IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_529ab124-c947-4aec-89b5-3f71d9fbdac3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_529ab124-c947-4aec-89b5-3f71d9fbdac3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\12db0a05-bb53-4865-af08-4aeec09c62ce.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3b219e0b-5e7b-46ae-b202-05343b04f5d2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\453a6db7-4669-4f77-b40a-9814f1471149.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\67ae3a70-3fb5-43a7-9da8-c0eca4f019f9.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\74bed03b-d041-4bd7-a5c6-b5d878ac1167.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7a2af48a-5860-4960-a588-04b0c4000679.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\c35ade92-f586-4ed2-8835-97cba56db08d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B845-1168.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B845-1C24.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B859-21E8.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4B861-E14.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\065580ab-c5f8-4d6e-8c08-76ffa057f7b2.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1193e7e8-b934-497f-a72f-43fcc3230f8f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\35523baf-69b4-4175-b6f1-a2cb57e7468f.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\41146758-f5e8-4460-8dbb-8b6df984544b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\64ecbe40-9e7f-413b-a117-f55aa6734266.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\73359451-9387-4199-a403-86749fa141ee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8a4026ec-8955-4e1c-a041-d8719f17b93f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8ce15003-ac76-4731-92c1-0248f0ca31a8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\9060a730-f3c2-4880-bbfc-33b2bcb7aa37.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 11, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie 0x1d, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\272e0c42-3f46-4fe7-8a85-900df68999fd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\6266b573-be7f-4880-b141-4ac5b8a88fc8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\644a078f-d1ef-4569-a03e-8944dec91ca4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\83625de1-c8a3-43d2-8a1c-23a41273cfa4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\970a7702-a2e8-437c-bb7d-66a07ffd4b7c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2cf0e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3b96e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a9e2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2bea3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2c9be.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3d003.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c01d80a6-9e85-46c1-a552-82a8e7ddc5a1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\e2d17422-16ce-4afd-aee3-dbc5a833fa37.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\f84f3ec3-ba11-4701-80e5-db433c200462.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2e2f3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF316f4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3569d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3a44f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2e68d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF3130c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369690441613360
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1ffccc63-ca69-4a73-afde-8184f507e6bf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\35e6f141-002f-431b-bff4-4e91ea188b00.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF3c0a1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF2bea3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\e89551d9-d3ba-4529-a888-a5dbb9c803bf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\ea950c69-ba4e-4581-a1bb-1b213b330294.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages 2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie 0x66, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a6c88677-fc5f-4b78-970c-c652a42d4bef.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\f4c9672a-9f15-46d4-9e2d-ff90f4ce1805.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28da0.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF292ef.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2930e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2ba0f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2da29.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2daa6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2dab6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2fb0f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2fb1f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3a3d2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3caf2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF400d7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a360abba-ffb9-4d23-8aae-88c57703f36e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\b14f5add-b3b9-4cf7-9493-adaef7c1f435.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bd9aed54-2025-4cfc-ac37-77bc24b19715.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c56bd8db-4fbb-4e39-8fb0-8c7c48eccf70.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\e47e4265-ff15-4a1c-a8c6-caea56eabc1d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ebefe4df-1f9a-4eb3-9a44-3a822e85be0e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\21713cf7-670c-451e-a39b-43372bada497.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\8b2e48a6-d6e1-4afa-a9d8-2dc0072111e0.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\8f7775e7-b3e8-4b23-b876-70494a73f6d6.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\b33b5721-7963-486a-bc72-8581a8e2c560.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\b6ac9416-56fe-4e52-868b-ce7c878a4ad9.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\da195d32-5721-4763-9bad-58dd30fffab7.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 603003
dropped
C:\Users\user\AppData\Local\Temp\ece79c27-4711-43f7-9649-f8d2597dd574.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_1878102065\b33b5721-7963-486a-bc72-8581a8e2c560.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\8f7775e7-b3e8-4b23-b876-70494a73f6d6.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7204_516139461\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 338 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=2176,i,7983970190078579778,15414779449484211005,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2452 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6428 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6688 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6984 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6984 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2280 --field-trial-handle=2068,i,13160541813465607293,2712023220913971906,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2020,i,12803728955632511086,9893143217689161617,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=7080 --field-trial-handle=2108,i,175679224649341972,9737569458968521055,262144 /prefetch:8
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2324 -parentBuildID 20230927232528 -prefsHandle 2264 -prefMapHandle 2260 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2c51076-e2ba-496a-8a5d-bad7f0b747df} 7172 "\\.\pipe\gecko-crash-server-pipe.7172" 1e9e0c6d310 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3504 -parentBuildID 20230927232528 -prefsHandle 2852 -prefMapHandle 3480 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {df1c462e-2999-4128-a5ee-18d3d60123b5} 7172 "\\.\pipe\gecko-crash-server-pipe.7172" 1e9f2c64d10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5652 -prefMapHandle 5592 -prefsLen 33976 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e87c3b9e-4be0-4f77-84ea-de9f8ccec19d} 7172 "\\.\pipe\gecko-crash-server-pipe.7172" 1e9f2c92110 utility
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://duckduckgo.com/ac/?q=
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://csp.withgoogle.com/csp/report-to/apps-themes
unknown
http://www.fontbureau.com/designers
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://docs.google.com/
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://drive-daily-2.corp.google.com/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://exslt.org/dates-and-times
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.251.35.164
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://shavar.services.mozilla.com/
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://chrome.google.com/webstore/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
216.58.206.65
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
unknown
https://play.google.com
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.openh264.org/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
chrome.cloudflare-dns.com
172.64.41.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
sni1gl.wpc.nucdn.net
152.199.21.175
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
googlehosted.l.googleusercontent.com
216.58.206.65
s-part-0032.t-0009.t-msedge.net
13.107.246.60
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
spocs.getpocket.com
unknown
detectportal.firefox.com
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
shavar.services.mozilla.com
unknown
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.107.246.40
unknown
United States
152.195.19.97
unknown
United States
192.168.2.4
unknown
unknown
13.107.246.60
s-part-0032.t-0009.t-msedge.net
United States
142.250.81.238
unknown
United States
23.59.250.96
unknown
United States
162.159.61.3
unknown
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.23
services.addons.mozilla.org
United States
23.223.209.207
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
142.251.35.170
unknown
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
216.58.206.65
googlehosted.l.googleusercontent.com
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
239.255.255.250
unknown
Reserved
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
142.251.35.164
unknown
United States
127.0.0.1
unknown
unknown
172.253.115.84
unknown
United States
There are 14 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
lw_13bbe73648289fe96dfa1aa1bf23b3da
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
Enabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ProfileErrorState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
EnhancedLinkOpeningDefault
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66632
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 198 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E9F2E74000
trusted library allocation
page read and write
EEE210E000
stack
page read and write
130C8A30000
unkown
page execute read
1E9F40A9000
trusted library allocation
page read and write
1E9F363C000
trusted library allocation
page read and write
1E9ECBB1000
trusted library allocation
page read and write
2D8D7803000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F40C0000
trusted library allocation
page read and write
130C8919000
trusted library allocation
page read and write
1E9FA9ED000
trusted library allocation
page read and write
1E9F2EE7000
trusted library allocation
page read and write
130C93E0000
heap
page read and write
28D05B0D000
trusted library allocation
page read and write
1E9ECDE1000
trusted library allocation
page read and write
1E9F9CD1000
trusted library allocation
page read and write
1E9F9F99000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9FA688000
trusted library allocation
page read and write
1E9F0D27000
trusted library allocation
page read and write
1E9ECDDD000
trusted library allocation
page read and write
1E9F0A78000
trusted library allocation
page read and write
1E9F0881000
heap
page read and write
1E9EEC55000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F18C0000
trusted library allocation
page read and write
130C9769000
heap
page read and write
1E9EC182000
heap
page read and write
1E9ECDC8000
trusted library allocation
page read and write
1E9F0AF4000
trusted library allocation
page read and write
1E9FA3D6000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1593000
heap
page read and write
1E9F17C8000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9F2A49000
trusted library allocation
page read and write
1593000
heap
page read and write
1E9FADEE000
trusted library allocation
page read and write
1E9F4099000
trusted library allocation
page read and write
1E9F08AC000
heap
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9FA390000
trusted library allocation
page read and write
1E9FAAA7000
trusted library allocation
page read and write
1E9EDBBD000
trusted library allocation
page read and write
1E9F085C000
heap
page read and write
1E9F0AC5000
trusted library allocation
page read and write
1E9F36D8000
trusted library allocation
page read and write
1E9FA6FE000
trusted library allocation
page read and write
1E9F0894000
heap
page read and write
1E9F0DD9000
trusted library allocation
page read and write
1E9FABF8000
trusted library allocation
page read and write
1E9F0BA8000
trusted library allocation
page read and write
1E9F25EC000
trusted library allocation
page read and write
1E9EE1CC000
trusted library allocation
page read and write
1E9F0626000
trusted library allocation
page read and write
1E9F34F3000
trusted library allocation
page read and write
1E9FA7C9000
trusted library allocation
page read and write
1E9EDCEB000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9F12E0000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9F30F2000
trusted library allocation
page read and write
1E9FA73C000
trusted library allocation
page read and write
1E9F9F5F000
trusted library allocation
page read and write
1E9F2E74000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
1E9F09D8000
trusted library allocation
page read and write
1E9F2FDA000
trusted library allocation
page read and write
1E9FA7FA000
trusted library allocation
page read and write
1E9F2EBE000
trusted library allocation
page read and write
1E9F2E3E000
trusted library allocation
page read and write
1E9F9FFE000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F3445000
trusted library allocation
page read and write
1E9FB47D000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9F34B3000
trusted library allocation
page read and write
1E9ECA13000
trusted library allocation
page read and write
1E9EDFFB000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F0AED000
trusted library allocation
page read and write
1E9F46FE000
trusted library allocation
page read and write
1E9F30D0000
trusted library allocation
page read and write
38B0000
heap
page read and write
1E9EC39E000
trusted library allocation
page read and write
1E9FAB14000
trusted library allocation
page read and write
1E9F2EBE000
trusted library allocation
page read and write
1E9FBCB8000
heap
page read and write
1E9F36DE000
trusted library allocation
page read and write
1E9F34ED000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC171000
heap
page read and write
1E9FA493000
trusted library allocation
page read and write
1E9F0518000
trusted library allocation
page read and write
1E9F9C8E000
trusted library allocation
page read and write
1E9FA475000
trusted library allocation
page read and write
1E9FABD6000
trusted library allocation
page read and write
1E9EDBC9000
trusted library allocation
page read and write
1E9EEC8F000
trusted library allocation
page read and write
1E9FABC3000
trusted library allocation
page read and write
1E9ECB26000
trusted library allocation
page read and write
1E9F9CDC000
trusted library allocation
page read and write
1E9EDBEE000
trusted library allocation
page read and write
1E9FA3E3000
trusted library allocation
page read and write
120E000
stack
page read and write
1E9EE36D000
trusted library allocation
page read and write
1E9EC186000
heap
page read and write
1E9F365C000
trusted library allocation
page read and write
1E9F4689000
trusted library allocation
page read and write
1E9F35A1000
trusted library allocation
page read and write
1E9FB478000
trusted library allocation
page read and write
1556000
heap
page read and write
1E9F357D000
trusted library allocation
page read and write
1E9EC352000
trusted library allocation
page read and write
1E9F46B7000
trusted library allocation
page read and write
1E9FBBE9000
trusted library allocation
page read and write
1E9F4043000
trusted library allocation
page read and write
1E9F3666000
trusted library allocation
page read and write
1E9EDB05000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F09CF000
trusted library allocation
page read and write
1E9FACB1000
trusted library allocation
page read and write
1E9F2E7A000
trusted library allocation
page read and write
1E9F0D40000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F34AD000
trusted library allocation
page read and write
1E9F4692000
trusted library allocation
page read and write
1E9ECB7B000
trusted library allocation
page read and write
1E9FA7B2000
trusted library allocation
page read and write
1E9FADA1000
trusted library allocation
page read and write
1E9FA79E000
trusted library allocation
page read and write
1E9F2F8D000
trusted library allocation
page read and write
1E9F3436000
trusted library allocation
page read and write
1E9F9CC1000
trusted library allocation
page read and write
1E9FA4B4000
trusted library allocation
page read and write
1E9EDA93000
trusted library allocation
page read and write
1E9EC186000
heap
page read and write
1E9EC4DB000
trusted library allocation
page read and write
1E9FA60F000
trusted library allocation
page read and write
1E9FABDD000
trusted library allocation
page read and write
2D8D7616000
trusted library allocation
page read and write
1E9F2F7D000
trusted library allocation
page read and write
1E9EC17D000
heap
page read and write
1E9EDB80000
trusted library allocation
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9EC3B3000
trusted library allocation
page read and write
A8C85D8000
stack
page read and write
1E9EC385000
trusted library allocation
page read and write
1E9FAB6D000
trusted library allocation
page read and write
1E9F36AD000
trusted library allocation
page read and write
1E9F35CC000
trusted library allocation
page read and write
1E9FA712000
trusted library allocation
page read and write
1E9FA9AF000
trusted library allocation
page read and write
1E9ECB0A000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
1E9FAAAE000
trusted library allocation
page read and write
1E9F36F8000
trusted library allocation
page read and write
1E9EC42D000
trusted library allocation
page read and write
1E9F2CA8000
trusted library allocation
page read and write
1E9F0AFD000
trusted library allocation
page read and write
1E9EDC45000
trusted library allocation
page read and write
FDC4DFF000
stack
page read and write
1E9FA67A000
trusted library allocation
page read and write
1E9F0868000
heap
page read and write
130C9781000
heap
page read and write
1E9FA088000
trusted library allocation
page read and write
1E9F3637000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9FAB79000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9FB070000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
130C922B000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F2A28000
trusted library allocation
page read and write
130C8900000
trusted library allocation
page read and write
1E9F2D9A000
trusted library allocation
page read and write
130C93F1000
heap
page read and write
1E9F0A84000
trusted library allocation
page read and write
1E9F12A5000
trusted library allocation
page read and write
1E9FAEC5000
trusted library allocation
page read and write
1E9FAAB6000
trusted library allocation
page read and write
1E9F08BC000
heap
page read and write
1E9F2FA3000
trusted library allocation
page read and write
1E9EDFCD000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA7DF000
trusted library allocation
page read and write
1E9F0985000
trusted library allocation
page read and write
1E9EC487000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9EEA08000
trusted library allocation
page read and write
1E9F308A000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
28D05BCB000
trusted library allocation
page read and write
1E9F2DD0000
trusted library allocation
page read and write
1E9F1376000
trusted library allocation
page read and write
1E9F0857000
heap
page read and write
1E9FA619000
trusted library allocation
page read and write
1E9F30F2000
trusted library allocation
page read and write
130C87AF000
unclassified section
page read and write
1E9F17FE000
trusted library allocation
page read and write
1E9F3063000
trusted library allocation
page read and write
1E9F0A6F000
trusted library allocation
page read and write
1E9FAFD9000
trusted library allocation
page read and write
566BA24000
trusted library allocation
page read and write
1E9F30BC000
trusted library allocation
page read and write
1E9F36D3000
trusted library allocation
page read and write
1E9FB0CF000
trusted library allocation
page read and write
1E9F367C000
trusted library allocation
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9F308A000
trusted library allocation
page read and write
1E9EC923000
trusted library allocation
page read and write
1E9F9F9B000
trusted library allocation
page read and write
1E9EEC8F000
trusted library allocation
page read and write
1E9F3430000
trusted library allocation
page read and write
1E9FA92C000
trusted library allocation
page read and write
1E9F0D69000
trusted library allocation
page read and write
1E9FB0B0000
trusted library allocation
page read and write
1E9F9C5D000
trusted library allocation
page read and write
1E9F0A46000
trusted library allocation
page read and write
1E9EECC5000
trusted library allocation
page read and write
1E9FA3E0000
trusted library allocation
page read and write
1E9FABDE000
trusted library allocation
page read and write
130C898B000
trusted library allocation
page read and write
1E9EC36F000
trusted library allocation
page read and write
1E9FA327000
trusted library allocation
page read and write
1E9FAD88000
trusted library allocation
page read and write
1E9FAACB000
trusted library allocation
page read and write
1E9EDCDB000
trusted library allocation
page read and write
1E9F29F6000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9EC5D9000
trusted library allocation
page read and write
1E9F11D3000
trusted library allocation
page read and write
1E9ECBC6000
trusted library allocation
page read and write
1E9F2F97000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F0B6E000
trusted library allocation
page read and write
1E9F36FE000
trusted library allocation
page read and write
1E9ED92A000
trusted library allocation
page read and write
1E9EDA53000
trusted library allocation
page read and write
1E9F13C1000
trusted library allocation
page read and write
1E9F36CF000
trusted library allocation
page read and write
1E9F13C1000
trusted library allocation
page read and write
1E9FABD6000
trusted library allocation
page read and write
A8C7B1E000
unkown
page readonly
1E9FA4B4000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F2EA6000
trusted library allocation
page read and write
1E9FAADA000
trusted library allocation
page read and write
130C9798000
heap
page read and write
1E9FA51B000
trusted library allocation
page read and write
1E9F0877000
heap
page read and write
1E9F0868000
heap
page read and write
1E9F36D8000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EDABB000
trusted library allocation
page read and write
1E9F40C0000
trusted library allocation
page read and write
1E9F0DC3000
trusted library allocation
page read and write
1E9FAAC8000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
130C87B0000
trusted library section
page readonly
1E9F3063000
trusted library allocation
page read and write
1E9F9FC5000
trusted library allocation
page read and write
1E9F3486000
trusted library allocation
page read and write
2D8D7710000
heap
page read and write
1E9EC194000
heap
page read and write
1E9F1347000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
130C93F1000
heap
page read and write
1E9EC173000
heap
page read and write
1E9F1273000
trusted library allocation
page read and write
1E9F0D54000
trusted library allocation
page read and write
28D05C32000
trusted library allocation
page read and write
1E9EDF06000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC183000
heap
page read and write
1E9FAD44000
trusted library allocation
page read and write
1E9EE317000
trusted library allocation
page read and write
1E9F9FD6000
trusted library allocation
page read and write
1E9EC5EB000
trusted library allocation
page read and write
1E9F9CEF000
trusted library allocation
page read and write
1E9EDAF8000
trusted library allocation
page read and write
1E9F0894000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9F2EE7000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EDAE8000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F0ADD000
trusted library allocation
page read and write
1E9F9F8B000
trusted library allocation
page read and write
3DF1F2E4F000
trusted library allocation
page read and write
1E9F0BA6000
trusted library allocation
page read and write
1E9EE1BB000
trusted library allocation
page read and write
1E9FA296000
trusted library allocation
page read and write
1E9FB900000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F08B5000
heap
page read and write
1E9FAFA5000
trusted library allocation
page read and write
1E9EECE0000
trusted library allocation
page read and write
1E9FB997000
trusted library allocation
page read and write
1E9F3449000
trusted library allocation
page read and write
1E9EE1BB000
trusted library allocation
page read and write
1E9F0BFA000
trusted library allocation
page read and write
1E9FA4AA000
trusted library allocation
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9FBC6D000
heap
page read and write
1E9FABB9000
trusted library allocation
page read and write
1E9ECB30000
trusted library allocation
page read and write
1E9FA4CE000
trusted library allocation
page read and write
1E9F0ADB000
trusted library allocation
page read and write
1E9F30D0000
trusted library allocation
page read and write
1E9F3451000
trusted library allocation
page read and write
1E9FA628000
trusted library allocation
page read and write
DEC000
unkown
page write copy
1E9F25AA000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F46E6000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F40FD000
trusted library allocation
page read and write
1E9F34EF000
trusted library allocation
page read and write
1E9FA659000
trusted library allocation
page read and write
1E9FA4AB000
trusted library allocation
page read and write
1E9F9FB8000
trusted library allocation
page read and write
1E9F08D1000
heap
page read and write
1E9F46B7000
trusted library allocation
page read and write
1E9F3697000
trusted library allocation
page read and write
1E9F30F4000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9FA498000
trusted library allocation
page read and write
130C8A40000
heap
page read and write
1E9EC9F6000
trusted library allocation
page read and write
1E9F258B000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F0D98000
trusted library allocation
page read and write
4A0E000
stack
page read and write
1E9EDFF8000
trusted library allocation
page read and write
1E9FA24A000
trusted library allocation
page read and write
1E9F9C4F000
trusted library allocation
page read and write
1E9FA999000
trusted library allocation
page read and write
1E9FAC43000
trusted library allocation
page read and write
1E9F0AFD000
trusted library allocation
page read and write
130C93A1000
heap
page read and write
1E9ECB56000
trusted library allocation
page read and write
1E9F47BB000
trusted library allocation
page read and write
28D0594F000
unclassified section
page read and write
1E9EDF09000
trusted library allocation
page read and write
1E9F0D81000
trusted library allocation
page read and write
1E9F2EBE000
trusted library allocation
page read and write
1E9F3055000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FAEFB000
trusted library allocation
page read and write
1E9F35BE000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F0CA5000
trusted library allocation
page read and write
1E9F12EF000
trusted library allocation
page read and write
1E9F11EB000
trusted library allocation
page read and write
1E9FA0DA000
trusted library allocation
page read and write
1E9F36FE000
trusted library allocation
page read and write
1E9F09E7000
trusted library allocation
page read and write
1E9F0C87000
trusted library allocation
page read and write
1E9EC16C000
heap
page read and write
1E9F18C0000
trusted library allocation
page read and write
1E9F0857000
heap
page read and write
1E9F303A000
trusted library allocation
page read and write
28D05B12000
trusted library allocation
page read and write
1E9F26A1000
trusted library allocation
page read and write
1E9ECAEF000
trusted library allocation
page read and write
1E9F2DF8000
trusted library allocation
page read and write
1E9F9CBC000
trusted library allocation
page read and write
1E9EDFF8000
trusted library allocation
page read and write
1E9F1254000
trusted library allocation
page read and write
1E9FA688000
trusted library allocation
page read and write
1E9F258B000
trusted library allocation
page read and write
1E9F46EC000
trusted library allocation
page read and write
1E9FABF8000
trusted library allocation
page read and write
1E9F2F97000
trusted library allocation
page read and write
1E9F12F9000
trusted library allocation
page read and write
1E9F367C000
trusted library allocation
page read and write
1E9EDBFC000
trusted library allocation
page read and write
1E9F1768000
trusted library allocation
page read and write
2D8D766A000
trusted library allocation
page read and write
130C9760000
heap
page read and write
1E9F35C1000
trusted library allocation
page read and write
1E9F36E0000
trusted library allocation
page read and write
1E9F365C000
trusted library allocation
page read and write
1E9EECFB000
trusted library allocation
page read and write
1E9FB0C9000
trusted library allocation
page read and write
1E9F1751000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E9F0857000
heap
page read and write
1E9F099C000
trusted library allocation
page read and write
1E9F2DBB000
trusted library allocation
page read and write
1E9FABAF000
trusted library allocation
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9EDCC1000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F303A000
trusted library allocation
page read and write
1E9F0DD2000
trusted library allocation
page read and write
1E9ECB9B000
trusted library allocation
page read and write
1E9EDC64000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F3486000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
28D05B66000
trusted library allocation
page read and write
1E9F05FA000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F0AEF000
trusted library allocation
page read and write
130C9785000
heap
page read and write
1E9F34EF000
trusted library allocation
page read and write
1E9F09A1000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F099C000
trusted library allocation
page read and write
1E9F3591000
trusted library allocation
page read and write
1E9F1C05000
trusted library allocation
page read and write
1E9F12BA000
trusted library allocation
page read and write
1E9F36AA000
trusted library allocation
page read and write
1E9F0DDF000
trusted library allocation
page read and write
1E9F3432000
trusted library allocation
page read and write
1E9F1354000
trusted library allocation
page read and write
1E9FA7B7000
trusted library allocation
page read and write
1E9FBC4D000
heap
page read and write
1E9EC19A000
heap
page read and write
1E9F0D69000
trusted library allocation
page read and write
28D05730000
remote allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9EC5F2000
trusted library allocation
page read and write
1E9F3015000
trusted library allocation
page read and write
130C895C000
trusted library allocation
page read and write
1E9F0D5B000
trusted library allocation
page read and write
1E9EDBEE000
trusted library allocation
page read and write
1E9F359E000
trusted library allocation
page read and write
1E9F36B6000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F05DA000
trusted library allocation
page read and write
1E9FAAAF000
trusted library allocation
page read and write
1E9F3432000
trusted library allocation
page read and write
1E9F36E0000
trusted library allocation
page read and write
1E9F46B2000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F2ECC000
trusted library allocation
page read and write
1E9F46EC000
trusted library allocation
page read and write
1E9F35B4000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FA995000
trusted library allocation
page read and write
1E9F9CE1000
trusted library allocation
page read and write
1E9F0A84000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F0974000
trusted library allocation
page read and write
1E9F2E7A000
trusted library allocation
page read and write
1E9EECF3000
trusted library allocation
page read and write
1E9F36EB000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9F088A000
heap
page read and write
1E9F08AC000
heap
page read and write
1E9F0AED000
trusted library allocation
page read and write
1E9F25A7000
trusted library allocation
page read and write
1E9F35BC000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FB062000
trusted library allocation
page read and write
1E9EC3DF000
trusted library allocation
page read and write
1E9F0AD6000
trusted library allocation
page read and write
130C8903000
trusted library allocation
page read and write
1E9FABEC000
trusted library allocation
page read and write
1E9EC4DB000
trusted library allocation
page read and write
1E9FA833000
trusted library allocation
page read and write
130C8EC6000
unkown
page execute read
1E9F3637000
trusted library allocation
page read and write
1E9F36E9000
trusted library allocation
page read and write
1E9F0937000
trusted library allocation
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9FBBFB000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F085C000
heap
page read and write
1E9F0651000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
22D4B900000
trusted library allocation
page read and write
1E9FAAB6000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
28D05C14000
trusted library allocation
page read and write
1E9FBC89000
heap
page read and write
1E9F363B000
trusted library allocation
page read and write
1E9FABDE000
trusted library allocation
page read and write
1E9EDFFB000
trusted library allocation
page read and write
1E9FA155000
trusted library allocation
page read and write
1E9F3486000
trusted library allocation
page read and write
1E9F08D1000
heap
page read and write
1E9F0869000
heap
page read and write
1E9EDBE8000
trusted library allocation
page read and write
130C8EB0000
trusted library allocation
page read and write
1E9F9CEF000
trusted library allocation
page read and write
1E9F30DA000
trusted library allocation
page read and write
1E9F361B000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9EC19A000
heap
page read and write
1E9EC173000
heap
page read and write
1E9F1263000
trusted library allocation
page read and write
1E9F17C8000
trusted library allocation
page read and write
1E9F9FDE000
trusted library allocation
page read and write
1E9F3568000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9EC16C000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9ECAFE000
trusted library allocation
page read and write
1E9F11D2000
trusted library allocation
page read and write
1E9F2CFB000
trusted library allocation
page read and write
1E9F2CD0000
trusted library allocation
page read and write
1E9FBCE3000
heap
page read and write
1E9F08C5000
heap
page read and write
1E9F2E80000
trusted library allocation
page read and write
1E9EC5FD000
trusted library allocation
page read and write
1E9EC378000
trusted library allocation
page read and write
1E9EC175000
heap
page read and write
1E9F0899000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F05CB000
trusted library allocation
page read and write
1E9ECB26000
trusted library allocation
page read and write
1E9F1391000
trusted library allocation
page read and write
1E9F3644000
trusted library allocation
page read and write
1E9FAAE6000
trusted library allocation
page read and write
130C86F0000
heap
page read and write
1E9EEC98000
trusted library allocation
page read and write
1E9EC198000
heap
page read and write
130C9200000
trusted library allocation
page read and write
1E9FB0C1000
trusted library allocation
page read and write
1E9FA91A000
trusted library allocation
page read and write
1568000
heap
page read and write
1E9F0D7B000
trusted library allocation
page read and write
1E9F057A000
trusted library allocation
page read and write
1E9F11CE000
trusted library allocation
page read and write
1E9FA613000
trusted library allocation
page read and write
1E9F9FAE000
trusted library allocation
page read and write
1E9EDB8F000
trusted library allocation
page read and write
1E9F46B2000
trusted library allocation
page read and write
1E9F2E17000
trusted library allocation
page read and write
1E9FA2BF000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9EC176000
heap
page read and write
1E9FA6DC000
trusted library allocation
page read and write
1E9EDCAA000
trusted library allocation
page read and write
1E9F0881000
heap
page read and write
1E9FA7DC000
trusted library allocation
page read and write
1E9F472F000
trusted library allocation
page read and write
1E9FAD9C000
trusted library allocation
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9F46EE000
trusted library allocation
page read and write
1E9FA774000
trusted library allocation
page read and write
1E9FA1AA000
trusted library allocation
page read and write
1E9EC174000
heap
page read and write
1E9FA833000
trusted library allocation
page read and write
1E9FA4A5000
trusted library allocation
page read and write
1E9FA53B000
trusted library allocation
page read and write
1E9FA152000
trusted library allocation
page read and write
28D0574B000
remote allocation
page execute read
1E9F08D1000
heap
page read and write
1E9F9FCF000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F127D000
trusted library allocation
page read and write
1E9F2E17000
trusted library allocation
page read and write
1E9F2E80000
trusted library allocation
page read and write
1E9F2ED6000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F34F3000
trusted library allocation
page read and write
2D8D7402000
unclassified section
page read and write
1E9F0A66000
trusted library allocation
page read and write
1E9F2DE6000
trusted library allocation
page read and write
1E9F0868000
heap
page read and write
1E9EC176000
heap
page read and write
1E9FA67A000
trusted library allocation
page read and write
1E9F0A65000
trusted library allocation
page read and write
1E9F0CFA000
trusted library allocation
page read and write
1E9F30F4000
trusted library allocation
page read and write
1E9F2D65000
trusted library allocation
page read and write
1E9FA78A000
trusted library allocation
page read and write
1E9F30D7000
trusted library allocation
page read and write
28D05B00000
trusted library allocation
page read and write
1E9ECD8E000
trusted library allocation
page read and write
1E9F9FD2000
trusted library allocation
page read and write
1E9F12FD000
trusted library allocation
page read and write
1E9F0D72000
trusted library allocation
page read and write
1E9F3504000
trusted library allocation
page read and write
1E9F2F8D000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9FA7DC000
trusted library allocation
page read and write
1E9EC41F000
trusted library allocation
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9F364A000
trusted library allocation
page read and write
1E9F46EA000
trusted library allocation
page read and write
1E9F05CF000
trusted library allocation
page read and write
1E9ECDF4000
trusted library allocation
page read and write
1E9FA0EA000
trusted library allocation
page read and write
1E9FADD1000
trusted library allocation
page read and write
1E9F13A5000
trusted library allocation
page read and write
1E9F138A000
trusted library allocation
page read and write
1E9FBC47000
heap
page read and write
1E9F9CD5000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9FA493000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F13D6000
trusted library allocation
page read and write
1E9F36A0000
trusted library allocation
page read and write
1E9F9FA8000
trusted library allocation
page read and write
1E9ECBC4000
trusted library allocation
page read and write
1E9F12E0000
trusted library allocation
page read and write
1E9F3430000
trusted library allocation
page read and write
130C8550000
unclassified section
page readonly
1E9F4027000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F0860000
heap
page read and write
1E9F0D54000
trusted library allocation
page read and write
1E9F0AF6000
trusted library allocation
page read and write
2D8D7700000
heap
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9F0D7B000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
EEE547E000
unkown
page readonly
130C9363000
heap
page read and write
1E9F2E74000
trusted library allocation
page read and write
1E9EDA6D000
trusted library allocation
page read and write
1E9F2FD5000
trusted library allocation
page read and write
1E9EC16E000
heap
page read and write
1E9EEC8F000
trusted library allocation
page read and write
1E9F34ED000
trusted library allocation
page read and write
28D05C00000
trusted library allocation
page read and write
1E9F46E3000
trusted library allocation
page read and write
1E9F35AB000
trusted library allocation
page read and write
1E9F29CF000
trusted library allocation
page read and write
1E9F25D7000
trusted library allocation
page read and write
1E9F36F8000
trusted library allocation
page read and write
1E9F12F7000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9F36E9000
trusted library allocation
page read and write
1E9F36AD000
trusted library allocation
page read and write
1E9F12C3000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA699000
trusted library allocation
page read and write
1E9F2EAF000
trusted library allocation
page read and write
1E9F2D9D000
trusted library allocation
page read and write
1E9F3443000
trusted library allocation
page read and write
1E9F4094000
trusted library allocation
page read and write
41CE000
stack
page read and write
1E9ED9C6000
trusted library allocation
page read and write
1593000
heap
page read and write
D21000
unkown
page execute read
1E9F9CC7000
trusted library allocation
page read and write
2D8D7210000
remote allocation
page read and write
1E9FABC7000
trusted library allocation
page read and write
1E9EDCDB000
trusted library allocation
page read and write
1E9EDBF5000
trusted library allocation
page read and write
1E9F0DDE000
trusted library allocation
page read and write
1E9FAF94000
trusted library allocation
page read and write
1E9FAC57000
trusted library allocation
page read and write
1E9EC19C000
heap
page read and write
1E9FBC3F000
heap
page read and write
1E9EEC6B000
trusted library allocation
page read and write
1E9FA7F9000
trusted library allocation
page read and write
1E9EDB63000
trusted library allocation
page read and write
1E9F40A1000
trusted library allocation
page read and write
28D05923000
heap
page read and write
1E9FAD3D000
trusted library allocation
page read and write
1E9EDAF8000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EDBC9000
trusted library allocation
page read and write
1E9EDA77000
trusted library allocation
page read and write
1E9EC44C000
trusted library allocation
page read and write
1E9F9FA0000
trusted library allocation
page read and write
1E9FB034000
trusted library allocation
page read and write
1E9F4695000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9F0A7E000
trusted library allocation
page read and write
528D000
stack
page read and write
1E9EC176000
heap
page read and write
3771000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9EC176000
heap
page read and write
1E9FAEFD000
trusted library allocation
page read and write
1E9F0CFE000
trusted library allocation
page read and write
1E9F25AA000
trusted library allocation
page read and write
1E9FA4C3000
trusted library allocation
page read and write
1E9F0BB1000
trusted library allocation
page read and write
1E9F05B0000
trusted library allocation
page read and write
28D05A00000
trusted library allocation
page read and write
1E9F0580000
trusted library allocation
page read and write
1E9F3624000
trusted library allocation
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9F34BB000
trusted library allocation
page read and write
1E9F0866000
heap
page read and write
1E9F1786000
trusted library allocation
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9F9CE1000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FBBFB000
trusted library allocation
page read and write
1E9F1B24000
trusted library allocation
page read and write
1E9F0860000
heap
page read and write
1E9EECF1000
trusted library allocation
page read and write
1E9F4055000
trusted library allocation
page read and write
1E9F1391000
trusted library allocation
page read and write
1E9F3599000
trusted library allocation
page read and write
1E9F9FFE000
trusted library allocation
page read and write
2D8D76F0000
trusted library allocation
page read and write
1E9F05B3000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F4080000
trusted library allocation
page read and write
1E9EE32C000
trusted library allocation
page read and write
1E9EC381000
trusted library allocation
page read and write
1E9F0D42000
trusted library allocation
page read and write
1E9ECB42000
trusted library allocation
page read and write
1E9EEC98000
trusted library allocation
page read and write
1E9F36D1000
trusted library allocation
page read and write
1E9F9FAE000
trusted library allocation
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F35AF000
trusted library allocation
page read and write
1E9F0896000
heap
page read and write
1E9F3445000
trusted library allocation
page read and write
1E9F17FE000
trusted library allocation
page read and write
1E9F0868000
heap
page read and write
1E9F2DA8000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F0860000
heap
page read and write
1E9FA475000
trusted library allocation
page read and write
1E9FA479000
trusted library allocation
page read and write
1E9F0860000
heap
page read and write
1E9F30D0000
trusted library allocation
page read and write
DEC000
unkown
page read and write
1E9FB0F5000
trusted library allocation
page read and write
1E9EC164000
heap
page read and write
1E9F0DA5000
trusted library allocation
page read and write
1E9F46A2000
trusted library allocation
page read and write
1E9F2F5F000
trusted library allocation
page read and write
1E9EDFC9000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F0CFA000
trusted library allocation
page read and write
1E9F46F0000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9FA999000
trusted library allocation
page read and write
1E9F2DAD000
trusted library allocation
page read and write
1E9F2FCD000
trusted library allocation
page read and write
EEE647E000
unkown
page readonly
1E9F29DE000
trusted library allocation
page read and write
1E9FC348000
trusted library allocation
page read and write
1E9FA2AC000
trusted library allocation
page read and write
1E9F0D83000
trusted library allocation
page read and write
1E9F358B000
trusted library allocation
page read and write
1E9F4699000
trusted library allocation
page read and write
1E9F0DD1000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FBBDF000
trusted library allocation
page read and write
1E9F3494000
trusted library allocation
page read and write
1E9F09AD000
trusted library allocation
page read and write
1E9F0DBF000
trusted library allocation
page read and write
2D8D74E0000
heap
page read and write
1E9EDC3B000
trusted library allocation
page read and write
1E9ECDC8000
trusted library allocation
page read and write
1E9F0881000
heap
page read and write
1E9F9FED000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9FB07A000
trusted library allocation
page read and write
1E9FA91E000
trusted library allocation
page read and write
1E9F09D8000
trusted library allocation
page read and write
1E9EDAF8000
trusted library allocation
page read and write
1E9EDFF8000
trusted library allocation
page read and write
1E9F1246000
trusted library allocation
page read and write
1E9F2D7B000
trusted library allocation
page read and write
1E9F0AFA000
trusted library allocation
page read and write
1E9F3697000
trusted library allocation
page read and write
1E9FBBF6000
trusted library allocation
page read and write
1E9EDCC7000
trusted library allocation
page read and write
1E9F3011000
trusted library allocation
page read and write
1E9FAFCC000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9FABDC000
trusted library allocation
page read and write
1E9EDBF9000
trusted library allocation
page read and write
1E9ECDC4000
trusted library allocation
page read and write
15BE000
heap
page read and write
1E9F0A75000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9FACBB000
trusted library allocation
page read and write
1E9F34D8000
trusted library allocation
page read and write
1E9F0AD1000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F13A5000
trusted library allocation
page read and write
1E9EC198000
heap
page read and write
1E9F17D2000
trusted library allocation
page read and write
1E9F3481000
trusted library allocation
page read and write
1E9EEC70000
trusted library allocation
page read and write
1E9FB070000
trusted library allocation
page read and write
15D6000
heap
page read and write
1E9F0D8B000
trusted library allocation
page read and write
1E9F0A57000
trusted library allocation
page read and write
1E9EDB63000
trusted library allocation
page read and write
23F961C0000
heap
page read and write
1E9EC186000
heap
page read and write
1E9F08AC000
heap
page read and write
1E9F30D7000
trusted library allocation
page read and write
1E9F138E000
trusted library allocation
page read and write
130C93A8000
heap
page read and write
23F960D0000
heap
page read and write
1E9FA761000
trusted library allocation
page read and write
1E9F1289000
trusted library allocation
page read and write
1E9F138E000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9F9BAD000
trusted library allocation
page read and write
1E9F0DF5000
trusted library allocation
page read and write
1E9F468B000
trusted library allocation
page read and write
1E9F12E4000
trusted library allocation
page read and write
1E9EC18A000
heap
page read and write
1E9FAAB7000
trusted library allocation
page read and write
1E9F0874000
heap
page read and write
130C8923000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E12DFE000
unkown
page readonly
1E9EC173000
heap
page read and write
1E9F1265000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
1E9FADFC000
trusted library allocation
page read and write
1E9F40D6000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9EE381000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F2DCD000
trusted library allocation
page read and write
1E9FA1B6000
trusted library allocation
page read and write
28D05B96000
trusted library allocation
page read and write
11CF000
stack
page read and write
1E9FA775000
trusted library allocation
page read and write
1E9F0CFE000
trusted library allocation
page read and write
1E9F12E0000
trusted library allocation
page read and write
130C977B000
heap
page read and write
1E9F0ADD000
trusted library allocation
page read and write
1E9EDB73000
trusted library allocation
page read and write
1E9FAB35000
trusted library allocation
page read and write
28D05BEB000
trusted library allocation
page read and write
1E9EC1A0000
heap
page read and write
1E9EC194000
heap
page read and write
2D8D740F000
unclassified section
page read and write
1E9F3025000
trusted library allocation
page read and write
130C89B4000
trusted library allocation
page read and write
130C8F70000
heap
page read and write
1E9EDF62000
trusted library allocation
page read and write
1E9FACD9000
trusted library allocation
page read and write
1E9FA68F000
trusted library allocation
page read and write
1E9F347D000
trusted library allocation
page read and write
1E9FA2B6000
trusted library allocation
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9EDF3D000
trusted library allocation
page read and write
1E9FAD5E000
trusted library allocation
page read and write
1E9F30E3000
trusted library allocation
page read and write
A8C9DFE000
unkown
page readonly
1E9FAAFD000
trusted library allocation
page read and write
1E9F2FD5000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F0CAA000
trusted library allocation
page read and write
1E9F13D6000
trusted library allocation
page read and write
1E9FC326000
trusted library allocation
page read and write
1E9F369C000
trusted library allocation
page read and write
1E9EDC48000
trusted library allocation
page read and write
1E9F2D9C000
trusted library allocation
page read and write
1E9FA3E3000
trusted library allocation
page read and write
1E9F0AFB000
trusted library allocation
page read and write
1E9F40B3000
trusted library allocation
page read and write
1E9F0C32000
trusted library allocation
page read and write
1E9F36D3000
trusted library allocation
page read and write
1E9F46B7000
trusted library allocation
page read and write
130C8730000
heap
page read and write
1E9EC1A0000
heap
page read and write
1E9ECD6B000
trusted library allocation
page read and write
1E9F2D5F000
trusted library allocation
page read and write
1E9FAEC9000
trusted library allocation
page read and write
1E9F36EB000
trusted library allocation
page read and write
1E9EEC7F000
trusted library allocation
page read and write
1E9F0D81000
trusted library allocation
page read and write
1E9F3061000
trusted library allocation
page read and write
1E9EDAEA000
trusted library allocation
page read and write
1E9F1287000
trusted library allocation
page read and write
1E9EC1A0000
heap
page read and write
1E9FA7A0000
trusted library allocation
page read and write
23F97DAB000
heap
page read and write
130C89FA000
trusted library allocation
page read and write
1E9F47DB000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9ECDAB000
trusted library allocation
page read and write
1E9EC195000
heap
page read and write
1E9FA0BA000
trusted library allocation
page read and write
1E9FA0CB000
trusted library allocation
page read and write
1E9FA995000
trusted library allocation
page read and write
1E9FB977000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FAB79000
trusted library allocation
page read and write
1E9F46A7000
trusted library allocation
page read and write
1E9F0A63000
trusted library allocation
page read and write
1E9F9CC7000
trusted library allocation
page read and write
1E9EDF18000
trusted library allocation
page read and write
1E9F36E9000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9EDF62000
trusted library allocation
page read and write
1E9EDC38000
trusted library allocation
page read and write
1E9F12EE000
trusted library allocation
page read and write
1E9EDA9C000
trusted library allocation
page read and write
1E9F4080000
trusted library allocation
page read and write
28D05B7B000
trusted library allocation
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9F09AD000
trusted library allocation
page read and write
1E9F09CF000
trusted library allocation
page read and write
1E9EDBD2000
trusted library allocation
page read and write
1E9FA4A3000
trusted library allocation
page read and write
1E9EC18C000
heap
page read and write
9DD000
stack
page read and write
1E9EDF5D000
trusted library allocation
page read and write
1E9EDFA7000
trusted library allocation
page read and write
1E9FA4AB000
trusted library allocation
page read and write
1E14F7E000
unkown
page readonly
1E9FA183000
trusted library allocation
page read and write
1E9F46E6000
trusted library allocation
page read and write
1E9F2ED6000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EDCA1000
trusted library allocation
page read and write
1E9F2EFC000
trusted library allocation
page read and write
15BE000
heap
page read and write
1E9EC181000
heap
page read and write
1E9F35CF000
trusted library allocation
page read and write
1E9FABAA000
trusted library allocation
page read and write
1E9FA15D000
trusted library allocation
page read and write
1E9F30E5000
trusted library allocation
page read and write
1E9F4048000
trusted library allocation
page read and write
1E9FADE3000
trusted library allocation
page read and write
1E9FB9FB000
trusted library allocation
page read and write
3771000
heap
page read and write
130C8977000
trusted library allocation
page read and write
1E9EC185000
heap
page read and write
1E9F099C000
trusted library allocation
page read and write
1E9F0874000
heap
page read and write
1E9F2D90000
trusted library allocation
page read and write
1E9F0AEF000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9EC1A4000
heap
page read and write
1E9F0D5B000
trusted library allocation
page read and write
1E9F2D70000
trusted library allocation
page read and write
1E9F13C5000
trusted library allocation
page read and write
1E9FA13E000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9FA45F000
trusted library allocation
page read and write
1E9F2E74000
trusted library allocation
page read and write
1E9FC32B000
trusted library allocation
page read and write
1E9F0863000
heap
page read and write
1E9F36FE000
trusted library allocation
page read and write
1E9FA49C000
trusted library allocation
page read and write
1E9EDCBC000
trusted library allocation
page read and write
1E9EC19C000
heap
page read and write
1E9F0D96000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9F05D7000
trusted library allocation
page read and write
1E9F0DBA000
trusted library allocation
page read and write
1E9F2EFC000
trusted library allocation
page read and write
1E9F405D000
trusted library allocation
page read and write
23F961E0000
heap
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9F4031000
trusted library allocation
page read and write
1E9FA629000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F9CF4000
trusted library allocation
page read and write
2D8D74E3000
heap
page read and write
1E9EDBDF000
trusted library allocation
page read and write
130C93F2000
heap
page read and write
1E9EDFF1000
trusted library allocation
page read and write
1E9F2EFC000
trusted library allocation
page read and write
1E9F3486000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9F0874000
heap
page read and write
1E9FB09F000
trusted library allocation
page read and write
1E9F0868000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9EC173000
heap
page read and write
130C976D000
heap
page read and write
1E9EC181000
heap
page read and write
1E9F2F5A000
trusted library allocation
page read and write
1E9F9FED000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F2DF9000
trusted library allocation
page read and write
1E9EC3AA000
trusted library allocation
page read and write
1E9EC186000
heap
page read and write
3DF1F2E89000
trusted library allocation
page read and write
1E9F0881000
heap
page read and write
1E9EC390000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F0CDB000
trusted library allocation
page read and write
1E9F0AB9000
trusted library allocation
page read and write
1E9F13C5000
trusted library allocation
page read and write
1E9EC432000
trusted library allocation
page read and write
2D8D7230000
unclassified section
page readonly
1E9F1924000
trusted library allocation
page read and write
1E9EE381000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9F0D2F000
trusted library allocation
page read and write
1E9F9CE1000
trusted library allocation
page read and write
1E9F3057000
trusted library allocation
page read and write
1E9F185B000
trusted library allocation
page read and write
1E9F2CFB000
trusted library allocation
page read and write
1E9EDAEA000
trusted library allocation
page read and write
1E9F36E5000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9F0D72000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9F35C6000
trusted library allocation
page read and write
1E9F352D000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F4043000
trusted library allocation
page read and write
1E9EDADC000
trusted library allocation
page read and write
23F97DA7000
heap
page read and write
1E9EC46E000
trusted library allocation
page read and write
1E9F11FE000
trusted library allocation
page read and write
1E9ED94A000
trusted library allocation
page read and write
1E9FA151000
trusted library allocation
page read and write
1E9ECBC4000
trusted library allocation
page read and write
1E9EC174000
heap
page read and write
1E9F34FB000
trusted library allocation
page read and write
1E9EDBE8000
trusted library allocation
page read and write
1E9F0DFE000
trusted library allocation
page read and write
28D05D00000
heap
page read and write
1E9FB05D000
trusted library allocation
page read and write
1E9F136E000
trusted library allocation
page read and write
1E9F0DC3000
trusted library allocation
page read and write
1E9F40A1000
trusted library allocation
page read and write
1E9EDB20000
trusted library allocation
page read and write
1E9FA498000
trusted library allocation
page read and write
1E9EE381000
trusted library allocation
page read and write
1E9F343D000
trusted library allocation
page read and write
1E9FA496000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9F0D16000
trusted library allocation
page read and write
1E9EC971000
trusted library allocation
page read and write
1E9F0866000
heap
page read and write
130C9799000
heap
page read and write
1E9EC181000
heap
page read and write
1E9FAC88000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FA7F9000
trusted library allocation
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9F4699000
trusted library allocation
page read and write
1E9FC300000
trusted library allocation
page read and write
1E9EC180000
heap
page read and write
1E9F3486000
trusted library allocation
page read and write
1E9FA7CF000
trusted library allocation
page read and write
130C9797000
heap
page read and write
1E9F3432000
trusted library allocation
page read and write
1E9F0CAA000
trusted library allocation
page read and write
1E9F0534000
trusted library allocation
page read and write
130C93E0000
heap
page read and write
4E8B000
stack
page read and write
1E9F9FC5000
trusted library allocation
page read and write
1E9ECBB5000
trusted library allocation
page read and write
1E9F2E35000
trusted library allocation
page read and write
1E9F30BA000
trusted library allocation
page read and write
130C93FC000
heap
page read and write
1E9EC173000
heap
page read and write
1E9EDBDF000
trusted library allocation
page read and write
1E9F061F000
trusted library allocation
page read and write
1E9FA49F000
trusted library allocation
page read and write
1E9EC5D9000
trusted library allocation
page read and write
1E9FA45F000
trusted library allocation
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FB062000
trusted library allocation
page read and write
1E9EC4AD000
trusted library allocation
page read and write
1E9F0D2F000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA068000
trusted library allocation
page read and write
1E9F3473000
trusted library allocation
page read and write
1E9ECA9F000
trusted library allocation
page read and write
1E9F9CFC000
trusted library allocation
page read and write
1E9F0964000
trusted library allocation
page read and write
2D8D7486000
heap
page read and write
1384000
heap
page read and write
1E9F3666000
trusted library allocation
page read and write
2D8D7410000
heap
page read and write
2D8D7672000
trusted library allocation
page read and write
2D8D71A0000
unclassified section
page readonly
1E9F1C02000
trusted library allocation
page read and write
1E9FB47D000
trusted library allocation
page read and write
1E9FA636000
trusted library allocation
page read and write
1E9FA7B4000
trusted library allocation
page read and write
1E9F344A000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F4744000
trusted library allocation
page read and write
1E9FBCBC000
heap
page read and write
1E9F175D000
trusted library allocation
page read and write
2D8D71B0000
unclassified section
page readonly
1E9F0CFE000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9ECDC1000
trusted library allocation
page read and write
1E9F36A7000
trusted library allocation
page read and write
130C935F000
heap
page read and write
DE2000
unkown
page readonly
1E9F05DC000
trusted library allocation
page read and write
1E12EBE000
stack
page read and write
1E9F47F2000
trusted library allocation
page read and write
1E9F46A6000
trusted library allocation
page read and write
1E9F0A0C000
trusted library allocation
page read and write
1E9F25C3000
trusted library allocation
page read and write
1E9F36FE000
trusted library allocation
page read and write
130C8980000
trusted library allocation
page read and write
1E9FA944000
trusted library allocation
page read and write
1E9FAF94000
trusted library allocation
page read and write
1E9F18C0000
trusted library allocation
page read and write
2D8D790C000
trusted library allocation
page read and write
1E9F9CEB000
trusted library allocation
page read and write
1E9F4090000
trusted library allocation
page read and write
1E9ED9B4000
trusted library allocation
page read and write
1E9FA90F000
trusted library allocation
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9FA67A000
trusted library allocation
page read and write
1E9F05F7000
trusted library allocation
page read and write
1E9EC186000
heap
page read and write
1E9F343D000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F12EA000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F2FAD000
trusted library allocation
page read and write
1E9F3441000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9F9F63000
trusted library allocation
page read and write
1E9F18A8000
trusted library allocation
page read and write
1E9FAAC8000
trusted library allocation
page read and write
1E9F0D9D000
trusted library allocation
page read and write
1E9F2F6A000
trusted library allocation
page read and write
1E9F0D81000
trusted library allocation
page read and write
1E9F0D8F000
trusted library allocation
page read and write
1E9F46A2000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9F0B1F000
trusted library allocation
page read and write
1E9F30E3000
trusted library allocation
page read and write
1E9EDB6E000
trusted library allocation
page read and write
1E9F2F91000
trusted library allocation
page read and write
28D05920000
heap
page read and write
1E9F409D000
trusted library allocation
page read and write
1E9F2CE1000
trusted library allocation
page read and write
1E9FAB44000
trusted library allocation
page read and write
1E9F0A28000
trusted library allocation
page read and write
1E9FABCE000
trusted library allocation
page read and write
1E9EECEC000
trusted library allocation
page read and write
1E9ECBC8000
trusted library allocation
page read and write
1E9F0981000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9FBC01000
heap
page read and write
1E9FAABD000
trusted library allocation
page read and write
1E9FAAB7000
trusted library allocation
page read and write
130C9203000
trusted library allocation
page read and write
1E9F0DEC000
trusted library allocation
page read and write
1E9F25CF000
trusted library allocation
page read and write
1E9F0D84000
trusted library allocation
page read and write
1E9F305B000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA07F000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
DF4000
unkown
page readonly
1E9F4027000
trusted library allocation
page read and write
1E9F2E80000
trusted library allocation
page read and write
130C87A0000
unclassified section
page read and write
1E9F2EFC000
trusted library allocation
page read and write
1E9ECA1B000
trusted library allocation
page read and write
1E9EC174000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9ECAFE000
trusted library allocation
page read and write
130C93ED000
heap
page read and write
1E9EC176000
heap
page read and write
1E9EEC98000
trusted library allocation
page read and write
1E9F9C76000
trusted library allocation
page read and write
1E9FAB5B000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F0DCF000
trusted library allocation
page read and write
1E9EC1A4000
heap
page read and write
EEE443E000
stack
page read and write
1E9F9B5B000
trusted library allocation
page read and write
1E9FBBE9000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F9CF7000
trusted library allocation
page read and write
130C936C000
heap
page read and write
1E9FAAAF000
trusted library allocation
page read and write
1E9F9FFA000
trusted library allocation
page read and write
1E9F30D0000
trusted library allocation
page read and write
1E9EECD5000
trusted library allocation
page read and write
1E9F0AEF000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F0D42000
trusted library allocation
page read and write
1E9FAAC1000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FAAEF000
trusted library allocation
page read and write
A8C7B9B000
stack
page read and write
1E9EDBF5000
trusted library allocation
page read and write
1E9FAACB000
trusted library allocation
page read and write
1E9F0AB0000
trusted library allocation
page read and write
1E9F05CB000
trusted library allocation
page read and write
1E9F402B000
trusted library allocation
page read and write
1E9EE15D000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F35AF000
trusted library allocation
page read and write
1E9F09A1000
trusted library allocation
page read and write
1E9F34D2000
trusted library allocation
page read and write
1E9F0D5B000
trusted library allocation
page read and write
2D8D765D000
trusted library allocation
page read and write
1E9F0DFD000
trusted library allocation
page read and write
1E9EC9F6000
trusted library allocation
page read and write
1E9F099F000
trusted library allocation
page read and write
28D05B72000
trusted library allocation
page read and write
1E9EDA8B000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FA9A1000
trusted library allocation
page read and write
1E9FAD60000
trusted library allocation
page read and write
1E9FA4C7000
trusted library allocation
page read and write
FDC5DFE000
stack
page read and write
1E9F346D000
trusted library allocation
page read and write
1E9F305D000
trusted library allocation
page read and write
1E9FABDA000
trusted library allocation
page read and write
1E9EDCF6000
trusted library allocation
page read and write
1E9EECFB000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1593000
heap
page read and write
1E9F088A000
heap
page read and write
1E9EC173000
heap
page read and write
1E9ECB9F000
trusted library allocation
page read and write
1E9EC4B5000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
950000
heap
page read and write
1E9F9B92000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F1900000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9EDC9A000
trusted library allocation
page read and write
1E9F46E3000
trusted library allocation
page read and write
1E9EC36D000
trusted library allocation
page read and write
1E9FAC26000
trusted library allocation
page read and write
1E9EECF5000
trusted library allocation
page read and write
1E9F30F4000
trusted library allocation
page read and write
28D05B23000
trusted library allocation
page read and write
1E9F30D0000
trusted library allocation
page read and write
1E9F0B1F000
trusted library allocation
page read and write
1E9EE909000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9EC173000
heap
page read and write
99E000
stack
page read and write
1550000
heap
page read and write
1E9ECB58000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9F1354000
trusted library allocation
page read and write
1E9FACB1000
trusted library allocation
page read and write
1E9F4076000
trusted library allocation
page read and write
1E9EC450000
trusted library allocation
page read and write
1E9EC1A4000
heap
page read and write
1E9EECF5000
trusted library allocation
page read and write
1E9F34A1000
trusted library allocation
page read and write
1E9F2D51000
trusted library allocation
page read and write
1E9ECAB0000
trusted library allocation
page read and write
1E9FA678000
trusted library allocation
page read and write
1E9F0898000
heap
page read and write
1E9F3059000
trusted library allocation
page read and write
1E9FA4AB000
trusted library allocation
page read and write
1E9F29D3000
trusted library allocation
page read and write
1E9F46EA000
trusted library allocation
page read and write
2D8D7250000
heap
page read and write
1E9FA0B2000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F34D2000
trusted library allocation
page read and write
1E9F0D72000
trusted library allocation
page read and write
1E9F4055000
trusted library allocation
page read and write
1E9F2DC4000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9EC384000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FAC13000
trusted library allocation
page read and write
11EB000
stack
page read and write
1E9F3563000
trusted library allocation
page read and write
1E9FAAB7000
trusted library allocation
page read and write
1E9FA7C5000
trusted library allocation
page read and write
1E9EC5F2000
trusted library allocation
page read and write
1E9FB47D000
trusted library allocation
page read and write
1E9FAFA5000
trusted library allocation
page read and write
1E9EC192000
heap
page read and write
1E9F0D46000
trusted library allocation
page read and write
1E9ECDDF000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FA7C4000
trusted library allocation
page read and write
1E9F30C5000
trusted library allocation
page read and write
1E9F9C7A000
trusted library allocation
page read and write
1E9F0D85000
trusted library allocation
page read and write
1E9FABAF000
trusted library allocation
page read and write
1E9F3093000
trusted library allocation
page read and write
130C9360000
heap
page read and write
1E9F362E000
trusted library allocation
page read and write
1E9FA90B000
trusted library allocation
page read and write
130C892F000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9FAAC6000
trusted library allocation
page read and write
1E9FAD77000
trusted library allocation
page read and write
1E9F17DF000
trusted library allocation
page read and write
1E9FB98F000
trusted library allocation
page read and write
1E9F18DD000
trusted library allocation
page read and write
1E9F1273000
trusted library allocation
page read and write
1E9FB050000
trusted library allocation
page read and write
1E9F2EE7000
trusted library allocation
page read and write
1E9F305D000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F46A6000
trusted library allocation
page read and write
1E9F9F9D000
trusted library allocation
page read and write
1E9F40C6000
trusted library allocation
page read and write
1E9F0673000
trusted library allocation
page read and write
1E9FA4E7000
trusted library allocation
page read and write
1E9ECD24000
trusted library allocation
page read and write
1E9F2EAF000
trusted library allocation
page read and write
1E9F2AB2000
trusted library allocation
page read and write
130C8780000
heap
page readonly
1E9ECDEA000
trusted library allocation
page read and write
A8CCF3E000
unkown
page readonly
1E9ECAD2000
trusted library allocation
page read and write
1E9F9CDC000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9F2FD5000
trusted library allocation
page read and write
1E9EC5E0000
trusted library allocation
page read and write
1E9FA316000
trusted library allocation
page read and write
1E9F30DA000
trusted library allocation
page read and write
1E9F0962000
trusted library allocation
page read and write
1E9EC5DC000
trusted library allocation
page read and write
1E9F3697000
trusted library allocation
page read and write
1E9EDBBD000
trusted library allocation
page read and write
1E9ED9D9000
trusted library allocation
page read and write
1E9F2ED6000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EDAEF000
trusted library allocation
page read and write
1E9F3656000
trusted library allocation
page read and write
1E9F2DA8000
trusted library allocation
page read and write
1E9F0C12000
trusted library allocation
page read and write
1E9F0ADB000
trusted library allocation
page read and write
1E9F1783000
trusted library allocation
page read and write
1E9FBBDD000
trusted library allocation
page read and write
1E9F08D0000
heap
page read and write
1E9F0D81000
trusted library allocation
page read and write
1E9EE409000
trusted library allocation
page read and write
1E9EEC59000
trusted library allocation
page read and write
1E9FBC6B000
heap
page read and write
1E9F36D3000
trusted library allocation
page read and write
1E9EC186000
heap
page read and write
1E9F35CC000
trusted library allocation
page read and write
1E9F357D000
trusted library allocation
page read and write
1E9FA145000
trusted library allocation
page read and write
1E9FA9C3000
trusted library allocation
page read and write
1E9ECDC4000
trusted library allocation
page read and write
1E9F36DE000
trusted library allocation
page read and write
52B0000
heap
page read and write
22D4B600000
heap
page read and write
1E9FB8C3000
trusted library allocation
page read and write
3781000
heap
page read and write
1E9F1249000
trusted library allocation
page read and write
1E9F2ED6000
trusted library allocation
page read and write
1E9FA23C000
trusted library allocation
page read and write
130C935C000
heap
page read and write
1E9FA99C000
trusted library allocation
page read and write
1E9F0DFA000
trusted library allocation
page read and write
28D05B7D000
trusted library allocation
page read and write
1E9EDBCC000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F25A0000
trusted library allocation
page read and write
1E9EDCC1000
trusted library allocation
page read and write
2D8D72E0000
heap
page read and write
1E9FADEE000
trusted library allocation
page read and write
1E9EC180000
heap
page read and write
1E9F2F9A000
trusted library allocation
page read and write
1E9F35B4000
trusted library allocation
page read and write
1E9F0939000
trusted library allocation
page read and write
1E9F099C000
trusted library allocation
page read and write
1E9F357D000
trusted library allocation
page read and write
8EA000
stack
page read and write
1E9F46E8000
trusted library allocation
page read and write
1E9F46F2000
trusted library allocation
page read and write
1E9FAAD1000
trusted library allocation
page read and write
1DA8B1404000
trusted library allocation
page read and write
1E9FA617000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
28D05B98000
trusted library allocation
page read and write
1E9FA305000
trusted library allocation
page read and write
1E9F0D72000
trusted library allocation
page read and write
1E9F3494000
trusted library allocation
page read and write
1E9EEC70000
trusted library allocation
page read and write
28D05BAD000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F0DE4000
trusted library allocation
page read and write
1E9EE708000
trusted library allocation
page read and write
1E9F258B000
trusted library allocation
page read and write
1E9FBC45000
heap
page read and write
1E9FA0A5000
trusted library allocation
page read and write
1E9FA4BA000
trusted library allocation
page read and write
1E9F36DE000
trusted library allocation
page read and write
1EC0003F000
trusted library allocation
page read and write
1E9F34B3000
trusted library allocation
page read and write
1E9FA66F000
trusted library allocation
page read and write
23F965E5000
heap
page read and write
1E9EE409000
trusted library allocation
page read and write
23F96270000
heap
page read and write
1E9EDBDF000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F0D46000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9FA483000
trusted library allocation
page read and write
1E9EC185000
heap
page read and write
1E9F30E5000
trusted library allocation
page read and write
1E9FA672000
trusted library allocation
page read and write
1E9F3473000
trusted library allocation
page read and write
130C896F000
trusted library allocation
page read and write
1E9EE609000
trusted library allocation
page read and write
A8CAEBE000
unkown
page readonly
1E9EC388000
trusted library allocation
page read and write
1E9F13C5000
trusted library allocation
page read and write
1E9ECDC1000
trusted library allocation
page read and write
1E9FA288000
trusted library allocation
page read and write
1E9F9F5D000
trusted library allocation
page read and write
1E9F0AE6000
trusted library allocation
page read and write
1E9F40BE000
trusted library allocation
page read and write
1E9F2D90000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E9F348C000
trusted library allocation
page read and write
1E9F46F0000
trusted library allocation
page read and write
1E12E3D000
stack
page read and write
1E9F34FB000
trusted library allocation
page read and write
1E9F0877000
heap
page read and write
1E9F30F2000
trusted library allocation
page read and write
1E9F3481000
trusted library allocation
page read and write
15D6000
heap
page read and write
1384000
heap
page read and write
1E9EDA7A000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E1377E000
stack
page read and write
1E9EC181000
heap
page read and write
1E9EC16F000
heap
page read and write
1E9F356D000
trusted library allocation
page read and write
1E9ED946000
trusted library allocation
page read and write
1E9F0DDA000
trusted library allocation
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9EC18A000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9FA63B000
trusted library allocation
page read and write
1E9F359B000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F305F000
trusted library allocation
page read and write
28D05B10000
trusted library allocation
page read and write
1E9F0D7B000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F3530000
trusted library allocation
page read and write
15A0000
heap
page read and write
3771000
heap
page read and write
1E9FBBE7000
trusted library allocation
page read and write
1E9F9CFC000
trusted library allocation
page read and write
1E9F12FD000
trusted library allocation
page read and write
1E9FB050000
trusted library allocation
page read and write
1E9F11EB000
trusted library allocation
page read and write
1E9EC5B7000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC17A000
heap
page read and write
1E9F46F0000
trusted library allocation
page read and write
1E9FA3CD000
trusted library allocation
page read and write
1E9F46A7000
trusted library allocation
page read and write
1E9F9F59000
trusted library allocation
page read and write
1E9F40CA000
trusted library allocation
page read and write
1E9FAABD000
trusted library allocation
page read and write
2D8D731D000
heap
page read and write
1E9FBBE9000
trusted library allocation
page read and write
1E9FAAA4000
trusted library allocation
page read and write
1E9F0DF7000
trusted library allocation
page read and write
130C97A6000
heap
page read and write
1E9FA9BE000
trusted library allocation
page read and write
1E9EDB87000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F0D42000
trusted library allocation
page read and write
1E9EC19C000
heap
page read and write
1E9F2ECC000
trusted library allocation
page read and write
1E9F2EA6000
trusted library allocation
page read and write
1E9EDCBE000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F4729000
trusted library allocation
page read and write
1E9F0DCA000
trusted library allocation
page read and write
1E9EC4DD000
trusted library allocation
page read and write
1E9F1361000
trusted library allocation
page read and write
1E9FA61E000
trusted library allocation
page read and write
1E9EDBD4000
trusted library allocation
page read and write
1E9F34AD000
trusted library allocation
page read and write
130C9785000
heap
page read and write
1E9FA0FD000
trusted library allocation
page read and write
1E9EDA9E000
trusted library allocation
page read and write
566BA1E000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F06D6000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F36B3000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
28D056C0000
unclassified section
page readonly
1E9F099C000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F2C9E000
trusted library allocation
page read and write
1E9FA254000
trusted library allocation
page read and write
1E9F0DDC000
trusted library allocation
page read and write
215E000
stack
page read and write
1E9F11EB000
trusted library allocation
page read and write
1E9F0572000
trusted library allocation
page read and write
1E9F2FAA000
trusted library allocation
page read and write
1E9FB484000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9F1783000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F3059000
trusted library allocation
page read and write
1E9F361B000
trusted library allocation
page read and write
1E9F0580000
trusted library allocation
page read and write
1E9F12FA000
trusted library allocation
page read and write
1E9F362E000
trusted library allocation
page read and write
2D8D7678000
trusted library allocation
page read and write
A8C7BDE000
stack
page read and write
1E9ECD3E000
trusted library allocation
page read and write
1E9F2D65000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9FA9AB000
trusted library allocation
page read and write
1E9F12FD000
trusted library allocation
page read and write
1E9F099C000
trusted library allocation
page read and write
1E9ECBDF000
trusted library allocation
page read and write
1E9F2D53000
trusted library allocation
page read and write
1E9FABA2000
trusted library allocation
page read and write
A8CAF3E000
unkown
page readonly
22D4B90A000
trusted library allocation
page read and write
1E9F25D7000
trusted library allocation
page read and write
1E9EDFFB000
trusted library allocation
page read and write
1E9F2DA8000
trusted library allocation
page read and write
1E9EC483000
trusted library allocation
page read and write
28D05C1E000
trusted library allocation
page read and write
1E9EECFD000
trusted library allocation
page read and write
1E9F2E80000
trusted library allocation
page read and write
1E9F09CF000
trusted library allocation
page read and write
1E9F088A000
heap
page read and write
1E9F2FDA000
trusted library allocation
page read and write
1E9F34BB000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC48D000
trusted library allocation
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9ECD8E000
trusted library allocation
page read and write
1E9EDA88000
trusted library allocation
page read and write
1E9FA7BC000
trusted library allocation
page read and write
1E9F13BD000
trusted library allocation
page read and write
1E9EDAA7000
trusted library allocation
page read and write
1E9F9C68000
trusted library allocation
page read and write
1E9FA68F000
trusted library allocation
page read and write
130C93FC000
heap
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9EC3C2000
trusted library allocation
page read and write
1E9EDBD2000
trusted library allocation
page read and write
1E9FA459000
trusted library allocation
page read and write
1E9F2D62000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F2E3E000
trusted library allocation
page read and write
1E9F3661000
trusted library allocation
page read and write
1E9F18A8000
trusted library allocation
page read and write
130C97A6000
heap
page read and write
1E9EC181000
heap
page read and write
1E9F0A99000
trusted library allocation
page read and write
1E9F348C000
trusted library allocation
page read and write
1E9F348C000
trusted library allocation
page read and write
1E9F46EE000
trusted library allocation
page read and write
130C93E0000
heap
page read and write
1E9FA9A3000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9FA975000
trusted library allocation
page read and write
1E9F347D000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F30C5000
trusted library allocation
page read and write
1E9FA0BF000
trusted library allocation
page read and write
1E9F13D6000
trusted library allocation
page read and write
23F96262000
heap
page read and write
1E9F2EFC000
trusted library allocation
page read and write
1E9F2F9A000
trusted library allocation
page read and write
1E9FAAA7000
trusted library allocation
page read and write
1E9F361B000
trusted library allocation
page read and write
1E9F2EBE000
trusted library allocation
page read and write
1E9FA3C0000
trusted library allocation
page read and write
1E9EC192000
heap
page read and write
1E9EECEC000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9FA496000
trusted library allocation
page read and write
1E9EC174000
heap
page read and write
1E9F2DB8000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9FAB7B000
trusted library allocation
page read and write
1E9F364A000
trusted library allocation
page read and write
1E9F0D63000
trusted library allocation
page read and write
1385000
heap
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9FA238000
trusted library allocation
page read and write
1E9F47DE000
trusted library allocation
page read and write
EEE2BD8000
stack
page read and write
1E9ECAE4000
trusted library allocation
page read and write
1E9FAAC4000
trusted library allocation
page read and write
1E9EC961000
trusted library allocation
page read and write
1E9FAACB000
trusted library allocation
page read and write
1E9FB947000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9FA47C000
trusted library allocation
page read and write
2D8D76F4000
trusted library allocation
page read and write
1E9F34D8000
trusted library allocation
page read and write
1E9EDC39000
trusted library allocation
page read and write
22D4B5E0000
heap
page read and write
1E9EC198000
heap
page read and write
1E9EE368000
trusted library allocation
page read and write
1E9FB0B2000
trusted library allocation
page read and write
2D8D7630000
trusted library allocation
page read and write
1E9F178B000
trusted library allocation
page read and write
130C86D0000
heap
page read and write
130C938A000
heap
page read and write
1E9EC16D000
heap
page read and write
1E10BFE000
unkown
page readonly
1E9FA9CE000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9FACD2000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FA752000
trusted library allocation
page read and write
1E9EDAA5000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F2DC4000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F2FBF000
trusted library allocation
page read and write
1E9F09DE000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1586000
heap
page read and write
1E9F9CE1000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E9F0C1D000
trusted library allocation
page read and write
1380000
heap
page read and write
130C8948000
trusted library allocation
page read and write
1E9F0A6A000
trusted library allocation
page read and write
1E9F0D63000
trusted library allocation
page read and write
1E9F35F6000
trusted library allocation
page read and write
1E9EC16C000
heap
page read and write
1E9ED9DD000
trusted library allocation
page read and write
1E9FBBE2000
trusted library allocation
page read and write
1E9FA79D000
trusted library allocation
page read and write
1E9F9CE9000
trusted library allocation
page read and write
130C93F1000
heap
page read and write
1E9FAD6C000
trusted library allocation
page read and write
1E9F2EA6000
trusted library allocation
page read and write
11FF000
stack
page read and write
1E9F0D93000
trusted library allocation
page read and write
1E9FAEDA000
trusted library allocation
page read and write
1E9F2D6C000
trusted library allocation
page read and write
1E9FA076000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1585000
heap
page read and write
1E9FB45D000
trusted library allocation
page read and write
1E9F0A84000
trusted library allocation
page read and write
1E9FA094000
trusted library allocation
page read and write
1E9F2DDD000
trusted library allocation
page read and write
130C977B000
heap
page read and write
1E9EC17B000
heap
page read and write
1E9FA49B000
trusted library allocation
page read and write
1E9F0617000
trusted library allocation
page read and write
1E9EC174000
heap
page read and write
1E9F9FAC000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9F3011000
trusted library allocation
page read and write
1E9FAB3F000
trusted library allocation
page read and write
2D8D760C000
trusted library allocation
page read and write
1E9F2FA0000
trusted library allocation
page read and write
1E9FA855000
trusted library allocation
page read and write
1E9F0AE9000
trusted library allocation
page read and write
1E9F0C26000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
15D6000
heap
page read and write
1E9EDF3D000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F40E5000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E9EEC55000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F25C3000
trusted library allocation
page read and write
1E9F9FD6000
trusted library allocation
page read and write
1E9F35D0000
trusted library allocation
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9F308E000
trusted library allocation
page read and write
1E9F3494000
trusted library allocation
page read and write
56FD000
stack
page read and write
130C8A20000
trusted library allocation
page read and write
1E9F2D82000
trusted library allocation
page read and write
1E9F34D8000
trusted library allocation
page read and write
1E9FA44F000
trusted library allocation
page read and write
1E9F347D000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9EDB51000
trusted library allocation
page read and write
1E9FA7E5000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA49F000
trusted library allocation
page read and write
1E9F12F7000
trusted library allocation
page read and write
2D8D7800000
trusted library allocation
page read and write
1E9EE50A000
trusted library allocation
page read and write
1E9F17CC000
trusted library allocation
page read and write
1E9F1C0A000
trusted library allocation
page read and write
1E9EEB08000
trusted library allocation
page read and write
1E9F36D3000
trusted library allocation
page read and write
130C93E6000
heap
page read and write
1E9FA15B000
trusted library allocation
page read and write
130C9785000
heap
page read and write
28D05B47000
trusted library allocation
page read and write
28D05C0C000
trusted library allocation
page read and write
23F97D9A000
heap
page read and write
1E9F2DB8000
trusted library allocation
page read and write
1E9F343B000
trusted library allocation
page read and write
130C8F80000
heap
page read and write
1E9F2D75000
trusted library allocation
page read and write
1E9FAD75000
trusted library allocation
page read and write
1E9FA9A3000
trusted library allocation
page read and write
1E9F4027000
trusted library allocation
page read and write
1E9F0863000
heap
page read and write
130C93FC000
heap
page read and write
15A0000
heap
page read and write
1E9F18ED000
trusted library allocation
page read and write
1E9F9CFC000
trusted library allocation
page read and write
1E9FA7AC000
trusted library allocation
page read and write
1E9F2DAD000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F40B3000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA288000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F40C4000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9FBBF6000
trusted library allocation
page read and write
1E9F35A6000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
1E9F9CC7000
trusted library allocation
page read and write
1E9F46B2000
trusted library allocation
page read and write
1E9EDCF6000
trusted library allocation
page read and write
1E9F36DE000
trusted library allocation
page read and write
1E9F30DA000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
1E9EDA56000
trusted library allocation
page read and write
1E9F4729000
trusted library allocation
page read and write
1E9FA9CE000
trusted library allocation
page read and write
2D8D7611000
trusted library allocation
page read and write
1EC0003F000
trusted library allocation
page read and write
1E9F36A7000
trusted library allocation
page read and write
1E9FB484000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9F0A6A000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EDA9C000
trusted library allocation
page read and write
1E9F25F8000
trusted library allocation
page read and write
1E9FA7CD000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9F11FE000
trusted library allocation
page read and write
1E9FA323000
trusted library allocation
page read and write
1E9F2FAD000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9FA483000
trusted library allocation
page read and write
1E9F35B6000
trusted library allocation
page read and write
1E9EC9FE000
trusted library allocation
page read and write
1E9F2ECC000
trusted library allocation
page read and write
130C9769000
heap
page read and write
1E9F362E000
trusted library allocation
page read and write
3771000
heap
page read and write
1E12E7E000
unkown
page readonly
1E9F136E000
trusted library allocation
page read and write
1E9F4076000
trusted library allocation
page read and write
1E9FA342000
trusted library allocation
page read and write
1E9F402B000
trusted library allocation
page read and write
1E9F13A2000
trusted library allocation
page read and write
1E9F3093000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F9CC7000
trusted library allocation
page read and write
1E9F2EAF000
trusted library allocation
page read and write
DBC000
unkown
page readonly
1E9F17D3000
trusted library allocation
page read and write
2D8D7676000
trusted library allocation
page read and write
1E9FA459000
trusted library allocation
page read and write
1E9F402B000
trusted library allocation
page read and write
1E9F35BC000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F3583000
trusted library allocation
page read and write
1E9F9CE1000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F088D000
heap
page read and write
1E9FAFF7000
trusted library allocation
page read and write
1E9FA4B4000
trusted library allocation
page read and write
1E9F1009000
trusted library allocation
page read and write
1E9FAB7B000
trusted library allocation
page read and write
1E9EC16E000
heap
page read and write
1E9FA0DA000
trusted library allocation
page read and write
1E9F4027000
trusted library allocation
page read and write
2D8D765F000
trusted library allocation
page read and write
1E9EE60F000
trusted library allocation
page read and write
130C85C0000
unclassified section
page readonly
1E9F0BBD000
trusted library allocation
page read and write
1E9FAB00000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F9B51000
trusted library allocation
page read and write
1E9F36B3000
trusted library allocation
page read and write
1E9FAC97000
trusted library allocation
page read and write
1E9F3656000
trusted library allocation
page read and write
1E9F0DD9000
trusted library allocation
page read and write
1E9FA9E5000
trusted library allocation
page read and write
1E9EE36C000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FAAB7000
trusted library allocation
page read and write
1E9FA955000
trusted library allocation
page read and write
1E9FA165000
trusted library allocation
page read and write
1E9F402B000
trusted library allocation
page read and write
1E9F46E8000
trusted library allocation
page read and write
1E1477E000
stack
page read and write
1E9F08B5000
heap
page read and write
1E9F0B54000
trusted library allocation
page read and write
1E9F0DAB000
trusted library allocation
page read and write
1E9F35B4000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FAABD000
trusted library allocation
page read and write
1E9F0893000
heap
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9FA7AE000
trusted library allocation
page read and write
1E9F0D63000
trusted library allocation
page read and write
1E9F0BB1000
trusted library allocation
page read and write
1E9F35A6000
trusted library allocation
page read and write
1E9EECE4000
trusted library allocation
page read and write
1E9FA0FD000
trusted library allocation
page read and write
1E9F11F8000
trusted library allocation
page read and write
1E9F0626000
trusted library allocation
page read and write
1E9F36A4000
trusted library allocation
page read and write
1E9F2DCB000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9EDA82000
trusted library allocation
page read and write
1E9FA63D000
trusted library allocation
page read and write
1E9EDB83000
trusted library allocation
page read and write
1E9F40C2000
trusted library allocation
page read and write
1E9F0A90000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9ECA17000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9F472F000
trusted library allocation
page read and write
1E9FA4A3000
trusted library allocation
page read and write
1E9F2DE0000
trusted library allocation
page read and write
1E9FABA3000
trusted library allocation
page read and write
1E9F12C3000
trusted library allocation
page read and write
1E9F47A4000
trusted library allocation
page read and write
755E7FE000
stack
page read and write
1E9F0BA8000
trusted library allocation
page read and write
1E9FA682000
trusted library allocation
page read and write
1E9F0CFE000
trusted library allocation
page read and write
1E9F30F4000
trusted library allocation
page read and write
1E9EDAAC000
trusted library allocation
page read and write
1E9F25CF000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F36EB000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F08AC000
heap
page read and write
1E9EC17B000
heap
page read and write
1E9F35CF000
trusted library allocation
page read and write
1E9F36AA000
trusted library allocation
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9EDBD4000
trusted library allocation
page read and write
1E9FA7A9000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F0D27000
trusted library allocation
page read and write
1E9F2D70000
trusted library allocation
page read and write
1E9F303A000
trusted library allocation
page read and write
1E9F4729000
trusted library allocation
page read and write
1E9ECDDF000
trusted library allocation
page read and write
1E9F46E8000
trusted library allocation
page read and write
45CE000
stack
page read and write
1E9F46F0000
trusted library allocation
page read and write
130C9764000
heap
page read and write
130C8912000
trusted library allocation
page read and write
1E9F05FE000
trusted library allocation
page read and write
130C8969000
trusted library allocation
page read and write
1E9ECB2C000
trusted library allocation
page read and write
1E9FA459000
trusted library allocation
page read and write
1E9F9F97000
trusted library allocation
page read and write
1E9F1727000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F085C000
heap
page read and write
1E9F12AD000
trusted library allocation
page read and write
1E9EDABB000
trusted library allocation
page read and write
1E9F4090000
trusted library allocation
page read and write
1E9F4061000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F3057000
trusted library allocation
page read and write
1E9F06D6000
trusted library allocation
page read and write
130C9740000
heap
page read and write
1E9F3661000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9ECB3F000
trusted library allocation
page read and write
1E9EDC88000
trusted library allocation
page read and write
1E9F0D96000
trusted library allocation
page read and write
1E9F30BA000
trusted library allocation
page read and write
1E9F2C6D000
trusted library allocation
page read and write
1E9EDF16000
trusted library allocation
page read and write
1E9F2DBB000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
130C93B9000
heap
page read and write
1E9F40C2000
trusted library allocation
page read and write
1E9F9CE9000
trusted library allocation
page read and write
1E9F1765000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC4DF000
trusted library allocation
page read and write
1E9FAAC1000
trusted library allocation
page read and write
1E115D8000
stack
page read and write
1E9F09D2000
trusted library allocation
page read and write
1E9F46F2000
trusted library allocation
page read and write
1E9EEC48000
trusted library allocation
page read and write
1E9F46E6000
trusted library allocation
page read and write
1E9EDA87000
trusted library allocation
page read and write
1E9F46A2000
trusted library allocation
page read and write
130C8800000
trusted library allocation
page read and write
2D8D7603000
trusted library allocation
page read and write
28D05C05000
trusted library allocation
page read and write
FDC7DFF000
stack
page read and write
1E9FA49C000
trusted library allocation
page read and write
1E9F3665000
trusted library allocation
page read and write
1E9FA269000
trusted library allocation
page read and write
EEE218D000
stack
page read and write
1E9ECB42000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9F9BC7000
trusted library allocation
page read and write
1E9EDF0F000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F356A000
trusted library allocation
page read and write
1E9ECDDD000
trusted library allocation
page read and write
1E9F0BF3000
trusted library allocation
page read and write
1E9FA9DB000
trusted library allocation
page read and write
1E9F0D69000
trusted library allocation
page read and write
1E9EC16E000
heap
page read and write
1E9F40D6000
trusted library allocation
page read and write
1E9F0857000
heap
page read and write
1E9F12C3000
trusted library allocation
page read and write
1E9F0AF6000
trusted library allocation
page read and write
1E9FABB4000
trusted library allocation
page read and write
1E9F36A2000
trusted library allocation
page read and write
1E9FB300000
trusted library allocation
page read and write
1E9F0D89000
trusted library allocation
page read and write
1E13F7E000
unkown
page readonly
1E9FAB08000
trusted library allocation
page read and write
307BB9903000
trusted library allocation
page read and write
1E9FA741000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F357B000
trusted library allocation
page read and write
1E9F1292000
trusted library allocation
page read and write
1E9EC170000
heap
page read and write
1E9F0ADD000
trusted library allocation
page read and write
1E9F405D000
trusted library allocation
page read and write
9E0000
heap
page read and write
28D05B6E000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F46EC000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9EC175000
heap
page read and write
130C93ED000
heap
page read and write
1E9F36A4000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
A8CC73E000
stack
page read and write
23F97EA0000
heap
page read and write
130C937D000
heap
page read and write
1E9F0644000
trusted library allocation
page read and write
1E9F13DF000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9EE199000
trusted library allocation
page read and write
1E9EDFF0000
trusted library allocation
page read and write
1E9F4699000
trusted library allocation
page read and write
1E9ECB80000
trusted library allocation
page read and write
1E9FAAD1000
trusted library allocation
page read and write
1E9EC1A4000
heap
page read and write
1E9FB0D4000
trusted library allocation
page read and write
1E9F364A000
trusted library allocation
page read and write
1E9EDB9C000
trusted library allocation
page read and write
1E9F47FB000
trusted library allocation
page read and write
1E9F2E3E000
trusted library allocation
page read and write
1E9F0881000
heap
page read and write
1E9EDCA5000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9EDA8A000
trusted library allocation
page read and write
1E9E2531000
heap
page read and write
1E9F308E000
trusted library allocation
page read and write
22D4B65F000
heap
page read and write
1E9F9FA4000
trusted library allocation
page read and write
1E9F46A2000
trusted library allocation
page read and write
1E9EC381000
trusted library allocation
page read and write
1E9FAF88000
trusted library allocation
page read and write
1E9F0857000
heap
page read and write
1E9FA4AA000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9F3481000
trusted library allocation
page read and write
1E9ECAE4000
trusted library allocation
page read and write
130C9369000
heap
page read and write
1E9EC176000
heap
page read and write
28D05950000
heap
page read and write
1E9F0D2B000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F11D3000
trusted library allocation
page read and write
EEE43FE000
unkown
page readonly
1E9FA6E4000
trusted library allocation
page read and write
2D8D7624000
trusted library allocation
page read and write
1E9F3093000
trusted library allocation
page read and write
1E9F0A6F000
trusted library allocation
page read and write
1E9F30C5000
trusted library allocation
page read and write
1E9F2D56000
trusted library allocation
page read and write
1E9F34B3000
trusted library allocation
page read and write
1E9F0AB9000
trusted library allocation
page read and write
1E9EDA7C000
trusted library allocation
page read and write
1E9EDA78000
trusted library allocation
page read and write
1E9FAC3F000
trusted library allocation
page read and write
130C8973000
trusted library allocation
page read and write
1E9F0AF3000
trusted library allocation
page read and write
1E9FAA6A000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F30DA000
trusted library allocation
page read and write
130C937F000
heap
page read and write
1E9F2D61000
trusted library allocation
page read and write
1E9F2FA3000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9FAAE9000
trusted library allocation
page read and write
1E9EE100000
trusted library allocation
page read and write
1E9F085C000
heap
page read and write
FDC65FE000
stack
page read and write
1E9F9C54000
trusted library allocation
page read and write
130C93F1000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9F34ED000
trusted library allocation
page read and write
1E9EC3F9000
trusted library allocation
page read and write
1E9F2D54000
trusted library allocation
page read and write
1E9F0CFA000
trusted library allocation
page read and write
1E9F11C3000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F09C2000
trusted library allocation
page read and write
1E9FB9E7000
trusted library allocation
page read and write
1E9F342D000
trusted library allocation
page read and write
1E9F3473000
trusted library allocation
page read and write
1E9ECBF1000
trusted library allocation
page read and write
1E9EC4B5000
trusted library allocation
page read and write
1E9EECC5000
trusted library allocation
page read and write
28D057C4000
heap
page read and write
1E9F34BB000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F46FE000
trusted library allocation
page read and write
1E9F0A55000
trusted library allocation
page read and write
1E9FA799000
trusted library allocation
page read and write
1E9F11CE000
trusted library allocation
page read and write
1E9EDAE8000
trusted library allocation
page read and write
1E9ECDE8000
trusted library allocation
page read and write
2D8D7484000
heap
page read and write
1E9F30FC000
trusted library allocation
page read and write
28D05942000
unclassified section
page read and write
1E9EC19B000
heap
page read and write
1E9EDB18000
trusted library allocation
page read and write
1E9F2D82000
trusted library allocation
page read and write
1E9F9C61000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F35CC000
trusted library allocation
page read and write
1E9F09CF000
trusted library allocation
page read and write
2D8D722A000
remote allocation
page execute read
1E9FA475000
trusted library allocation
page read and write
1E9FAAE6000
trusted library allocation
page read and write
1E9F09E9000
trusted library allocation
page read and write
1E9F09C5000
trusted library allocation
page read and write
1E9F3453000
trusted library allocation
page read and write
130C85B0000
remote allocation
page execute read
1E9EC176000
heap
page read and write
1E9EDF78000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
3771000
heap
page read and write
1E9F9CF7000
trusted library allocation
page read and write
130C9783000
heap
page read and write
1E9FAACB000
trusted library allocation
page read and write
1E9F47F2000
trusted library allocation
page read and write
1E9F08C6000
heap
page read and write
1E9F2FB1000
trusted library allocation
page read and write
1E9F11D3000
trusted library allocation
page read and write
1E9F4695000
trusted library allocation
page read and write
130C936C000
heap
page read and write
1E9EC173000
heap
page read and write
1E9F17D8000
trusted library allocation
page read and write
2D8D7807000
trusted library allocation
page read and write
1E9EC5C0000
trusted library allocation
page read and write
1E9EEC7F000
trusted library allocation
page read and write
1E9F30DA000
trusted library allocation
page read and write
2D8D767A000
trusted library allocation
page read and write
1E9F0BA6000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F356D000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9ECDCA000
trusted library allocation
page read and write
1E9EE609000
trusted library allocation
page read and write
1E9F0C12000
trusted library allocation
page read and write
1E9F9D0D000
trusted library allocation
page read and write
1E9F05B0000
trusted library allocation
page read and write
2D8D76B5000
trusted library allocation
page read and write
1E9FA7E3000
trusted library allocation
page read and write
1E9F365C000
trusted library allocation
page read and write
1E9F2F54000
trusted library allocation
page read and write
1E9EDB66000
trusted library allocation
page read and write
1E9F13AA000
trusted library allocation
page read and write
FDC55FE000
stack
page read and write
1E9EC43E000
trusted library allocation
page read and write
1E9FB96F000
trusted library allocation
page read and write
1E9F40C6000
trusted library allocation
page read and write
1E9F347D000
trusted library allocation
page read and write
1E9FA2E6000
trusted library allocation
page read and write
1E9FA61E000
trusted library allocation
page read and write
1E9F36AA000
trusted library allocation
page read and write
23F96300000
trusted library allocation
page read and write
1E9F08AC000
heap
page read and write
1E9F0894000
heap
page read and write
1E9F2E7A000
trusted library allocation
page read and write
1E9FAABD000
trusted library allocation
page read and write
130C9369000
heap
page read and write
1E9F0ADC000
trusted library allocation
page read and write
1E9FAB5F000
trusted library allocation
page read and write
1E9F9CED000
trusted library allocation
page read and write
1E9F099F000
trusted library allocation
page read and write
1E9EDA56000
trusted library allocation
page read and write
1E9FA7BB000
trusted library allocation
page read and write
1E9F9BFD000
trusted library allocation
page read and write
1E9EECFD000
trusted library allocation
page read and write
1E9F367C000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F30D0000
trusted library allocation
page read and write
1E9FAC89000
trusted library allocation
page read and write
1E9F9B19000
trusted library allocation
page read and write
1E9F3644000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F34A1000
trusted library allocation
page read and write
1E9EC481000
trusted library allocation
page read and write
1E9F0863000
heap
page read and write
1E9F0AB0000
trusted library allocation
page read and write
1E9F2F7D000
trusted library allocation
page read and write
1E9FA955000
trusted library allocation
page read and write
1E9F18DD000
trusted library allocation
page read and write
1E9ECDAB000
trusted library allocation
page read and write
1E9EDBFC000
trusted library allocation
page read and write
1E9F0DDD000
trusted library allocation
page read and write
1E9EE380000
trusted library allocation
page read and write
1E9FB05D000
trusted library allocation
page read and write
1E9F9B3C000
trusted library allocation
page read and write
1E9F40E5000
trusted library allocation
page read and write
1E9FA32C000
trusted library allocation
page read and write
1E9F0987000
trusted library allocation
page read and write
1E9F0D42000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9FB484000
trusted library allocation
page read and write
1E9FA7A6000
trusted library allocation
page read and write
1E9EC486000
trusted library allocation
page read and write
EEE4C7E000
stack
page read and write
130C9300000
heap
page read and write
1E9FAAFD000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9FA855000
trusted library allocation
page read and write
1E9FAA83000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
130C93E8000
heap
page read and write
1E9EDAE8000
trusted library allocation
page read and write
1E9F12EE000
trusted library allocation
page read and write
1E9F11E6000
trusted library allocation
page read and write
1E9F34FB000
trusted library allocation
page read and write
1E9EDABB000
trusted library allocation
page read and write
1E9F0AE6000
trusted library allocation
page read and write
1E9F0969000
trusted library allocation
page read and write
1E9F40A9000
trusted library allocation
page read and write
1E9F088A000
heap
page read and write
1E9EEC6B000
trusted library allocation
page read and write
1E9FA623000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC176000
heap
page read and write
1E9FA9A3000
trusted library allocation
page read and write
1E9F364A000
trusted library allocation
page read and write
1E9F2E35000
trusted library allocation
page read and write
1E9F0988000
trusted library allocation
page read and write
28D057C0000
heap
page read and write
1E9F0BFA000
trusted library allocation
page read and write
1E9FA0CB000
trusted library allocation
page read and write
1E9F09D8000
trusted library allocation
page read and write
130C934D000
heap
page read and write
1E9F13B0000
trusted library allocation
page read and write
1E9FA2F5000
trusted library allocation
page read and write
1E9F3059000
trusted library allocation
page read and write
1E9ECA1E000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F128D000
trusted library allocation
page read and write
1E9F308E000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9FBC71000
heap
page read and write
23F9624A000
heap
page read and write
1E9EC174000
heap
page read and write
1384000
heap
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9EC92F000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9FA6EC000
trusted library allocation
page read and write
1E9EC1A1000
heap
page read and write
1E9F34EF000
trusted library allocation
page read and write
1E9FA9AB000
trusted library allocation
page read and write
1E9F35BE000
trusted library allocation
page read and write
1E9F0BBD000
trusted library allocation
page read and write
1E9F366E000
trusted library allocation
page read and write
1E9FABC5000
trusted library allocation
page read and write
1E9FA677000
trusted library allocation
page read and write
1E9F2AD3000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
3771000
heap
page read and write
1E9F0866000
heap
page read and write
1E9EC179000
heap
page read and write
23F97D9B000
heap
page read and write
1E9EC17B000
heap
page read and write
1E9FBC7E000
heap
page read and write
1E9EC16E000
heap
page read and write
1E9EC19B000
heap
page read and write
2D8D7430000
unclassified section
page readonly
3771000
heap
page read and write
2D8D76B0000
trusted library allocation
page read and write
1E9FA6D8000
trusted library allocation
page read and write
1E9F0ADB000
trusted library allocation
page read and write
1E9FA688000
trusted library allocation
page read and write
1E9EC9FB000
trusted library allocation
page read and write
1E9F0893000
heap
page read and write
1E9F2DE6000
trusted library allocation
page read and write
1E9F13D6000
trusted library allocation
page read and write
1E9EECB4000
trusted library allocation
page read and write
1E9EC37B000
trusted library allocation
page read and write
1E9FA7AC000
trusted library allocation
page read and write
1E9FABC5000
trusted library allocation
page read and write
130C9364000
heap
page read and write
1E9F9F67000
trusted library allocation
page read and write
1E9F0BF3000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9F0DD7000
trusted library allocation
page read and write
1E9FA319000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F36E9000
trusted library allocation
page read and write
1E9F0ACC000
trusted library allocation
page read and write
130C97A8000
heap
page read and write
1E9F0D5B000
trusted library allocation
page read and write
1E9F2CC5000
trusted library allocation
page read and write
1E9FABE7000
trusted library allocation
page read and write
1E9F3591000
trusted library allocation
page read and write
1E9F0D93000
trusted library allocation
page read and write
1E9FA15B000
trusted library allocation
page read and write
1E9EDA76000
trusted library allocation
page read and write
1E9F34BB000
trusted library allocation
page read and write
1E9F348C000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F30F2000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F9CE9000
trusted library allocation
page read and write
23F965E0000
heap
page read and write
1E9F46B7000
trusted library allocation
page read and write
1E9F1765000
trusted library allocation
page read and write
1E9F08AC000
heap
page read and write
1E9EDF6B000
trusted library allocation
page read and write
1E9F0D06000
trusted library allocation
page read and write
130C87A2000
unclassified section
page read and write
1E9F9D43000
trusted library allocation
page read and write
1E9F138E000
trusted library allocation
page read and write
1E9EC187000
heap
page read and write
1E9F09F1000
trusted library allocation
page read and write
1E9F2598000
trusted library allocation
page read and write
1E9FA789000
trusted library allocation
page read and write
1E9F12E0000
trusted library allocation
page read and write
1E9F085C000
heap
page read and write
1E9F34F3000
trusted library allocation
page read and write
1E9EDF8B000
trusted library allocation
page read and write
1E9F34A1000
trusted library allocation
page read and write
1E9EDFFB000
trusted library allocation
page read and write
4A4E000
stack
page read and write
1E9EC173000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9FACA7000
trusted library allocation
page read and write
1E9F409D000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F2E1A000
trusted library allocation
page read and write
1E9F088B000
heap
page read and write
1E9F40CA000
trusted library allocation
page read and write
1E9F365F000
trusted library allocation
page read and write
1E9F0899000
heap
page read and write
1E9F0617000
trusted library allocation
page read and write
1E9FACB9000
trusted library allocation
page read and write
1E9F35CF000
trusted library allocation
page read and write
1E9E0CF0000
trusted library allocation
page read and write
1E9ECBDC000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F134B000
trusted library allocation
page read and write
1E9F08BC000
heap
page read and write
1E9F369C000
trusted library allocation
page read and write
1E9FA23A000
trusted library allocation
page read and write
130C93ED000
heap
page read and write
1E9F2DCE000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F34A1000
trusted library allocation
page read and write
1E9FA7A3000
trusted library allocation
page read and write
1E9F3583000
trusted library allocation
page read and write
1E9FA45B000
trusted library allocation
page read and write
1E9EDFF8000
trusted library allocation
page read and write
1E9F0AD6000
trusted library allocation
page read and write
130C97A6000
heap
page read and write
1E9F08C6000
heap
page read and write
1E9F4695000
trusted library allocation
page read and write
1E9F3537000
trusted library allocation
page read and write
1E9FA615000
trusted library allocation
page read and write
1E9EDBEE000
trusted library allocation
page read and write
1E9EDAEA000
trusted library allocation
page read and write
130C97A6000
heap
page read and write
1E9F0DCD000
trusted library allocation
page read and write
1E9F0AFD000
trusted library allocation
page read and write
1E9F0D54000
trusted library allocation
page read and write
1E9F46F2000
trusted library allocation
page read and write
1E9F0D5B000
trusted library allocation
page read and write
1E9F35D3000
trusted library allocation
page read and write
1E9F097C000
trusted library allocation
page read and write
1E9EC180000
heap
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9F1275000
trusted library allocation
page read and write
1E9EC195000
heap
page read and write
1E9F0985000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F34A1000
trusted library allocation
page read and write
1E9F1B1E000
trusted library allocation
page read and write
1E9F9CF4000
trusted library allocation
page read and write
1E9ECA93000
trusted library allocation
page read and write
1E9F12A3000
trusted library allocation
page read and write
1E9F1778000
trusted library allocation
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9F357B000
trusted library allocation
page read and write
28D057C6000
heap
page read and write
1E9F08AC000
heap
page read and write
1E9F0AED000
trusted library allocation
page read and write
1E9F9CD0000
trusted library allocation
page read and write
1E9FBBFB000
trusted library allocation
page read and write
1E9F05DE000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F9BA2000
trusted library allocation
page read and write
1E9FA60A000
trusted library allocation
page read and write
1E9EC187000
heap
page read and write
1E9EDCC1000
trusted library allocation
page read and write
1E9EC4D9000
trusted library allocation
page read and write
1E9FA0B4000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9F12E0000
trusted library allocation
page read and write
1E9F0AB0000
trusted library allocation
page read and write
130C8A39000
unkown
page execute read
1E9EC19B000
heap
page read and write
2D8D7666000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9ECDF4000
trusted library allocation
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9F3591000
trusted library allocation
page read and write
1E9F2FDA000
trusted library allocation
page read and write
1E9F29C3000
trusted library allocation
page read and write
1E9F2E6E000
trusted library allocation
page read and write
1E9F3614000
trusted library allocation
page read and write
1E9F12FD000
trusted library allocation
page read and write
1595000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F0857000
heap
page read and write
1E9FAABD000
trusted library allocation
page read and write
1E9FB0ED000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F4031000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9FBC5C000
heap
page read and write
1E9F3061000
trusted library allocation
page read and write
1E9EECE0000
trusted library allocation
page read and write
1E9EECB4000
trusted library allocation
page read and write
1E9EDBD4000
trusted library allocation
page read and write
1E9F0BFA000
trusted library allocation
page read and write
1E9F9B1E000
trusted library allocation
page read and write
A8C95FE000
stack
page read and write
1E9FA13E000
trusted library allocation
page read and write
1E9F0DB2000
trusted library allocation
page read and write
130C9783000
heap
page read and write
1E9F09A7000
trusted library allocation
page read and write
1E9EDFF0000
trusted library allocation
page read and write
1E9F9C5B000
trusted library allocation
page read and write
1E9F46EC000
trusted library allocation
page read and write
1E9F9FE2000
trusted library allocation
page read and write
1E9FA7C9000
trusted library allocation
page read and write
1E9F34FB000
trusted library allocation
page read and write
1E9EC1A1000
heap
page read and write
1E9FA26B000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9F12B5000
trusted library allocation
page read and write
1E9F12E0000
trusted library allocation
page read and write
1E9F0CA2000
trusted library allocation
page read and write
1E9F3614000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F4061000
trusted library allocation
page read and write
1E9F474B000
trusted library allocation
page read and write
1E9FA9EF000
trusted library allocation
page read and write
1E9FAFDE000
trusted library allocation
page read and write
1E9ED94C000
trusted library allocation
page read and write
130C97A6000
heap
page read and write
1E9FC342000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC19B000
heap
page read and write
23F96271000
heap
page read and write
1E9F305B000
trusted library allocation
page read and write
1E9F17F4000
trusted library allocation
page read and write
1E9F2DDD000
trusted library allocation
page read and write
1E9FA934000
trusted library allocation
page read and write
1E9FBA29000
trusted library allocation
page read and write
1E9F46EE000
trusted library allocation
page read and write
1E9F2DCB000
trusted library allocation
page read and write
FDC6DFE000
stack
page read and write
1E9EC16D000
heap
page read and write
1E9F05F8000
trusted library allocation
page read and write
28D05790000
heap
page read and write
1E9F0878000
heap
page read and write
1E9EDA9E000
trusted library allocation
page read and write
1E9F2E35000
trusted library allocation
page read and write
1E9F2ECC000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FABAA000
trusted library allocation
page read and write
1E9FA0A5000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F40FD000
trusted library allocation
page read and write
1E9F2200000
trusted library allocation
page read and write
1E9FA9EB000
trusted library allocation
page read and write
1E9F11D6000
trusted library allocation
page read and write
23F96240000
heap
page read and write
1E9FA4A3000
trusted library allocation
page read and write
1E9F0DE2000
trusted library allocation
page read and write
1E9EC3C0000
trusted library allocation
page read and write
1E9ECA93000
trusted library allocation
page read and write
1E9ECBCC000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
2D8D72EA000
heap
page read and write
3771000
heap
page read and write
1E9F2E1A000
trusted library allocation
page read and write
130C9360000
heap
page read and write
1E9EEC48000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9FA26D000
trusted library allocation
page read and write
1E9F29D5000
trusted library allocation
page read and write
1E9F355C000
trusted library allocation
page read and write
1E9F3614000
trusted library allocation
page read and write
1E9FA312000
trusted library allocation
page read and write
1E9FAAC3000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
FDC4DFA000
stack
page read and write
1E9FA2F0000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F2FAA000
trusted library allocation
page read and write
130C935F000
heap
page read and write
1E9EDBA0000
trusted library allocation
page read and write
130C9369000
heap
page read and write
1E9F17BC000
trusted library allocation
page read and write
28D05B5B000
trusted library allocation
page read and write
28D05750000
unclassified section
page readonly
1E9EC17F000
heap
page read and write
1384000
heap
page read and write
130C9308000
heap
page read and write
1E9F308A000
trusted library allocation
page read and write
1E9F34D8000
trusted library allocation
page read and write
1E9FABB9000
trusted library allocation
page read and write
1E9F3061000
trusted library allocation
page read and write
1E9ECDB5000
trusted library allocation
page read and write
1E9FA853000
trusted library allocation
page read and write
1E9EC5DC000
trusted library allocation
page read and write
1E9EECD5000
trusted library allocation
page read and write
1E9FA9AF000
trusted library allocation
page read and write
1E9F18C0000
trusted library allocation
page read and write
1E9F367C000
trusted library allocation
page read and write
1E9F0CDB000
trusted library allocation
page read and write
D21000
unkown
page execute read
1E9F36A4000
trusted library allocation
page read and write
1E9FA9F7000
trusted library allocation
page read and write
1E9F0560000
trusted library allocation
page read and write
1E9FA467000
trusted library allocation
page read and write
130C93ED000
heap
page read and write
1E9F0D14000
trusted library allocation
page read and write
1E9FABAA000
trusted library allocation
page read and write
1E9F0CFE000
trusted library allocation
page read and write
1E9F11E6000
trusted library allocation
page read and write
1E9F0B6E000
trusted library allocation
page read and write
1E9FB0FB000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9F9CC3000
trusted library allocation
page read and write
130C93E8000
heap
page read and write
1E9EDAAD000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9FA999000
trusted library allocation
page read and write
1E9F40BC000
trusted library allocation
page read and write
1E9F35AB000
trusted library allocation
page read and write
1E9FAACB000
trusted library allocation
page read and write
1E9EC48A000
trusted library allocation
page read and write
1E9F0D63000
trusted library allocation
page read and write
1E9FC30E000
trusted library allocation
page read and write
28D05C39000
trusted library allocation
page read and write
1E9FA4B4000
trusted library allocation
page read and write
130C9797000
heap
page read and write
1E9FA3D4000
trusted library allocation
page read and write
1E9FA0BD000
trusted library allocation
page read and write
1E9FAFAD000
trusted library allocation
page read and write
1E9FA2CA000
trusted library allocation
page read and write
1E9F30E3000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
130C977B000
heap
page read and write
1E9ECA6A000
trusted library allocation
page read and write
1E9FAC0F000
trusted library allocation
page read and write
1E9F9CED000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC17A000
heap
page read and write
1E9EC459000
trusted library allocation
page read and write
1E9F9C62000
trusted library allocation
page read and write
1E9F305B000
trusted library allocation
page read and write
1E9FABD0000
trusted library allocation
page read and write
1E9EE50A000
trusted library allocation
page read and write
1E9EDFF6000
trusted library allocation
page read and write
1E9ECD24000
trusted library allocation
page read and write
1E9FA467000
trusted library allocation
page read and write
28D05770000
heap
page read and write
1E9F18F0000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9FA99C000
trusted library allocation
page read and write
1E9F36D1000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
130C93F1000
heap
page read and write
1E9FBBF6000
trusted library allocation
page read and write
2D8D7900000
trusted library allocation
page read and write
1E9F1866000
trusted library allocation
page read and write
1E9F0D3B000
trusted library allocation
page read and write
1E9F0ADB000
trusted library allocation
page read and write
1E9F4094000
trusted library allocation
page read and write
1E9FA633000
trusted library allocation
page read and write
1E9FABF8000
trusted library allocation
page read and write
1E9F09EE000
trusted library allocation
page read and write
1E9F4037000
trusted library allocation
page read and write
1E9F9FAA000
trusted library allocation
page read and write
1E9F2DBA000
trusted library allocation
page read and write
1E9F0857000
heap
page read and write
1384000
heap
page read and write
1E9F40BC000
trusted library allocation
page read and write
1E9F2EE7000
trusted library allocation
page read and write
1E9F2D65000
trusted library allocation
page read and write
1E9F0DF3000
trusted library allocation
page read and write
1E9F0878000
heap
page read and write
130C9783000
heap
page read and write
1E9F357B000
trusted library allocation
page read and write
1E9EDB9C000
trusted library allocation
page read and write
1E9F3015000
trusted library allocation
page read and write
1E9EC3EF000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9ECD6B000
trusted library allocation
page read and write
1E9FA3C0000
trusted library allocation
page read and write
1E9EECFD000
trusted library allocation
page read and write
1E9FA955000
trusted library allocation
page read and write
1E9F9B77000
trusted library allocation
page read and write
1E9FADB2000
trusted library allocation
page read and write
1E9FAC97000
trusted library allocation
page read and write
1E9F2E7A000
trusted library allocation
page read and write
1E9F9CFA000
trusted library allocation
page read and write
1E9FAABD000
trusted library allocation
page read and write
1E9FAA6C000
trusted library allocation
page read and write
1E9EC183000
heap
page read and write
1E9EC19C000
heap
page read and write
1E9F2D9C000
trusted library allocation
page read and write
1E9FABD1000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F2F4E000
trusted library allocation
page read and write
1E9F30CD000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F0C32000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F474B000
trusted library allocation
page read and write
1E9F407B000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC170000
heap
page read and write
1E9EE365000
trusted library allocation
page read and write
1E9FA9FA000
trusted library allocation
page read and write
1E9FA7E8000
trusted library allocation
page read and write
1E9F0A78000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA709000
trusted library allocation
page read and write
1E9F0DC8000
trusted library allocation
page read and write
28D05BA5000
trusted library allocation
page read and write
1E9EC18D000
heap
page read and write
1E9EEC77000
trusted library allocation
page read and write
1E9F0DF7000
trusted library allocation
page read and write
1E9ED9E8000
trusted library allocation
page read and write
1E9FABAF000
trusted library allocation
page read and write
1E9EDB9C000
trusted library allocation
page read and write
1E9EC3CE000
trusted library allocation
page read and write
23F96400000
trusted library allocation
page read and write
1E9FA995000
trusted library allocation
page read and write
130C93ED000
heap
page read and write
1E9FA94C000
trusted library allocation
page read and write
1E9EEC70000
trusted library allocation
page read and write
1E9FAD96000
trusted library allocation
page read and write
1E9F1166000
trusted library allocation
page read and write
1E9F0DD7000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
A8C9E7E000
unkown
page readonly
1E9F1723000
trusted library allocation
page read and write
130C93AA000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F136E000
trusted library allocation
page read and write
1E9F11F8000
trusted library allocation
page read and write
1E9F2E74000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F347D000
trusted library allocation
page read and write
1E9FA4C3000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9F0644000
trusted library allocation
page read and write
1E9FA90D000
trusted library allocation
page read and write
1E9F13AA000
trusted library allocation
page read and write
1E9F9CCD000
trusted library allocation
page read and write
1E9FAAD1000
trusted library allocation
page read and write
1E9F0866000
heap
page read and write
1E9ECDEA000
trusted library allocation
page read and write
1E9ECB80000
trusted library allocation
page read and write
1E9FAB33000
trusted library allocation
page read and write
23F9625D000
heap
page read and write
1E9F36D1000
trusted library allocation
page read and write
1E9F2FBF000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
1E9F0DAB000
trusted library allocation
page read and write
1E9F406D000
trusted library allocation
page read and write
1E9F099C000
trusted library allocation
page read and write
1E9F9FBA000
trusted library allocation
page read and write
3DF1F2E1E000
trusted library allocation
page read and write
1E9F2D5F000
trusted library allocation
page read and write
1E9F0DA5000
trusted library allocation
page read and write
1E9F0860000
heap
page read and write
130C93B2000
heap
page read and write
28D05940000
unclassified section
page read and write
1E9EC19B000
heap
page read and write
1E9F0863000
heap
page read and write
1E12EFE000
unkown
page readonly
1E9F9FFA000
trusted library allocation
page read and write
1E9EE1A1000
trusted library allocation
page read and write
1E9FBC36000
heap
page read and write
1E9F0D63000
trusted library allocation
page read and write
1E9F2F91000
trusted library allocation
page read and write
1E9EDBF5000
trusted library allocation
page read and write
130C85E0000
heap
page read and write
1E9F30D7000
trusted library allocation
page read and write
1E9F1739000
trusted library allocation
page read and write
1E9FABB2000
trusted library allocation
page read and write
1E9F136B000
trusted library allocation
page read and write
1E9FA496000
trusted library allocation
page read and write
1E9F0877000
heap
page read and write
1E9F0582000
trusted library allocation
page read and write
2D8D7480000
heap
page read and write
130C8910000
trusted library allocation
page read and write
1E9EDF98000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F2F5A000
trusted library allocation
page read and write
1E9F46EA000
trusted library allocation
page read and write
1E9F2E3E000
trusted library allocation
page read and write
FDC75FE000
stack
page read and write
1E9F09A7000
trusted library allocation
page read and write
1E9FBC71000
heap
page read and write
1E9FA2A4000
trusted library allocation
page read and write
1E9F34F3000
trusted library allocation
page read and write
1E9F30EC000
trusted library allocation
page read and write
1E9F088E000
heap
page read and write
22D4B650000
heap
page read and write
1E9F17D6000
trusted library allocation
page read and write
1E9F9B84000
trusted library allocation
page read and write
1E9EE357000
trusted library allocation
page read and write
1E9F0874000
heap
page read and write
1E9F0533000
trusted library allocation
page read and write
1E9F3655000
trusted library allocation
page read and write
1E9F0DD1000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9FA479000
trusted library allocation
page read and write
1E9EC398000
trusted library allocation
page read and write
1E9F3025000
trusted library allocation
page read and write
1E9F2CD0000
trusted library allocation
page read and write
1E9F0D7B000
trusted library allocation
page read and write
1E9F9CE1000
trusted library allocation
page read and write
130C93E8000
heap
page read and write
1E9FA45B000
trusted library allocation
page read and write
1E9FB03F000
trusted library allocation
page read and write
1E9FBC99000
heap
page read and write
1E9FAB58000
trusted library allocation
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9F4692000
trusted library allocation
page read and write
DF4000
unkown
page readonly
1E9F124E000
trusted library allocation
page read and write
130C8A44000
heap
page read and write
1E9ED925000
trusted library allocation
page read and write
1E9EDBD2000
trusted library allocation
page read and write
1E9F2DA8000
trusted library allocation
page read and write
1E9EEC59000
trusted library allocation
page read and write
1E9EC198000
heap
page read and write
1E9FAA97000
trusted library allocation
page read and write
1E9F0B54000
trusted library allocation
page read and write
1E9F13C5000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
2D8D7270000
heap
page read and write
1E9F1289000
trusted library allocation
page read and write
1E9F0AF8000
trusted library allocation
page read and write
1E9F3512000
trusted library allocation
page read and write
28D05930000
heap
page readonly
1E9FBA0B000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F1292000
trusted library allocation
page read and write
1E9F2EAF000
trusted library allocation
page read and write
1E9FA6CC000
trusted library allocation
page read and write
1E9F3055000
trusted library allocation
page read and write
1E9F12BE000
trusted library allocation
page read and write
1E9EE37B000
trusted library allocation
page read and write
1E9F0D69000
trusted library allocation
page read and write
1E9EC4F1000
trusted library allocation
page read and write
1E9FAF8B000
trusted library allocation
page read and write
1E9F0DED000
trusted library allocation
page read and write
1E9FAABD000
trusted library allocation
page read and write
1E9EDCBE000
trusted library allocation
page read and write
1E9F30B9000
trusted library allocation
page read and write
1E9F085C000
heap
page read and write
2D8D760E000
trusted library allocation
page read and write
1E9F1354000
trusted library allocation
page read and write
28D05B64000
trusted library allocation
page read and write
1E9F09A7000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9FA479000
trusted library allocation
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F17BC000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F30BC000
trusted library allocation
page read and write
130C9100000
heap
page read and write
1E9F2DD0000
trusted library allocation
page read and write
1E9FA69E000
trusted library allocation
page read and write
1E9F0877000
heap
page read and write
1E9F9FA0000
trusted library allocation
page read and write
1E9F9B58000
trusted library allocation
page read and write
1E9F2FBF000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9FA694000
trusted library allocation
page read and write
1E9F468B000
trusted library allocation
page read and write
1E9FA3EA000
trusted library allocation
page read and write
130C8540000
unclassified section
page readonly
1E9EE39F000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F2FE9000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F9F65000
trusted library allocation
page read and write
1E9FAFE4000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
22D4B907000
trusted library allocation
page read and write
130C935C000
heap
page read and write
1E9F2DDD000
trusted library allocation
page read and write
1E9F36A0000
trusted library allocation
page read and write
A8CA6BE000
stack
page read and write
1E9F346D000
trusted library allocation
page read and write
1E9F0893000
heap
page read and write
1E9EC170000
heap
page read and write
1E9ECD21000
trusted library allocation
page read and write
1E9F0DD2000
trusted library allocation
page read and write
1E9EDFFB000
trusted library allocation
page read and write
1E9F2C9E000
trusted library allocation
page read and write
1E9F2E35000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9F08B5000
heap
page read and write
1E9EDB8F000
trusted library allocation
page read and write
130C873A000
heap
page read and write
1E9F3537000
trusted library allocation
page read and write
1E9F12FD000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
1E9F36AA000
trusted library allocation
page read and write
1E9F2D75000
trusted library allocation
page read and write
1E9F2F4E000
trusted library allocation
page read and write
1E9FB700000
trusted library allocation
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9EDBF9000
trusted library allocation
page read and write
1E9F3436000
trusted library allocation
page read and write
1E9F35CC000
trusted library allocation
page read and write
1E9F0ADF000
trusted library allocation
page read and write
1E9F13A5000
trusted library allocation
page read and write
1E9EDFF0000
trusted library allocation
page read and write
1E9EC481000
trusted library allocation
page read and write
130C87F0000
trusted library allocation
page read and write
1E9F1394000
trusted library allocation
page read and write
1E9EDBFC000
trusted library allocation
page read and write
130C899D000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F26BC000
trusted library allocation
page read and write
1E9ECD3E000
trusted library allocation
page read and write
1E9F3624000
trusted library allocation
page read and write
1E9FA9A1000
trusted library allocation
page read and write
1E9F46E8000
trusted library allocation
page read and write
1E9F9CE6000
trusted library allocation
page read and write
1E9F0C9E000
trusted library allocation
page read and write
1E9F9CEB000
trusted library allocation
page read and write
2D8D7600000
trusted library allocation
page read and write
1E9ECBDE000
trusted library allocation
page read and write
1E9F12F7000
trusted library allocation
page read and write
130C8ECE000
unkown
page execute read
1E9F36EB000
trusted library allocation
page read and write
1E9FBCE1000
heap
page read and write
130C935F000
heap
page read and write
1E9EC173000
heap
page read and write
3771000
heap
page read and write
1E9FAB6F000
trusted library allocation
page read and write
1E9F9FF0000
trusted library allocation
page read and write
1E9EC17D000
heap
page read and write
1E9EEC3C000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F0DCF000
trusted library allocation
page read and write
1E9F0AD0000
trusted library allocation
page read and write
1E9F0DFD000
trusted library allocation
page read and write
1E9F0D8B000
trusted library allocation
page read and write
1E9F30E3000
trusted library allocation
page read and write
1E9FA498000
trusted library allocation
page read and write
1E9EDFD5000
trusted library allocation
page read and write
1E9EE34D000
trusted library allocation
page read and write
1E9F9B82000
trusted library allocation
page read and write
1E9F085C000
heap
page read and write
1E9EDF17000
trusted library allocation
page read and write
1E9EEC77000
trusted library allocation
page read and write
460E000
stack
page read and write
1E9F3583000
trusted library allocation
page read and write
1E9F0C0B000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
3771000
heap
page read and write
1E9FAC7B000
trusted library allocation
page read and write
1E9F9FA4000
trusted library allocation
page read and write
1E9FBC36000
heap
page read and write
1E9EC17A000
heap
page read and write
1E9EC194000
heap
page read and write
1E9F35D3000
trusted library allocation
page read and write
1E9FA145000
trusted library allocation
page read and write
1E9F34B3000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F3443000
trusted library allocation
page read and write
1D5E000
stack
page read and write
1E9ECA7D000
trusted library allocation
page read and write
1E9FA853000
trusted library allocation
page read and write
1E9F46F2000
trusted library allocation
page read and write
1E9F0A78000
trusted library allocation
page read and write
1E9F2EA6000
trusted library allocation
page read and write
1E9F3532000
trusted library allocation
page read and write
130C97A6000
heap
page read and write
1E9F35BC000
trusted library allocation
page read and write
1E9EDF5D000
trusted library allocation
page read and write
1E9F099F000
trusted library allocation
page read and write
1E9F134B000
trusted library allocation
page read and write
1E9F08C6000
heap
page read and write
1E9F2CE1000
trusted library allocation
page read and write
1E9F26AE000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9FA164000
trusted library allocation
page read and write
1E9F35A4000
trusted library allocation
page read and write
1E9FAAC1000
trusted library allocation
page read and write
1E9FA9EB000
trusted library allocation
page read and write
1E9EDB80000
trusted library allocation
page read and write
1E9FA9FC000
trusted library allocation
page read and write
1E9F08B5000
heap
page read and write
1E9F0CA2000
trusted library allocation
page read and write
1E9F25F8000
trusted library allocation
page read and write
DF0000
unkown
page write copy
755DFFC000
stack
page read and write
1E9F4037000
trusted library allocation
page read and write
1E9F0AFA000
trusted library allocation
page read and write
1E9F2E80000
trusted library allocation
page read and write
EEE447E000
unkown
page readonly
1E9F30D7000
trusted library allocation
page read and write
28D05C1B000
trusted library allocation
page read and write
1E9ECBB7000
trusted library allocation
page read and write
2D8D73F0000
heap
page readonly
1E9F0881000
heap
page read and write
1E9EDF12000
trusted library allocation
page read and write
1E9F17D4000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F0A82000
trusted library allocation
page read and write
1E9F25A7000
trusted library allocation
page read and write
1E9FA6F5000
trusted library allocation
page read and write
1E9F0894000
heap
page read and write
1E9FB0AD000
trusted library allocation
page read and write
1E9ECA82000
trusted library allocation
page read and write
1E9F2EAF000
trusted library allocation
page read and write
1E9F30F2000
trusted library allocation
page read and write
1E9FA9EB000
trusted library allocation
page read and write
1E9FAAEB000
trusted library allocation
page read and write
1E9FA999000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EC3A1000
trusted library allocation
page read and write
1E9EDCE0000
trusted library allocation
page read and write
1E9EEC77000
trusted library allocation
page read and write
1E9F2EE7000
trusted library allocation
page read and write
1E9ECA80000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
28D0580A000
heap
page read and write
1E9F0C9E000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F0F0A000
trusted library allocation
page read and write
4E4F000
stack
page read and write
1E9EC173000
heap
page read and write
1E9FA0B6000
trusted library allocation
page read and write
1E9EC5FD000
trusted library allocation
page read and write
1E9F34AD000
trusted library allocation
page read and write
DE2000
unkown
page readonly
3771000
heap
page read and write
1E9F0DFD000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F9FBA000
trusted library allocation
page read and write
1E9F1347000
trusted library allocation
page read and write
1E9EDBF9000
trusted library allocation
page read and write
1E9EC18E000
heap
page read and write
1E9FB0F0000
trusted library allocation
page read and write
1E9EC976000
trusted library allocation
page read and write
130C93B9000
heap
page read and write
1E9F29C3000
trusted library allocation
page read and write
1E9FA479000
trusted library allocation
page read and write
1E9F34D8000
trusted library allocation
page read and write
1E9FA999000
trusted library allocation
page read and write
1E9F36E5000
trusted library allocation
page read and write
1E9F40BE000
trusted library allocation
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9F0895000
heap
page read and write
1E9FA387000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F0BFA000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9FA479000
trusted library allocation
page read and write
1E9F9CDC000
trusted library allocation
page read and write
1E9F34EF000
trusted library allocation
page read and write
1E9EE37A000
trusted library allocation
page read and write
1E9EC398000
trusted library allocation
page read and write
1E9F05FE000
trusted library allocation
page read and write
1E9EDAEB000
trusted library allocation
page read and write
1E9F1223000
trusted library allocation
page read and write
1E9FA15A000
trusted library allocation
page read and write
1E9FA242000
trusted library allocation
page read and write
1E9FB47D000
trusted library allocation
page read and write
1E9F46E3000
trusted library allocation
page read and write
A8C9EBE000
unkown
page readonly
1E9F2D4D000
trusted library allocation
page read and write
1E9F05E5000
trusted library allocation
page read and write
1E9F25A0000
trusted library allocation
page read and write
1E9EDB83000
trusted library allocation
page read and write
1E9EC5C5000
trusted library allocation
page read and write
1E9F1252000
trusted library allocation
page read and write
1E9F0AEF000
trusted library allocation
page read and write
1E9F356A000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9F36E0000
trusted library allocation
page read and write
1E9F0CA5000
trusted library allocation
page read and write
1E9F0860000
heap
page read and write
1E9EDF78000
trusted library allocation
page read and write
1E9F0BB1000
trusted library allocation
page read and write
1E9FADA6000
trusted library allocation
page read and write
1E9F0BB9000
trusted library allocation
page read and write
1E9F0DD9000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9F2F54000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F13BD000
trusted library allocation
page read and write
1E9F47CF000
trusted library allocation
page read and write
1E9F0651000
trusted library allocation
page read and write
1E9F3697000
trusted library allocation
page read and write
130C9797000
heap
page read and write
1E9F1391000
trusted library allocation
page read and write
1E9EC4D9000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9F0BB9000
trusted library allocation
page read and write
1E9F1376000
trusted library allocation
page read and write
1E9ECDCA000
trusted library allocation
page read and write
1E9F30DA000
trusted library allocation
page read and write
1E9F0D0C000
trusted library allocation
page read and write
1E9F4070000
trusted library allocation
page read and write
1E9FA99C000
trusted library allocation
page read and write
1E9F0C87000
trusted library allocation
page read and write
1560000
heap
page read and write
1E9F17C8000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FAAA1000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F36A4000
trusted library allocation
page read and write
1E9F3596000
trusted library allocation
page read and write
1E9EC180000
heap
page read and write
1E9F3564000
trusted library allocation
page read and write
1E9FB08E000
trusted library allocation
page read and write
1E9F34BB000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9EC173000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9EC173000
heap
page read and write
1E9F0D85000
trusted library allocation
page read and write
1E9F2EFC000
trusted library allocation
page read and write
1E9F305F000
trusted library allocation
page read and write
1E9F9CFA000
trusted library allocation
page read and write
1E9F0DF7000
trusted library allocation
page read and write
130C93E1000
heap
page read and write
A8CB73E000
stack
page read and write
1E9F9C4C000
trusted library allocation
page read and write
1E9F0AD6000
trusted library allocation
page read and write
1E9FA623000
trusted library allocation
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9F2EA6000
trusted library allocation
page read and write
1E9EDF83000
trusted library allocation
page read and write
1E9F34B3000
trusted library allocation
page read and write
1E9F05AE000
trusted library allocation
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F30D7000
trusted library allocation
page read and write
130C9797000
heap
page read and write
38E4000
heap
page read and write
1E9F366E000
trusted library allocation
page read and write
1E9F343B000
trusted library allocation
page read and write
1E9F0673000
trusted library allocation
page read and write
1E9F36B5000
trusted library allocation
page read and write
1E9F0B6E000
trusted library allocation
page read and write
1E9FA475000
trusted library allocation
page read and write
1E9F0AE2000
trusted library allocation
page read and write
1E9F2F9A000
trusted library allocation
page read and write
1E9F1B17000
trusted library allocation
page read and write
1E9F2EBE000
trusted library allocation
page read and write
1E9EDBC9000
trusted library allocation
page read and write
1E9FA7B0000
trusted library allocation
page read and write
28D05800000
heap
page read and write
1E9F3473000
trusted library allocation
page read and write
1E9FA9EF000
trusted library allocation
page read and write
28D05B03000
trusted library allocation
page read and write
1E9F0D46000
trusted library allocation
page read and write
1E125FE000
stack
page read and write
1E9EDBCC000
trusted library allocation
page read and write
1E9F3055000
trusted library allocation
page read and write
1E9EDBA0000
trusted library allocation
page read and write
1E9F36D1000
trusted library allocation
page read and write
1E9FAA99000
trusted library allocation
page read and write
D20000
unkown
page readonly
1E9F0AFA000
trusted library allocation
page read and write
1E9FA7AE000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F0B54000
trusted library allocation
page read and write
1E9F11C9000
trusted library allocation
page read and write
1E9EC18E000
heap
page read and write
1E9FBC8D000
heap
page read and write
1E9F08D1000
heap
page read and write
1E9FA9A1000
trusted library allocation
page read and write
1E9F3057000
trusted library allocation
page read and write
1E9FAAA4000
trusted library allocation
page read and write
1E9F30CD000
trusted library allocation
page read and write
1E9EDFF1000
trusted library allocation
page read and write
1E9EDBBD000
trusted library allocation
page read and write
1E9FA798000
trusted library allocation
page read and write
1E9F0DF8000
trusted library allocation
page read and write
28D05C0F000
trusted library allocation
page read and write
1E9EE182000
trusted library allocation
page read and write
DBC000
unkown
page readonly
1E9EC467000
trusted library allocation
page read and write
1E9F13B0000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9F0984000
trusted library allocation
page read and write
1E9FA9EB000
trusted library allocation
page read and write
22D4B800000
trusted library allocation
page read and write
1E9F0A90000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FADB5000
trusted library allocation
page read and write
130C897B000
trusted library allocation
page read and write
1E9FB997000
trusted library allocation
page read and write
1E9F0DB7000
trusted library allocation
page read and write
1E9F11EC000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
1E9EC17A000
heap
page read and write
1E9F2D4B000
trusted library allocation
page read and write
1E9FAFAD000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F34D2000
trusted library allocation
page read and write
1E9FACC0000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9FAD62000
trusted library allocation
page read and write
130C9797000
heap
page read and write
1E9F3451000
trusted library allocation
page read and write
1E9F34AD000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9FA0A1000
trusted library allocation
page read and write
1E9FADF7000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F30DD000
trusted library allocation
page read and write
1E9FA242000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9F4099000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F0987000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FAF73000
trusted library allocation
page read and write
1E9F30FC000
trusted library allocation
page read and write
1E9F05FE000
trusted library allocation
page read and write
1E9FAAC1000
trusted library allocation
page read and write
1E9EE398000
trusted library allocation
page read and write
22D4B659000
heap
page read and write
38E0000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9FA27E000
trusted library allocation
page read and write
1E9F089A000
heap
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9EDF63000
trusted library allocation
page read and write
1E9FA7B0000
trusted library allocation
page read and write
2D8D7704000
heap
page read and write
1E9EC4F1000
trusted library allocation
page read and write
1E9EDCC7000
trusted library allocation
page read and write
1E9FA16B000
trusted library allocation
page read and write
1E9F40C4000
trusted library allocation
page read and write
1E9FAAC8000
trusted library allocation
page read and write
1E9ECB9D000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F13B0000
trusted library allocation
page read and write
1E9EDAEF000
trusted library allocation
page read and write
1E9F0D18000
trusted library allocation
page read and write
1E9F0863000
heap
page read and write
1E9F36E0000
trusted library allocation
page read and write
1E9F9CC7000
trusted library allocation
page read and write
130C93E9000
heap
page read and write
1E9F1361000
trusted library allocation
page read and write
1E9F29EE000
trusted library allocation
page read and write
2D8D7670000
trusted library allocation
page read and write
1E9EECE4000
trusted library allocation
page read and write
1E9F29B5000
trusted library allocation
page read and write
1E9F2ECC000
trusted library allocation
page read and write
1E9F2CA8000
trusted library allocation
page read and write
1E9F11D2000
trusted library allocation
page read and write
1E9ECACF000
trusted library allocation
page read and write
1E9F0DF4000
trusted library allocation
page read and write
1E9F0DE7000
trusted library allocation
page read and write
1E9EECFB000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9F46EA000
trusted library allocation
page read and write
1E9FA0BF000
trusted library allocation
page read and write
1E9F1360000
trusted library allocation
page read and write
1E9FA661000
trusted library allocation
page read and write
1E9EC18E000
heap
page read and write
1E9F46E6000
trusted library allocation
page read and write
1E9F46B2000
trusted library allocation
page read and write
1E9F1B24000
trusted library allocation
page read and write
130C93E8000
heap
page read and write
1E9F2E7A000
trusted library allocation
page read and write
1E9ECB36000
trusted library allocation
page read and write
1E9FA0A1000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9FAF00000
trusted library allocation
page read and write
1E9F3100000
trusted library allocation
page read and write
1E9F9FE2000
trusted library allocation
page read and write
1E9F0DC3000
trusted library allocation
page read and write
130C936C000
heap
page read and write
1E9F0D72000
trusted library allocation
page read and write
1E9EC193000
heap
page read and write
1E9F0DA0000
trusted library allocation
page read and write
1E9FAAC8000
trusted library allocation
page read and write
1E9EC45F000
trusted library allocation
page read and write
1E9F1B35000
trusted library allocation
page read and write
1E9F34ED000
trusted library allocation
page read and write
1E9EE382000
trusted library allocation
page read and write
2D8D7290000
heap
page read and write
1E9F0DF9000
trusted library allocation
page read and write
130C9369000
heap
page read and write
1E9FA0EA000
trusted library allocation
page read and write
1E9FAEDC000
trusted library allocation
page read and write
1E9F0860000
heap
page read and write
1E9F2F6A000
trusted library allocation
page read and write
1E9EDFFC000
trusted library allocation
page read and write
1E9F2598000
trusted library allocation
page read and write
1E9FA667000
trusted library allocation
page read and write
1E9F08AC000
heap
page read and write
1E9EDC48000
trusted library allocation
page read and write
1E9FA682000
trusted library allocation
page read and write
1E9FA45F000
trusted library allocation
page read and write
2D8D7613000
trusted library allocation
page read and write
1E9F0877000
heap
page read and write
1E9EC176000
heap
page read and write
1E9EC16A000
heap
page read and write
1E9EE398000
trusted library allocation
page read and write
2D8D767C000
trusted library allocation
page read and write
1E9F09AE000
trusted library allocation
page read and write
1E9FA611000
trusted library allocation
page read and write
1E9F0866000
heap
page read and write
1E9F407B000
trusted library allocation
page read and write
130C935C000
heap
page read and write
1E9FAB3B000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F29F6000
trusted library allocation
page read and write
1E9F0580000
trusted library allocation
page read and write
1E9FA7B2000
trusted library allocation
page read and write
1E9F9CFA000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9FA9CA000
trusted library allocation
page read and write
1E9F2DE0000
trusted library allocation
page read and write
2D8D76C8000
trusted library allocation
page read and write
28D057D0000
heap
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9F2DD2000
trusted library allocation
page read and write
1E9FB9E7000
trusted library allocation
page read and write
1E9F11E6000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EDC9D000
trusted library allocation
page read and write
1E9FAB0C000
trusted library allocation
page read and write
1E9FBC4E000
heap
page read and write
1E9F3624000
trusted library allocation
page read and write
1E9F0D46000
trusted library allocation
page read and write
28D05B68000
trusted library allocation
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9F11F8000
trusted library allocation
page read and write
1E9EC468000
trusted library allocation
page read and write
1E9F0529000
trusted library allocation
page read and write
1E9F0CDB000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC176000
heap
page read and write
1E9EC176000
heap
page read and write
1E9EC173000
heap
page read and write
1E9EC44C000
trusted library allocation
page read and write
1E9FB9FB000
trusted library allocation
page read and write
1E9EDBA0000
trusted library allocation
page read and write
1E9FBBDF000
trusted library allocation
page read and write
1E9F05AA000
trusted library allocation
page read and write
1E9FA21A000
trusted library allocation
page read and write
1E9FA813000
trusted library allocation
page read and write
1E9F3441000
trusted library allocation
page read and write
23F96407000
trusted library allocation
page read and write
1E9EC43A000
trusted library allocation
page read and write
1E9F30F4000
trusted library allocation
page read and write
1E9FA49C000
trusted library allocation
page read and write
1E9FAAC8000
trusted library allocation
page read and write
1E9EDFF8000
trusted library allocation
page read and write
1E9F9CD5000
trusted library allocation
page read and write
1E9F18DD000
trusted library allocation
page read and write
755DFFF000
stack
page read and write
28D05970000
unclassified section
page readonly
1E9FA3E0000
trusted library allocation
page read and write
1E9F0DD2000
trusted library allocation
page read and write
1E9F46E3000
trusted library allocation
page read and write
1E9F2FE9000
trusted library allocation
page read and write
1E9F0B1F000
trusted library allocation
page read and write
1E9FA467000
trusted library allocation
page read and write
1E9F0DD1000
trusted library allocation
page read and write
22D4B620000
heap
page read and write
1E9FA22E000
trusted library allocation
page read and write
1E9F1777000
trusted library allocation
page read and write
1E9F47EF000
trusted library allocation
page read and write
1E9F4048000
trusted library allocation
page read and write
1E9F3439000
trusted library allocation
page read and write
28D05BC8000
trusted library allocation
page read and write
1E9F0DCF000
trusted library allocation
page read and write
1E9F3533000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC17A000
heap
page read and write
1E9FAA8C000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F2D75000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
28D05BB7000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9EC176000
heap
page read and write
1E9EC19B000
heap
page read and write
1E9F05F6000
trusted library allocation
page read and write
1E9FAABD000
trusted library allocation
page read and write
1E9F0964000
trusted library allocation
page read and write
A8C7ADE000
stack
page read and write
1E9FA6C7000
trusted library allocation
page read and write
1E9F0891000
heap
page read and write
1E9F9BE6000
trusted library allocation
page read and write
1E9ECBEA000
trusted library allocation
page read and write
1E9F13DF000
trusted library allocation
page read and write
1E9EDB73000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
EEE5C7E000
stack
page read and write
1E9F0624000
trusted library allocation
page read and write
1E9F305F000
trusted library allocation
page read and write
1E9F2AF0000
trusted library allocation
page read and write
130C895F000
trusted library allocation
page read and write
1E9F05B3000
trusted library allocation
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1E9F3063000
trusted library allocation
page read and write
1E9EC180000
heap
page read and write
1E9F3481000
trusted library allocation
page read and write
1E9F0DE4000
trusted library allocation
page read and write
1E9EC40E000
trusted library allocation
page read and write
130C89AD000
trusted library allocation
page read and write
1E9FA08B000
trusted library allocation
page read and write
1E9F2E35000
trusted library allocation
page read and write
1E9F2F5F000
trusted library allocation
page read and write
1E9F08C6000
heap
page read and write
1E9F1394000
trusted library allocation
page read and write
1E9EDFF0000
trusted library allocation
page read and write
1E9ECB5E000
trusted library allocation
page read and write
1E9EC17B000
heap
page read and write
28D056D0000
unclassified section
page readonly
1E9F305D000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
130C93E3000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9F9FF4000
trusted library allocation
page read and write
1E9F34AD000
trusted library allocation
page read and write
1E9F0AFA000
trusted library allocation
page read and write
1E9ECA26000
trusted library allocation
page read and write
1E9F13B0000
trusted library allocation
page read and write
1E9FA667000
trusted library allocation
page read and write
1E9F2E6E000
trusted library allocation
page read and write
1E9F34ED000
trusted library allocation
page read and write
1E9FA27E000
trusted library allocation
page read and write
3770000
heap
page read and write
1E9FA475000
trusted library allocation
page read and write
1E9F9CDC000
trusted library allocation
page read and write
1E9F08C5000
heap
page read and write
1E9FA7A9000
trusted library allocation
page read and write
1E9F34D0000
trusted library allocation
page read and write
1E9FA7D1000
trusted library allocation
page read and write
1E9FA6A2000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC17A000
heap
page read and write
1E9FA9AB000
trusted library allocation
page read and write
1E9EC18A000
heap
page read and write
1E9F061F000
trusted library allocation
page read and write
1E9F0AFD000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9EDF8F000
trusted library allocation
page read and write
1E9EE17D000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F2D6A000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9EC48A000
trusted library allocation
page read and write
1E9F25EC000
trusted library allocation
page read and write
1E9F2D51000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F0CDA000
trusted library allocation
page read and write
28D05C19000
trusted library allocation
page read and write
1E9F29A2000
trusted library allocation
page read and write
1E9FA4C0000
trusted library allocation
page read and write
1E9F363C000
trusted library allocation
page read and write
1E9EC1A4000
heap
page read and write
28D05B5D000
trusted library allocation
page read and write
130C935F000
heap
page read and write
3771000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F1786000
trusted library allocation
page read and write
1E9FA659000
trusted library allocation
page read and write
1E9F3439000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F9CB6000
trusted library allocation
page read and write
A8C7B98000
stack
page read and write
1E9F2D7F000
trusted library allocation
page read and write
1E9F17FE000
trusted library allocation
page read and write
1E9F0CA9000
trusted library allocation
page read and write
1E9FB5A8000
trusted library allocation
page read and write
1E9F0866000
heap
page read and write
2D8D7682000
trusted library allocation
page read and write
1E9F12ED000
trusted library allocation
page read and write
1E9FAB55000
trusted library allocation
page read and write
1E9F0D69000
trusted library allocation
page read and write
1E9F11FE000
trusted library allocation
page read and write
1E9F0881000
heap
page read and write
1E9F08AC000
heap
page read and write
1E9F9D0F000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FAD00000
trusted library allocation
page read and write
1E9FBC01000
heap
page read and write
1E9EC5EB000
trusted library allocation
page read and write
28D05B81000
trusted library allocation
page read and write
1E9FA772000
trusted library allocation
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9FA999000
trusted library allocation
page read and write
1E9EC19A000
heap
page read and write
1E9EEC7F000
trusted library allocation
page read and write
3771000
heap
page read and write
1E9F0891000
heap
page read and write
1E9F2D77000
trusted library allocation
page read and write
1E9F35C7000
trusted library allocation
page read and write
1E9EDF83000
trusted library allocation
page read and write
1E9F9BB2000
trusted library allocation
page read and write
1E9F2C6D000
trusted library allocation
page read and write
130C93F1000
heap
page read and write
1E9F9F5B000
trusted library allocation
page read and write
A8CBF3E000
unkown
page readonly
1E9ECEFC000
trusted library allocation
page read and write
1E9F365C000
trusted library allocation
page read and write
1E9F1727000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
130C8964000
trusted library allocation
page read and write
1E9FACA7000
trusted library allocation
page read and write
1E9F2AA0000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9F0561000
trusted library allocation
page read and write
1E9F30F2000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F35AF000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F3449000
trusted library allocation
page read and write
1E9F1386000
trusted library allocation
page read and write
1E9EDAEF000
trusted library allocation
page read and write
1E9FB502000
trusted library allocation
page read and write
1E9FADC6000
trusted library allocation
page read and write
1E9EC357000
trusted library allocation
page read and write
23F97D90000
heap
page read and write
EEE21CE000
unkown
page readonly
1E9F11E6000
trusted library allocation
page read and write
1E9FAAA7000
trusted library allocation
page read and write
1E9EDFFB000
trusted library allocation
page read and write
1E9F34F3000
trusted library allocation
page read and write
1E9F0624000
trusted library allocation
page read and write
1E9F36A2000
trusted library allocation
page read and write
1E9EE36A000
trusted library allocation
page read and write
1E9EE3C8000
trusted library allocation
page read and write
11DE000
stack
page read and write
1E9EC19B000
heap
page read and write
1E9F0AF3000
trusted library allocation
page read and write
1E9F18DD000
trusted library allocation
page read and write
130C9769000
heap
page read and write
1E9FA922000
trusted library allocation
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9F3598000
trusted library allocation
page read and write
1E9FBBEF000
trusted library allocation
page read and write
1E9F05FA000
trusted library allocation
page read and write
1E9F0AE6000
trusted library allocation
page read and write
1E9F34FB000
trusted library allocation
page read and write
1E9F4070000
trusted library allocation
page read and write
1E9FA7A0000
trusted library allocation
page read and write
1E9F0A99000
trusted library allocation
page read and write
1E9EDB8F000
trusted library allocation
page read and write
1E9FA7E8000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9FA3EC000
trusted library allocation
page read and write
130C8987000
trusted library allocation
page read and write
1E9F136B000
trusted library allocation
page read and write
1E9F1354000
trusted library allocation
page read and write
1E9F3519000
trusted library allocation
page read and write
1E9F0B54000
trusted library allocation
page read and write
1E9ECB3F000
trusted library allocation
page read and write
1E9FAAD1000
trusted library allocation
page read and write
1E9F357D000
trusted library allocation
page read and write
1E9FBBF3000
trusted library allocation
page read and write
1E9EC181000
heap
page read and write
1E9F3637000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
3771000
heap
page read and write
1E9FB967000
trusted library allocation
page read and write
52FB000
stack
page read and write
1E9F46EE000
trusted library allocation
page read and write
1E9FA45B000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
2D8D7500000
trusted library allocation
page read and write
1E9FA4C0000
trusted library allocation
page read and write
1E9F2E6E000
trusted library allocation
page read and write
1E9F1C07000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F351F000
trusted library allocation
page read and write
1E9FA3D6000
trusted library allocation
page read and write
1E9ECDE8000
trusted library allocation
page read and write
1E9FA69C000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9F12FA000
trusted library allocation
page read and write
130C8FA4000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F3572000
trusted library allocation
page read and write
1E9EC174000
heap
page read and write
1E9FAA9B000
trusted library allocation
page read and write
1E9F0DF4000
trusted library allocation
page read and write
1E9F0DF0000
trusted library allocation
page read and write
1E9F0894000
heap
page read and write
1E9F1B1F000
trusted library allocation
page read and write
755EFFF000
stack
page read and write
1E9EC454000
trusted library allocation
page read and write
1E9EDC3B000
trusted library allocation
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9F34EF000
trusted library allocation
page read and write
2D8D7649000
trusted library allocation
page read and write
3BC920B1000
trusted library allocation
page execute read
1E9F09DB000
trusted library allocation
page read and write
1E9F30D0000
trusted library allocation
page read and write
1E9FAAF5000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F9CDC000
trusted library allocation
page read and write
1E9FA9F4000
trusted library allocation
page read and write
1E9F2DAD000
trusted library allocation
page read and write
1E9F09AF000
trusted library allocation
page read and write
1E9FA9BC000
trusted library allocation
page read and write
1E9EC193000
heap
page read and write
1E9EC16D000
heap
page read and write
1E9F2CC5000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC195000
heap
page read and write
1E9E0CFE000
trusted library allocation
page read and write
1E9EDB65000
trusted library allocation
page read and write
1E9F1765000
trusted library allocation
page read and write
28D05B2E000
trusted library allocation
page read and write
1E9F2FCD000
trusted library allocation
page read and write
130C9797000
heap
page read and write
1E9F0A43000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
130C9783000
heap
page read and write
1E9F3568000
trusted library allocation
page read and write
1E9F4692000
trusted library allocation
page read and write
1E9FAB22000
trusted library allocation
page read and write
1E9EE1CC000
trusted library allocation
page read and write
130C935F000
heap
page read and write
1E9F2EE7000
trusted library allocation
page read and write
1E9FA975000
trusted library allocation
page read and write
3771000
heap
page read and write
2D8D76D7000
trusted library allocation
page read and write
1E9FA3B5000
trusted library allocation
page read and write
2D8D7400000
unclassified section
page read and write
1E9F355C000
trusted library allocation
page read and write
1E9F9B60000
trusted library allocation
page read and write
1E9F0A5C000
trusted library allocation
page read and write
1E9F11C6000
trusted library allocation
page read and write
1E9F9CFE000
trusted library allocation
page read and write
1E9EE39F000
trusted library allocation
page read and write
1E9FAAF3000
trusted library allocation
page read and write
1E9FAAEF000
trusted library allocation
page read and write
1E9F9FF0000
trusted library allocation
page read and write
1E9F0A75000
trusted library allocation
page read and write
1E9F9CCC000
trusted library allocation
page read and write
1E9FAAFD000
trusted library allocation
page read and write
130C938A000
heap
page read and write
1E9EC1A4000
heap
page read and write
1E9EDF83000
trusted library allocation
page read and write
1E9ECB69000
trusted library allocation
page read and write
130C89F0000
trusted library allocation
page read and write
1E9FA23C000
trusted library allocation
page read and write
1E9F0894000
heap
page read and write
1E9FA0BA000
trusted library allocation
page read and write
1E9F0D7B000
trusted library allocation
page read and write
1E9F3453000
trusted library allocation
page read and write
1E9FB484000
trusted library allocation
page read and write
1E9F36B6000
trusted library allocation
page read and write
1E9EDCEB000
trusted library allocation
page read and write
1E9ECBCA000
trusted library allocation
page read and write
130C8961000
trusted library allocation
page read and write
1E9F2D82000
trusted library allocation
page read and write
1E9F11F8000
trusted library allocation
page read and write
1E9F05CB000
trusted library allocation
page read and write
130C937D000
heap
page read and write
1E9EC19B000
heap
page read and write
A8CAEFE000
stack
page read and write
1E9F0868000
heap
page read and write
1E9EDBCC000
trusted library allocation
page read and write
1E9F0A1A000
trusted library allocation
page read and write
1E10BBB000
stack
page read and write
1E9F0575000
trusted library allocation
page read and write
130C9785000
heap
page read and write
1E9F13DF000
trusted library allocation
page read and write
1E9F468B000
trusted library allocation
page read and write
1E9F13DF000
trusted library allocation
page read and write
23F9640A000
trusted library allocation
page read and write
1E9F9CB1000
trusted library allocation
page read and write
1E9EC182000
heap
page read and write
1E9F2E6E000
trusted library allocation
page read and write
1E9EC187000
heap
page read and write
1E9EE35B000
trusted library allocation
page read and write
1E9ED95E000
trusted library allocation
page read and write
1E9F1250000
trusted library allocation
page read and write
1E9EC18E000
heap
page read and write
1E9EE341000
trusted library allocation
page read and write
1E9F0D0A000
trusted library allocation
page read and write
1E9F17BC000
trusted library allocation
page read and write
1E9ECB69000
trusted library allocation
page read and write
1E9F30DA000
trusted library allocation
page read and write
1E9F0ADD000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9EC181000
heap
page read and write
1E9FA922000
trusted library allocation
page read and write
1E9EC173000
heap
page read and write
1E9EC176000
heap
page read and write
1E9F2D58000
trusted library allocation
page read and write
1E9F0894000
heap
page read and write
1E9F0CA2000
trusted library allocation
page read and write
1E9F0AF4000
trusted library allocation
page read and write
1E9F30D7000
trusted library allocation
page read and write
130C93E6000
heap
page read and write
1E9FAAC1000
trusted library allocation
page read and write
1384000
heap
page read and write
1384000
heap
page read and write
1E9FA7CD000
trusted library allocation
page read and write
130C93ED000
heap
page read and write
1E9FA15D000
trusted library allocation
page read and write
1E9FABF1000
trusted library allocation
page read and write
1E9F08D1000
heap
page read and write
1E9EECF1000
trusted library allocation
page read and write
1E9F2E6E000
trusted library allocation
page read and write
1E9FA49F000
trusted library allocation
page read and write
1E9F357B000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
D20000
unkown
page readonly
130C9760000
heap
page read and write
1E9FAAE1000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E9EDAEE000
trusted library allocation
page read and write
1E9FA4C3000
trusted library allocation
page read and write
130C93E3000
heap
page read and write
1E9F9FE0000
trusted library allocation
page read and write
1E9F17CC000
trusted library allocation
page read and write
1E9EC462000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9F08C5000
heap
page read and write
1E9F9CDC000
trusted library allocation
page read and write
1E9FA0B8000
trusted library allocation
page read and write
1E9F18F0000
trusted library allocation
page read and write
1E9F0DB9000
trusted library allocation
page read and write
1E9ECDE1000
trusted library allocation
page read and write
1E9FA6C7000
trusted library allocation
page read and write
1E9F35A4000
trusted library allocation
page read and write
1E9F25BF000
trusted library allocation
page read and write
1E9F1BFD000
trusted library allocation
page read and write
1E9F348C000
trusted library allocation
page read and write
1E9EDBE8000
trusted library allocation
page read and write
1E9ECD21000
trusted library allocation
page read and write
1E9F09F8000
trusted library allocation
page read and write
1E9EC19B000
heap
page read and write
1E9F0D54000
trusted library allocation
page read and write
1E9FA4AA000
trusted library allocation
page read and write
1E9FA254000
trusted library allocation
page read and write
1E9F30D7000
trusted library allocation
page read and write
1E9F3473000
trusted library allocation
page read and write
1E9F36CF000
trusted library allocation
page read and write
1E9F12FA000
trusted library allocation
page read and write
1E9F35A1000
trusted library allocation
page read and write
2D8D7687000
trusted library allocation
page read and write
1E9EC185000
heap
page read and write
1E9F343D000
trusted library allocation
page read and write
1E9F1777000
trusted library allocation
page read and write
1E9ECA26000
trusted library allocation
page read and write
1E9EC463000
trusted library allocation
page read and write
1E9EDF3D000
trusted library allocation
page read and write
1E9EC194000
heap
page read and write
1E9F29E3000
trusted library allocation
page read and write
130C93E9000
heap
page read and write
1E9FA7C9000
trusted library allocation
page read and write
1E9FA1B8000
trusted library allocation
page read and write
1E9EC169000
heap
page read and write
1E9EC181000
heap
page read and write
1E9F30F4000
trusted library allocation
page read and write
1E9FAC55000
trusted library allocation
page read and write
1E9FA7E5000
trusted library allocation
page read and write
1E9ECBA3000
trusted library allocation
page read and write
28D05B79000
trusted library allocation
page read and write
1E9F2FE9000
trusted library allocation
page read and write
EEE3BFE000
stack
page read and write
1E9EE3C8000
trusted library allocation
page read and write
1384000
heap
page read and write
1E9F9F61000
trusted library allocation
page read and write
1E9F3481000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EECE7000
trusted library allocation
page read and write
EEE214E000
unkown
page readonly
1E9ECA66000
trusted library allocation
page read and write
1E9EDA78000
trusted library allocation
page read and write
1E9FA1B2000
trusted library allocation
page read and write
1E9F2AFD000
trusted library allocation
page read and write
1E9F136E000
trusted library allocation
page read and write
1E9F12A3000
trusted library allocation
page read and write
1E9F2E3E000
trusted library allocation
page read and write
1E9F0AFD000
trusted library allocation
page read and write
1E9EC16D000
heap
page read and write
1E9ECB00000
trusted library allocation
page read and write
1E9FA06B000
trusted library allocation
page read and write
1E9FB94F000
trusted library allocation
page read and write
1E9FA330000
trusted library allocation
page read and write
1E9F11FE000
trusted library allocation
page read and write
1E9FAA82000
trusted library allocation
page read and write
1E9EC176000
heap
page read and write
1E9EDA77000
trusted library allocation
page read and write
1E9F0A63000
trusted library allocation
page read and write
1E9EDF17000
trusted library allocation
page read and write
1E9F25BF000
trusted library allocation
page read and write
1E9FA175000
trusted library allocation
page read and write
1E9F0998000
trusted library allocation
page read and write
1E9EECB4000
trusted library allocation
page read and write
1E9FAAD9000
trusted library allocation
page read and write
1E9F1826000
trusted library allocation
page read and write
1E9F9FDC000
trusted library allocation
page read and write
1520000
heap
page read and write
1E9F1723000
trusted library allocation
page read and write
1E9EC17A000
heap
page read and write
1E9F2FA0000
trusted library allocation
page read and write
22D4BAC0000
heap
page read and write
1E9F35AF000
trusted library allocation
page read and write
1E9FBBFB000
trusted library allocation
page read and write
1E9F472F000
trusted library allocation
page read and write
There are 3689 hidden memdumps, click here to show them.