IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d60dc410-3767-4381-bd10-561f7657946c.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d60dc410-3767-4381-bd10-561f7657946c.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\00dc5ecc-716d-4b14-955e-b70fae13b881.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\051ba387-3a3f-42b6-be33-c92f4114f03e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4ac6fb7a-084b-4ad8-9f89-2cc0b8ed2a65.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\55d3ee13-590b-489f-a31f-fcc49b82d5a3.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5e12960b-c25c-49aa-a3e1-c30a09a761e7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8aeb325e-a520-4e0d-9da7-94fd3f415d41.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\96842d3d-4358-4e4e-94a1-81bc65a23d1d.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\a83ad99d-22fc-46ae-931b-e0d23ec671b8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE1E-193C.pma
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 134217728.000000, slope 75015551881388056232440365056.000000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE1E-1BF8.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE32-E54.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE3A-1568.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\043ad7fe-31b7-4917-80cd-9f98ae2b7f20.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\066d5289-46b7-4b11-907f-4026c4e7756f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1bcb3170-cc4f-442d-8ace-802717e3a3e0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3c3cb00c-a4f0-406e-a265-25a31b4c54d4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\74db587a-9296-4c02-9762-af54f6b05cba.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 12, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie 0x1d, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\331e2b4d-a468-417f-a20c-e6115d507e0b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\3fdb20b9-98f5-4643-8d07-172b1c3d2433.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9375e314-f63b-452f-b8fe-30bae3e995a5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2bf6e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3aa5a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a0ba.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2b471.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2bf6e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3c0ff.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a063ec0d-0273-4abf-b4be-e4a9c3f7e047.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a270f432-f25d-47be-a056-ceb6f809b0c8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\b1a6ec76-8c3f-46fe-9ee3-d3fae9b6973b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\cb62ddac-2387-41c7-bcad-79d58a5136d0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\eb024c89-1ff6-4178-a734-ce07c44720e6.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2debd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3108b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF347e7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39cdd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2db72.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF30d20.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369691938600280
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\0aeb64fa-e93e-4352-89d7-95f1ca22e064.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1d22e22a-e6ea-4c46-81dc-166cf27e1b61.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\57d68818-86f5-45ef-b162-149eb86cd9a3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF2c78c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF3b826.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF2b471.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\a2d8a6cb-3a0d-4bee-b18f-571b75546a78.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\aba8c75d-899a-4bb0-a3a4-46d1f8fc5707.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages 2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie 0x66, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\aa0b92e2-8cc9-4959-843e-dfb73ecea653.tmp
ASCII text, with very long lines (1597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\aebecdda-452e-4eb2-86bc-83c99274d82c.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\c203f2f6-98fa-4deb-a009-38e355d0fccd.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d1004e34-5bf8-4e10-bda7-4f1d2ca452d3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dd690892-d485-4eea-8ec2-9fa1985e0aef.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dfecd7df-8498-49c0-8212-d06a60cb97d7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2863d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2864d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28b9c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28bbb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2b2bc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d2d6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d392.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f2b3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f2c2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39cbe.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c3ce.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3f917.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a06cfde0-1cf4-41a7-8ab9-22dd1cd209e8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bbe46430-8c0e-4dd1-9548-5a9cb41bb6e9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cbf87674-287c-4901-a846-8839c92da34f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ce599a9b-bac1-4f2b-bf5e-c4d13d1d48f7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\45a0fae4-04f0-4153-b161-cb4725a1fbf6.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\7be5c440-0e44-4d98-a9db-127b13852fe3.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 695310
dropped
C:\Users\user\AppData\Local\Temp\cadfc7de-2fba-49aa-a326-8cd4d9c5c14d.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\cf7397ca-e998-463e-bd03-9b85894aaa1a.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\d5a034f9-1e09-4f4a-ba39-e07f1b2f3e1e.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\e9abb6d9-4187-42d6-b0e2-d1c7c6f736a2.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\fe23149c-d6c1-4b38-82ad-c966428e522d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\45a0fae4-04f0-4153-b161-cb4725a1fbf6.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\cf7397ca-e998-463e-bd03-9b85894aaa1a.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 301 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 301 bytes
dropped
There are 326 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1944,i,1885108096133923708,5615008366606404031,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6552 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6800 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6312 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6312 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2332 --field-trial-handle=2076,i,7221193845708721563,11522825552492207431,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2288 --field-trial-handle=1944,i,12137075612384507687,15765736089809574248,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6928 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144 /prefetch:8
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2220 -prefMapHandle 2228 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {983f46ee-0e12-4a53-bee0-8668e7f3c346} 480 "\\.\pipe\gecko-crash-server-pipe.480" 214b0670910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4048 -parentBuildID 20230927232528 -prefsHandle 3944 -prefMapHandle 3940 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b05df780-e3db-4483-9c2e-582d825b99d8} 480 "\\.\pipe\gecko-crash-server-pipe.480" 214c06bf610 rdd
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://duckduckgo.com/ac/?q=
unknown
http://detectportal.firefox.com/
unknown
http://ww.microH
unknown
https://services.addons.mozilla.org
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://csp.withgoogle.com/csp/report-to/apps-themes
unknown
http://www.fontbureau.com/designers
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://docs.google.com/
unknown
https://screenshots.firefox.com
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
http://www.sandoll.co.krcomm/
unknown
https://www.instagram.com
unknown
http://www.jiyu-kobo.co.jp/8
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
http://www.fontbureau.com/designersadnl
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
http://www.fontbureau.com/designers/frere-user.html:
unknown
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
unknown
https://outlook.office.com/mail/compose?isExtension=true
unknown
http://www.sandoll.co.krF
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://i.y.qq.com/n2/m/index.html
unknown
https://www.deezer.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://web.telegram.org/
unknown
http://www.jiyu-kobo.co.jp/X
unknown
http://www.jiyu-kobo.co.jp/jp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://drive-daily-2.corp.google.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://exslt.org/dates-and-times
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://www.jiyu-kobo.co.jp/H
unknown
http://www.jiyu-kobo.co.jp/F
unknown
https://drive-daily-1.corp.google.com/
unknown
https://excel.new?from=EdgeM365Shoreline
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.251.40.228
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
http://127.0.0.1:
unknown
http://www.monotype.0
unknown
https://mitmdetection.services.mozilla.com/
unknown
http://detectportal.firefox.comP
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://chrome.google.com/webstore/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://bard.google.com/
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
142.250.185.161
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://www.office.com
unknown
https://outlook.live.com/mail/0/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://tidal.com/
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://www.openh264.org/
unknown
https://gaana.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
unknown
https://outlook.live.com/mail/compose?isExtension=true
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://outlook.office.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
chrome.cloudflare-dns.com
172.64.41.3
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.80
ipv4only.arpa
192.0.0.171
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
googlehosted.l.googleusercontent.com
142.250.185.161
sni1gl.wpc.nucdn.net
152.199.21.175
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
detectportal.firefox.com
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
firefox.settings.services.mozilla.com
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.107.246.40
unknown
United States
152.195.19.97
unknown
United States
142.251.40.206
unknown
United States
142.251.40.228
unknown
United States
192.168.2.4
unknown
unknown
142.250.185.161
googlehosted.l.googleusercontent.com
United States
23.44.133.38
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
52.222.236.80
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
142.250.81.234
unknown
United States
239.255.255.250
unknown
Reserved
20.96.153.111
unknown
United States
23.44.201.5
unknown
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
172.253.115.84
unknown
United States
There are 10 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
lw_13bbe73648289fe96dfa1aa1bf23b3da
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
Enabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ProfileErrorState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
EnhancedLinkOpeningDefault
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahokoikenoafgppiblgpenaaaolecifn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bhmhibnbialendcafinliemndanacfaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
bobbggphonhgdonfdibkfipfepfcildj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ceaifoolopnigfpidlheoagpheiplgii
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
cjneempfhkonkkbcmnfdibgobmhbagaj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dabfebgaghanlbehmkmaflipiohdimmc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dcaajljecejllikfgbhjdgeognacjkkp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dmbljphlfghcnbohaoffiedmodfmkmol
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ehlmnljdoejdahfjdfobmpfancoibmig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
eijpepilkjkofamihbmjcnihgpbebafj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
enkoeamdnimieoooocohgbdajhhkajko
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fjngpfnaikknjdhkckmncgicobbkcnle
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbihlnbpmfkodghomcinpblknjhneknc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gbmoeijgfngecijpcnbooedokgafmmji
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gecfnmoodchdkebjjffmdcmeghkflpib
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
gekagaaiohabmaknhkbaofhhedhelemf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghglcnachgghkhbafjogogiggghcpjig
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hciemgmhplhpinoohcjpafmncmjapioh
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hloomjjkinpbjldhobfkfdamkmikjmdo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
hmlhageoffiiefnmojcgoagebofoifpl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jbleckejnaboogigodiafflhkajdmpcl
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jlipacegilfgfpgkefbjcncbfcoeecgj
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jpfjdekhebcolnfkpicpciaknbgcdcbm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kfihiegbjaloebkmglnjnljoljgkkchm
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
khffkadolmfbdgahbabbhipadklfmhgf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kjncpkplfnolibapodobnnjfgmjmiaba
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kkobcodijbdelbnhbfkkfncbeildnpie
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
kmojgmpmopiiagdfbilgognmlegkonbk
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkbndigcebkoaejohleckhekfmcecfja
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nnpnekncnhiglbokoiffmejlimgmgoam
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ofefcgjbeghpigppfmkologfjadafddi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olkdlefmaniacnmgofabnpmomgcpdaip
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
olmhchkiafniffcaiciiomfdplnmklak
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
pencekojiebcjhifbkfdncgmmooepclc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ppnnjfpaneghjbcepgedmlcgmfgkjhah
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 198 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
259FFF40000
heap
page read and write
214C27A2000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73EF000
heap
page read and write
214B73FF000
heap
page read and write
214B73EC000
heap
page read and write
214B73F2000
heap
page read and write
214C03BC000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F8000
heap
page read and write
214C10E3000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C00F1000
trusted library allocation
page read and write
214BBE87000
trusted library allocation
page read and write
214C01BF000
trusted library allocation
page read and write
214C034C000
trusted library allocation
page read and write
214BD4CB000
trusted library allocation
page read and write
214C0583000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2666000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
214B73F1000
heap
page read and write
214B06EF000
trusted library allocation
page read and write
214B7419000
heap
page read and write
214C0EBF000
trusted library allocation
page read and write
214B73F0000
heap
page read and write
214B73F7000
heap
page read and write
214C272E000
trusted library allocation
page read and write
214C10A2000
trusted library allocation
page read and write
214C1081000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214BFADC000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C25E3000
trusted library allocation
page read and write
214C2EFD000
trusted library allocation
page read and write
214B73F5000
heap
page read and write
944000
heap
page read and write
FB1000
unkown
page execute read
214BE1EC000
trusted library allocation
page read and write
250B9D69000
heap
page read and write
214B73F7000
heap
page read and write
214C118E000
trusted library allocation
page read and write
214C3885000
trusted library allocation
page read and write
214C10DB000
trusted library allocation
page read and write
214C10E0000
trusted library allocation
page read and write
214C2E50000
trusted library allocation
page read and write
214B73C1000
heap
page read and write
214C24EB000
trusted library allocation
page read and write
250B9413000
trusted library allocation
page read and write
214C018A000
trusted library allocation
page read and write
87468FE000
stack
page read and write
214BD4F1000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214BD5DA000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73F1000
heap
page read and write
214C117E000
trusted library allocation
page read and write
214C03CE000
trusted library allocation
page read and write
214C0EA2000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B73D7000
heap
page read and write
214C00A7000
trusted library allocation
page read and write
214C388F000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73FC000
heap
page read and write
214B7406000
heap
page read and write
214C44E4000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
310B1FB000
stack
page read and write
214B743C000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214BBDCD000
trusted library allocation
page read and write
214C1054000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214B741A000
heap
page read and write
214B741A000
heap
page read and write
214C1081000
trusted library allocation
page read and write
214C10E6000
trusted library allocation
page read and write
1EDDFC63000
trusted library allocation
page read and write
214C2DD6000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214B7452000
heap
page read and write
214B73F1000
heap
page read and write
214B73F1000
heap
page read and write
214C2E6A000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7406000
heap
page read and write
250B9D8A000
heap
page read and write
214C3889000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73F8000
heap
page read and write
214B742F000
heap
page read and write
214B7405000
heap
page read and write
214C0553000
trusted library allocation
page read and write
214C2737000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
214BC7DB000
trusted library allocation
page read and write
214BFADE000
trusted library allocation
page read and write
214B7403000
heap
page read and write
310C1FF000
stack
page read and write
214B73F0000
heap
page read and write
214C23C7000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214C38CB000
trusted library allocation
page read and write
1AA68500000
trusted library allocation
page read and write
250BA1AD000
heap
page read and write
214BFB58000
trusted library allocation
page read and write
214C01EB000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
250BA1AD000
heap
page read and write
214BBE68000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B744D000
heap
page read and write
214B73E6000
heap
page read and write
1EDDFC7B000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214C2CC4000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BD454000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73B9000
heap
page read and write
214C2E98000
trusted library allocation
page read and write
214C0000000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C014C000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C2D74000
trusted library allocation
page read and write
1EDDFCC8000
trusted library allocation
page read and write
3481000
heap
page read and write
214C24FD000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214C2C79000
trusted library allocation
page read and write
7EF000
stack
page read and write
214C277B000
trusted library allocation
page read and write
214BE1F7000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214B7406000
heap
page read and write
214B73E2000
heap
page read and write
214C2EF8000
trusted library allocation
page read and write
214C28EF000
trusted library allocation
page read and write
214BE17D000
trusted library allocation
page read and write
214BD6DD000
trusted library allocation
page read and write
214C2737000
trusted library allocation
page read and write
214C239B000
trusted library allocation
page read and write
214C1836000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
214C388F000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C0E9E000
trusted library allocation
page read and write
214C0021000
trusted library allocation
page read and write
214C2EF6000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
214C12F5000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73E6000
heap
page read and write
214C24D6000
trusted library allocation
page read and write
214C02C8000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214B73E6000
heap
page read and write
214C03BF000
trusted library allocation
page read and write
214BFAF2000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214BFA33000
trusted library allocation
page read and write
214C1B58000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F3000
heap
page read and write
87447D8000
stack
page read and write
214C28BC000
trusted library allocation
page read and write
214B743E000
heap
page read and write
214C2677000
trusted library allocation
page read and write
214BBDBF000
trusted library allocation
page read and write
250BA197000
heap
page read and write
214B741A000
heap
page read and write
214C44DC000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73DB000
heap
page read and write
214C07E8000
trusted library allocation
page read and write
214BBDBF000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214BBD81000
trusted library allocation
page read and write
214BC716000
trusted library allocation
page read and write
214B73E7000
heap
page read and write
214C1099000
trusted library allocation
page read and write
944000
heap
page read and write
214B73F7000
heap
page read and write
214C10C1000
trusted library allocation
page read and write
250B9DEC000
heap
page read and write
214C2C3D000
trusted library allocation
page read and write
214B7402000
heap
page read and write
214C20E2000
trusted library allocation
page read and write
214BC718000
trusted library allocation
page read and write
214C2E89000
trusted library allocation
page read and write
214C01E1000
trusted library allocation
page read and write
214C2D9E000
trusted library allocation
page read and write
214BBE2D000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73F7000
heap
page read and write
214C2790000
trusted library allocation
page read and write
214C2D5E000
trusted library allocation
page read and write
214BD694000
trusted library allocation
page read and write
214C029F000
trusted library allocation
page read and write
214BC7DB000
trusted library allocation
page read and write
214C18B9000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C3880000
trusted library allocation
page read and write
250BA17B000
heap
page read and write
214B73F7000
heap
page read and write
214C059B000
trusted library allocation
page read and write
214C11D0000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73C5000
heap
page read and write
214B7417000
heap
page read and write
214B73D1000
heap
page read and write
214C1081000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214C1166000
trusted library allocation
page read and write
2FBCA9C4F000
trusted library allocation
page read and write
214B7466000
heap
page read and write
214C12D0000
trusted library allocation
page read and write
AAA394B000
stack
page read and write
214B73D5000
heap
page read and write
214B73FC000
heap
page read and write
214B73FF000
heap
page read and write
250B9415000
trusted library allocation
page read and write
214C20E0000
trusted library allocation
page read and write
214B7453000
heap
page read and write
214B73F7000
heap
page read and write
214BD696000
trusted library allocation
page read and write
214C23E8000
trusted library allocation
page read and write
214BC73C000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214B745E000
heap
page read and write
214B73F9000
heap
page read and write
214C2494000
trusted library allocation
page read and write
214C2D84000
trusted library allocation
page read and write
214C2C2B000
trusted library allocation
page read and write
214BD6BC000
trusted library allocation
page read and write
214BD6F4000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214C22D7000
trusted library allocation
page read and write
214C01DC000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214BD468000
trusted library allocation
page read and write
214C26B1000
trusted library allocation
page read and write
214B741C000
heap
page read and write
214B741A000
heap
page read and write
214B73F8000
heap
page read and write
214B73CB000
heap
page read and write
930000
heap
page read and write
250B94CA000
trusted library allocation
page read and write
1EDDFC03000
trusted library allocation
page read and write
214B742D000
heap
page read and write
3481000
heap
page read and write
214B73ED000
heap
page read and write
214C3893000
trusted library allocation
page read and write
214BC413000
trusted library allocation
page read and write
214BFADD000
trusted library allocation
page read and write
214BE18E000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214BC32F000
trusted library allocation
page read and write
214BD4C8000
trusted library allocation
page read and write
214C2CC8000
trusted library allocation
page read and write
214BD5D5000
trusted library allocation
page read and write
214C28D4000
trusted library allocation
page read and write
214B73F2000
heap
page read and write
214B73E2000
heap
page read and write
250B9DE1000
heap
page read and write
214C12ED000
trusted library allocation
page read and write
214C25C0000
trusted library allocation
page read and write
214C1A06000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214B73FA000
heap
page read and write
214C28EF000
trusted library allocation
page read and write
214B744D000
heap
page read and write
107C000
unkown
page read and write
214C10A2000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214C44E4000
trusted library allocation
page read and write
214C10CB000
trusted library allocation
page read and write
214BC721000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73D7000
heap
page read and write
214C26A3000
trusted library allocation
page read and write
214C2737000
trusted library allocation
page read and write
214C2EF8000
trusted library allocation
page read and write
214BFAA2000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214C01E9000
trusted library allocation
page read and write
214B741E000
heap
page read and write
214B73F7000
heap
page read and write
214C26A7000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73E6000
heap
page read and write
87480FE000
unkown
page readonly
214B73F7000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214C38CF000
trusted library allocation
page read and write
214C10C1000
trusted library allocation
page read and write
214C2768000
trusted library allocation
page read and write
250BA17B000
heap
page read and write
214B7406000
heap
page read and write
AAA6CFE000
unkown
page readonly
214C2DA1000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214BD4A1000
trusted library allocation
page read and write
214C2D80000
trusted library allocation
page read and write
214BD6F1000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73CC000
heap
page read and write
214B7417000
heap
page read and write
214BBE0D000
trusted library allocation
page read and write
214C0270000
trusted library allocation
page read and write
214C38C9000
trusted library allocation
page read and write
214B7418000
heap
page read and write
214C27C9000
trusted library allocation
page read and write
214C3875000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2D5E000
trusted library allocation
page read and write
214B73DA000
heap
page read and write
214BC736000
trusted library allocation
page read and write
214BE1AA000
trusted library allocation
page read and write
214C0EE2000
trusted library allocation
page read and write
214C24EB000
trusted library allocation
page read and write
214BD4DC000
trusted library allocation
page read and write
214C05FA000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C12CD000
trusted library allocation
page read and write
214C0586000
trusted library allocation
page read and write
214C0579000
trusted library allocation
page read and write
214B73D6000
heap
page read and write
CF7F3FF000
stack
page read and write
214C38B7000
trusted library allocation
page read and write
214BD45D000
trusted library allocation
page read and write
214B7464000
heap
page read and write
214C01E9000
trusted library allocation
page read and write
214C1066000
trusted library allocation
page read and write
214BC716000
trusted library allocation
page read and write
214B73EC000
heap
page read and write
214BFA62000
trusted library allocation
page read and write
214C03ED000
trusted library allocation
page read and write
214C04E6000
trusted library allocation
page read and write
214BD35B000
trusted library allocation
page read and write
214C26E7000
trusted library allocation
page read and write
214B7402000
heap
page read and write
214C0E9E000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214BD4E8000
trusted library allocation
page read and write
214C38D3000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C039A000
trusted library allocation
page read and write
214BBDEF000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C273F000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C07E8000
trusted library allocation
page read and write
214BFB52000
trusted library allocation
page read and write
214C01FA000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214C1049000
trusted library allocation
page read and write
1EDDFB44000
heap
page read and write
214BD69D000
trusted library allocation
page read and write
214C26CB000
trusted library allocation
page read and write
214BD67E000
trusted library allocation
page read and write
214C07E8000
trusted library allocation
page read and write
214B741A000
heap
page read and write
1AA69EA0000
heap
page read and write
214B73F5000
heap
page read and write
250BA197000
heap
page read and write
214BD4FD000
trusted library allocation
page read and write
214B740B000
heap
page read and write
214B73E7000
heap
page read and write
214B73C9000
heap
page read and write
214C0281000
trusted library allocation
page read and write
214C01FC000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
AAA53FE000
stack
page read and write
214C1046000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B7447000
heap
page read and write
214B7405000
heap
page read and write
214C104A000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214C38D5000
trusted library allocation
page read and write
214C44D9000
trusted library allocation
page read and write
214BC323000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7417000
heap
page read and write
214B7406000
heap
page read and write
214B73E4000
heap
page read and write
214C4499000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BD4E0000
trusted library allocation
page read and write
214C38A1000
trusted library allocation
page read and write
214C21FD000
trusted library allocation
page read and write
214BBE8C000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BFACB000
trusted library allocation
page read and write
214C26A3000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C12D4000
trusted library allocation
page read and write
214BD698000
trusted library allocation
page read and write
250B9230000
heap
page read and write
214BBE71000
trusted library allocation
page read and write
250BA160000
heap
page read and write
214BD4F8000
trusted library allocation
page read and write
250B9DE8000
heap
page read and write
214C103D000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73EC000
heap
page read and write
214C01BF000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214B73E6000
heap
page read and write
214C07C4000
trusted library allocation
page read and write
214C1020000
trusted library allocation
page read and write
214BD49E000
trusted library allocation
page read and write
214B73F5000
heap
page read and write
250B9DF1000
heap
page read and write
214B73F7000
heap
page read and write
214B73F3000
heap
page read and write
214B73F3000
heap
page read and write
214C10A2000
trusted library allocation
page read and write
214BFADC000
trusted library allocation
page read and write
214C0583000
trusted library allocation
page read and write
214B741A000
heap
page read and write
250B946F000
trusted library allocation
page read and write
214C07A5000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
430E000
stack
page read and write
214B744D000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B73FC000
heap
page read and write
8743DBC000
stack
page read and write
214C2C64000
trusted library allocation
page read and write
A85000
heap
page read and write
214B7466000
heap
page read and write
214C3899000
trusted library allocation
page read and write
214B73E1000
heap
page read and write
214C2D89000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
53FD000
stack
page read and write
214B73FC000
heap
page read and write
214C26EB000
trusted library allocation
page read and write
214B73EC000
heap
page read and write
214C2C79000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C2D4E000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B746B000
heap
page read and write
250B9448000
trusted library allocation
page read and write
214B73DF000
heap
page read and write
214C38CF000
trusted library allocation
page read and write
214B73D6000
heap
page read and write
214B73F1000
heap
page read and write
250B940D000
trusted library allocation
page read and write
214C23C7000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214C0EE2000
trusted library allocation
page read and write
214C10CB000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C10C1000
trusted library allocation
page read and write
214BD6BC000
trusted library allocation
page read and write
214B7452000
heap
page read and write
214C2CE8000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F1000
heap
page read and write
214BE1DF000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C10BB000
trusted library allocation
page read and write
214C44DE000
trusted library allocation
page read and write
214C23E8000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
250B945C000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73F3000
heap
page read and write
214B73F3000
heap
page read and write
214C2E90000
trusted library allocation
page read and write
214BFB58000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F8000
heap
page read and write
214B747F000
heap
page read and write
214BD47F000
trusted library allocation
page read and write
250B9DF1000
heap
page read and write
214C447F000
trusted library allocation
page read and write
214C17E4000
trusted library allocation
page read and write
3481000
heap
page read and write
214C12ED000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C388F000
trusted library allocation
page read and write
214C109E000
trusted library allocation
page read and write
214C44DC000
trusted library allocation
page read and write
214C384B000
trusted library allocation
page read and write
214C01B6000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BD486000
trusted library allocation
page read and write
250B92C2000
unclassified section
page read and write
214B744D000
heap
page read and write
214B73C1000
heap
page read and write
214B73EB000
heap
page read and write
214B746B000
heap
page read and write
214B73D1000
heap
page read and write
214BD66E000
trusted library allocation
page read and write
214BC736000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C2786000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214B73F7000
heap
page read and write
214BC721000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B744D000
heap
page read and write
1A30000
heap
page read and write
214C0378000
trusted library allocation
page read and write
214BFC90000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214B73C5000
heap
page read and write
214B73DB000
heap
page read and write
214BD49E000
trusted library allocation
page read and write
250B9D6C000
heap
page read and write
AAA6C3E000
stack
page read and write
214C1049000
trusted library allocation
page read and write
214C2C79000
trusted library allocation
page read and write
214C10D1000
trusted library allocation
page read and write
214C109C000
trusted library allocation
page read and write
214BFC34000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C287F000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B741A000
heap
page read and write
214C27C5000
trusted library allocation
page read and write
214BBD85000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214C20E2000
trusted library allocation
page read and write
A75000
heap
page read and write
3481000
heap
page read and write
214B73F8000
heap
page read and write
214BD694000
trusted library allocation
page read and write
214C10E6000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C24CE000
trusted library allocation
page read and write
214B7429000
heap
page read and write
214C2C79000
trusted library allocation
page read and write
214BC721000
trusted library allocation
page read and write
250B9C03000
trusted library allocation
page read and write
214B7402000
heap
page read and write
214B73F3000
heap
page read and write
214B7403000
heap
page read and write
214C2CBF000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214B73EB000
heap
page read and write
214C05DB000
trusted library allocation
page read and write
214C23E8000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214C20F2000
trusted library allocation
page read and write
214BC7B2000
trusted library allocation
page read and write
214C10BB000
trusted library allocation
page read and write
214BD6A6000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73E6000
heap
page read and write
250B940A000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214BD6EB000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214BC7EA000
trusted library allocation
page read and write
214C2143000
trusted library allocation
page read and write
214B7460000
heap
page read and write
214B7407000
heap
page read and write
214B73F7000
heap
page read and write
214B73F9000
heap
page read and write
214B73F6000
heap
page read and write
4FAF000
stack
page read and write
214B73ED000
heap
page read and write
214BD5D4000
trusted library allocation
page read and write
214BC736000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C2D26000
trusted library allocation
page read and write
214C027C000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
250B9DEC000
heap
page read and write
214B73F7000
heap
page read and write
214C27ED000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214C2137000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73C5000
heap
page read and write
214B7417000
heap
page read and write
214B73F0000
heap
page read and write
214BC7AF000
trusted library allocation
page read and write
1EDDFC61000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
8743D7E000
unkown
page readonly
214BFCAC000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
1EDDFC2E000
trusted library allocation
page read and write
214C20F8000
trusted library allocation
page read and write
214B746B000
heap
page read and write
214B7406000
heap
page read and write
214C27F5000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214B7407000
heap
page read and write
214C3885000
trusted library allocation
page read and write
214B73D3000
heap
page read and write
214B7406000
heap
page read and write
214C381F000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214BC7B4000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C2D4E000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
250B9D60000
heap
page read and write
214B745E000
heap
page read and write
214B744D000
heap
page read and write
214B7417000
heap
page read and write
214B7405000
heap
page read and write
214B73D1000
heap
page read and write
214B73C5000
heap
page read and write
214C4499000
trusted library allocation
page read and write
214BC721000
trusted library allocation
page read and write
214C118A000
trusted library allocation
page read and write
214C2EDF000
trusted library allocation
page read and write
1EDDFC98000
trusted library allocation
page read and write
214C2C29000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7401000
heap
page read and write
214C03CE000
trusted library allocation
page read and write
214BD499000
trusted library allocation
page read and write
1EDDF7E0000
remote allocation
page read and write
214BD4FD000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214BC4AE000
trusted library allocation
page read and write
214BBE8A000
trusted library allocation
page read and write
214B7419000
heap
page read and write
214B73F1000
heap
page read and write
214B73D6000
heap
page read and write
250B9DAA000
heap
page read and write
214C25AF000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C2D4C000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214B73E4000
heap
page read and write
214C1166000
trusted library allocation
page read and write
214C104E000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BD4E8000
trusted library allocation
page read and write
214C2C7C000
trusted library allocation
page read and write
AAA6CBE000
stack
page read and write
214C10A2000
trusted library allocation
page read and write
214BFAA3000
trusted library allocation
page read and write
214C27ED000
trusted library allocation
page read and write
214B73CA000
heap
page read and write
214BD451000
trusted library allocation
page read and write
214C2D97000
trusted library allocation
page read and write
214BD642000
trusted library allocation
page read and write
214B7466000
heap
page read and write
3481000
heap
page read and write
214B73F5000
heap
page read and write
214C118E000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C03D4000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73D2000
heap
page read and write
214C2EF0000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
214B73D0000
heap
page read and write
3481000
heap
page read and write
214BD69D000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214C38D7000
trusted library allocation
page read and write
214C2696000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214BFAAA000
trusted library allocation
page read and write
214B747B000
heap
page read and write
214B73F1000
heap
page read and write
214B73D1000
heap
page read and write
214C05DB000
trusted library allocation
page read and write
214C01DF000
trusted library allocation
page read and write
250BA1B6000
heap
page read and write
214C20CA000
trusted library allocation
page read and write
214B73D3000
heap
page read and write
214C116C000
trusted library allocation
page read and write
214C03C3000
trusted library allocation
page read and write
214B73CF000
heap
page read and write
214C288B000
trusted library allocation
page read and write
214BBD76000
trusted library allocation
page read and write
214C0298000
trusted library allocation
page read and write
214BD482000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C2EFD000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73E6000
heap
page read and write
214B741A000
heap
page read and write
214C2685000
trusted library allocation
page read and write
214BFB16000
trusted library allocation
page read and write
214B7403000
heap
page read and write
214B741D000
heap
page read and write
214C01AE000
trusted library allocation
page read and write
214BD4C5000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C0FD5000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73E6000
heap
page read and write
214B73FE000
heap
page read and write
214B73C5000
heap
page read and write
214B7418000
heap
page read and write
3E8E000
stack
page read and write
214B73F8000
heap
page read and write
214B73F1000
heap
page read and write
214B7405000
heap
page read and write
214C0EE2000
trusted library allocation
page read and write
214C2D1C000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B7406000
heap
page read and write
214BD447000
trusted library allocation
page read and write
214C10BB000
trusted library allocation
page read and write
214C01DF000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B741D000
heap
page read and write
214B7453000
heap
page read and write
214B73F3000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214C2CB2000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73F8000
heap
page read and write
214B747C000
heap
page read and write
214B73FC000
heap
page read and write
214C24CE000
trusted library allocation
page read and write
214C0198000
trusted library allocation
page read and write
214C03C9000
trusted library allocation
page read and write
214B73DF000
heap
page read and write
214BD6BE000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C38CD000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B73F7000
heap
page read and write
214C2DC2000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214BD554000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
CF007FF000
stack
page read and write
214B73F3000
heap
page read and write
214B73E4000
heap
page read and write
214BC7BF000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214B73D7000
heap
page read and write
214B73E3000
heap
page read and write
214B7406000
heap
page read and write
214B73F7000
heap
page read and write
214B73C4000
heap
page read and write
214B741E000
heap
page read and write
214B73F9000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214C10E6000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73E1000
heap
page read and write
214B73F7000
heap
page read and write
214C1940000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B7417000
heap
page read and write
214B73FA000
heap
page read and write
1AA68470000
heap
page read and write
214C00B3000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
214BD6F8000
trusted library allocation
page read and write
214C283B000
trusted library allocation
page read and write
A8F000
heap
page read and write
214C28D4000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214B73E6000
heap
page read and write
214C2CF2000
trusted library allocation
page read and write
214C2D73000
trusted library allocation
page read and write
3481000
heap
page read and write
214B7476000
heap
page read and write
214C03CD000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7401000
heap
page read and write
214B7428000
heap
page read and write
214C07ED000
trusted library allocation
page read and write
214B73E1000
heap
page read and write
214B7448000
heap
page read and write
214B73F7000
heap
page read and write
214B73F1000
heap
page read and write
214C01F9000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C01B8000
trusted library allocation
page read and write
214BBFB5000
trusted library allocation
page read and write
214B741D000
heap
page read and write
250BA164000
heap
page read and write
214B73E6000
heap
page read and write
214B73F3000
heap
page read and write
214C0263000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B73E2000
heap
page read and write
470F000
stack
page read and write
4B4C000
stack
page read and write
214C21BA000
trusted library allocation
page read and write
214BFC49000
trusted library allocation
page read and write
214C10A2000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B7417000
heap
page read and write
214B73F1000
heap
page read and write
214B73EB000
heap
page read and write
214C2D59000
trusted library allocation
page read and write
214B73E3000
heap
page read and write
214C0EA2000
trusted library allocation
page read and write
214C025F000
trusted library allocation
page read and write
214B73D2000
heap
page read and write
214B73F3000
heap
page read and write
214BC7CC000
trusted library allocation
page read and write
214B7476000
heap
page read and write
214B73E6000
heap
page read and write
214C209C000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214B73CC000
heap
page read and write
214BBFBF000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B7402000
heap
page read and write
3481000
heap
page read and write
214BD633000
trusted library allocation
page read and write
214B740B000
heap
page read and write
250B9100000
heap
page read and write
214C01A9000
trusted library allocation
page read and write
214B744E000
heap
page read and write
214BC716000
trusted library allocation
page read and write
214C1093000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214BD39C000
trusted library allocation
page read and write
214C2DCC000
trusted library allocation
page read and write
FB0000
unkown
page readonly
214C029F000
trusted library allocation
page read and write
214C3E1C000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73EC000
heap
page read and write
214C10C1000
trusted library allocation
page read and write
214BBD9E000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214C2137000
trusted library allocation
page read and write
214BD615000
trusted library allocation
page read and write
250B9DF1000
heap
page read and write
214C2773000
trusted library allocation
page read and write
214C2C65000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214C029F000
trusted library allocation
page read and write
250BA185000
heap
page read and write
214B73FC000
heap
page read and write
214B73EC000
heap
page read and write
214B741D000
heap
page read and write
214B7406000
heap
page read and write
214B73F7000
heap
page read and write
214C38D3000
trusted library allocation
page read and write
214C2C8F000
trusted library allocation
page read and write
214B7465000
heap
page read and write
214C00B5000
trusted library allocation
page read and write
214C24CE000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BBE63000
trusted library allocation
page read and write
214C10BB000
trusted library allocation
page read and write
214BD6A8000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
310D1FE000
stack
page read and write
214C10D1000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214C10AD000
trusted library allocation
page read and write
214BFCF8000
trusted library allocation
page read and write
214C26B1000
trusted library allocation
page read and write
214BC4B6000
trusted library allocation
page read and write
214C28CA000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C23A9000
trusted library allocation
page read and write
214BFA72000
trusted library allocation
page read and write
214B7444000
heap
page read and write
214C00C1000
trusted library allocation
page read and write
214B746F000
heap
page read and write
214BD48A000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C05DB000
trusted library allocation
page read and write
214B73CA000
heap
page read and write
214BD6DF000
trusted library allocation
page read and write
214BFAFE000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B7437000
heap
page read and write
3481000
heap
page read and write
214C12C9000
trusted library allocation
page read and write
214C018A000
trusted library allocation
page read and write
214C10E7000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214B73FE000
heap
page read and write
214B7437000
heap
page read and write
214B73FA000
heap
page read and write
214B73F7000
heap
page read and write
214B7400000
heap
page read and write
214B7453000
heap
page read and write
1AA69EBC000
heap
page read and write
214C1848000
trusted library allocation
page read and write
214C12EF000
trusted library allocation
page read and write
214BC7EA000
trusted library allocation
page read and write
214B7418000
heap
page read and write
214BD4F8000
trusted library allocation
page read and write
214B7406000
heap
page read and write
8743D3B000
stack
page read and write
214BD4CB000
trusted library allocation
page read and write
214C0337000
trusted library allocation
page read and write
214C1300000
trusted library allocation
page read and write
214C2EF6000
trusted library allocation
page read and write
214C3862000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214C07ED000
trusted library allocation
page read and write
214C2CFA000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C28C2000
trusted library allocation
page read and write
214BD6DD000
trusted library allocation
page read and write
214BFAE7000
trusted library allocation
page read and write
214BD6A1000
trusted library allocation
page read and write
214C28C4000
trusted library allocation
page read and write
214C02C8000
trusted library allocation
page read and write
214BE160000
trusted library allocation
page read and write
214BFB50000
trusted library allocation
page read and write
310D9FF000
stack
page read and write
250B9560000
heap
page read and write
214C0278000
trusted library allocation
page read and write
7FE000
stack
page read and write
214BDB0A000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214C1193000
trusted library allocation
page read and write
214B744E000
heap
page read and write
214C1093000
trusted library allocation
page read and write
214C12EE000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C28D4000
trusted library allocation
page read and write
214BBDCA000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
214B73FE000
heap
page read and write
214C2732000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73D7000
heap
page read and write
214C12F7000
trusted library allocation
page read and write
214B73C3000
heap
page read and write
214B741A000
heap
page read and write
214C1182000
trusted library allocation
page read and write
214C24BC000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214C2EE1000
trusted library allocation
page read and write
214BD69A000
trusted library allocation
page read and write
214C2660000
trusted library allocation
page read and write
214B743C000
heap
page read and write
214BC5FD000
trusted library allocation
page read and write
214B73D0000
heap
page read and write
214B744D000
heap
page read and write
214B745E000
heap
page read and write
214C3810000
trusted library allocation
page read and write
214C10F4000
trusted library allocation
page read and write
214C2C5B000
trusted library allocation
page read and write
214C027C000
trusted library allocation
page read and write
214B73DA000
heap
page read and write
214B741D000
heap
page read and write
214B73E6000
heap
page read and write
214BC72A000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73B9000
heap
page read and write
214B73D1000
heap
page read and write
214B73F8000
heap
page read and write
3481000
heap
page read and write
214B73F7000
heap
page read and write
214B73F7000
heap
page read and write
214C38D5000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C27A9000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C1A42000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B7406000
heap
page read and write
214B7417000
heap
page read and write
214B73CC000
heap
page read and write
259FFE00000
trusted library allocation
page read and write
214C10F9000
trusted library allocation
page read and write
214C44D9000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C23A9000
trusted library allocation
page read and write
214C0298000
trusted library allocation
page read and write
214BD47D000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C109E000
trusted library allocation
page read and write
214B73F4000
heap
page read and write
250BA140000
heap
page read and write
214B73F3000
heap
page read and write
214B73C4000
heap
page read and write
214B73F7000
heap
page read and write
214B73D1000
heap
page read and write
1EDDF9E0000
unclassified section
page read and write
214C0389000
trusted library allocation
page read and write
214C0F83000
trusted library allocation
page read and write
250B9D5C000
heap
page read and write
2170003F000
trusted library allocation
page read and write
1EDDFCA7000
trusted library allocation
page read and write
250B9070000
unclassified section
page readonly
AAA5BFE000
unkown
page readonly
214C2718000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C2D17000
trusted library allocation
page read and write
214BDC0A000
trusted library allocation
page read and write
214BD62C000
trusted library allocation
page read and write
250B9465000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B7437000
heap
page read and write
214C1093000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F9000
heap
page read and write
214B73D1000
heap
page read and write
214C10F4000
trusted library allocation
page read and write
214C44E0000
trusted library allocation
page read and write
214B747C000
heap
page read and write
214BFBCA000
trusted library allocation
page read and write
214C10E6000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B73E2000
heap
page read and write
214C26A7000
trusted library allocation
page read and write
214C029F000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C386A000
trusted library allocation
page read and write
214B7462000
heap
page read and write
250B9D5F000
heap
page read and write
214B73D9000
heap
page read and write
214C38A1000
trusted library allocation
page read and write
214B743E000
heap
page read and write
214B7405000
heap
page read and write
214B7462000
heap
page read and write
250B9D7D000
heap
page read and write
214C0E9E000
trusted library allocation
page read and write
214C23C7000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C1039000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73DB000
heap
page read and write
250B9C10000
trusted library allocation
page read and write
214B7461000
heap
page read and write
214BD618000
trusted library allocation
page read and write
214C28C6000
trusted library allocation
page read and write
1EDDFC13000
trusted library allocation
page read and write
214C0260000
trusted library allocation
page read and write
214BD69D000
trusted library allocation
page read and write
214B743B000
heap
page read and write
214B741D000
heap
page read and write
214B73ED000
heap
page read and write
214BD4E5000
trusted library allocation
page read and write
3A8E000
stack
page read and write
250B9411000
trusted library allocation
page read and write
214C288F000
trusted library allocation
page read and write
214C26B1000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
944000
heap
page read and write
214B7407000
heap
page read and write
214C2666000
trusted library allocation
page read and write
214B73CE000
heap
page read and write
250B9403000
trusted library allocation
page read and write
214C0C1E000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B7465000
heap
page read and write
214B73F9000
heap
page read and write
214C0527000
trusted library allocation
page read and write
214BC426000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
3481000
heap
page read and write
214B7406000
heap
page read and write
214B73E6000
heap
page read and write
3481000
heap
page read and write
214C2EF6000
trusted library allocation
page read and write
214BBD88000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B73CB000
heap
page read and write
214B73E6000
heap
page read and write
214B73FE000
heap
page read and write
214C00BF000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73C5000
heap
page read and write
214BFCF1000
trusted library allocation
page read and write
214C12E2000
trusted library allocation
page read and write
214C18F4000
trusted library allocation
page read and write
214C1A0E000
trusted library allocation
page read and write
214C0281000
trusted library allocation
page read and write
250B9556000
unkown
page execute read
214B73F8000
heap
page read and write
214BFCF0000
trusted library allocation
page read and write
214C26EA000
trusted library allocation
page read and write
214B73EC000
heap
page read and write
250B9DFC000
heap
page read and write
214B7417000
heap
page read and write
214B73F3000
heap
page read and write
250BA1B6000
heap
page read and write
214B73FC000
heap
page read and write
214C2CF2000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214BD4DC000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
214BD35E000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214C2C3F000
trusted library allocation
page read and write
214C24D6000
trusted library allocation
page read and write
214C10A2000
trusted library allocation
page read and write
214C1F80000
trusted library allocation
page read and write
214C109C000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F7000
heap
page read and write
3481000
heap
page read and write
214BC475000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214BFB25000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C109E000
trusted library allocation
page read and write
1EDDFD38000
trusted library allocation
page read and write
214C03CE000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73EB000
heap
page read and write
250BA1B6000
heap
page read and write
214B7407000
heap
page read and write
214BFCF0000
trusted library allocation
page read and write
214C20E0000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F7000
heap
page read and write
250B9AD0000
heap
page read and write
214B73E6000
heap
page read and write
1AA6834A000
heap
page read and write
214B73D5000
heap
page read and write
214C1174000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73CC000
heap
page read and write
214C2CFA000
trusted library allocation
page read and write
214BBDC1000
trusted library allocation
page read and write
214C03D6000
trusted library allocation
page read and write
214C0298000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C28EF000
trusted library allocation
page read and write
AAA3948000
stack
page read and write
214C0F6B000
trusted library allocation
page read and write
214B7406000
heap
page read and write
944000
heap
page read and write
214B73ED000
heap
page read and write
214C28CA000
trusted library allocation
page read and write
214C0550000
trusted library allocation
page read and write
214C04EA000
trusted library allocation
page read and write
214BFB50000
trusted library allocation
page read and write
214C2C1D000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C38D1000
trusted library allocation
page read and write
214B7444000
heap
page read and write
214C2C47000
trusted library allocation
page read and write
214C28C0000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73FE000
heap
page read and write
250B9DF2000
heap
page read and write
214C01E7000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214BD6A8000
trusted library allocation
page read and write
214BD6EB000
trusted library allocation
page read and write
214C10CB000
trusted library allocation
page read and write
214BE209000
trusted library allocation
page read and write
214BBFBB000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C1B4C000
trusted library allocation
page read and write
250B9492000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C2CFA000
trusted library allocation
page read and write
214B7460000
heap
page read and write
214B73F7000
heap
page read and write
214B7426000
heap
page read and write
214B73EB000
heap
page read and write
214BC7AD000
trusted library allocation
page read and write
214C2D7C000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214BD451000
trusted library allocation
page read and write
214C2CFA000
trusted library allocation
page read and write
214C2CC4000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
1EDDF800000
unclassified section
page readonly
214B73F3000
heap
page read and write
214BFAE9000
trusted library allocation
page read and write
214C1863000
trusted library allocation
page read and write
214BD62C000
trusted library allocation
page read and write
214C28D4000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C10B4000
trusted library allocation
page read and write
214C277B000
trusted library allocation
page read and write
214BD353000
trusted library allocation
page read and write
214C00E8000
trusted library allocation
page read and write
214BD4C5000
trusted library allocation
page read and write
214C00C1000
trusted library allocation
page read and write
250B9DE0000
heap
page read and write
7CE000
stack
page read and write
214C2DAC000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214C272E000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73E7000
heap
page read and write
214B741A000
heap
page read and write
214C2653000
trusted library allocation
page read and write
214B73F4000
heap
page read and write
214BBEB5000
trusted library allocation
page read and write
214C0F05000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73D3000
heap
page read and write
214B73F1000
heap
page read and write
214C1840000
trusted library allocation
page read and write
214B73DB000
heap
page read and write
A83000
heap
page read and write
214C28BC000
trusted library allocation
page read and write
8743DFE000
unkown
page readonly
214B73CB000
heap
page read and write
214B73F7000
heap
page read and write
214C38A1000
trusted library allocation
page read and write
214C07A5000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B7463000
heap
page read and write
214C109E000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
214B73F3000
heap
page read and write
214B73D1000
heap
page read and write
214C03C5000
trusted library allocation
page read and write
3481000
heap
page read and write
214BFC54000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C38B7000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214C20F8000
trusted library allocation
page read and write
214B73DD000
heap
page read and write
214B73EC000
heap
page read and write
214C0265000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C0B25000
trusted library allocation
page read and write
214BD4E0000
trusted library allocation
page read and write
214BFCF8000
trusted library allocation
page read and write
214BD449000
trusted library allocation
page read and write
214BD47F000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214B7401000
heap
page read and write
214C2E50000
trusted library allocation
page read and write
214BFCCD000
trusted library allocation
page read and write
214C2EF8000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
944000
heap
page read and write
214BC73C000
trusted library allocation
page read and write
214C44D9000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214BE1DF000
trusted library allocation
page read and write
214C2E42000
trusted library allocation
page read and write
474C000
stack
page read and write
214B73F9000
heap
page read and write
214B73FC000
heap
page read and write
214B73FC000
heap
page read and write
214C28C6000
trusted library allocation
page read and write
214C28BE000
trusted library allocation
page read and write
214C3899000
trusted library allocation
page read and write
214B7403000
heap
page read and write
250B9500000
trusted library section
page readonly
214C26B1000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214BFAD1000
trusted library allocation
page read and write
214BC323000
trusted library allocation
page read and write
214B7426000
heap
page read and write
214B742B000
heap
page read and write
214C44A4000
trusted library allocation
page read and write
214C0072000
trusted library allocation
page read and write
214B7478000
heap
page read and write
214BC4E4000
trusted library allocation
page read and write
1EDDFC0E000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214C2CE8000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73CB000
heap
page read and write
1AA69FA0000
heap
page read and write
214C2C47000
trusted library allocation
page read and write
214C3885000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B7406000
heap
page read and write
1AA684D5000
heap
page read and write
214BFB1D000
trusted library allocation
page read and write
3481000
heap
page read and write
214C2D3B000
trusted library allocation
page read and write
214C22CE000
trusted library allocation
page read and write
214C1F5B000
trusted library allocation
page read and write
214C1040000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73F3000
heap
page read and write
214B7466000
heap
page read and write
214B7406000
heap
page read and write
214C2D89000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B7401000
heap
page read and write
214C2E90000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F3000
heap
page read and write
A76000
heap
page read and write
214B73E1000
heap
page read and write
214C1040000
trusted library allocation
page read and write
214BC7EA000
trusted library allocation
page read and write
214C26A7000
trusted library allocation
page read and write
250BA160000
heap
page read and write
214C0154000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73E6000
heap
page read and write
214C0E39000
trusted library allocation
page read and write
1EDDF9E2000
unclassified section
page read and write
214C05CF000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73E6000
heap
page read and write
214BD6C1000
trusted library allocation
page read and write
214C117E000
trusted library allocation
page read and write
87478FE000
stack
page read and write
214BD6E0000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B741D000
heap
page read and write
214B7406000
heap
page read and write
214BC46A000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C0E11000
trusted library allocation
page read and write
1EDDF840000
heap
page read and write
214B73ED000
heap
page read and write
214C1602000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B7403000
heap
page read and write
214C03BF000
trusted library allocation
page read and write
214BD4F1000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214B7478000
heap
page read and write
214B73E6000
heap
page read and write
214C10B3000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73FB000
heap
page read and write
214B73E5000
heap
page read and write
214B73E6000
heap
page read and write
214B7403000
heap
page read and write
214C27C5000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73D1000
heap
page read and write
214C10FB000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73D1000
heap
page read and write
3481000
heap
page read and write
214C38C9000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C19A0000
trusted library allocation
page read and write
214C26E4000
trusted library allocation
page read and write
214C0EE2000
trusted library allocation
page read and write
214B73EB000
heap
page read and write
214B73FE000
heap
page read and write
214B744D000
heap
page read and write
214B7406000
heap
page read and write
214C1081000
trusted library allocation
page read and write
214C0260000
trusted library allocation
page read and write
259FFB00000
heap
page read and write
214B73D7000
heap
page read and write
214C0EBF000
trusted library allocation
page read and write
944000
heap
page read and write
214C2EF0000
trusted library allocation
page read and write
214C3893000
trusted library allocation
page read and write
214C2DB3000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C2E79000
trusted library allocation
page read and write
214C3E30000
trusted library allocation
page read and write
214C2684000
trusted library allocation
page read and write
214C13E4000
trusted library allocation
page read and write
3481000
heap
page read and write
214BD6F6000
trusted library allocation
page read and write
250B9DE8000
heap
page read and write
214B73FE000
heap
page read and write
214C0553000
trusted library allocation
page read and write
214BFA79000
trusted library allocation
page read and write
214C20F2000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
214C12CD000
trusted library allocation
page read and write
214BD437000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
250BA1B6000
heap
page read and write
214C04F5000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214B747F000
heap
page read and write
214B73EB000
heap
page read and write
214C2CBF000
trusted library allocation
page read and write
944000
heap
page read and write
214B73F5000
heap
page read and write
214C0F48000
trusted library allocation
page read and write
214BFC49000
trusted library allocation
page read and write
214BD66E000
trusted library allocation
page read and write
214BC7B2000
trusted library allocation
page read and write
214C38CD000
trusted library allocation
page read and write
214C2D76000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
214B73CB000
heap
page read and write
214C1980000
trusted library allocation
page read and write
214C2D9D000
trusted library allocation
page read and write
214BBE25000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214B7401000
heap
page read and write
2FBCA9C89000
trusted library allocation
page read and write
214B73D2000
heap
page read and write
214BD6F1000
trusted library allocation
page read and write
250BA185000
heap
page read and write
214B7406000
heap
page read and write
214B73F3000
heap
page read and write
214B744D000
heap
page read and write
214C272D000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214BFC8E000
trusted library allocation
page read and write
214B742D000
heap
page read and write
214B741A000
heap
page read and write
214BE151000
trusted library allocation
page read and write
214C0392000
trusted library allocation
page read and write
214C1071000
trusted library allocation
page read and write
214C10B3000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214C2C1B000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214C24EB000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214C2D8C000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73FE000
heap
page read and write
214B73C5000
heap
page read and write
214B73FC000
heap
page read and write
214C1300000
trusted library allocation
page read and write
874603E000
stack
page read and write
214B7427000
heap
page read and write
214C0E39000
trusted library allocation
page read and write
214C2CC4000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C0FD5000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73FE000
heap
page read and write
214B73E6000
heap
page read and write
214C2D83000
trusted library allocation
page read and write
214BD6A6000
trusted library allocation
page read and write
214C1040000
trusted library allocation
page read and write
214C0217000
trusted library allocation
page read and write
1EDDFC72000
trusted library allocation
page read and write
214C28C8000
trusted library allocation
page read and write
214C3875000
trusted library allocation
page read and write
214C3E15000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214B73D1000
heap
page read and write
214C01BF000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214B73FC000
heap
page read and write
214C21FD000
trusted library allocation
page read and write
214B747B000
heap
page read and write
214B7440000
heap
page read and write
214C278B000
trusted library allocation
page read and write
214C0FDF000
trusted library allocation
page read and write
214C0298000
trusted library allocation
page read and write
214B741A000
heap
page read and write
1EDDFC47000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
AAA38CE000
unkown
page readonly
214B7407000
heap
page read and write
214B73E2000
heap
page read and write
214C1182000
trusted library allocation
page read and write
214B73CD000
heap
page read and write
214B744D000
heap
page read and write
214C27D5000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73F9000
heap
page read and write
214B7478000
heap
page read and write
214C186A000
trusted library allocation
page read and write
214C23E8000
trusted library allocation
page read and write
214C44E2000
trusted library allocation
page read and write
214C24CE000
trusted library allocation
page read and write
214C01E1000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C2EF0000
trusted library allocation
page read and write
214C03BF000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B73FE000
heap
page read and write
214BD6BC000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214C28C0000
trusted library allocation
page read and write
214C07B9000
trusted library allocation
page read and write
214C2D25000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73FC000
heap
page read and write
250BA197000
heap
page read and write
214B7406000
heap
page read and write
214C1071000
trusted library allocation
page read and write
214C38CD000
trusted library allocation
page read and write
214C26B4000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
3481000
heap
page read and write
214C026C000
trusted library allocation
page read and write
250B9DB9000
heap
page read and write
214B73EC000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214C105F000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73C5000
heap
page read and write
214C07E8000
trusted library allocation
page read and write
214C2C30000
trusted library allocation
page read and write
214C07C4000
trusted library allocation
page read and write
214C10B3000
trusted library allocation
page read and write
214C1071000
trusted library allocation
page read and write
214BC70E000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
3481000
heap
page read and write
214B7478000
heap
page read and write
214B73F1000
heap
page read and write
214C00F9000
trusted library allocation
page read and write
214BD4FA000
trusted library allocation
page read and write
214C2D95000
trusted library allocation
page read and write
214C0156000
trusted library allocation
page read and write
214BC7B8000
trusted library allocation
page read and write
214C389D000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214B73F0000
heap
page read and write
214C11B5000
trusted library allocation
page read and write
250B9DEC000
heap
page read and write
214BC7CC000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214B744D000
heap
page read and write
214B73F7000
heap
page read and write
214C2C29000
trusted library allocation
page read and write
214C2859000
trusted library allocation
page read and write
214C10A0000
trusted library allocation
page read and write
214C24BC000
trusted library allocation
page read and write
214C10E6000
trusted library allocation
page read and write
214BE1B4000
trusted library allocation
page read and write
250BA185000
heap
page read and write
214C2CBA000
trusted library allocation
page read and write
214C04F5000
trusted library allocation
page read and write
214C1802000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214C38D1000
trusted library allocation
page read and write
214C3899000
trusted library allocation
page read and write
1AA000
stack
page read and write
214BD4B9000
trusted library allocation
page read and write
214C44E4000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73B9000
heap
page read and write
214BD62F000
trusted library allocation
page read and write
214B747B000
heap
page read and write
214BBE81000
trusted library allocation
page read and write
214BD35E000
trusted library allocation
page read and write
214BC3F6000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B73EF000
heap
page read and write
214B744D000
heap
page read and write
214B73FA000
heap
page read and write
EF0000
heap
page read and write
214B73C5000
heap
page read and write
214B73FC000
heap
page read and write
214C1087000
trusted library allocation
page read and write
214BBE83000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
1EDDFE00000
heap
page read and write
214C2143000
trusted library allocation
page read and write
250B9D69000
heap
page read and write
940000
heap
page read and write
250B9DA8000
heap
page read and write
3481000
heap
page read and write
214B7401000
heap
page read and write
214C00F1000
trusted library allocation
page read and write
214C07ED000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214B7427000
heap
page read and write
250B9DF1000
heap
page read and write
214C3862000
trusted library allocation
page read and write
214BBEEF000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B745E000
heap
page read and write
214B73FD000
heap
page read and write
214B73DB000
heap
page read and write
250B94BF000
trusted library allocation
page read and write
214C2C5D000
trusted library allocation
page read and write
214C3E1C000
trusted library allocation
page read and write
214BFA31000
trusted library allocation
page read and write
214C44DE000
trusted library allocation
page read and write
3481000
heap
page read and write
214BFC4B000
trusted library allocation
page read and write
214C1B0F000
trusted library allocation
page read and write
214BFC0B000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73F7000
heap
page read and write
214C3864000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73B9000
heap
page read and write
214C1924000
trusted library allocation
page read and write
214B743E000
heap
page read and write
214B744D000
heap
page read and write
214C38D1000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B745E000
heap
page read and write
214BD444000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B743A000
heap
page read and write
A83000
heap
page read and write
214C1060000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73FF000
heap
page read and write
214B7406000
heap
page read and write
214B7405000
heap
page read and write
1AA68320000
heap
page read and write
214BD679000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F1000
heap
page read and write
214C1033000
trusted library allocation
page read and write
214BD698000
trusted library allocation
page read and write
1AA69EB8000
heap
page read and write
214C10BB000
trusted library allocation
page read and write
3481000
heap
page read and write
1AA68372000
heap
page read and write
214B742B000
heap
page read and write
104C000
unkown
page readonly
AAA74FE000
stack
page read and write
214C03ED000
trusted library allocation
page read and write
944000
heap
page read and write
214B744D000
heap
page read and write
214C272E000
trusted library allocation
page read and write
3481000
heap
page read and write
214C0FFE000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73FE000
heap
page read and write
214B73FE000
heap
page read and write
214C1071000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73F1000
heap
page read and write
1EDDF99A000
heap
page read and write
214C23B9000
trusted library allocation
page read and write
214C18A5000
trusted library allocation
page read and write
214B7418000
heap
page read and write
214B73E2000
heap
page read and write
AAA6C7E000
unkown
page readonly
214B741D000
heap
page read and write
214C3847000
trusted library allocation
page read and write
214B7460000
heap
page read and write
1AA68370000
heap
page read and write
214BD499000
trusted library allocation
page read and write
1A36000
heap
page read and write
214B7406000
heap
page read and write
214B73F9000
heap
page read and write
214B73D1000
heap
page read and write
214B73C5000
heap
page read and write
214B73EE000
heap
page read and write
214B73C1000
heap
page read and write
214B73F8000
heap
page read and write
214C2C1F000
trusted library allocation
page read and write
214C0298000
trusted library allocation
page read and write
214C28C8000
trusted library allocation
page read and write
214C04EF000
trusted library allocation
page read and write
214C01FC000
trusted library allocation
page read and write
214BD5F1000
trusted library allocation
page read and write
3481000
heap
page read and write
214BE164000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
214C03BA000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7406000
heap
page read and write
214B73E3000
heap
page read and write
214B73E5000
heap
page read and write
214B743C000
heap
page read and write
214C1C00000
trusted library allocation
page read and write
214C10C1000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
2109C04000
trusted library allocation
page read and write
250B9060000
unclassified section
page readonly
944000
heap
page read and write
214B73FE000
heap
page read and write
214B73F1000
heap
page read and write
214C11C4000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B7427000
heap
page read and write
214C2674000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214B73F2000
heap
page read and write
214C23B9000
trusted library allocation
page read and write
214BBFEC000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73F8000
heap
page read and write
214C2D94000
trusted library allocation
page read and write
214C2CDF000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73D1000
heap
page read and write
AAA7CFE000
unkown
page readonly
214C38A1000
trusted library allocation
page read and write
214B73D0000
heap
page read and write
214B73D1000
heap
page read and write
944000
heap
page read and write
214C2D5B000
trusted library allocation
page read and write
214BC718000
trusted library allocation
page read and write
214BD679000
trusted library allocation
page read and write
214B7429000
heap
page read and write
214C2D8D000
trusted library allocation
page read and write
214C2E6A000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B7406000
heap
page read and write
214B73E7000
heap
page read and write
214B7406000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214BFB50000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BD4E5000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73F3000
heap
page read and write
214BC482000
trusted library allocation
page read and write
214C2CC4000
trusted library allocation
page read and write
214B73C1000
heap
page read and write
214BBFC9000
trusted library allocation
page read and write
214B73DB000
heap
page read and write
214B73F8000
heap
page read and write
250B9DF1000
heap
page read and write
214B744D000
heap
page read and write
214BC7B8000
trusted library allocation
page read and write
214B7406000
heap
page read and write
1072000
unkown
page readonly
214BD66C000
trusted library allocation
page read and write
214C2D6B000
trusted library allocation
page read and write
214C27F5000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C2653000
trusted library allocation
page read and write
214B7448000
heap
page read and write
214C2C09000
trusted library allocation
page read and write
214C0527000
trusted library allocation
page read and write
214C2EE1000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C2C10000
trusted library allocation
page read and write
214BC7F4000
trusted library allocation
page read and write
1EDDF770000
unclassified section
page readonly
214B73F1000
heap
page read and write
214B7417000
heap
page read and write
189F000
stack
page read and write
214B7417000
heap
page read and write
214B73E1000
heap
page read and write
3481000
heap
page read and write
214C0E39000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214C10AD000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214C26F9000
trusted library allocation
page read and write
214C26A3000
trusted library allocation
page read and write
3481000
heap
page read and write
214BFC44000
trusted library allocation
page read and write
214BC7D7000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214B7424000
heap
page read and write
214B73F7000
heap
page read and write
214B73F8000
heap
page read and write
214B73FE000
heap
page read and write
214B73F7000
heap
page read and write
214B73F1000
heap
page read and write
214C386F000
trusted library allocation
page read and write
214C2D84000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214BE1BD000
trusted library allocation
page read and write
214B7476000
heap
page read and write
214C1195000
trusted library allocation
page read and write
214C2859000
trusted library allocation
page read and write
1EDDFC9D000
trusted library allocation
page read and write
214B73F2000
heap
page read and write
214B7406000
heap
page read and write
214B73CA000
heap
page read and write
214B73F7000
heap
page read and write
214BBE54000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B744D000
heap
page read and write
214C07ED000
trusted library allocation
page read and write
214C2C34000
trusted library allocation
page read and write
214B7447000
heap
page read and write
214BFC4B000
trusted library allocation
page read and write
1EDDF780000
unclassified section
page readonly
214BD675000
trusted library allocation
page read and write
214BFC63000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73FC000
heap
page read and write
214B73EB000
heap
page read and write
214BBFD7000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73F1000
heap
page read and write
214C2DB0000
trusted library allocation
page read and write
214BD6F4000
trusted library allocation
page read and write
214BD5F1000
trusted library allocation
page read and write
214BFADC000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C10AD000
trusted library allocation
page read and write
214B73DD000
heap
page read and write
214BDE0A000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214BC7DE000
trusted library allocation
page read and write
214C0286000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214B73F3000
heap
page read and write
214B73F9000
heap
page read and write
214B73F3000
heap
page read and write
214C28BE000
trusted library allocation
page read and write
214BD4DC000
trusted library allocation
page read and write
214C28C6000
trusted library allocation
page read and write
214B743B000
heap
page read and write
214B73F7000
heap
page read and write
214C12C3000
trusted library allocation
page read and write
214BD679000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
250B942F000
trusted library allocation
page read and write
214BFACE000
trusted library allocation
page read and write
214BD4D0000
trusted library allocation
page read and write
214BFC0E000
trusted library allocation
page read and write
214C27C5000
trusted library allocation
page read and write
214C2C32000
trusted library allocation
page read and write
214C2C32000
trusted library allocation
page read and write
214C05DB000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C1071000
trusted library allocation
page read and write
3481000
heap
page read and write
3481000
heap
page read and write
214BD66E000
trusted library allocation
page read and write
214BE1BD000
trusted library allocation
page read and write
214C2160000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214B73F7000
heap
page read and write
214C2C23000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214B7406000
heap
page read and write
214B744D000
heap
page read and write
250B9D60000
heap
page read and write
250B9477000
trusted library allocation
page read and write
214C2C54000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C00AE000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
3481000
heap
page read and write
214B743D000
heap
page read and write
214B7417000
heap
page read and write
214B73FC000
heap
page read and write
214B73F8000
heap
page read and write
214BBEDB000
trusted library allocation
page read and write
214C11BC000
trusted library allocation
page read and write
214C2D56000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B73E4000
heap
page read and write
214B73FC000
heap
page read and write
214C10AD000
trusted library allocation
page read and write
214C1324000
trusted library allocation
page read and write
214BFCBA000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B7437000
heap
page read and write
214B73E6000
heap
page read and write
214B73DB000
heap
page read and write
3481000
heap
page read and write
214BFAD5000
trusted library allocation
page read and write
214C2E71000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214C1195000
trusted library allocation
page read and write
214C05FA000
trusted library allocation
page read and write
214B7427000
heap
page read and write
214C10CB000
trusted library allocation
page read and write
214C213C000
trusted library allocation
page read and write
214BD6C1000
trusted library allocation
page read and write
214B7406000
heap
page read and write
3481000
heap
page read and write
214B73FE000
heap
page read and write
3481000
heap
page read and write
214B73CC000
heap
page read and write
214C44D5000
trusted library allocation
page read and write
214BFB58000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C0266000
trusted library allocation
page read and write
214B73E1000
heap
page read and write
214B73FF000
heap
page read and write
214B744D000
heap
page read and write
214BD4FA000
trusted library allocation
page read and write
1EDDFC0B000
trusted library allocation
page read and write
214C03C5000
trusted library allocation
page read and write
214BD4CB000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214B7427000
heap
page read and write
214C0263000
trusted library allocation
page read and write
214C0553000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C2DC2000
trusted library allocation
page read and write
214C2C7E000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214B7407000
heap
page read and write
214B73C5000
heap
page read and write
214B73F5000
heap
page read and write
214C024D000
trusted library allocation
page read and write
214C3836000
trusted library allocation
page read and write
214C2C64000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C2C4B000
trusted library allocation
page read and write
214C0EE2000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
259FFBF0000
heap
page read and write
214B73D5000
heap
page read and write
214B73F3000
heap
page read and write
214B73E2000
heap
page read and write
214C10CB000
trusted library allocation
page read and write
214C2D8D000
trusted library allocation
page read and write
214BFAD4000
trusted library allocation
page read and write
214C2C34000
trusted library allocation
page read and write
214C266B000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
310B9FE000
stack
page read and write
214B73E3000
heap
page read and write
214C2EE1000
trusted library allocation
page read and write
214C2EDB000
trusted library allocation
page read and write
214C0F48000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BFC34000
trusted library allocation
page read and write
214C20A6000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BBEAD000
trusted library allocation
page read and write
214BC7A4000
trusted library allocation
page read and write
214C10B3000
trusted library allocation
page read and write
214C0F74000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214BD48A000
trusted library allocation
page read and write
214C2656000
trusted library allocation
page read and write
214B7402000
heap
page read and write
214B73FC000
heap
page read and write
214B73E6000
heap
page read and write
214C12EF000
trusted library allocation
page read and write
214C100E000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B73DD000
heap
page read and write
214B745E000
heap
page read and write
214B73E6000
heap
page read and write
214C2CDD000
trusted library allocation
page read and write
3481000
heap
page read and write
214B745E000
heap
page read and write
214B73F1000
heap
page read and write
214C38D7000
trusted library allocation
page read and write
214C3885000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214BC7AF000
trusted library allocation
page read and write
214C0172000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73F1000
heap
page read and write
214B73F1000
heap
page read and write
214C11BA000
trusted library allocation
page read and write
214B7426000
heap
page read and write
214BFCFB000
trusted library allocation
page read and write
214C2C1B000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73D1000
heap
page read and write
214C2160000
trusted library allocation
page read and write
214BFC44000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214C2C3D000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B7406000
heap
page read and write
214B73F7000
heap
page read and write
214BBE4C000
trusted library allocation
page read and write
214C38D5000
trusted library allocation
page read and write
250B9D9C000
heap
page read and write
214B7428000
heap
page read and write
214BC7BF000
trusted library allocation
page read and write
214C28CA000
trusted library allocation
page read and write
214C23B9000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BFA0E000
trusted library allocation
page read and write
214C2681000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214C1054000
trusted library allocation
page read and write
250B9DE3000
heap
page read and write
1EDDF873000
heap
page read and write
214C03C9000
trusted library allocation
page read and write
214B7418000
heap
page read and write
214B7437000
heap
page read and write
214B73F1000
heap
page read and write
1EDDF9D0000
heap
page readonly
214C07C4000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C2C5B000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214B73D6000
heap
page read and write
1EDDFB00000
heap
page read and write
214BC7A4000
trusted library allocation
page read and write
214C0298000
trusted library allocation
page read and write
214B743C000
heap
page read and write
214B73E2000
heap
page read and write
214B73F8000
heap
page read and write
214B73FB000
heap
page read and write
214BD4FD000
trusted library allocation
page read and write
214C00DC000
trusted library allocation
page read and write
214C039A000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214C28C8000
trusted library allocation
page read and write
1EDDFC67000
trusted library allocation
page read and write
214B73C2000
heap
page read and write
214BD6E0000
trusted library allocation
page read and write
214C4499000
trusted library allocation
page read and write
214C1093000
trusted library allocation
page read and write
214B7428000
heap
page read and write
FB1000
unkown
page execute read
214C10DF000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214C0527000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214B7417000
heap
page read and write
214B73FE000
heap
page read and write
214BFA9B000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
3481000
heap
page read and write
214B73F9000
heap
page read and write
214B73F3000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2697000
trusted library allocation
page read and write
214C02C8000
trusted library allocation
page read and write
250B99D0000
heap
page read and write
214B73C4000
heap
page read and write
214B73F7000
heap
page read and write
214C44E2000
trusted library allocation
page read and write
214B73D0000
heap
page read and write
214C2C30000
trusted library allocation
page read and write
1084000
unkown
page readonly
2FBCA9C1E000
trusted library allocation
page read and write
214BFAA7000
trusted library allocation
page read and write
214C27F5000
trusted library allocation
page read and write
214C2C3D000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214C28BE000
trusted library allocation
page read and write
214C2665000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B745C000
heap
page read and write
214C015A000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214BC7D6000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214BD45D000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C38D1000
trusted library allocation
page read and write
214C28F6000
trusted library allocation
page read and write
214BFC34000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214B73ED000
heap
page read and write
214C10E2000
trusted library allocation
page read and write
A82000
heap
page read and write
214C1057000
trusted library allocation
page read and write
214BFC04000
trusted library allocation
page read and write
214C27ED000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73C5000
heap
page read and write
214C2C54000
trusted library allocation
page read and write
214C2D56000
trusted library allocation
page read and write
214BD4E8000
trusted library allocation
page read and write
214C38D7000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73DF000
heap
page read and write
214BD4E0000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B7401000
heap
page read and write
250B9250000
heap
page read and write
E90000
trusted library allocation
page read and write
214C2DAE000
trusted library allocation
page read and write
214BBE67000
trusted library allocation
page read and write
214C10C1000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C00BF000
trusted library allocation
page read and write
214C1018000
trusted library allocation
page read and write
214C07B9000
trusted library allocation
page read and write
214C22F2000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214B7426000
heap
page read and write
214B73F3000
heap
page read and write
3481000
heap
page read and write
214C1046000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73E6000
heap
page read and write
214B73C5000
heap
page read and write
214BD4F8000
trusted library allocation
page read and write
214C03C9000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73F7000
heap
page read and write
214B73FB000
heap
page read and write
214B73D1000
heap
page read and write
214C2674000
trusted library allocation
page read and write
214C2EC9000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B7401000
heap
page read and write
214B73F7000
heap
page read and write
214B73EF000
heap
page read and write
AAA63FE000
stack
page read and write
214C25CC000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B741A000
heap
page read and write
214C10F2000
trusted library allocation
page read and write
214C07B9000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C1039000
trusted library allocation
page read and write
250B946A000
trusted library allocation
page read and write
214BFCF8000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73E2000
heap
page read and write
214B73F1000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214C2CDD000
trusted library allocation
page read and write
214BD476000
trusted library allocation
page read and write
214BC7EA000
trusted library allocation
page read and write
214BC7F4000
trusted library allocation
page read and write
214B7426000
heap
page read and write
214B73ED000
heap
page read and write
214B741E000
heap
page read and write
214C2E89000
trusted library allocation
page read and write
214C27F5000
trusted library allocation
page read and write
214C2DAC000
trusted library allocation
page read and write
214C1607000
trusted library allocation
page read and write
214C287F000
trusted library allocation
page read and write
214C0154000
trusted library allocation
page read and write
214BC323000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C20BC000
trusted library allocation
page read and write
1EDDF990000
heap
page read and write
214B73F1000
heap
page read and write
214C109E000
trusted library allocation
page read and write
250B9D5F000
heap
page read and write
214C2CDF000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BD468000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
3481000
heap
page read and write
E70000
heap
page read and write
214B73F7000
heap
page read and write
214BDA08000
trusted library allocation
page read and write
214C2D59000
trusted library allocation
page read and write
214BE137000
trusted library allocation
page read and write
214BFB4C000
trusted library allocation
page read and write
214C386A000
trusted library allocation
page read and write
214B746B000
heap
page read and write
250B94CF000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73FB000
heap
page read and write
250B9DEC000
heap
page read and write
214B744D000
heap
page read and write
214C109E000
trusted library allocation
page read and write
214C3875000
trusted library allocation
page read and write
214C07C2000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2C34000
trusted library allocation
page read and write
214C24BC000
trusted library allocation
page read and write
214C383B000
trusted library allocation
page read and write
214C10F7000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2C32000
trusted library allocation
page read and write
214C286F000
trusted library allocation
page read and write
214C2D31000
trusted library allocation
page read and write
AAA84FE000
stack
page read and write
214B73C3000
heap
page read and write
214C119A000
trusted library allocation
page read and write
214B7466000
heap
page read and write
214B7407000
heap
page read and write
214B73EF000
heap
page read and write
214B73E3000
heap
page read and write
214C2C65000
trusted library allocation
page read and write
1EDDFD0F000
trusted library allocation
page read and write
214C2D8D000
trusted library allocation
page read and write
214BBE45000
trusted library allocation
page read and write
3481000
heap
page read and write
214C2656000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C278B000
trusted library allocation
page read and write
214C38CD000
trusted library allocation
page read and write
214C23B9000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214C26C2000
trusted library allocation
page read and write
214C12E2000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B7406000
heap
page read and write
214C26A3000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73ED000
heap
page read and write
214C1984000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73F7000
heap
page read and write
214BD4B9000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214C1035000
trusted library allocation
page read and write
214C0E39000
trusted library allocation
page read and write
AAA43D8000
stack
page read and write
214B73D1000
heap
page read and write
214BFADC000
trusted library allocation
page read and write
214BC70A000
trusted library allocation
page read and write
214B7478000
heap
page read and write
214BE1CF000
trusted library allocation
page read and write
104C000
unkown
page readonly
214BD6BC000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C28D4000
trusted library allocation
page read and write
214C277E000
trusted library allocation
page read and write
214C3872000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B741E000
heap
page read and write
214C00BF000
trusted library allocation
page read and write
214BFACE000
trusted library allocation
page read and write
214C2C8B000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214C26EB000
trusted library allocation
page read and write
214C2D5E000
trusted library allocation
page read and write
AAA8CFE000
unkown
page readonly
214C00B3000
trusted library allocation
page read and write
250B9DE8000
heap
page read and write
214BD4D0000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C28CA000
trusted library allocation
page read and write
214BBD52000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C2CBF000
trusted library allocation
page read and write
250B9B00000
heap
page read and write
214C0EA2000
trusted library allocation
page read and write
214BD4D0000
trusted library allocation
page read and write
214B7402000
heap
page read and write
250B9D63000
heap
page read and write
214B7406000
heap
page read and write
214B73DD000
heap
page read and write
214B741A000
heap
page read and write
214BC7EA000
trusted library allocation
page read and write
214C24FD000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
214C0F05000
trusted library allocation
page read and write
214C23C7000
trusted library allocation
page read and write
214B7430000
heap
page read and write
214B744D000
heap
page read and write
214B7401000
heap
page read and write
214B7405000
heap
page read and write
214B73F1000
heap
page read and write
214B73F8000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B744D000
heap
page read and write
1AA6860A000
trusted library allocation
page read and write
214C2ECE000
trusted library allocation
page read and write
214B7423000
heap
page read and write
214B73E6000
heap
page read and write
214C109E000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73FC000
heap
page read and write
214B7406000
heap
page read and write
214C2494000
trusted library allocation
page read and write
3481000
heap
page read and write
214B7406000
heap
page read and write
214C0045000
trusted library allocation
page read and write
214C1161000
trusted library allocation
page read and write
214C44A4000
trusted library allocation
page read and write
214BE1E9000
trusted library allocation
page read and write
214C10B3000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C25DD000
trusted library allocation
page read and write
214BBE6C000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C24DC000
trusted library allocation
page read and write
214C0EA2000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
250BA183000
heap
page read and write
214C286F000
trusted library allocation
page read and write
214C2EDB000
trusted library allocation
page read and write
250B9D5C000
heap
page read and write
214C277E000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C3880000
trusted library allocation
page read and write
214C287B000
trusted library allocation
page read and write
214B73DA000
heap
page read and write
214BD4E5000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C2773000
trusted library allocation
page read and write
214C00DC000
trusted library allocation
page read and write
214C2EF0000
trusted library allocation
page read and write
214C1182000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
214BD6DC000
trusted library allocation
page read and write
214C2CDF000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B7460000
heap
page read and write
214C287F000
trusted library allocation
page read and write
214C0286000
trusted library allocation
page read and write
214C2DAC000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214C27E3000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
3481000
heap
page read and write
214B73F7000
heap
page read and write
250BA197000
heap
page read and write
214B73F9000
heap
page read and write
214C0F07000
trusted library allocation
page read and write
214B73CE000
heap
page read and write
214B73FB000
heap
page read and write
214C01BC000
trusted library allocation
page read and write
214BD5F1000
trusted library allocation
page read and write
214C38C9000
trusted library allocation
page read and write
214C01F9000
trusted library allocation
page read and write
3481000
heap
page read and write
214C38CB000
trusted library allocation
page read and write
214BD4C8000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214C2D70000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214C2CD2000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214B73EA000
heap
page read and write
214BFCAC000
trusted library allocation
page read and write
CF7F3FC000
stack
page read and write
214C003B000
trusted library allocation
page read and write
214C10B4000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
250B910A000
heap
page read and write
214B73F1000
heap
page read and write
AC3000
heap
page read and write
214B73CC000
heap
page read and write
214C10A2000
trusted library allocation
page read and write
214B7406000
heap
page read and write
92E000
stack
page read and write
214C10D6000
trusted library allocation
page read and write
250B9DE0000
heap
page read and write
214B73F1000
heap
page read and write
214B73E2000
heap
page read and write
214C10B4000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B73F7000
heap
page read and write
214B73EE000
heap
page read and write
214C2CB2000
trusted library allocation
page read and write
214B7460000
heap
page read and write
214B744D000
heap
page read and write
214B73F1000
heap
page read and write
214B73F7000
heap
page read and write
214C10DF000
trusted library allocation
page read and write
214C01BF000
trusted library allocation
page read and write
214C2D8D000
trusted library allocation
page read and write
214C0F48000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214C27ED000
trusted library allocation
page read and write
214BD4A1000
trusted library allocation
page read and write
214C03BA000
trusted library allocation
page read and write
214C02C8000
trusted library allocation
page read and write
214C03C9000
trusted library allocation
page read and write
214B7466000
heap
page read and write
214C44D5000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73DF000
heap
page read and write
214B73FE000
heap
page read and write
214B73FA000
heap
page read and write
214B73F4000
heap
page read and write
214C28C4000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214B73CA000
heap
page read and write
214BFB58000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C288B000
trusted library allocation
page read and write
214C1920000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214BD4C8000
trusted library allocation
page read and write
214B7403000
heap
page read and write
214B744D000
heap
page read and write
214B740F000
heap
page read and write
250B90D9000
remote allocation
page execute read
214BD4F8000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C109E000
trusted library allocation
page read and write
214B73EA000
heap
page read and write
214C0285000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
250BA183000
heap
page read and write
214B7409000
heap
page read and write
214B744D000
heap
page read and write
214B73F1000
heap
page read and write
214C248E000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B744D000
heap
page read and write
214C28CA000
trusted library allocation
page read and write
214B73F4000
heap
page read and write
214B73E5000
heap
page read and write
214BC7BB000
trusted library allocation
page read and write
214BBE8A000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73D3000
heap
page read and write
214B741A000
heap
page read and write
214C12F1000
trusted library allocation
page read and write
214C2768000
trusted library allocation
page read and write
214C00AE000
trusted library allocation
page read and write
214B7406000
heap
page read and write
1EDDFC23000
trusted library allocation
page read and write
214C0126000
trusted library allocation
page read and write
250BA181000
heap
page read and write
214B7406000
heap
page read and write
214C21FD000
trusted library allocation
page read and write
214BC736000
trusted library allocation
page read and write
214BFCFB000
trusted library allocation
page read and write
214C248E000
trusted library allocation
page read and write
214B73EB000
heap
page read and write
214B73FA000
heap
page read and write
214C2ED5000
trusted library allocation
page read and write
214C38CB000
trusted library allocation
page read and write
214BD4DC000
trusted library allocation
page read and write
250B9C00000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214BBE43000
trusted library allocation
page read and write
214BD605000
trusted library allocation
page read and write
FB0000
unkown
page readonly
214C26EA000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
250BA1B9000
heap
page read and write
214B7478000
heap
page read and write
214C0021000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B7417000
heap
page read and write
214C2DCC000
trusted library allocation
page read and write
250B9D00000
heap
page read and write
1EDDFC81000
trusted library allocation
page read and write
250B955F000
unkown
page execute read
214C2863000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214B73F3000
heap
page read and write
214C2D89000
trusted library allocation
page read and write
214B73E3000
heap
page read and write
214C2C4B000
trusted library allocation
page read and write
214C2D26000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214C389D000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214C273F000
trusted library allocation
page read and write
214B73DB000
heap
page read and write
214B746F000
heap
page read and write
A8F000
heap
page read and write
214BBE6E000
trusted library allocation
page read and write
214C4491000
trusted library allocation
page read and write
214B73CD000
heap
page read and write
214C38CB000
trusted library allocation
page read and write
214C38D3000
trusted library allocation
page read and write
CF7FBFF000
stack
page read and write
214C2CAE000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B741C000
heap
page read and write
214B73E6000
heap
page read and write
214B73E3000
heap
page read and write
214BBD9B000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214B7417000
heap
page read and write
250B9474000
trusted library allocation
page read and write
3481000
heap
page read and write
1EDDFC5D000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73F7000
heap
page read and write
214C277B000
trusted library allocation
page read and write
214B7448000
heap
page read and write
214B7478000
heap
page read and write
214C20BC000
trusted library allocation
page read and write
214B743E000
heap
page read and write
214B743C000
heap
page read and write
214B747F000
heap
page read and write
214BD679000
trusted library allocation
page read and write
214C2CDD000
trusted library allocation
page read and write
214C034F000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73F0000
heap
page read and write
250B9DEC000
heap
page read and write
214B741B000
heap
page read and write
214C3899000
trusted library allocation
page read and write
214C10F4000
trusted library allocation
page read and write
98E000
stack
page read and write
214C213E000
trusted library allocation
page read and write
214C10DF000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214C2CC8000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214BFAAA000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73CC000
heap
page read and write
214C2D89000
trusted library allocation
page read and write
214C027E000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214BFCFB000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B7405000
heap
page read and write
214C38C9000
trusted library allocation
page read and write
214B73CA000
heap
page read and write
214C2D82000
trusted library allocation
page read and write
214C28EF000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214C19C0000
trusted library allocation
page read and write
214C05FA000
trusted library allocation
page read and write
214C38CF000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
250B9DEC000
heap
page read and write
214BD66E000
trusted library allocation
page read and write
214C288B000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73F8000
heap
page read and write
214C10E6000
trusted library allocation
page read and write
214C1193000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214C05CF000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C0E17000
trusted library allocation
page read and write
214BD6F6000
trusted library allocation
page read and write
214C1021000
trusted library allocation
page read and write
250B99F5000
heap
page read and write
3481000
heap
page read and write
214C1946000
trusted library allocation
page read and write
259FFE07000
trusted library allocation
page read and write
214B7406000
heap
page read and write
250BA1B6000
heap
page read and write
214C10AA000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B73DA000
heap
page read and write
214B7405000
heap
page read and write
214C11C4000
trusted library allocation
page read and write
214C03CB000
trusted library allocation
page read and write
250B9D8D000
heap
page read and write
214C07ED000
trusted library allocation
page read and write
214B745E000
heap
page read and write
1EDDFD00000
trusted library allocation
page read and write
250B9DFC000
heap
page read and write
214B73ED000
heap
page read and write
214B7437000
heap
page read and write
214C28C2000
trusted library allocation
page read and write
250B9DE8000
heap
page read and write
AAA388D000
stack
page read and write
214C1060000
trusted library allocation
page read and write
214C2CBA000
trusted library allocation
page read and write
214C0E39000
trusted library allocation
page read and write
214BFAA7000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
214B741D000
heap
page read and write
214C0E9E000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214B744D000
heap
page read and write
214B7406000
heap
page read and write
214C264F000
trusted library allocation
page read and write
944000
heap
page read and write
250B9DA1000
heap
page read and write
214B7406000
heap
page read and write
214C03ED000
trusted library allocation
page read and write
214BC7DB000
trusted library allocation
page read and write
214C10CB000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B7427000
heap
page read and write
214C10CB000
trusted library allocation
page read and write
214BD6F3000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C238E000
trusted library allocation
page read and write
214C2C5B000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214B7409000
heap
page read and write
214C2D2C000
trusted library allocation
page read and write
214C2723000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214B73DF000
heap
page read and write
214B06EC000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73FC000
heap
page read and write
214B741A000
heap
page read and write
214B73F5000
heap
page read and write
214BC718000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214B7478000
heap
page read and write
214B73F1000
heap
page read and write
214B73EA000
heap
page read and write
214BFAA2000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214B73F8000
heap
page read and write
214B73F1000
heap
page read and write
214C2CB2000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73C5000
heap
page read and write
214B73F7000
heap
page read and write
214C265D000
trusted library allocation
page read and write
214BC4A4000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214BBFE7000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214BC7B8000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214C0EE2000
trusted library allocation
page read and write
1080000
unkown
page write copy
250B9AE0000
unkown
page execute read
214C05CF000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B73DB000
heap
page read and write
214C248E000
trusted library allocation
page read and write
214B73D7000
heap
page read and write
214B73F1000
heap
page read and write
214B73F8000
heap
page read and write
214BFA33000
trusted library allocation
page read and write
214C2D1C000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C27D5000
trusted library allocation
page read and write
214C28FE000
trusted library allocation
page read and write
3481000
heap
page read and write
214BE134000
trusted library allocation
page read and write
214C2697000
trusted library allocation
page read and write
214BC7CA000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214BC7AD000
trusted library allocation
page read and write
214C28C2000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214BD499000
trusted library allocation
page read and write
214BD4E5000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
3481000
heap
page read and write
214C025C000
trusted library allocation
page read and write
214B73D7000
heap
page read and write
214C239B000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
250B92A0000
heap
page readonly
214B741D000
heap
page read and write
214B744D000
heap
page read and write
214C1AE2000
trusted library allocation
page read and write
214C2737000
trusted library allocation
page read and write
214C1A6F000
trusted library allocation
page read and write
214BFC0B000
trusted library allocation
page read and write
214B73C1000
heap
page read and write
214B73E1000
heap
page read and write
214BD4FA000
trusted library allocation
page read and write
214BD698000
trusted library allocation
page read and write
214BD5D4000
trusted library allocation
page read and write
214BD4B9000
trusted library allocation
page read and write
214C01B8000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73F7000
heap
page read and write
1EDDFA00000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B741E000
heap
page read and write
214B73C1000
heap
page read and write
214B73F7000
heap
page read and write
214C2D9E000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214BBFF4000
trusted library allocation
page read and write
214C10B4000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214BD633000
trusted library allocation
page read and write
214BD6C1000
trusted library allocation
page read and write
214C2C10000
trusted library allocation
page read and write
214C28F6000
trusted library allocation
page read and write
250B9D7F000
heap
page read and write
214C44DC000
trusted library allocation
page read and write
214C0148000
trusted library allocation
page read and write
214B747F000
heap
page read and write
214B73E6000
heap
page read and write
214B73B9000
heap
page read and write
214C0550000
trusted library allocation
page read and write
214B73D3000
heap
page read and write
214C2768000
trusted library allocation
page read and write
214C2CE8000
trusted library allocation
page read and write
214C2D1C000
trusted library allocation
page read and write
214C1182000
trusted library allocation
page read and write
250B92D0000
trusted library allocation
page read and write
214B7429000
heap
page read and write
214B7453000
heap
page read and write
3481000
heap
page read and write
214C3889000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C38CB000
trusted library allocation
page read and write
214B744D000
heap
page read and write
1EDDFE02000
heap
page read and write
214C44A4000
trusted library allocation
page read and write
214C287B000
trusted library allocation
page read and write
214BD4F1000
trusted library allocation
page read and write
214BD4A1000
trusted library allocation
page read and write
214B746B000
heap
page read and write
3481000
heap
page read and write
214C27C5000
trusted library allocation
page read and write
214BBDDF000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214B73E2000
heap
page read and write
214B73F7000
heap
page read and write
214C1099000
trusted library allocation
page read and write
214B747C000
heap
page read and write
214B7417000
heap
page read and write
214B73DA000
heap
page read and write
214BC72A000
trusted library allocation
page read and write
214C2CD2000
trusted library allocation
page read and write
214B73DF000
heap
page read and write
214C07C0000
trusted library allocation
page read and write
214BD6F1000
trusted library allocation
page read and write
214C3889000
trusted library allocation
page read and write
214C0286000
trusted library allocation
page read and write
214C24FD000
trusted library allocation
page read and write
214C38B7000
trusted library allocation
page read and write
214C28C6000
trusted library allocation
page read and write
250B94FB000
trusted library allocation
page read and write
214B741E000
heap
page read and write
214B7417000
heap
page read and write
214C10AD000
trusted library allocation
page read and write
4FFC000
stack
page read and write
214B73E6000
heap
page read and write
214C2D59000
trusted library allocation
page read and write
214C2D76000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73CD000
heap
page read and write
214C01BC000
trusted library allocation
page read and write
214C266D000
trusted library allocation
page read and write
250BA16D000
heap
page read and write
214C2C5D000
trusted library allocation
page read and write
3481000
heap
page read and write
214C117E000
trusted library allocation
page read and write
3480000
heap
page read and write
214B7417000
heap
page read and write
214BC500000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C3E29000
trusted library allocation
page read and write
250B9D08000
heap
page read and write
214C11C6000
trusted library allocation
page read and write
214C1054000
trusted library allocation
page read and write
214B73FA000
heap
page read and write
214C3E30000
trusted library allocation
page read and write
214C03E4000
trusted library allocation
page read and write
214B73F0000
heap
page read and write
944000
heap
page read and write
214C28C8000
trusted library allocation
page read and write
214B7405000
heap
page read and write
250BA199000
heap
page read and write
214B73E1000
heap
page read and write
214B73C4000
heap
page read and write
214B747C000
heap
page read and write
214B7417000
heap
page read and write
214C0EA2000
trusted library allocation
page read and write
250B92CF000
unclassified section
page read and write
214C1AE6000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B7406000
heap
page read and write
214B73F7000
heap
page read and write
214C01DC000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B742D000
heap
page read and write
1EDDF870000
heap
page read and write
214C2D94000
trusted library allocation
page read and write
214C2CD2000
trusted library allocation
page read and write
214BD675000
trusted library allocation
page read and write
214BFC31000
trusted library allocation
page read and write
214BD4FD000
trusted library allocation
page read and write
214B73CE000
heap
page read and write
214BBE6C000
trusted library allocation
page read and write
214BD69D000
trusted library allocation
page read and write
214C1182000
trusted library allocation
page read and write
214C287B000
trusted library allocation
page read and write
214B7477000
heap
page read and write
214B73EF000
heap
page read and write
214BE155000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
3481000
heap
page read and write
214B73C5000
heap
page read and write
214BD386000
trusted library allocation
page read and write
214C2732000
trusted library allocation
page read and write
214C28C2000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B7417000
heap
page read and write
214B743E000
heap
page read and write
214B7402000
heap
page read and write
944000
heap
page read and write
214C26A3000
trusted library allocation
page read and write
214B7406000
heap
page read and write
250B9DE3000
heap
page read and write
214C38D3000
trusted library allocation
page read and write
214B73C3000
heap
page read and write
214C104E000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214B73E6000
heap
page read and write
250B9DFC000
heap
page read and write
214C2D5B000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73F7000
heap
page read and write
214B73F7000
heap
page read and write
3481000
heap
page read and write
214B7406000
heap
page read and write
214BBE4E000
trusted library allocation
page read and write
214BD66C000
trusted library allocation
page read and write
250BA197000
heap
page read and write
214B73C2000
heap
page read and write
214C286F000
trusted library allocation
page read and write
214B7460000
heap
page read and write
214BFB3F000
trusted library allocation
page read and write
214C44D7000
trusted library allocation
page read and write
214C029F000
trusted library allocation
page read and write
214C38D5000
trusted library allocation
page read and write
214C12C5000
trusted library allocation
page read and write
1EDDFD21000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C2694000
trusted library allocation
page read and write
214B73F2000
heap
page read and write
214C27F5000
trusted library allocation
page read and write
1EDDFC5B000
trusted library allocation
page read and write
3481000
heap
page read and write
214BD6C7000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B7417000
heap
page read and write
214B7406000
heap
page read and write
214C11B3000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214BC32F000
trusted library allocation
page read and write
214BBE5E000
trusted library allocation
page read and write
214C10E0000
trusted library allocation
page read and write
214C27E3000
trusted library allocation
page read and write
250B9AE8000
unkown
page execute read
214B73F0000
heap
page read and write
214B7440000
heap
page read and write
214C3815000
trusted library allocation
page read and write
214C26D4000
trusted library allocation
page read and write
214BD4FA000
trusted library allocation
page read and write
214B744D000
heap
page read and write
1AA68600000
trusted library allocation
page read and write
214C07E8000
trusted library allocation
page read and write
214BBEEF000
trusted library allocation
page read and write
214B7403000
heap
page read and write
214B73F7000
heap
page read and write
214B73CC000
heap
page read and write
214C1182000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214C20D7000
trusted library allocation
page read and write
250B955C000
unkown
page execute read
214C2CB2000
trusted library allocation
page read and write
214B73D2000
heap
page read and write
214C03DB000
trusted library allocation
page read and write
250B9D4D000
heap
page read and write
214C10BB000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
250B9D69000
heap
page read and write
1AA6835D000
heap
page read and write
214B73CA000
heap
page read and write
214BFC49000
trusted library allocation
page read and write
214C2697000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B73EB000
heap
page read and write
214C1048000
trusted library allocation
page read and write
7DB000
stack
page read and write
214C10A2000
trusted library allocation
page read and write
214BFA62000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73F1000
heap
page read and write
250B9DF1000
heap
page read and write
214C116C000
trusted library allocation
page read and write
214C2671000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C38D7000
trusted library allocation
page read and write
214BD4C5000
trusted library allocation
page read and write
214B73CA000
heap
page read and write
214B7417000
heap
page read and write
214BFCEF000
trusted library allocation
page read and write
214B7404000
heap
page read and write
214B73FA000
heap
page read and write
214B73CD000
heap
page read and write
214B7405000
heap
page read and write
214B73F7000
heap
page read and write
214BBFAD000
trusted library allocation
page read and write
214BC7B8000
trusted library allocation
page read and write
214C05CF000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214BE1E9000
trusted library allocation
page read and write
214BFC5D000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73FF000
heap
page read and write
250B9DE6000
heap
page read and write
214C059B000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B73FF000
heap
page read and write
1EDDF820000
heap
page read and write
214C10D8000
trusted library allocation
page read and write
214C07ED000
trusted library allocation
page read and write
250BA1AD000
heap
page read and write
214C3893000
trusted library allocation
page read and write
214C2582000
trusted library allocation
page read and write
214C1402000
trusted library allocation
page read and write
214B744D000
heap
page read and write
1EDDFD03000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
1EDDF950000
heap
page read and write
250B9D7D000
heap
page read and write
214C1A2C000
trusted library allocation
page read and write
214C0F07000
trusted library allocation
page read and write
250BA185000
heap
page read and write
214B73FE000
heap
page read and write
214B73E6000
heap
page read and write
214B73D0000
heap
page read and write
214B73ED000
heap
page read and write
214BE16D000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73D5000
heap
page read and write
214B73D1000
heap
page read and write
214BC7A4000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214B73D1000
heap
page read and write
214B7406000
heap
page read and write
214B73E5000
heap
page read and write
214BC47E000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C10E4000
trusted library allocation
page read and write
214C01B6000
trusted library allocation
page read and write
214C2732000
trusted library allocation
page read and write
214B73EE000
heap
page read and write
214B73D1000
heap
page read and write
214B7406000
heap
page read and write
214C0156000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C38B7000
trusted library allocation
page read and write
214BC70A000
trusted library allocation
page read and write
214C0278000
trusted library allocation
page read and write
214C2CC8000
trusted library allocation
page read and write
214C0586000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C10A2000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214BD6A6000
trusted library allocation
page read and write
214B73F2000
heap
page read and write
214C2DB3000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B73F7000
heap
page read and write
214C10FB000
trusted library allocation
page read and write
214C10A2000
trusted library allocation
page read and write
214C22C3000
trusted library allocation
page read and write
214BC736000
trusted library allocation
page read and write
214BD694000
trusted library allocation
page read and write
214B73FD000
heap
page read and write
214BC500000
trusted library allocation
page read and write
214C0FD5000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73F7000
heap
page read and write
214B73F7000
heap
page read and write
214C2C32000
trusted library allocation
page read and write
A50000
heap
page read and write
214B73F1000
heap
page read and write
214C2CEA000
trusted library allocation
page read and write
214BFADC000
trusted library allocation
page read and write
214C2C34000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B7417000
heap
page read and write
214C2D97000
trusted library allocation
page read and write
214B741E000
heap
page read and write
214C2E98000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B73EE000
heap
page read and write
214B73F1000
heap
page read and write
214C38D1000
trusted library allocation
page read and write
214BD340000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F8000
heap
page read and write
214C2710000
trusted library allocation
page read and write
214C026C000
trusted library allocation
page read and write
214B73EE000
heap
page read and write
214BD4CB000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73FF000
heap
page read and write
214BD6A8000
trusted library allocation
page read and write
214C2D95000
trusted library allocation
page read and write
214B73EE000
heap
page read and write
214BBE83000
trusted library allocation
page read and write
214BC718000
trusted library allocation
page read and write
214B73E3000
heap
page read and write
214C2145000
trusted library allocation
page read and write
214C02C8000
trusted library allocation
page read and write
214C21BA000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
3481000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214C26E4000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
3481000
heap
page read and write
214B7407000
heap
page read and write
3481000
heap
page read and write
214B7408000
heap
page read and write
214B7406000
heap
page read and write
214C18CD000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214C00F9000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73E2000
heap
page read and write
214B73FA000
heap
page read and write
214B73F7000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214C07E8000
trusted library allocation
page read and write
214B73E1000
heap
page read and write
214B73F7000
heap
page read and write
214C238E000
trusted library allocation
page read and write
214B7403000
heap
page read and write
214B73E2000
heap
page read and write
214C2CEA000
trusted library allocation
page read and write
214C0EBF000
trusted library allocation
page read and write
3481000
heap
page read and write
214BBDB3000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214B73C4000
heap
page read and write
944000
heap
page read and write
214B73FA000
heap
page read and write
214BD66C000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73DF000
heap
page read and write
944000
heap
page read and write
214B73F9000
heap
page read and write
214B7478000
heap
page read and write
214B7427000
heap
page read and write
214B73F5000
heap
page read and write
250B955A000
unkown
page execute read
214B73F3000
heap
page read and write
310B1FF000
stack
page read and write
214B73EA000
heap
page read and write
214B73EC000
heap
page read and write
214B73C5000
heap
page read and write
214C025D000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
214C02C8000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73F7000
heap
page read and write
214B73FE000
heap
page read and write
214C2768000
trusted library allocation
page read and write
214C2732000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
944000
heap
page read and write
214BC7B4000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C2DB3000
trusted library allocation
page read and write
214C26E7000
trusted library allocation
page read and write
214C0136000
trusted library allocation
page read and write
250B9554000
unkown
page execute read
214B7406000
heap
page read and write
214B73F8000
heap
page read and write
214BBD6F000
trusted library allocation
page read and write
214BBF9B000
trusted library allocation
page read and write
214C07E8000
trusted library allocation
page read and write
214BD4E0000
trusted library allocation
page read and write
214BBE06000
trusted library allocation
page read and write
214C2C30000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214B747C000
heap
page read and write
214B73FD000
heap
page read and write
214B744D000
heap
page read and write
214B7405000
heap
page read and write
214C0E9E000
trusted library allocation
page read and write
214C248E000
trusted library allocation
page read and write
214B73D7000
heap
page read and write
214B73FF000
heap
page read and write
214C25F2000
trusted library allocation
page read and write
214C3E2B000
trusted library allocation
page read and write
214B7401000
heap
page read and write
214C20CA000
trusted library allocation
page read and write
214C2C2C000
trusted library allocation
page read and write
214B73EF000
heap
page read and write
214C3E14000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
214BBE3D000
trusted library allocation
page read and write
214BFC8B000
trusted library allocation
page read and write
3481000
heap
page read and write
214C104E000
trusted library allocation
page read and write
214BFBC8000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73C1000
heap
page read and write
214B73F7000
heap
page read and write
214B73C1000
heap
page read and write
214C0FDF000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
250BA169000
heap
page read and write
214B73FA000
heap
page read and write
214C2C47000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214B73EA000
heap
page read and write
149E000
stack
page read and write
214B73F2000
heap
page read and write
214B73FE000
heap
page read and write
214B73FC000
heap
page read and write
1072000
unkown
page readonly
214B73E4000
heap
page read and write
214B73C5000
heap
page read and write
214BFB50000
trusted library allocation
page read and write
214C213C000
trusted library allocation
page read and write
3481000
heap
page read and write
214B7406000
heap
page read and write
214C3E1A000
trusted library allocation
page read and write
214B741E000
heap
page read and write
214B741A000
heap
page read and write
214B7407000
heap
page read and write
214B7405000
heap
page read and write
214C382B000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F0000
heap
page read and write
1EDDFB46000
heap
page read and write
250BA183000
heap
page read and write
1AA68340000
heap
page read and write
214C03D0000
trusted library allocation
page read and write
214BD358000
trusted library allocation
page read and write
214B741E000
heap
page read and write
214B7401000
heap
page read and write
214C38CD000
trusted library allocation
page read and write
214C3E11000
trusted library allocation
page read and write
250BA169000
heap
page read and write
214B7417000
heap
page read and write
214B7417000
heap
page read and write
214C2CD2000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2EF8000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73E2000
heap
page read and write
214C388F000
trusted library allocation
page read and write
214C0260000
trusted library allocation
page read and write
214C2C1D000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F9000
heap
page read and write
214C2D73000
trusted library allocation
page read and write
214BD675000
trusted library allocation
page read and write
214C2D44000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214BFBCA000
trusted library allocation
page read and write
214C2CBA000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73D6000
heap
page read and write
214B73C3000
heap
page read and write
3481000
heap
page read and write
214C012C000
trusted library allocation
page read and write
214C2900000
trusted library allocation
page read and write
214C1174000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73EE000
heap
page read and write
214BC7BF000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7427000
heap
page read and write
214B742C000
heap
page read and write
214BFA62000
trusted library allocation
page read and write
214B73D6000
heap
page read and write
214B73F3000
heap
page read and write
214BC7D6000
trusted library allocation
page read and write
214BBEE0000
trusted library allocation
page read and write
214C27ED000
trusted library allocation
page read and write
3481000
heap
page read and write
214B7466000
heap
page read and write
214B73FC000
heap
page read and write
214B73F7000
heap
page read and write
214B73CC000
heap
page read and write
214B7428000
heap
page read and write
A83000
heap
page read and write
250BA1AD000
heap
page read and write
250B92C0000
unclassified section
page read and write
42CE000
stack
page read and write
214C38CF000
trusted library allocation
page read and write
214B7428000
heap
page read and write
214C1AB0000
trusted library allocation
page read and write
214B73FF000
heap
page read and write
214B73C5000
heap
page read and write
214B73C5000
heap
page read and write
214BFA0F000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73E6000
heap
page read and write
214B73F7000
heap
page read and write
214B7437000
heap
page read and write
214C384E000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73F8000
heap
page read and write
214B741E000
heap
page read and write
214C01E9000
trusted library allocation
page read and write
250BA1B8000
heap
page read and write
214C28C4000
trusted library allocation
page read and write
214C10BB000
trusted library allocation
page read and write
3481000
heap
page read and write
214C0553000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73E6000
heap
page read and write
214BC31B000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73CA000
heap
page read and write
214C075B000
trusted library allocation
page read and write
214C28C6000
trusted library allocation
page read and write
259FFBF9000
heap
page read and write
214BC716000
trusted library allocation
page read and write
214BC721000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214B73E2000
heap
page read and write
214B73C5000
heap
page read and write
214B73FE000
heap
page read and write
214B7406000
heap
page read and write
214B73CC000
heap
page read and write
214B73CC000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214C2CAE000
trusted library allocation
page read and write
214C2ECE000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C0EBF000
trusted library allocation
page read and write
214C10C1000
trusted library allocation
page read and write
214BD6F6000
trusted library allocation
page read and write
214BD6C1000
trusted library allocation
page read and write
214C0079000
trusted library allocation
page read and write
214C03BA000
trusted library allocation
page read and write
214BC371000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B73E6000
heap
page read and write
250BA1B6000
heap
page read and write
214B741A000
heap
page read and write
214B73F5000
heap
page read and write
3481000
heap
page read and write
214B7406000
heap
page read and write
1AA684D0000
heap
page read and write
214BFCF1000
trusted library allocation
page read and write
214C0072000
trusted library allocation
page read and write
214B73DD000
heap
page read and write
214B744D000
heap
page read and write
214C0F83000
trusted library allocation
page read and write
250B9494000
trusted library allocation
page read and write
214BE00A000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B73FE000
heap
page read and write
214BC466000
trusted library allocation
page read and write
3481000
heap
page read and write
214C2CDF000
trusted library allocation
page read and write
3481000
heap
page read and write
214B744D000
heap
page read and write
214C0378000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B7406000
heap
page read and write
214B73FD000
heap
page read and write
214B7437000
heap
page read and write
214C2CEA000
trusted library allocation
page read and write
214BFB58000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73FC000
heap
page read and write
214B73BF000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214C04EB000
trusted library allocation
page read and write
214C0E21000
trusted library allocation
page read and write
214C2C1F000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B7437000
heap
page read and write
214B7417000
heap
page read and write
214C2644000
trusted library allocation
page read and write
250B9400000
trusted library allocation
page read and write
214C03BA000
trusted library allocation
page read and write
214B7453000
heap
page read and write
214BD675000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B741A000
heap
page read and write
214C0379000
trusted library allocation
page read and write
214C0045000
trusted library allocation
page read and write
214B7400000
heap
page read and write
1AA68450000
heap
page read and write
214C0257000
trusted library allocation
page read and write
214C2E44000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214C10E0000
trusted library allocation
page read and write
214B742C000
heap
page read and write
214B73F2000
heap
page read and write
214BE1FD000
trusted library allocation
page read and write
214C27E3000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
EE4000
heap
page read and write
250B9DE9000
heap
page read and write
214BC41E000
trusted library allocation
page read and write
214C28FE000
trusted library allocation
page read and write
3481000
heap
page read and write
214C44D5000
trusted library allocation
page read and write
214C10D6000
trusted library allocation
page read and write
214C24FD000
trusted library allocation
page read and write
214B73D5000
heap
page read and write
1EDDFC00000
trusted library allocation
page read and write
214B7440000
heap
page read and write
214B73C5000
heap
page read and write
214BD451000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214BC41B000
trusted library allocation
page read and write
214BBD90000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F1000
heap
page read and write
214C10F2000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C10DB000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B73FE000
heap
page read and write
214C27C2000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214C0583000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C2145000
trusted library allocation
page read and write
214BC7D7000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
214C28C8000
trusted library allocation
page read and write
214C3893000
trusted library allocation
page read and write
214BBD98000
trusted library allocation
page read and write
214C026C000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C0723000
trusted library allocation
page read and write
214C2C7E000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214C2863000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C2D4B000
trusted library allocation
page read and write
214BC3FE000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214C2C47000
trusted library allocation
page read and write
250B9140000
heap
page read and write
214BBEB5000
trusted library allocation
page read and write
214C109E000
trusted library allocation
page read and write
214BFCFB000
trusted library allocation
page read and write
214B73E4000
heap
page read and write
214C10E0000
trusted library allocation
page read and write
944000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214B73DD000
heap
page read and write
214B7417000
heap
page read and write
214B73C5000
heap
page read and write
214B746F000
heap
page read and write
214C10B3000
trusted library allocation
page read and write
250BA197000
heap
page read and write
214B73F3000
heap
page read and write
214B73E6000
heap
page read and write
214C11B5000
trusted library allocation
page read and write
214BD482000
trusted library allocation
page read and write
214BD449000
trusted library allocation
page read and write
250B9300000
trusted library allocation
page read and write
214C38D5000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
214C21FD000
trusted library allocation
page read and write
214BC376000
trusted library allocation
page read and write
214B73EB000
heap
page read and write
214B7406000
heap
page read and write
214BD6BE000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B7405000
heap
page read and write
214C022C000
trusted library allocation
page read and write
214C059B000
trusted library allocation
page read and write
1EDDFC79000
trusted library allocation
page read and write
214C38D7000
trusted library allocation
page read and write
214C239B000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B7405000
heap
page read and write
214C10D7000
trusted library allocation
page read and write
214B744D000
heap
page read and write
250B9461000
trusted library allocation
page read and write
214B73EE000
heap
page read and write
214B7427000
heap
page read and write
214C2658000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73FF000
heap
page read and write
214C238E000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BBEDB000
trusted library allocation
page read and write
214B73DB000
heap
page read and write
214B7417000
heap
page read and write
259FFE0A000
trusted library allocation
page read and write
214B7437000
heap
page read and write
250BA198000
heap
page read and write
214BBDF8000
trusted library allocation
page read and write
3ECD000
stack
page read and write
214B73F1000
heap
page read and write
214B7447000
heap
page read and write
214C1039000
trusted library allocation
page read and write
214C24DC000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B7406000
heap
page read and write
214BD6DD000
trusted library allocation
page read and write
214C26C8000
trusted library allocation
page read and write
214C01B5000
trusted library allocation
page read and write
3481000
heap
page read and write
250B9D5F000
heap
page read and write
214B73F8000
heap
page read and write
214C03CC000
trusted library allocation
page read and write
3481000
heap
page read and write
214C26E4000
trusted library allocation
page read and write
214BC32F000
trusted library allocation
page read and write
214BC418000
trusted library allocation
page read and write
214C0146000
trusted library allocation
page read and write
214BBE43000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214BFCCD000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
1AA68607000
trusted library allocation
page read and write
214C10E3000
trusted library allocation
page read and write
214B06FE000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C2D95000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214B7429000
heap
page read and write
214B743C000
heap
page read and write
214B7406000
heap
page read and write
214B7428000
heap
page read and write
214C07E8000
trusted library allocation
page read and write
214B73D7000
heap
page read and write
214B7428000
heap
page read and write
1084000
unkown
page readonly
214C28BC000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214C24D6000
trusted library allocation
page read and write
214C209C000
trusted library allocation
page read and write
214C05FA000
trusted library allocation
page read and write
214B7406000
heap
page read and write
3481000
heap
page read and write
214B73E6000
heap
page read and write
214B747B000
heap
page read and write
214C07ED000
trusted library allocation
page read and write
214C3875000
trusted library allocation
page read and write
214C1059000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214BD6C7000
trusted library allocation
page read and write
214C26DD000
trusted library allocation
page read and write
214C277B000
trusted library allocation
page read and write
214C2EC9000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7417000
heap
page read and write
214B740F000
heap
page read and write
250B9D01000
heap
page read and write
214C2E49000
trusted library allocation
page read and write
214C1A97000
trusted library allocation
page read and write
214BBE87000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
810000
heap
page read and write
214B7406000
heap
page read and write
214C28BE000
trusted library allocation
page read and write
214B73C3000
heap
page read and write
214C3875000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73F1000
heap
page read and write
214B73CC000
heap
page read and write
214BC7B4000
trusted library allocation
page read and write
214C382D000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
250B9D60000
heap
page read and write
214C05FA000
trusted library allocation
page read and write
3481000
heap
page read and write
214BD6BE000
trusted library allocation
page read and write
214B741E000
heap
page read and write
214B7406000
heap
page read and write
214B7437000
heap
page read and write
214B743B000
heap
page read and write
214C3885000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73E6000
heap
page read and write
214C029F000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B7406000
heap
page read and write
214B7406000
heap
page read and write
214C2EF6000
trusted library allocation
page read and write
214C28BC000
trusted library allocation
page read and write
214BBDA1000
trusted library allocation
page read and write
214C0079000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
214C01E9000
trusted library allocation
page read and write
214BD5F3000
trusted library allocation
page read and write
214C2C2C000
trusted library allocation
page read and write
214C04EE000
trusted library allocation
page read and write
214C2C7C000
trusted library allocation
page read and write
214C2779000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
A58000
heap
page read and write
944000
heap
page read and write
214BC7BF000
trusted library allocation
page read and write
214C1084000
trusted library allocation
page read and write
214C117E000
trusted library allocation
page read and write
214BBEB5000
trusted library allocation
page read and write
214BC718000
trusted library allocation
page read and write
214C389D000
trusted library allocation
page read and write
250B9D69000
heap
page read and write
214B73E1000
heap
page read and write
214C025C000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
1EDDFCEA000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214BBE81000
trusted library allocation
page read and write
AAA39CE000
unkown
page readonly
214B73E4000
heap
page read and write
214BFA5A000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73DB000
heap
page read and write
214C28C4000
trusted library allocation
page read and write
214BC72A000
trusted library allocation
page read and write
214BC73C000
trusted library allocation
page read and write
214C277B000
trusted library allocation
page read and write
250B9DE6000
heap
page read and write
214B73E2000
heap
page read and write
214B73E2000
heap
page read and write
87457FE000
stack
page read and write
214C38B7000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214C0270000
trusted library allocation
page read and write
214BE1E5000
trusted library allocation
page read and write
214C3880000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214BD6F4000
trusted library allocation
page read and write
3481000
heap
page read and write
214C3893000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214C38CF000
trusted library allocation
page read and write
214B747C000
heap
page read and write
214B73E6000
heap
page read and write
214B73E2000
heap
page read and write
214C1099000
trusted library allocation
page read and write
214C07B9000
trusted library allocation
page read and write
214B747F000
heap
page read and write
214B73C4000
heap
page read and write
214C059B000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C28C0000
trusted library allocation
page read and write
214BC7F4000
trusted library allocation
page read and write
214B73C3000
heap
page read and write
214BE1CF000
trusted library allocation
page read and write
214C3880000
trusted library allocation
page read and write
214B745E000
heap
page read and write
250B9D5C000
heap
page read and write
214C2C3D000
trusted library allocation
page read and write
214BE1FD000
trusted library allocation
page read and write
214BD621000
trusted library allocation
page read and write
250B9D8A000
heap
page read and write
214C2D9E000
trusted library allocation
page read and write
214C0EBF000
trusted library allocation
page read and write
214C11BE000
trusted library allocation
page read and write
EE0000
heap
page read and write
214C268D000
trusted library allocation
page read and write
214B7471000
heap
page read and write
214B7405000
heap
page read and write
1EDDFD16000
trusted library allocation
page read and write
214B7467000
heap
page read and write
214C2C54000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73E6000
heap
page read and write
214C2C29000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B7417000
heap
page read and write
214B741D000
heap
page read and write
214C2CAE000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B741A000
heap
page read and write
214BC7CA000
trusted library allocation
page read and write
4FB0000
heap
page read and write
214B73CF000
heap
page read and write
3481000
heap
page read and write
214C07B9000
trusted library allocation
page read and write
214B740F000
heap
page read and write
214BD3A1000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214C10F2000
trusted library allocation
page read and write
214B745B000
heap
page read and write
214B7401000
heap
page read and write
214B73E6000
heap
page read and write
214C44D7000
trusted library allocation
page read and write
214B73DD000
heap
page read and write
310C9FF000
stack
page read and write
214C3844000
trusted library allocation
page read and write
214BD6C7000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73D2000
heap
page read and write
250B945F000
trusted library allocation
page read and write
214C0550000
trusted library allocation
page read and write
214C2C2B000
trusted library allocation
page read and write
1EDDFC11000
trusted library allocation
page read and write
214C12D3000
trusted library allocation
page read and write
214C10A2000
trusted library allocation
page read and write
214B7403000
heap
page read and write
214B73E6000
heap
page read and write
214B73CC000
heap
page read and write
214B7437000
heap
page read and write
214BBD57000
trusted library allocation
page read and write
214B7453000
heap
page read and write
250B9540000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214B73FF000
heap
page read and write
214C10E0000
trusted library allocation
page read and write
4BAE000
stack
page read and write
214C2696000
trusted library allocation
page read and write
214C1161000
trusted library allocation
page read and write
214C1049000
trusted library allocation
page read and write
214C28BC000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B73CC000
heap
page read and write
214BBFF0000
trusted library allocation
page read and write
214BBE87000
trusted library allocation
page read and write
214BFC83000
trusted library allocation
page read and write
214BD6F3000
trusted library allocation
page read and write
214B741D000
heap
page read and write
214BBE3D000
trusted library allocation
page read and write
214B7478000
heap
page read and write
214B73EB000
heap
page read and write
214B73E2000
heap
page read and write
214C10BB000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73FB000
heap
page read and write
214B73E2000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214BD66C000
trusted library allocation
page read and write
214C11D7000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214C038D000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214C2C30000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214C2D6B000
trusted library allocation
page read and write
214B743C000
heap
page read and write
214C44D7000
trusted library allocation
page read and write
214C3864000
trusted library allocation
page read and write
214C0266000
trusted library allocation
page read and write
214BFCFB000
trusted library allocation
page read and write
214B7428000
heap
page read and write
214BD6C7000
trusted library allocation
page read and write
214C27ED000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B7406000
heap
page read and write
214B73E6000
heap
page read and write
214C28C4000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B73F3000
heap
page read and write
214C01DC000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C38A1000
trusted library allocation
page read and write
214C27F5000
trusted library allocation
page read and write
214B742B000
heap
page read and write
214BD6BE000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214BC72A000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214C01E1000
trusted library allocation
page read and write
214C109E000
trusted library allocation
page read and write
1EDDFB50000
unclassified section
page readonly
214BFA34000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
3481000
heap
page read and write
214C3872000
trusted library allocation
page read and write
214C23A9000
trusted library allocation
page read and write
214C0E21000
trusted library allocation
page read and write
214BBE83000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
214B744B000
heap
page read and write
214B73F1000
heap
page read and write
214B73FB000
heap
page read and write
214B73F1000
heap
page read and write
214C28BE000
trusted library allocation
page read and write
250B9DE9000
heap
page read and write
214B73F1000
heap
page read and write
214BFADC000
trusted library allocation
page read and write
214C24DC000
trusted library allocation
page read and write
214BD4C8000
trusted library allocation
page read and write
3490000
heap
page read and write
214C12D7000
trusted library allocation
page read and write
214C109E000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214BD642000
trusted library allocation
page read and write
250B9D60000
heap
page read and write
214C2706000
trusted library allocation
page read and write
214B7403000
heap
page read and write
214B740B000
heap
page read and write
214B73F2000
heap
page read and write
214B73FE000
heap
page read and write
214C2D7F000
trusted library allocation
page read and write
1EDDF7F4000
remote allocation
page execute read
214B7437000
heap
page read and write
214B7452000
heap
page read and write
214B73F6000
heap
page read and write
214BD6F8000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214BD663000
trusted library allocation
page read and write
214B7405000
heap
page read and write
214B73F2000
heap
page read and write
214BD4A1000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B73FF000
heap
page read and write
214C027E000
trusted library allocation
page read and write
214BD6C1000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214B746B000
heap
page read and write
214BBD98000
trusted library allocation
page read and write
214B73C2000
heap
page read and write
214B73E1000
heap
page read and write
1EDDFC96000
trusted library allocation
page read and write
107C000
unkown
page write copy
214B73DD000
heap
page read and write
214B741A000
heap
page read and write
214C2D5B000
trusted library allocation
page read and write
214C22ED000
trusted library allocation
page read and write
214BFACE000
trusted library allocation
page read and write
250BA17B000
heap
page read and write
214B73FC000
heap
page read and write
214C3858000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C25D5000
trusted library allocation
page read and write
3481000
heap
page read and write
214C04F9000
trusted library allocation
page read and write
214C01FC000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B7428000
heap
page read and write
214B7417000
heap
page read and write
214B7417000
heap
page read and write
214BD6E0000
trusted library allocation
page read and write
214BD6C1000
trusted library allocation
page read and write
214C213E000
trusted library allocation
page read and write
214BFB52000
trusted library allocation
page read and write
214C118A000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73E6000
heap
page read and write
214BD6EB000
trusted library allocation
page read and write
214C26DD000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B7417000
heap
page read and write
214B7406000
heap
page read and write
214B73F3000
heap
page read and write
214BBEDC000
trusted library allocation
page read and write
214C24DC000
trusted library allocation
page read and write
214B7444000
heap
page read and write
214B73E6000
heap
page read and write
214C38D3000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73FE000
heap
page read and write
214B73F7000
heap
page read and write
214C12F4000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
AC3000
heap
page read and write
214B73DF000
heap
page read and write
214C273F000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73E6000
heap
page read and write
214C24EB000
trusted library allocation
page read and write
214C24BC000
trusted library allocation
page read and write
214C1960000
trusted library allocation
page read and write
214BD4F1000
trusted library allocation
page read and write
214BD6EB000
trusted library allocation
page read and write
214C25FD000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BC73C000
trusted library allocation
page read and write
214B7436000
heap
page read and write
214C38C9000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C0EE2000
trusted library allocation
page read and write
214C1A53000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
3481000
heap
page read and write
214C03ED000
trusted library allocation
page read and write
1AA68362000
heap
page read and write
214B73ED000
heap
page read and write
214B7406000
heap
page read and write
214C28C0000
trusted library allocation
page read and write
214C2CF2000
trusted library allocation
page read and write
214C10AD000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
250BA183000
heap
page read and write
214B7405000
heap
page read and write
214BFA9B000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73F3000
heap
page read and write
3481000
heap
page read and write
214C015A000
trusted library allocation
page read and write
214C2D2F000
trusted library allocation
page read and write
214B73E1000
heap
page read and write
214C1A88000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214B73E5000
heap
page read and write
214C389D000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214BC72A000
trusted library allocation
page read and write
214B73B4000
heap
page read and write
214C288F000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73F7000
heap
page read and write
214B740F000
heap
page read and write
214C389D000
trusted library allocation
page read and write
214BFAAA000
trusted library allocation
page read and write
214B7411000
heap
page read and write
214BFADC000
trusted library allocation
page read and write
214C2CBA000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214C18E0000
trusted library allocation
page read and write
214B73E5000
heap
page read and write
214C1055000
trusted library allocation
page read and write
214B73ED000
heap
page read and write
214B7406000
heap
page read and write
214B73E6000
heap
page read and write
214BD449000
trusted library allocation
page read and write
214C2DC2000
trusted library allocation
page read and write
214BFC87000
trusted library allocation
page read and write
214BC4FE000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73F7000
heap
page read and write
214C0298000
trusted library allocation
page read and write
214C380C000
trusted library allocation
page read and write
214C2EA8000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B73C5000
heap
page read and write
214C07E8000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C03C9000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214B7478000
heap
page read and write
250B9D5F000
heap
page read and write
214B7437000
heap
page read and write
3481000
heap
page read and write
214B73F1000
heap
page read and write
3481000
heap
page read and write
1EDDFCB7000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
250B9D6C000
heap
page read and write
214B73F3000
heap
page read and write
214B7417000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214C07ED000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214BD6A6000
trusted library allocation
page read and write
214C388F000
trusted library allocation
page read and write
214B7406000
heap
page read and write
3481000
heap
page read and write
214BE1B4000
trusted library allocation
page read and write
214B73E7000
heap
page read and write
214C10CB000
trusted library allocation
page read and write
214C03ED000
trusted library allocation
page read and write
214B7465000
heap
page read and write
214B7417000
heap
page read and write
214B73F7000
heap
page read and write
214C03CE000
trusted library allocation
page read and write
214C3E15000
trusted library allocation
page read and write
214B73EE000
heap
page read and write
214C2E79000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B73C1000
heap
page read and write
214C1892000
trusted library allocation
page read and write
214BD6F6000
trusted library allocation
page read and write
214C03C5000
trusted library allocation
page read and write
214B73E3000
heap
page read and write
214B73CB000
heap
page read and write
214C2D6B000
trusted library allocation
page read and write
214B73E3000
heap
page read and write
8745FFE000
unkown
page readonly
214B7417000
heap
page read and write
214BBDA9000
trusted library allocation
page read and write
214BD49E000
trusted library allocation
page read and write
214C28C0000
trusted library allocation
page read and write
214BD49E000
trusted library allocation
page read and write
214C01BC000
trusted library allocation
page read and write
874607E000
unkown
page readonly
214C01E8000
trusted library allocation
page read and write
214C2C5A000
trusted library allocation
page read and write
214BD454000
trusted library allocation
page read and write
214B73EB000
heap
page read and write
214B73F3000
heap
page read and write
214B73F1000
heap
page read and write
87470FE000
unkown
page readonly
214B7403000
heap
page read and write
214C2EE1000
trusted library allocation
page read and write
214C1093000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214C10F4000
trusted library allocation
page read and write
214B747C000
heap
page read and write
214B73E6000
heap
page read and write
214B7436000
heap
page read and write
1EDDFD32000
trusted library allocation
page read and write
250BA169000
heap
page read and write
214C0527000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2D84000
trusted library allocation
page read and write
3481000
heap
page read and write
214C2EA8000
trusted library allocation
page read and write
214BBD7F000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
3481000
heap
page read and write
214C2C5B000
trusted library allocation
page read and write
214C3899000
trusted library allocation
page read and write
214B7447000
heap
page read and write
214C2676000
trusted library allocation
page read and write
214BD6BE000
trusted library allocation
page read and write
214B73FD000
heap
page read and write
214B73E3000
heap
page read and write
250B9423000
trusted library allocation
page read and write
214C026A000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73D1000
heap
page read and write
214B742A000
heap
page read and write
214C2EDF000
trusted library allocation
page read and write
214C2CEA000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73CC000
heap
page read and write
250B948D000
trusted library allocation
page read and write
214BFA33000
trusted library allocation
page read and write
214C10E6000
trusted library allocation
page read and write
214B7447000
heap
page read and write
214C3EB4000
trusted library allocation
page read and write
214C2C8B000
trusted library allocation
page read and write
214C2D76000
trusted library allocation
page read and write
214C383F000
trusted library allocation
page read and write
214B73C5000
heap
page read and write
214B73FE000
heap
page read and write
214BFC5D000
trusted library allocation
page read and write
214BBE6E000
trusted library allocation
page read and write
214C3831000
trusted library allocation
page read and write
214BC426000
trusted library allocation
page read and write
214C0763000
trusted library allocation
page read and write
214C2494000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214C19A6000
trusted library allocation
page read and write
214B73FB000
heap
page read and write
214B73F7000
heap
page read and write
214B73BA000
heap
page read and write
250B9DE0000
heap
page read and write
214B7405000
heap
page read and write
214B7448000
heap
page read and write
250B90E0000
unclassified section
page readonly
214C2863000
trusted library allocation
page read and write
250B9AF0000
trusted library allocation
page read and write
214B73CB000
heap
page read and write
250BA1AD000
heap
page read and write
214C0163000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B73ED000
heap
page read and write
3481000
heap
page read and write
214B73C5000
heap
page read and write
214C160A000
trusted library allocation
page read and write
214C2CBF000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73F8000
heap
page read and write
214BC493000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214BD6AA000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214BC7CC000
trusted library allocation
page read and write
214C109B000
trusted library allocation
page read and write
214B73F1000
heap
page read and write
214B746B000
heap
page read and write
214B73EF000
heap
page read and write
250B9564000
heap
page read and write
214B73C5000
heap
page read and write
214B741D000
heap
page read and write
214C0241000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2DCC000
trusted library allocation
page read and write
214BD4E8000
trusted library allocation
page read and write
3481000
heap
page read and write
214B7405000
heap
page read and write
214BC7D7000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214BD486000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214C25B3000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214B73F3000
heap
page read and write
214B73FC000
heap
page read and write
214C2662000
trusted library allocation
page read and write
214BD4D0000
trusted library allocation
page read and write
214C28FE000
trusted library allocation
page read and write
214C03DE000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C2C3F000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73C5000
heap
page read and write
214C10C1000
trusted library allocation
page read and write
214B73EB000
heap
page read and write
214C0298000
trusted library allocation
page read and write
1EDDFB40000
heap
page read and write
214B73E6000
heap
page read and write
214C2C29000
trusted library allocation
page read and write
214C0339000
trusted library allocation
page read and write
214C01E7000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B73DA000
heap
page read and write
250B9D6C000
heap
page read and write
214B742D000
heap
page read and write
214B73E5000
heap
page read and write
1AA68370000
heap
page read and write
214C2643000
trusted library allocation
page read and write
214B73D6000
heap
page read and write
214B73FE000
heap
page read and write
214BC716000
trusted library allocation
page read and write
214B743E000
heap
page read and write
214B73DF000
heap
page read and write
214BBE63000
trusted library allocation
page read and write
1EDDFD1B000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73F7000
heap
page read and write
214B73E6000
heap
page read and write
214BBEEF000
trusted library allocation
page read and write
214BFC5F000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
A82000
heap
page read and write
214C20D7000
trusted library allocation
page read and write
214C11D7000
trusted library allocation
page read and write
214C0F48000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214B7417000
heap
page read and write
214BC7AF000
trusted library allocation
page read and write
214C018A000
trusted library allocation
page read and write
214C11C6000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214BFBF3000
trusted library allocation
page read and write
AC3000
heap
page read and write
214B7417000
heap
page read and write
214C01DF000
trusted library allocation
page read and write
214B7407000
heap
page read and write
214BD6C7000
trusted library allocation
page read and write
3481000
heap
page read and write
214C2E71000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C11D0000
trusted library allocation
page read and write
214B73EC000
heap
page read and write
214C44E0000
trusted library allocation
page read and write
214C1A22000
trusted library allocation
page read and write
214C44E2000
trusted library allocation
page read and write
214C07ED000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B744D000
heap
page read and write
214C10C1000
trusted library allocation
page read and write
214B73F2000
heap
page read and write
214C28C2000
trusted library allocation
page read and write
214C103D000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214B7407000
heap
page read and write
214BC7AD000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73F3000
heap
page read and write
214C26CA000
trusted library allocation
page read and write
214C11D0000
trusted library allocation
page read and write
214C273F000
trusted library allocation
page read and write
214B747F000
heap
page read and write
214B73E6000
heap
page read and write
214C3880000
trusted library allocation
page read and write
214B73B9000
heap
page read and write
250B9D64000
heap
page read and write
214B73F8000
heap
page read and write
214B73F3000
heap
page read and write
214BD499000
trusted library allocation
page read and write
214C1605000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73FC000
heap
page read and write
214C1066000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214B73E6000
heap
page read and write
250B9C06000
trusted library allocation
page read and write
259FFA10000
heap
page read and write
214C11BA000
trusted library allocation
page read and write
3481000
heap
page read and write
214B73F3000
heap
page read and write
214BFA63000
trusted library allocation
page read and write
214C12E3000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214B73F7000
heap
page read and write
214C1046000
trusted library allocation
page read and write
214BFACC000
trusted library allocation
page read and write
214B73CC000
heap
page read and write
214C0260000
trusted library allocation
page read and write
214BDD09000
trusted library allocation
page read and write
214BFC44000
trusted library allocation
page read and write
214BC32F000
trusted library allocation
page read and write
214C0EBF000
trusted library allocation
page read and write
214B745E000
heap
page read and write
214B7406000
heap
page read and write
214B73D1000
heap
page read and write
214B73D5000
heap
page read and write
214B73C0000
heap
page read and write
214B73CC000
heap
page read and write
214C2D70000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214C2C8F000
trusted library allocation
page read and write
214BC7AF000
trusted library allocation
page read and write
214B73FE000
heap
page read and write
214C2CC8000
trusted library allocation
page read and write
214B7447000
heap
page read and write
214BD6F6000
trusted library allocation
page read and write
214C3889000
trusted library allocation
page read and write
214B73C4000
heap
page read and write
944000
heap
page read and write
214B73C0000
heap
page read and write
214B741A000
heap
page read and write
214C0592000
trusted library allocation
page read and write
214B73D0000
heap
page read and write
214C10A7000
trusted library allocation
page read and write
214C0583000
trusted library allocation
page read and write
214C10FB000
trusted library allocation
page read and write
214B7447000
heap
page read and write
214B73D1000
heap
page read and write
214B73C5000
heap
page read and write
214B7437000
heap
page read and write
214B7403000
heap
page read and write
214C0FC3000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214B73C5000
heap
page read and write
214C23A9000
trusted library allocation
page read and write
3481000
heap
page read and write
214BFCFB000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214B747A000
heap
page read and write
214C2D84000
trusted library allocation
page read and write
214C2ED5000
trusted library allocation
page read and write
214C22D9000
trusted library allocation
page read and write
214C025A000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C44DE000
trusted library allocation
page read and write
214C10CB000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214BD4B9000
trusted library allocation
page read and write
214BD6DC000
trusted library allocation
page read and write
259FFD00000
trusted library allocation
page read and write
214C2CF2000
trusted library allocation
page read and write
214C02C8000
trusted library allocation
page read and write
214B7417000
heap
page read and write
214B73F7000
heap
page read and write
214B746B000
heap
page read and write
214BFCF0000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C0268000
trusted library allocation
page read and write
1EDDFCCB000
trusted library allocation
page read and write
214C2C23000
trusted library allocation
page read and write
214C00A7000
trusted library allocation
page read and write
214B7437000
heap
page read and write
214C26B1000
trusted library allocation
page read and write
214B745C000
heap
page read and write
214B741A000
heap
page read and write
214C10BB000
trusted library allocation
page read and write
214C07C4000
trusted library allocation
page read and write
214C038D000
trusted library allocation
page read and write
214B73E2000
heap
page read and write
214B7478000
heap
page read and write
214C12E2000
trusted library allocation
page read and write
214BFCEF000
trusted library allocation
page read and write
214C28EF000
trusted library allocation
page read and write
214C3889000
trusted library allocation
page read and write
214BD454000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BD5D7000
trusted library allocation
page read and write
214B7444000
heap
page read and write
214C2CAE000
trusted library allocation
page read and write
214C12EF000
trusted library allocation
page read and write
214C26D4000
trusted library allocation
page read and write
214C239B000
trusted library allocation
page read and write
214C1A1F000
trusted library allocation
page read and write
214B73DD000
heap
page read and write
214C2494000
trusted library allocation
page read and write
214C3872000
trusted library allocation
page read and write
214B73FC000
heap
page read and write
214B741D000
heap
page read and write
214C10D1000
trusted library allocation
page read and write
214B73D1000
heap
page read and write
214B73F7000
heap
page read and write
214C1041000
trusted library allocation
page read and write
214B7406000
heap
page read and write
214BD4C5000
trusted library allocation
page read and write
214B73F8000
heap
page read and write
214BE1E5000
trusted library allocation
page read and write
214C10CD000
trusted library allocation
page read and write
1EDDFC6E000
trusted library allocation
page read and write
214B742F000
heap
page read and write
214B73E6000
heap
page read and write
214B741A000
heap
page read and write
214B7437000
heap
page read and write
214B744D000
heap
page read and write
214C10DF000
trusted library allocation
page read and write
214B73F7000
heap
page read and write
214C10A2000
trusted library allocation
page read and write
214C1081000
trusted library allocation
page read and write
214C44E0000
trusted library allocation
page read and write
3481000
heap
page read and write
214C24D6000
trusted library allocation
page read and write
214C27D1000
trusted library allocation
page read and write
214B73D9000
heap
page read and write
214B73E2000
heap
page read and write
214B7406000
heap
page read and write
259FFB20000
heap
page read and write
3481000
heap
page read and write
214BBEAD000
trusted library allocation
page read and write
214C10FB000
trusted library allocation
page read and write
214B73F9000
heap
page read and write
214C2D88000
trusted library allocation
page read and write
214C003B000
trusted library allocation
page read and write
214C1093000
trusted library allocation
page read and write
214B73F3000
heap
page read and write
214B73FE000
heap
page read and write
214B73C5000
heap
page read and write
214B7448000
heap
page read and write
214BC70A000
trusted library allocation
page read and write
3481000
heap
page read and write
1EDDF9EF000
unclassified section
page read and write
214BBE8A000
trusted library allocation
page read and write
214BFA9B000
trusted library allocation
page read and write
214B73E6000
heap
page read and write
214C2CDD000
trusted library allocation
page read and write
214C014D000
trusted library allocation
page read and write
214B741A000
heap
page read and write
214C0E1A000
trusted library allocation
page read and write
214B744D000
heap
page read and write
214B740B000
heap
page read and write
214BBFC5000
trusted library allocation
page read and write
7BF000
stack
page read and write
214BD6EB000
trusted library allocation
page read and write
There are 4163 hidden memdumps, click here to show them.