000
|
trusted library allocation
|
page read and write
|
||
1E9FA7B0000
|
trusted library allocation
|
page read and write
|
||
2D8D7704000
|
heap
|
page read and write
|
||
1E9EC4F1000
|
trusted library allocation
|
page read and write
|
||
1E9EDCC7000
|
trusted library allocation
|
page read and write
|
||
1E9FA16B000
|
trusted library allocation
|
page read and write
|
||
1E9F40C4000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC8000
|
trusted library allocation
|
page read and write
|
||
1E9ECB9D000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F13B0000
|
trusted library allocation
|
page read and write
|
||
1E9EDAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F0D18000
|
trusted library allocation
|
page read and write
|
||
1E9F0863000
|
heap
|
page read and write
|
||
1E9F36E0000
|
trusted library allocation
|
page read and write
|
||
1E9F9CC7000
|
trusted library allocation
|
page read and write
|
||
130C93E9000
|
heap
|
page read and write
|
||
1E9F1361000
|
trusted library allocation
|
page read and write
|
||
1E9F29EE000
|
trusted library allocation
|
page read and write
|
||
2D8D7670000
|
trusted library allocation
|
page read and write
|
||
1E9EECE4000
|
trusted library allocation
|
page read and write
|
||
1E9F29B5000
|
trusted library allocation
|
page read and write
|
||
1E9F2ECC000
|
trusted library allocation
|
page read and write
|
||
1E9F2CA8000
|
trusted library allocation
|
page read and write
|
||
1E9F11D2000
|
trusted library allocation
|
page read and write
|
||
1E9ECACF000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF4000
|
trusted library allocation
|
page read and write
|
||
1E9F0DE7000
|
trusted library allocation
|
page read and write
|
||
1E9EECFB000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F46EA000
|
trusted library allocation
|
page read and write
|
||
1E9FA0BF000
|
trusted library allocation
|
page read and write
|
||
1E9F1360000
|
trusted library allocation
|
page read and write
|
||
1E9FA661000
|
trusted library allocation
|
page read and write
|
||
1E9EC18E000
|
heap
|
page read and write
|
||
1E9F46E6000
|
trusted library allocation
|
page read and write
|
||
1E9F46B2000
|
trusted library allocation
|
page read and write
|
||
1E9F1B24000
|
trusted library allocation
|
page read and write
|
||
130C93E8000
|
heap
|
page read and write
|
||
1E9F2E7A000
|
trusted library allocation
|
page read and write
|
||
1E9ECB36000
|
trusted library allocation
|
page read and write
|
||
1E9FA0A1000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9FAF00000
|
trusted library allocation
|
page read and write
|
||
1E9F3100000
|
trusted library allocation
|
page read and write
|
||
1E9F9FE2000
|
trusted library allocation
|
page read and write
|
||
1E9F0DC3000
|
trusted library allocation
|
page read and write
|
||
130C936C000
|
heap
|
page read and write
|
||
1E9F0D72000
|
trusted library allocation
|
page read and write
|
||
1E9EC193000
|
heap
|
page read and write
|
||
1E9F0DA0000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC8000
|
trusted library allocation
|
page read and write
|
||
1E9EC45F000
|
trusted library allocation
|
page read and write
|
||
1E9F1B35000
|
trusted library allocation
|
page read and write
|
||
1E9F34ED000
|
trusted library allocation
|
page read and write
|
||
1E9EE382000
|
trusted library allocation
|
page read and write
|
||
2D8D7290000
|
heap
|
page read and write
|
||
1E9F0DF9000
|
trusted library allocation
|
page read and write
|
||
130C9369000
|
heap
|
page read and write
|
||
1E9FA0EA000
|
trusted library allocation
|
page read and write
|
||
1E9FAEDC000
|
trusted library allocation
|
page read and write
|
||
1E9F0860000
|
heap
|
page read and write
|
||
1E9F2F6A000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFC000
|
trusted library allocation
|
page read and write
|
||
1E9F2598000
|
trusted library allocation
|
page read and write
|
||
1E9FA667000
|
trusted library allocation
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9EDC48000
|
trusted library allocation
|
page read and write
|
||
1E9FA682000
|
trusted library allocation
|
page read and write
|
||
1E9FA45F000
|
trusted library allocation
|
page read and write
|
||
2D8D7613000
|
trusted library allocation
|
page read and write
|
||
1E9F0877000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC16A000
|
heap
|
page read and write
|
||
1E9EE398000
|
trusted library allocation
|
page read and write
|
||
2D8D767C000
|
trusted library allocation
|
page read and write
|
||
1E9F09AE000
|
trusted library allocation
|
page read and write
|
||
1E9FA611000
|
trusted library allocation
|
page read and write
|
||
1E9F0866000
|
heap
|
page read and write
|
||
1E9F407B000
|
trusted library allocation
|
page read and write
|
||
130C935C000
|
heap
|
page read and write
|
||
1E9FAB3B000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F29F6000
|
trusted library allocation
|
page read and write
|
||
1E9F0580000
|
trusted library allocation
|
page read and write
|
||
1E9FA7B2000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFA000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9FA9CA000
|
trusted library allocation
|
page read and write
|
||
1E9F2DE0000
|
trusted library allocation
|
page read and write
|
||
2D8D76C8000
|
trusted library allocation
|
page read and write
|
||
28D057D0000
|
heap
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9F2DD2000
|
trusted library allocation
|
page read and write
|
||
1E9FB9E7000
|
trusted library allocation
|
page read and write
|
||
1E9F11E6000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EDC9D000
|
trusted library allocation
|
page read and write
|
||
1E9FAB0C000
|
trusted library allocation
|
page read and write
|
||
1E9FBC4E000
|
heap
|
page read and write
|
||
1E9F3624000
|
trusted library allocation
|
page read and write
|
||
1E9F0D46000
|
trusted library allocation
|
page read and write
|
||
28D05B68000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9F11F8000
|
trusted library allocation
|
page read and write
|
||
1E9EC468000
|
trusted library allocation
|
page read and write
|
||
1E9F0529000
|
trusted library allocation
|
page read and write
|
||
1E9F0CDB000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EC44C000
|
trusted library allocation
|
page read and write
|
||
1E9FB9FB000
|
trusted library allocation
|
page read and write
|
||
1E9EDBA0000
|
trusted library allocation
|
page read and write
|
||
1E9FBBDF000
|
trusted library allocation
|
page read and write
|
||
1E9F05AA000
|
trusted library allocation
|
page read and write
|
||
1E9FA21A000
|
trusted library allocation
|
page read and write
|
||
1E9FA813000
|
trusted library allocation
|
page read and write
|
||
1E9F3441000
|
trusted library allocation
|
page read and write
|
||
23F96407000
|
trusted library allocation
|
page read and write
|
||
1E9EC43A000
|
trusted library allocation
|
page read and write
|
||
1E9F30F4000
|
trusted library allocation
|
page read and write
|
||
1E9FA49C000
|
trusted library allocation
|
page read and write
|
||
1E9FAAC8000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF8000
|
trusted library allocation
|
page read and write
|
||
1E9F9CD5000
|
trusted library allocation
|
page read and write
|
||
1E9F18DD000
|
trusted library allocation
|
page read and write
|
||
755DFFF000
|
stack
|
page read and write
|
||
28D05970000
|
unclassified section
|
page readonly
|
||
1E9FA3E0000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD2000
|
trusted library allocation
|
page read and write
|
||
1E9F46E3000
|
trusted library allocation
|
page read and write
|
||
1E9F2FE9000
|
trusted library allocation
|
page read and write
|
||
1E9F0B1F000
|
trusted library allocation
|
page read and write
|
||
1E9FA467000
|
trusted library allocation
|
page read and write
|
||
1E9F0DD1000
|
trusted library allocation
|
page read and write
|
||
22D4B620000
|
heap
|
page read and write
|
||
1E9FA22E000
|
trusted library allocation
|
page read and write
|
||
1E9F1777000
|
trusted library allocation
|
page read and write
|
||
1E9F47EF000
|
trusted library allocation
|
page read and write
|
||
1E9F4048000
|
trusted library allocation
|
page read and write
|
||
1E9F3439000
|
trusted library allocation
|
page read and write
|
||
28D05BC8000
|
trusted library allocation
|
page read and write
|
||
1E9F0DCF000
|
trusted library allocation
|
page read and write
|
||
1E9F3533000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAA8C000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F2D75000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
28D05BB7000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F05F6000
|
trusted library allocation
|
page read and write
|
||
1E9FAABD000
|
trusted library allocation
|
page read and write
|
||
1E9F0964000
|
trusted library allocation
|
page read and write
|
||
A8C7ADE000
|
stack
|
page read and write
|
||
1E9FA6C7000
|
trusted library allocation
|
page read and write
|
||
1E9F0891000
|
heap
|
page read and write
|
||
1E9F9BE6000
|
trusted library allocation
|
page read and write
|
||
1E9ECBEA000
|
trusted library allocation
|
page read and write
|
||
1E9F13DF000
|
trusted library allocation
|
page read and write
|
||
1E9EDB73000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
EEE5C7E000
|
stack
|
page read and write
|
||
1E9F0624000
|
trusted library allocation
|
page read and write
|
||
1E9F305F000
|
trusted library allocation
|
page read and write
|
||
1E9F2AF0000
|
trusted library allocation
|
page read and write
|
||
130C895F000
|
trusted library allocation
|
page read and write
|
||
1E9F05B3000
|
trusted library allocation
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1E9F3063000
|
trusted library allocation
|
page read and write
|
||
1E9EC180000
|
heap
|
page read and write
|
||
1E9F3481000
|
trusted library allocation
|
page read and write
|
||
1E9F0DE4000
|
trusted library allocation
|
page read and write
|
||
1E9EC40E000
|
trusted library allocation
|
page read and write
|
||
130C89AD000
|
trusted library allocation
|
page read and write
|
||
1E9FA08B000
|
trusted library allocation
|
page read and write
|
||
1E9F2E35000
|
trusted library allocation
|
page read and write
|
||
1E9F2F5F000
|
trusted library allocation
|
page read and write
|
||
1E9F08C6000
|
heap
|
page read and write
|
||
1E9F1394000
|
trusted library allocation
|
page read and write
|
||
1E9EDFF0000
|
trusted library allocation
|
page read and write
|
||
1E9ECB5E000
|
trusted library allocation
|
page read and write
|
||
1E9EC17B000
|
heap
|
page read and write
|
||
28D056D0000
|
unclassified section
|
page readonly
|
||
1E9F305D000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
130C93E3000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F9FF4000
|
trusted library allocation
|
page read and write
|
||
1E9F34AD000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFA000
|
trusted library allocation
|
page read and write
|
||
1E9ECA26000
|
trusted library allocation
|
page read and write
|
||
1E9F13B0000
|
trusted library allocation
|
page read and write
|
||
1E9FA667000
|
trusted library allocation
|
page read and write
|
||
1E9F2E6E000
|
trusted library allocation
|
page read and write
|
||
1E9F34ED000
|
trusted library allocation
|
page read and write
|
||
1E9FA27E000
|
trusted library allocation
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
1E9FA475000
|
trusted library allocation
|
page read and write
|
||
1E9F9CDC000
|
trusted library allocation
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9FA7A9000
|
trusted library allocation
|
page read and write
|
||
1E9F34D0000
|
trusted library allocation
|
page read and write
|
||
1E9FA7D1000
|
trusted library allocation
|
page read and write
|
||
1E9FA6A2000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FA9AB000
|
trusted library allocation
|
page read and write
|
||
1E9EC18A000
|
heap
|
page read and write
|
||
1E9F061F000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFD000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EDF8F000
|
trusted library allocation
|
page read and write
|
||
1E9EE17D000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F2D6A000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9EC48A000
|
trusted library allocation
|
page read and write
|
||
1E9F25EC000
|
trusted library allocation
|
page read and write
|
||
1E9F2D51000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F0CDA000
|
trusted library allocation
|
page read and write
|
||
28D05C19000
|
trusted library allocation
|
page read and write
|
||
1E9F29A2000
|
trusted library allocation
|
page read and write
|
||
1E9FA4C0000
|
trusted library allocation
|
page read and write
|
||
1E9F363C000
|
trusted library allocation
|
page read and write
|
||
1E9EC1A4000
|
heap
|
page read and write
|
||
28D05B5D000
|
trusted library allocation
|
page read and write
|
||
130C935F000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F1786000
|
trusted library allocation
|
page read and write
|
||
1E9FA659000
|
trusted library allocation
|
page read and write
|
||
1E9F3439000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F9CB6000
|
trusted library allocation
|
page read and write
|
||
A8C7B98000
|
stack
|
page read and write
|
||
1E9F2D7F000
|
trusted library allocation
|
page read and write
|
||
1E9F17FE000
|
trusted library allocation
|
page read and write
|
||
1E9F0CA9000
|
trusted library allocation
|
page read and write
|
||
1E9FB5A8000
|
trusted library allocation
|
page read and write
|
||
1E9F0866000
|
heap
|
page read and write
|
||
2D8D7682000
|
trusted library allocation
|
page read and write
|
||
1E9F12ED000
|
trusted library allocation
|
page read and write
|
||
1E9FAB55000
|
trusted library allocation
|
page read and write
|
||
1E9F0D69000
|
trusted library allocation
|
page read and write
|
||
1E9F11FE000
|
trusted library allocation
|
page read and write
|
||
1E9F0881000
|
heap
|
page read and write
|
||
1E9F08AC000
|
heap
|
page read and write
|
||
1E9F9D0F000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FAD00000
|
trusted library allocation
|
page read and write
|
||
1E9FBC01000
|
heap
|
page read and write
|
||
1E9EC5EB000
|
trusted library allocation
|
page read and write
|
||
28D05B81000
|
trusted library allocation
|
page read and write
|
||
1E9FA772000
|
trusted library allocation
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9FA999000
|
trusted library allocation
|
page read and write
|
||
1E9EC19A000
|
heap
|
page read and write
|
||
1E9EEC7F000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9F0891000
|
heap
|
page read and write
|
||
1E9F2D77000
|
trusted library allocation
|
page read and write
|
||
1E9F35C7000
|
trusted library allocation
|
page read and write
|
||
1E9EDF83000
|
trusted library allocation
|
page read and write
|
||
1E9F9BB2000
|
trusted library allocation
|
page read and write
|
||
1E9F2C6D000
|
trusted library allocation
|
page read and write
|
||
130C93F1000
|
heap
|
page read and write
|
||
1E9F9F5B000
|
trusted library allocation
|
page read and write
|
||
A8CBF3E000
|
unkown
|
page readonly
|
||
1E9ECEFC000
|
trusted library allocation
|
page read and write
|
||
1E9F365C000
|
trusted library allocation
|
page read and write
|
||
1E9F1727000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
130C8964000
|
trusted library allocation
|
page read and write
|
||
1E9FACA7000
|
trusted library allocation
|
page read and write
|
||
1E9F2AA0000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9F0561000
|
trusted library allocation
|
page read and write
|
||
1E9F30F2000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F35AF000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F3449000
|
trusted library allocation
|
page read and write
|
||
1E9F1386000
|
trusted library allocation
|
page read and write
|
||
1E9EDAEF000
|
trusted library allocation
|
page read and write
|
||
1E9FB502000
|
trusted library allocation
|
page read and write
|
||
1E9FADC6000
|
trusted library allocation
|
page read and write
|
||
1E9EC357000
|
trusted library allocation
|
page read and write
|
||
23F97D90000
|
heap
|
page read and write
|
||
EEE21CE000
|
unkown
|
page readonly
|
||
1E9F11E6000
|
trusted library allocation
|
page read and write
|
||
1E9FAAA7000
|
trusted library allocation
|
page read and write
|
||
1E9EDFFB000
|
trusted library allocation
|
page read and write
|
||
1E9F34F3000
|
trusted library allocation
|
page read and write
|
||
1E9F0624000
|
trusted library allocation
|
page read and write
|
||
1E9F36A2000
|
trusted library allocation
|
page read and write
|
||
1E9EE36A000
|
trusted library allocation
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0AF3000
|
trusted library allocation
|
page read and write
|
||
1E9F18DD000
|
trusted library allocation
|
page read and write
|
||
130C9769000
|
heap
|
page read and write
|
||
1E9FA922000
|
trusted library allocation
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9F3598000
|
trusted library allocation
|
page read and write
|
||
1E9FBBEF000
|
trusted library allocation
|
page read and write
|
||
1E9F05FA000
|
trusted library allocation
|
page read and write
|
||
1E9F0AE6000
|
trusted library allocation
|
page read and write
|
||
1E9F34FB000
|
trusted library allocation
|
page read and write
|
||
1E9F4070000
|
trusted library allocation
|
page read and write
|
||
1E9FA7A0000
|
trusted library allocation
|
page read and write
|
||
1E9F0A99000
|
trusted library allocation
|
page read and write
|
||
1E9EDB8F000
|
trusted library allocation
|
page read and write
|
||
1E9FA7E8000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9FA3EC000
|
trusted library allocation
|
page read and write
|
||
130C8987000
|
trusted library allocation
|
page read and write
|
||
1E9F136B000
|
trusted library allocation
|
page read and write
|
||
1E9F1354000
|
trusted library allocation
|
page read and write
|
||
1E9F3519000
|
trusted library allocation
|
page read and write
|
||
1E9F0B54000
|
trusted library allocation
|
page read and write
|
||
1E9ECB3F000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD1000
|
trusted library allocation
|
page read and write
|
||
1E9F357D000
|
trusted library allocation
|
page read and write
|
||
1E9FBBF3000
|
trusted library allocation
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F3637000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
1E9FB967000
|
trusted library allocation
|
page read and write
|
||
52FB000
|
stack
|
page read and write
|
||
1E9F46EE000
|
trusted library allocation
|
page read and write
|
||
1E9FA45B000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
2D8D7500000
|
trusted library allocation
|
page read and write
|
||
1E9FA4C0000
|
trusted library allocation
|
page read and write
|
||
1E9F2E6E000
|
trusted library allocation
|
page read and write
|
||
1E9F1C07000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F351F000
|
trusted library allocation
|
page read and write
|
||
1E9FA3D6000
|
trusted library allocation
|
page read and write
|
||
1E9ECDE8000
|
trusted library allocation
|
page read and write
|
||
1E9FA69C000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9F12FA000
|
trusted library allocation
|
page read and write
|
||
130C8FA4000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F3572000
|
trusted library allocation
|
page read and write
|
||
1E9EC174000
|
heap
|
page read and write
|
||
1E9FAA9B000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF4000
|
trusted library allocation
|
page read and write
|
||
1E9F0DF0000
|
trusted library allocation
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9F1B1F000
|
trusted library allocation
|
page read and write
|
||
755EFFF000
|
stack
|
page read and write
|
||
1E9EC454000
|
trusted library allocation
|
page read and write
|
||
1E9EDC3B000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9F34EF000
|
trusted library allocation
|
page read and write
|
||
2D8D7649000
|
trusted library allocation
|
page read and write
|
||
3BC920B1000
|
trusted library allocation
|
page execute read
|
||
1E9F09DB000
|
trusted library allocation
|
page read and write
|
||
1E9F30D0000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF5000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F9CDC000
|
trusted library allocation
|
page read and write
|
||
1E9FA9F4000
|
trusted library allocation
|
page read and write
|
||
1E9F2DAD000
|
trusted library allocation
|
page read and write
|
||
1E9F09AF000
|
trusted library allocation
|
page read and write
|
||
1E9FA9BC000
|
trusted library allocation
|
page read and write
|
||
1E9EC193000
|
heap
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9F2CC5000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC195000
|
heap
|
page read and write
|
||
1E9E0CFE000
|
trusted library allocation
|
page read and write
|
||
1E9EDB65000
|
trusted library allocation
|
page read and write
|
||
1E9F1765000
|
trusted library allocation
|
page read and write
|
||
28D05B2E000
|
trusted library allocation
|
page read and write
|
||
1E9F2FCD000
|
trusted library allocation
|
page read and write
|
||
130C9797000
|
heap
|
page read and write
|
||
1E9F0A43000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
130C9783000
|
heap
|
page read and write
|
||
1E9F3568000
|
trusted library allocation
|
page read and write
|
||
1E9F4692000
|
trusted library allocation
|
page read and write
|
||
1E9FAB22000
|
trusted library allocation
|
page read and write
|
||
1E9EE1CC000
|
trusted library allocation
|
page read and write
|
||
130C935F000
|
heap
|
page read and write
|
||
1E9F2EE7000
|
trusted library allocation
|
page read and write
|
||
1E9FA975000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
2D8D76D7000
|
trusted library allocation
|
page read and write
|
||
1E9FA3B5000
|
trusted library allocation
|
page read and write
|
||
2D8D7400000
|
unclassified section
|
page read and write
|
||
1E9F355C000
|
trusted library allocation
|
page read and write
|
||
1E9F9B60000
|
trusted library allocation
|
page read and write
|
||
1E9F0A5C000
|
trusted library allocation
|
page read and write
|
||
1E9F11C6000
|
trusted library allocation
|
page read and write
|
||
1E9F9CFE000
|
trusted library allocation
|
page read and write
|
||
1E9EE39F000
|
trusted library allocation
|
page read and write
|
||
1E9FAAF3000
|
trusted library allocation
|
page read and write
|
||
1E9FAAEF000
|
trusted library allocation
|
page read and write
|
||
1E9F9FF0000
|
trusted library allocation
|
page read and write
|
||
1E9F0A75000
|
trusted library allocation
|
page read and write
|
||
1E9F9CCC000
|
trusted library allocation
|
page read and write
|
||
1E9FAAFD000
|
trusted library allocation
|
page read and write
|
||
130C938A000
|
heap
|
page read and write
|
||
1E9EC1A4000
|
heap
|
page read and write
|
||
1E9EDF83000
|
trusted library allocation
|
page read and write
|
||
1E9ECB69000
|
trusted library allocation
|
page read and write
|
||
130C89F0000
|
trusted library allocation
|
page read and write
|
||
1E9FA23C000
|
trusted library allocation
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9FA0BA000
|
trusted library allocation
|
page read and write
|
||
1E9F0D7B000
|
trusted library allocation
|
page read and write
|
||
1E9F3453000
|
trusted library allocation
|
page read and write
|
||
1E9FB484000
|
trusted library allocation
|
page read and write
|
||
1E9F36B6000
|
trusted library allocation
|
page read and write
|
||
1E9EDCEB000
|
trusted library allocation
|
page read and write
|
||
1E9ECBCA000
|
trusted library allocation
|
page read and write
|
||
130C8961000
|
trusted library allocation
|
page read and write
|
||
1E9F2D82000
|
trusted library allocation
|
page read and write
|
||
1E9F11F8000
|
trusted library allocation
|
page read and write
|
||
1E9F05CB000
|
trusted library allocation
|
page read and write
|
||
130C937D000
|
heap
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
A8CAEFE000
|
stack
|
page read and write
|
||
1E9F0868000
|
heap
|
page read and write
|
||
1E9EDBCC000
|
trusted library allocation
|
page read and write
|
||
1E9F0A1A000
|
trusted library allocation
|
page read and write
|
||
1E10BBB000
|
stack
|
page read and write
|
||
1E9F0575000
|
trusted library allocation
|
page read and write
|
||
130C9785000
|
heap
|
page read and write
|
||
1E9F13DF000
|
trusted library allocation
|
page read and write
|
||
1E9F468B000
|
trusted library allocation
|
page read and write
|
||
1E9F13DF000
|
trusted library allocation
|
page read and write
|
||
23F9640A000
|
trusted library allocation
|
page read and write
|
||
1E9F9CB1000
|
trusted library allocation
|
page read and write
|
||
1E9EC182000
|
heap
|
page read and write
|
||
1E9F2E6E000
|
trusted library allocation
|
page read and write
|
||
1E9EC187000
|
heap
|
page read and write
|
||
1E9EE35B000
|
trusted library allocation
|
page read and write
|
||
1E9ED95E000
|
trusted library allocation
|
page read and write
|
||
1E9F1250000
|
trusted library allocation
|
page read and write
|
||
1E9EC18E000
|
heap
|
page read and write
|
||
1E9EE341000
|
trusted library allocation
|
page read and write
|
||
1E9F0D0A000
|
trusted library allocation
|
page read and write
|
||
1E9F17BC000
|
trusted library allocation
|
page read and write
|
||
1E9ECB69000
|
trusted library allocation
|
page read and write
|
||
1E9F30DA000
|
trusted library allocation
|
page read and write
|
||
1E9F0ADD000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9FA922000
|
trusted library allocation
|
page read and write
|
||
1E9EC173000
|
heap
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F2D58000
|
trusted library allocation
|
page read and write
|
||
1E9F0894000
|
heap
|
page read and write
|
||
1E9F0CA2000
|
trusted library allocation
|
page read and write
|
||
1E9F0AF4000
|
trusted library allocation
|
page read and write
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
130C93E6000
|
heap
|
page read and write
|
||
1E9FAAC1000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9FA7CD000
|
trusted library allocation
|
page read and write
|
||
130C93ED000
|
heap
|
page read and write
|
||
1E9FA15D000
|
trusted library allocation
|
page read and write
|
||
1E9FABF1000
|
trusted library allocation
|
page read and write
|
||
1E9F08D1000
|
heap
|
page read and write
|
||
1E9EECF1000
|
trusted library allocation
|
page read and write
|
||
1E9F2E6E000
|
trusted library allocation
|
page read and write
|
||
1E9FA49F000
|
trusted library allocation
|
page read and write
|
||
1E9F357B000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
130C9760000
|
heap
|
page read and write
|
||
1E9FAAE1000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9EDAEE000
|
trusted library allocation
|
page read and write
|
||
1E9FA4C3000
|
trusted library allocation
|
page read and write
|
||
130C93E3000
|
heap
|
page read and write
|
||
1E9F9FE0000
|
trusted library allocation
|
page read and write
|
||
1E9F17CC000
|
trusted library allocation
|
page read and write
|
||
1E9EC462000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9F08C5000
|
heap
|
page read and write
|
||
1E9F9CDC000
|
trusted library allocation
|
page read and write
|
||
1E9FA0B8000
|
trusted library allocation
|
page read and write
|
||
1E9F18F0000
|
trusted library allocation
|
page read and write
|
||
1E9F0DB9000
|
trusted library allocation
|
page read and write
|
||
1E9ECDE1000
|
trusted library allocation
|
page read and write
|
||
1E9FA6C7000
|
trusted library allocation
|
page read and write
|
||
1E9F35A4000
|
trusted library allocation
|
page read and write
|
||
1E9F25BF000
|
trusted library allocation
|
page read and write
|
||
1E9F1BFD000
|
trusted library allocation
|
page read and write
|
||
1E9F348C000
|
trusted library allocation
|
page read and write
|
||
1E9EDBE8000
|
trusted library allocation
|
page read and write
|
||
1E9ECD21000
|
trusted library allocation
|
page read and write
|
||
1E9F09F8000
|
trusted library allocation
|
page read and write
|
||
1E9EC19B000
|
heap
|
page read and write
|
||
1E9F0D54000
|
trusted library allocation
|
page read and write
|
||
1E9FA4AA000
|
trusted library allocation
|
page read and write
|
||
1E9FA254000
|
trusted library allocation
|
page read and write
|
||
1E9F30D7000
|
trusted library allocation
|
page read and write
|
||
1E9F3473000
|
trusted library allocation
|
page read and write
|
||
1E9F36CF000
|
trusted library allocation
|
page read and write
|
||
1E9F12FA000
|
trusted library allocation
|
page read and write
|
||
1E9F35A1000
|
trusted library allocation
|
page read and write
|
||
2D8D7687000
|
trusted library allocation
|
page read and write
|
||
1E9EC185000
|
heap
|
page read and write
|
||
1E9F343D000
|
trusted library allocation
|
page read and write
|
||
1E9F1777000
|
trusted library allocation
|
page read and write
|
||
1E9ECA26000
|
trusted library allocation
|
page read and write
|
||
1E9EC463000
|
trusted library allocation
|
page read and write
|
||
1E9EDF3D000
|
trusted library allocation
|
page read and write
|
||
1E9EC194000
|
heap
|
page read and write
|
||
1E9F29E3000
|
trusted library allocation
|
page read and write
|
||
130C93E9000
|
heap
|
page read and write
|
||
1E9FA7C9000
|
trusted library allocation
|
page read and write
|
||
1E9FA1B8000
|
trusted library allocation
|
page read and write
|
||
1E9EC169000
|
heap
|
page read and write
|
||
1E9EC181000
|
heap
|
page read and write
|
||
1E9F30F4000
|
trusted library allocation
|
page read and write
|
||
1E9FAC55000
|
trusted library allocation
|
page read and write
|
||
1E9FA7E5000
|
trusted library allocation
|
page read and write
|
||
1E9ECBA3000
|
trusted library allocation
|
page read and write
|
||
28D05B79000
|
trusted library allocation
|
page read and write
|
||
1E9F2FE9000
|
trusted library allocation
|
page read and write
|
||
EEE3BFE000
|
stack
|
page read and write
|
||
1E9EE3C8000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1E9F9F61000
|
trusted library allocation
|
page read and write
|
||
1E9F3481000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EECE7000
|
trusted library allocation
|
page read and write
|
||
EEE214E000
|
unkown
|
page readonly
|
||
1E9ECA66000
|
trusted library allocation
|
page read and write
|
||
1E9EDA78000
|
trusted library allocation
|
page read and write
|
||
1E9FA1B2000
|
trusted library allocation
|
page read and write
|
||
1E9F2AFD000
|
trusted library allocation
|
page read and write
|
||
1E9F136E000
|
trusted library allocation
|
page read and write
|
||
1E9F12A3000
|
trusted library allocation
|
page read and write
|
||
1E9F2E3E000
|
trusted library allocation
|
page read and write
|
||
1E9F0AFD000
|
trusted library allocation
|
page read and write
|
||
1E9EC16D000
|
heap
|
page read and write
|
||
1E9ECB00000
|
trusted library allocation
|
page read and write
|
||
1E9FA06B000
|
trusted library allocation
|
page read and write
|
||
1E9FB94F000
|
trusted library allocation
|
page read and write
|
||
1E9FA330000
|
trusted library allocation
|
page read and write
|
||
1E9F11FE000
|
trusted library allocation
|
page read and write
|
||
1E9FAA82000
|
trusted library allocation
|
page read and write
|
||
1E9EC176000
|
heap
|
page read and write
|
||
1E9EDA77000
|
trusted library allocation
|
page read and write
|
||
1E9F0A63000
|
trusted library allocation
|
page read and write
|
||
1E9EDF17000
|
trusted library allocation
|
page read and write
|
||
1E9F25BF000
|
trusted library allocation
|
page read and write
|
||
1E9FA175000
|
trusted library allocation
|
page read and write
|
||
1E9F0998000
|
trusted library allocation
|
page read and write
|
||
1E9EECB4000
|
trusted library allocation
|
page read and write
|
||
1E9FAAD9000
|
trusted library allocation
|
page read and write
|
||
1E9F1826000
|
trusted library allocation
|
page read and write
|
||
1E9F9FDC000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1E9F1723000
|
trusted library allocation
|
page read and write
|
||
1E9EC17A000
|
heap
|
page read and write
|
||
1E9F2FA0000
|
trusted library allocation
|
page read and write
|
||
22D4BAC0000
|
heap
|
page read and write
|
||
1E9F35AF000
|
trusted library allocation
|
page read and write
|
||
1E9FBBFB000
|
trusted library allocation
|
page read and write
|
||
1E9F472F000
|
trusted library allocation
|
page read and write
|
There are 3689 hidden memdumps, click here to show them.