Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d60dc410-3767-4381-bd10-561f7657946c.json
(copy)
|
JSON data
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d60dc410-3767-4381-bd10-561f7657946c.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\00dc5ecc-716d-4b14-955e-b70fae13b881.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\051ba387-3a3f-42b6-be33-c92f4114f03e.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4ac6fb7a-084b-4ad8-9f89-2cc0b8ed2a65.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\55d3ee13-590b-489f-a31f-fcc49b82d5a3.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5e12960b-c25c-49aa-a3e1-c30a09a761e7.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8aeb325e-a520-4e0d-9da7-94fd3f415d41.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\96842d3d-4358-4e4e-94a1-81bc65a23d1d.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\a83ad99d-22fc-46ae-931b-e0d23ec671b8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE1E-193C.pma
|
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration:
offset 134217728.000000, slope 75015551881388056232440365056.000000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE1E-1BF8.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE32-E54.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4BE3A-1568.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\043ad7fe-31b7-4917-80cd-9f98ae2b7f20.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\066d5289-46b7-4b11-907f-4026c4e7756f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\1bcb3170-cc4f-442d-8ace-802717e3a3e0.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\3c3cb00c-a4f0-406e-a265-25a31b4c54d4.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\74db587a-9296-4c02-9762-af54f6b05cba.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8,
version-valid-for 14
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free
pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps (copy)
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 12, cookie 0x3, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie
0x1d, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\331e2b4d-a468-417f-a20c-e6115d507e0b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\3fdb20b9-98f5-4643-8d07-172b1c3d2433.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\9375e314-f63b-452f-b8fe-30bae3e995a5.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2bf6e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3aa5a.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 6
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a0ba.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2b471.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2bf6e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3c0ff.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a063ec0d-0273-4abf-b4be-e4a9c3f7e047.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\a270f432-f25d-47be-a056-ceb6f809b0c8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\b1a6ec76-8c3f-46fe-9ee3-d3fae9b6973b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\cb62ddac-2387-41c7-bcad-79d58a5136d0.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\eb024c89-1ff6-4178-a734-ce07c44720e6.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2debd.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF3108b.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF347e7.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39cdd.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2db72.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF30d20.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369691938600280
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\0aeb64fa-e93e-4352-89d7-95f1ca22e064.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\1d22e22a-e6ea-4c46-81dc-166cf27e1b61.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\57d68818-86f5-45ef-b162-149eb86cd9a3.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State~RF2c78c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network
Persistent State~RF3b826.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting
and NEL
|
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT
Auditing Pending Reports~RF2b471.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch
Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust
Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\a2d8a6cb-3a0d-4bee-b18f-571b75546a78.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\aba8c75d-899a-4bb0-a3a4-46d1f8fc5707.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages
2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie
0x66, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie
0xb, schema 4, UTF-8, version-valid-for 10
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\aa0b92e2-8cc9-4959-843e-dfb73ecea653.tmp
|
ASCII text, with very long lines (1597), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\aebecdda-452e-4eb2-86bc-83c99274d82c.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
|
ASCII text, with very long lines (3951), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\c203f2f6-98fa-4deb-a009-38e355d0fccd.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d1004e34-5bf8-4e10-bda7-4f1d2ca452d3.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8,
version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dd690892-d485-4eea-8ec2-9fa1985e0aef.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\dfecd7df-8498-49c0-8212-d06a60cb97d7.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8,
version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2863d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2864d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28b9c.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28bbb.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2b2bc.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d2d6.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d392.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f2b3.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2f2c2.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39cbe.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c3ce.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3f917.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\a06cfde0-1cf4-41a7-8ab9-22dd1cd209e8.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\bbe46430-8c0e-4dd1-9548-5a9cb41bb6e9.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\cbf87674-287c-4901-a846-8839c92da34f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ce599a9b-bac1-4f2b-bf5e-c4d13d1d48f7.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\45a0fae4-04f0-4153-b161-cb4725a1fbf6.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7be5c440-0e44-4d98-a9db-127b13852fe3.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 695310
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cadfc7de-2fba-49aa-a326-8cd4d9c5c14d.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cf7397ca-e998-463e-bd03-9b85894aaa1a.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cv_debug.log
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\d5a034f9-1e09-4f4a-ba39-e07f1b2f3e1e.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e9abb6d9-4187-42d6-b0e2-d1c7c6f736a2.tmp
|
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fe23149c-d6c1-4b38-82ad-c966428e522d.tmp
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\45a0fae4-04f0-4153-b161-cb4725a1fbf6.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\af\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\am\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ar\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\az\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\be\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\bg\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\bn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ca\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\cs\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\cy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\da\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\de\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\el\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en_GB\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\en_US\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\es\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\es_419\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\et\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\eu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fil\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\fr_CA\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\gl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\gu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\hy\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\id\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\is\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\it\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\iw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ja\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ka\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\kk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\km\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\kn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ko\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\lo\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\lt\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\lv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ml\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\mn\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\mr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ms\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\my\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ne\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\nl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\no\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pa\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pt_BR\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\pt_PT\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ro\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ru\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\si\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sl\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sv\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\sw\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ta\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\te\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\th\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\tr\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\uk\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\ur\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\vi\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zh_CN\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zh_HK\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zh_TW\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_locales\zu\messages.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\dasherSettingSchema.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\offscreendocument.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\offscreendocument_main.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\page_embed_script.js
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_1866555910\CRX_INSTALL\service_worker_bin_prod.js
|
ASCII text, with very long lines (4369)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\_metadata\verified_contents.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\content.js
|
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\content_new.js
|
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\CRX_INSTALL\manifest.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6460_220966862\cf7397ca-e998-463e-bd03-9b85894aaa1a.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpaddon
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
|
Mozilla lz4 compressed data, originally 56 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1809), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
|
Mozilla lz4 compressed data, originally 301 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
|
Mozilla lz4 compressed data, originally 301 bytes
|
dropped
|
There are 326 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1944,i,1885108096133923708,5615008366606404031,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService
--lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6552 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor
--lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6800 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6312 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6312 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2332 --field-trial-handle=2076,i,7221193845708721563,11522825552492207431,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2288 --field-trial-handle=1944,i,12137075612384507687,15765736089809574248,262144
/prefetch:3
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker
--lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6928 --field-trial-handle=1948,i,16766255207364502604,7562736169763922936,262144
/prefetch:8
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
--attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2220
-prefMapHandle 2228 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {983f46ee-0e12-4a53-bee0-8668e7f3c346} 480 "\\.\pipe\gecko-crash-server-pipe.480" 214b0670910 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4048 -parentBuildID 20230927232528 -prefsHandle 3944
-prefMapHandle 3940 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b05df780-e3db-4483-9c2e-582d825b99d8}
480 "\\.\pipe\gecko-crash-server-pipe.480" 214c06bf610 rdd
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
http://ww.microH
|
unknown
|
||
https://services.addons.mozilla.org
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
http://www.mozilla.com0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/apps-themes
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://screenshots.firefox.com
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
http://www.sandoll.co.krcomm/
|
unknown
|
||
https://www.instagram.com
|
unknown
|
||
http://www.jiyu-kobo.co.jp/8
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
http://www.fontbureau.com/designersadnl
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://profiler.firefox.com/
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html:
|
unknown
|
||
https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
|
unknown
|
||
https://outlook.office.com/mail/compose?isExtension=true
|
unknown
|
||
http://www.sandoll.co.krF
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
http://exslt.org/sets
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
https://i.y.qq.com/n2/m/index.html
|
unknown
|
||
https://www.deezer.com/
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://web.telegram.org/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/X
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
http://exslt.org/common
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://fpn.firefox.com
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://exslt.org/dates-and-times
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://www.jiyu-kobo.co.jp/H
|
unknown
|
||
http://www.jiyu-kobo.co.jp/F
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://excel.new?from=EdgeM365Shoreline
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://www.google.com/favicon.ico
|
142.251.40.228
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://bzib.nelreports.net/api/report?cat=bingbusiness
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
http://www.monotype.0
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
http://detectportal.firefox.comP
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://chrome.google.com/webstore/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://bard.google.com/
|
unknown
|
||
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
|
142.250.185.161
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://www.office.com
|
unknown
|
||
https://outlook.live.com/mail/0/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
|
unknown
|
||
http://www.inbox.lv/rfc2368/?value=%su
|
unknown
|
||
https://monitor.firefox.com/user/dashboard
|
unknown
|
||
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
|
unknown
|
||
https://tidal.com/
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
http://mozilla.org/MPL/2.0/.
|
unknown
|
||
https://account.bellmedia.c
|
unknown
|
||
https://www.openh264.org/
|
unknown
|
||
https://gaana.com/
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://coverage.mozilla.org
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
|
unknown
|
||
https://outlook.live.com/mail/compose?isExtension=true
|
unknown
|
||
https://blocked.cdn.mozilla.net/
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
|
unknown
|
||
https://outlook.office.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true
|
unknown
|
||
https://profiler.firefox.com
|
unknown
|
||
https://outlook.live.com/default.aspx?rru=compose&to=%s
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
example.org
|
93.184.215.14
|
||
chrome.cloudflare-dns.com
|
172.64.41.3
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
services.addons.mozilla.org
|
52.222.236.80
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
googlehosted.l.googleusercontent.com
|
142.250.185.161
|
||
sni1gl.wpc.nucdn.net
|
152.199.21.175
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
detectportal.firefox.com
|
unknown
|
||
clients2.googleusercontent.com
|
unknown
|
||
bzib.nelreports.net
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
There are 5 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.107.246.40
|
unknown
|
United States
|
||
152.195.19.97
|
unknown
|
United States
|
||
142.251.40.206
|
unknown
|
United States
|
||
142.251.40.228
|
unknown
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
142.250.185.161
|
googlehosted.l.googleusercontent.com
|
United States
|
||
23.44.133.38
|
unknown
|
United States
|
||
172.64.41.3
|
chrome.cloudflare-dns.com
|
United States
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
52.222.236.80
|
services.addons.mozilla.org
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
142.250.81.234
|
unknown
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
20.96.153.111
|
unknown
|
United States
|
||
23.44.201.5
|
unknown
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
172.253.115.84
|
unknown
|
United States
|
There are 10 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
|
lw_13bbe73648289fe96dfa1aa1bf23b3da
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseenversion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
freseen
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_dse_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
|
is_startup_page_recommended
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
|
Enabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
|
ShortcutName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
|
ProfileErrorState
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
|
EnhancedLinkOpeningDefault
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ahokoikenoafgppiblgpenaaaolecifn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bhmhibnbialendcafinliemndanacfaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
bobbggphonhgdonfdibkfipfepfcildj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ceaifoolopnigfpidlheoagpheiplgii
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
cjneempfhkonkkbcmnfdibgobmhbagaj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dabfebgaghanlbehmkmaflipiohdimmc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dcaajljecejllikfgbhjdgeognacjkkp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
dmbljphlfghcnbohaoffiedmodfmkmol
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ehlmnljdoejdahfjdfobmpfancoibmig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
eijpepilkjkofamihbmjcnihgpbebafj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
enkoeamdnimieoooocohgbdajhhkajko
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fikbjbembnmfhppjfnmfkahdhfohhjmg
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
fjngpfnaikknjdhkckmncgicobbkcnle
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbihlnbpmfkodghomcinpblknjhneknc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gbmoeijgfngecijpcnbooedokgafmmji
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gecfnmoodchdkebjjffmdcmeghkflpib
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
gekagaaiohabmaknhkbaofhhedhelemf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ghglcnachgghkhbafjogogiggghcpjig
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hciemgmhplhpinoohcjpafmncmjapioh
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hloomjjkinpbjldhobfkfdamkmikjmdo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
hmlhageoffiiefnmojcgoagebofoifpl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
iglcjdemknebjbklcgkfaebgojjphkec
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ihmafllikibpmigkcoadcmckbfhibefp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jbleckejnaboogigodiafflhkajdmpcl
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jdiccldimpdaibmpdkjnbmckianbfold
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jlipacegilfgfpgkefbjcncbfcoeecgj
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jmjflgjpcpepeafmmgdpfkogkghcpiha
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
jpfjdekhebcolnfkpicpciaknbgcdcbm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kfihiegbjaloebkmglnjnljoljgkkchm
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
khffkadolmfbdgahbabbhipadklfmhgf
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kjncpkplfnolibapodobnnjfgmjmiaba
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kkobcodijbdelbnhbfkkfncbeildnpie
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
kmojgmpmopiiagdfbilgognmlegkonbk
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ncbjelpjchkpbikbpkcchkhkblodoama
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkbndigcebkoaejohleckhekfmcecfja
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
nnpnekncnhiglbokoiffmejlimgmgoam
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ofefcgjbeghpigppfmkologfjadafddi
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olkdlefmaniacnmgofabnpmomgcpdaip
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
olmhchkiafniffcaiciiomfdplnmklak
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
pencekojiebcjhifbkfdncgmmooepclc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
|
ppnnjfpaneghjbcepgedmlcgmfgkjhah
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66626
|
WindowTabManagerFileMappingId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
There are 198 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
259FFF40000
|
heap
|
page read and write
|
||
214C27A2000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214C03BC000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C10E3000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C00F1000
|
trusted library allocation
|
page read and write
|
||
214BBE87000
|
trusted library allocation
|
page read and write
|
||
214C01BF000
|
trusted library allocation
|
page read and write
|
||
214C034C000
|
trusted library allocation
|
page read and write
|
||
214BD4CB000
|
trusted library allocation
|
page read and write
|
||
214C0583000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2666000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B06EF000
|
trusted library allocation
|
page read and write
|
||
214B7419000
|
heap
|
page read and write
|
||
214C0EBF000
|
trusted library allocation
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C272E000
|
trusted library allocation
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214C1081000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C25E3000
|
trusted library allocation
|
page read and write
|
||
214C2EFD000
|
trusted library allocation
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
FB1000
|
unkown
|
page execute read
|
||
214BE1EC000
|
trusted library allocation
|
page read and write
|
||
250B9D69000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C118E000
|
trusted library allocation
|
page read and write
|
||
214C3885000
|
trusted library allocation
|
page read and write
|
||
214C10DB000
|
trusted library allocation
|
page read and write
|
||
214C10E0000
|
trusted library allocation
|
page read and write
|
||
214C2E50000
|
trusted library allocation
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214C24EB000
|
trusted library allocation
|
page read and write
|
||
250B9413000
|
trusted library allocation
|
page read and write
|
||
214C018A000
|
trusted library allocation
|
page read and write
|
||
87468FE000
|
stack
|
page read and write
|
||
214BD4F1000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BD5DA000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C117E000
|
trusted library allocation
|
page read and write
|
||
214C03CE000
|
trusted library allocation
|
page read and write
|
||
214C0EA2000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214C00A7000
|
trusted library allocation
|
page read and write
|
||
214C388F000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C44E4000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
310B1FB000
|
stack
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214BBDCD000
|
trusted library allocation
|
page read and write
|
||
214C1054000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C1081000
|
trusted library allocation
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
1EDDFC63000
|
trusted library allocation
|
page read and write
|
||
214C2DD6000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B7452000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C2E6A000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
250B9D8A000
|
heap
|
page read and write
|
||
214C3889000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B742F000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C0553000
|
trusted library allocation
|
page read and write
|
||
214C2737000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214BC7DB000
|
trusted library allocation
|
page read and write
|
||
214BFADE000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
310C1FF000
|
stack
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
214C23C7000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214C38CB000
|
trusted library allocation
|
page read and write
|
||
1AA68500000
|
trusted library allocation
|
page read and write
|
||
250BA1AD000
|
heap
|
page read and write
|
||
214BFB58000
|
trusted library allocation
|
page read and write
|
||
214C01EB000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
250BA1AD000
|
heap
|
page read and write
|
||
214BBE68000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
1EDDFC7B000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214C2CC4000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD454000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C2E98000
|
trusted library allocation
|
page read and write
|
||
214C0000000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C014C000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2D74000
|
trusted library allocation
|
page read and write
|
||
1EDDFCC8000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C24FD000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C2C79000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
stack
|
page read and write
|
||
214C277B000
|
trusted library allocation
|
page read and write
|
||
214BE1F7000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C2EF8000
|
trusted library allocation
|
page read and write
|
||
214C28EF000
|
trusted library allocation
|
page read and write
|
||
214BE17D000
|
trusted library allocation
|
page read and write
|
||
214BD6DD000
|
trusted library allocation
|
page read and write
|
||
214C2737000
|
trusted library allocation
|
page read and write
|
||
214C239B000
|
trusted library allocation
|
page read and write
|
||
214C1836000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214C388F000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C0E9E000
|
trusted library allocation
|
page read and write
|
||
214C0021000
|
trusted library allocation
|
page read and write
|
||
214C2EF6000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214C12F5000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C24D6000
|
trusted library allocation
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C03BF000
|
trusted library allocation
|
page read and write
|
||
214BFAF2000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BFA33000
|
trusted library allocation
|
page read and write
|
||
214C1B58000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
87447D8000
|
stack
|
page read and write
|
||
214C28BC000
|
trusted library allocation
|
page read and write
|
||
214B743E000
|
heap
|
page read and write
|
||
214C2677000
|
trusted library allocation
|
page read and write
|
||
214BBDBF000
|
trusted library allocation
|
page read and write
|
||
250BA197000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C44DC000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214BBDBF000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BBD81000
|
trusted library allocation
|
page read and write
|
||
214BC716000
|
trusted library allocation
|
page read and write
|
||
214B73E7000
|
heap
|
page read and write
|
||
214C1099000
|
trusted library allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
250B9DEC000
|
heap
|
page read and write
|
||
214C2C3D000
|
trusted library allocation
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
214C20E2000
|
trusted library allocation
|
page read and write
|
||
214BC718000
|
trusted library allocation
|
page read and write
|
||
214C2E89000
|
trusted library allocation
|
page read and write
|
||
214C01E1000
|
trusted library allocation
|
page read and write
|
||
214C2D9E000
|
trusted library allocation
|
page read and write
|
||
214BBE2D000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2790000
|
trusted library allocation
|
page read and write
|
||
214C2D5E000
|
trusted library allocation
|
page read and write
|
||
214BD694000
|
trusted library allocation
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214BC7DB000
|
trusted library allocation
|
page read and write
|
||
214C18B9000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C3880000
|
trusted library allocation
|
page read and write
|
||
250BA17B000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C059B000
|
trusted library allocation
|
page read and write
|
||
214C11D0000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C1081000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C1166000
|
trusted library allocation
|
page read and write
|
||
2FBCA9C4F000
|
trusted library allocation
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
214C12D0000
|
trusted library allocation
|
page read and write
|
||
AAA394B000
|
stack
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
250B9415000
|
trusted library allocation
|
page read and write
|
||
214C20E0000
|
trusted library allocation
|
page read and write
|
||
214B7453000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BD696000
|
trusted library allocation
|
page read and write
|
||
214C23E8000
|
trusted library allocation
|
page read and write
|
||
214BC73C000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C2494000
|
trusted library allocation
|
page read and write
|
||
214C2D84000
|
trusted library allocation
|
page read and write
|
||
214C2C2B000
|
trusted library allocation
|
page read and write
|
||
214BD6BC000
|
trusted library allocation
|
page read and write
|
||
214BD6F4000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C22D7000
|
trusted library allocation
|
page read and write
|
||
214C01DC000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214BD468000
|
trusted library allocation
|
page read and write
|
||
214C26B1000
|
trusted library allocation
|
page read and write
|
||
214B741C000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
250B94CA000
|
trusted library allocation
|
page read and write
|
||
1EDDFC03000
|
trusted library allocation
|
page read and write
|
||
214B742D000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C3893000
|
trusted library allocation
|
page read and write
|
||
214BC413000
|
trusted library allocation
|
page read and write
|
||
214BFADD000
|
trusted library allocation
|
page read and write
|
||
214BE18E000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214BC32F000
|
trusted library allocation
|
page read and write
|
||
214BD4C8000
|
trusted library allocation
|
page read and write
|
||
214C2CC8000
|
trusted library allocation
|
page read and write
|
||
214BD5D5000
|
trusted library allocation
|
page read and write
|
||
214C28D4000
|
trusted library allocation
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
250B9DE1000
|
heap
|
page read and write
|
||
214C12ED000
|
trusted library allocation
|
page read and write
|
||
214C25C0000
|
trusted library allocation
|
page read and write
|
||
214C1A06000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214C28EF000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
107C000
|
unkown
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C44E4000
|
trusted library allocation
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214BC721000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214C26A3000
|
trusted library allocation
|
page read and write
|
||
214C2737000
|
trusted library allocation
|
page read and write
|
||
214C2EF8000
|
trusted library allocation
|
page read and write
|
||
214BFAA2000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214C01E9000
|
trusted library allocation
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C26A7000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
87480FE000
|
unkown
|
page readonly
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214C38CF000
|
trusted library allocation
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214C2768000
|
trusted library allocation
|
page read and write
|
||
250BA17B000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
AAA6CFE000
|
unkown
|
page readonly
|
||
214C2DA1000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214BD4A1000
|
trusted library allocation
|
page read and write
|
||
214C2D80000
|
trusted library allocation
|
page read and write
|
||
214BD6F1000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BBE0D000
|
trusted library allocation
|
page read and write
|
||
214C0270000
|
trusted library allocation
|
page read and write
|
||
214C38C9000
|
trusted library allocation
|
page read and write
|
||
214B7418000
|
heap
|
page read and write
|
||
214C27C9000
|
trusted library allocation
|
page read and write
|
||
214C3875000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2D5E000
|
trusted library allocation
|
page read and write
|
||
214B73DA000
|
heap
|
page read and write
|
||
214BC736000
|
trusted library allocation
|
page read and write
|
||
214BE1AA000
|
trusted library allocation
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
214C24EB000
|
trusted library allocation
|
page read and write
|
||
214BD4DC000
|
trusted library allocation
|
page read and write
|
||
214C05FA000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C12CD000
|
trusted library allocation
|
page read and write
|
||
214C0586000
|
trusted library allocation
|
page read and write
|
||
214C0579000
|
trusted library allocation
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
CF7F3FF000
|
stack
|
page read and write
|
||
214C38B7000
|
trusted library allocation
|
page read and write
|
||
214BD45D000
|
trusted library allocation
|
page read and write
|
||
214B7464000
|
heap
|
page read and write
|
||
214C01E9000
|
trusted library allocation
|
page read and write
|
||
214C1066000
|
trusted library allocation
|
page read and write
|
||
214BC716000
|
trusted library allocation
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214BFA62000
|
trusted library allocation
|
page read and write
|
||
214C03ED000
|
trusted library allocation
|
page read and write
|
||
214C04E6000
|
trusted library allocation
|
page read and write
|
||
214BD35B000
|
trusted library allocation
|
page read and write
|
||
214C26E7000
|
trusted library allocation
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
214C0E9E000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214BD4E8000
|
trusted library allocation
|
page read and write
|
||
214C38D3000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C039A000
|
trusted library allocation
|
page read and write
|
||
214BBDEF000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C273F000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214BFB52000
|
trusted library allocation
|
page read and write
|
||
214C01FA000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C1049000
|
trusted library allocation
|
page read and write
|
||
1EDDFB44000
|
heap
|
page read and write
|
||
214BD69D000
|
trusted library allocation
|
page read and write
|
||
214C26CB000
|
trusted library allocation
|
page read and write
|
||
214BD67E000
|
trusted library allocation
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
1AA69EA0000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
250BA197000
|
heap
|
page read and write
|
||
214BD4FD000
|
trusted library allocation
|
page read and write
|
||
214B740B000
|
heap
|
page read and write
|
||
214B73E7000
|
heap
|
page read and write
|
||
214B73C9000
|
heap
|
page read and write
|
||
214C0281000
|
trusted library allocation
|
page read and write
|
||
214C01FC000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
AAA53FE000
|
stack
|
page read and write
|
||
214C1046000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C104A000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C38D5000
|
trusted library allocation
|
page read and write
|
||
214C44D9000
|
trusted library allocation
|
page read and write
|
||
214BC323000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214C4499000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BD4E0000
|
trusted library allocation
|
page read and write
|
||
214C38A1000
|
trusted library allocation
|
page read and write
|
||
214C21FD000
|
trusted library allocation
|
page read and write
|
||
214BBE8C000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BFACB000
|
trusted library allocation
|
page read and write
|
||
214C26A3000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C12D4000
|
trusted library allocation
|
page read and write
|
||
214BD698000
|
trusted library allocation
|
page read and write
|
||
250B9230000
|
heap
|
page read and write
|
||
214BBE71000
|
trusted library allocation
|
page read and write
|
||
250BA160000
|
heap
|
page read and write
|
||
214BD4F8000
|
trusted library allocation
|
page read and write
|
||
250B9DE8000
|
heap
|
page read and write
|
||
214C103D000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214C01BF000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C07C4000
|
trusted library allocation
|
page read and write
|
||
214C1020000
|
trusted library allocation
|
page read and write
|
||
214BD49E000
|
trusted library allocation
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
250B9DF1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214C0583000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
250B946F000
|
trusted library allocation
|
page read and write
|
||
214C07A5000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
8743DBC000
|
stack
|
page read and write
|
||
214C2C64000
|
trusted library allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
214C3899000
|
trusted library allocation
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214C2D89000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
53FD000
|
stack
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C26EB000
|
trusted library allocation
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214C2C79000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2D4E000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
250B9448000
|
trusted library allocation
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214C38CF000
|
trusted library allocation
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
250B940D000
|
trusted library allocation
|
page read and write
|
||
214C23C7000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214BD6BC000
|
trusted library allocation
|
page read and write
|
||
214B7452000
|
heap
|
page read and write
|
||
214C2CE8000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214BE1DF000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214C44DE000
|
trusted library allocation
|
page read and write
|
||
214C23E8000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
250B945C000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C2E90000
|
trusted library allocation
|
page read and write
|
||
214BFB58000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B747F000
|
heap
|
page read and write
|
||
214BD47F000
|
trusted library allocation
|
page read and write
|
||
250B9DF1000
|
heap
|
page read and write
|
||
214C447F000
|
trusted library allocation
|
page read and write
|
||
214C17E4000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C12ED000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C388F000
|
trusted library allocation
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214C44DC000
|
trusted library allocation
|
page read and write
|
||
214C384B000
|
trusted library allocation
|
page read and write
|
||
214C01B6000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BD486000
|
trusted library allocation
|
page read and write
|
||
250B92C2000
|
unclassified section
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214BD66E000
|
trusted library allocation
|
page read and write
|
||
214BC736000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C2786000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BC721000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
214C0378000
|
trusted library allocation
|
page read and write
|
||
214BFC90000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214BD49E000
|
trusted library allocation
|
page read and write
|
||
250B9D6C000
|
heap
|
page read and write
|
||
AAA6C3E000
|
stack
|
page read and write
|
||
214C1049000
|
trusted library allocation
|
page read and write
|
||
214C2C79000
|
trusted library allocation
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214C109C000
|
trusted library allocation
|
page read and write
|
||
214BFC34000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C287F000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C27C5000
|
trusted library allocation
|
page read and write
|
||
214BBD85000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C20E2000
|
trusted library allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BD694000
|
trusted library allocation
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C24CE000
|
trusted library allocation
|
page read and write
|
||
214B7429000
|
heap
|
page read and write
|
||
214C2C79000
|
trusted library allocation
|
page read and write
|
||
214BC721000
|
trusted library allocation
|
page read and write
|
||
250B9C03000
|
trusted library allocation
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214C2CBF000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214C05DB000
|
trusted library allocation
|
page read and write
|
||
214C23E8000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C20F2000
|
trusted library allocation
|
page read and write
|
||
214BC7B2000
|
trusted library allocation
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214BD6A6000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
250B940A000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214BD6EB000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214BC7EA000
|
trusted library allocation
|
page read and write
|
||
214C2143000
|
trusted library allocation
|
page read and write
|
||
214B7460000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73F6000
|
heap
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214BD5D4000
|
trusted library allocation
|
page read and write
|
||
214BC736000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2D26000
|
trusted library allocation
|
page read and write
|
||
214C027C000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
250B9DEC000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C27ED000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C2137000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
214BC7AF000
|
trusted library allocation
|
page read and write
|
||
1EDDFC61000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
8743D7E000
|
unkown
|
page readonly
|
||
214BFCAC000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
1EDDFC2E000
|
trusted library allocation
|
page read and write
|
||
214C20F8000
|
trusted library allocation
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C27F5000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214C3885000
|
trusted library allocation
|
page read and write
|
||
214B73D3000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C381F000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214BC7B4000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C2D4E000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
250B9D60000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C4499000
|
trusted library allocation
|
page read and write
|
||
214BC721000
|
trusted library allocation
|
page read and write
|
||
214C118A000
|
trusted library allocation
|
page read and write
|
||
214C2EDF000
|
trusted library allocation
|
page read and write
|
||
1EDDFC98000
|
trusted library allocation
|
page read and write
|
||
214C2C29000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C03CE000
|
trusted library allocation
|
page read and write
|
||
214BD499000
|
trusted library allocation
|
page read and write
|
||
1EDDF7E0000
|
remote allocation
|
page read and write
|
||
214BD4FD000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214BC4AE000
|
trusted library allocation
|
page read and write
|
||
214BBE8A000
|
trusted library allocation
|
page read and write
|
||
214B7419000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
250B9DAA000
|
heap
|
page read and write
|
||
214C25AF000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C2D4C000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214C1166000
|
trusted library allocation
|
page read and write
|
||
214C104E000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD4E8000
|
trusted library allocation
|
page read and write
|
||
214C2C7C000
|
trusted library allocation
|
page read and write
|
||
AAA6CBE000
|
stack
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214BFAA3000
|
trusted library allocation
|
page read and write
|
||
214C27ED000
|
trusted library allocation
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214BD451000
|
trusted library allocation
|
page read and write
|
||
214C2D97000
|
trusted library allocation
|
page read and write
|
||
214BD642000
|
trusted library allocation
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
214C118E000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C03D4000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73D2000
|
heap
|
page read and write
|
||
214C2EF0000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214B73D0000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD69D000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C38D7000
|
trusted library allocation
|
page read and write
|
||
214C2696000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BFAAA000
|
trusted library allocation
|
page read and write
|
||
214B747B000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C05DB000
|
trusted library allocation
|
page read and write
|
||
214C01DF000
|
trusted library allocation
|
page read and write
|
||
250BA1B6000
|
heap
|
page read and write
|
||
214C20CA000
|
trusted library allocation
|
page read and write
|
||
214B73D3000
|
heap
|
page read and write
|
||
214C116C000
|
trusted library allocation
|
page read and write
|
||
214C03C3000
|
trusted library allocation
|
page read and write
|
||
214B73CF000
|
heap
|
page read and write
|
||
214C288B000
|
trusted library allocation
|
page read and write
|
||
214BBD76000
|
trusted library allocation
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214BD482000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C2EFD000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2685000
|
trusted library allocation
|
page read and write
|
||
214BFB16000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C01AE000
|
trusted library allocation
|
page read and write
|
||
214BD4C5000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C0FD5000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B7418000
|
heap
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
214C2D1C000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD447000
|
trusted library allocation
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214C01DF000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7453000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214C2CB2000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C24CE000
|
trusted library allocation
|
page read and write
|
||
214C0198000
|
trusted library allocation
|
page read and write
|
||
214C03C9000
|
trusted library allocation
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214BD6BE000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C38CD000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2DC2000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BD554000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
CF007FF000
|
stack
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214BC7BF000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C1940000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
1AA68470000
|
heap
|
page read and write
|
||
214C00B3000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD6F8000
|
trusted library allocation
|
page read and write
|
||
214C283B000
|
trusted library allocation
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
214C28D4000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2CF2000
|
trusted library allocation
|
page read and write
|
||
214C2D73000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7476000
|
heap
|
page read and write
|
||
214C03CD000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214B7448000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C01F9000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C01B8000
|
trusted library allocation
|
page read and write
|
||
214BBFB5000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
250BA164000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C0263000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
4B4C000
|
stack
|
page read and write
|
||
214C21BA000
|
trusted library allocation
|
page read and write
|
||
214BFC49000
|
trusted library allocation
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214C2D59000
|
trusted library allocation
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214C0EA2000
|
trusted library allocation
|
page read and write
|
||
214C025F000
|
trusted library allocation
|
page read and write
|
||
214B73D2000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BC7CC000
|
trusted library allocation
|
page read and write
|
||
214B7476000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C209C000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214BBFBF000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD633000
|
trusted library allocation
|
page read and write
|
||
214B740B000
|
heap
|
page read and write
|
||
250B9100000
|
heap
|
page read and write
|
||
214C01A9000
|
trusted library allocation
|
page read and write
|
||
214B744E000
|
heap
|
page read and write
|
||
214BC716000
|
trusted library allocation
|
page read and write
|
||
214C1093000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214BD39C000
|
trusted library allocation
|
page read and write
|
||
214C2DCC000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214C3E1C000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214BBD9E000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C2137000
|
trusted library allocation
|
page read and write
|
||
214BD615000
|
trusted library allocation
|
page read and write
|
||
250B9DF1000
|
heap
|
page read and write
|
||
214C2773000
|
trusted library allocation
|
page read and write
|
||
214C2C65000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
250BA185000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C38D3000
|
trusted library allocation
|
page read and write
|
||
214C2C8F000
|
trusted library allocation
|
page read and write
|
||
214B7465000
|
heap
|
page read and write
|
||
214C00B5000
|
trusted library allocation
|
page read and write
|
||
214C24CE000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BBE63000
|
trusted library allocation
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214BD6A8000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
310D1FE000
|
stack
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214BFCF8000
|
trusted library allocation
|
page read and write
|
||
214C26B1000
|
trusted library allocation
|
page read and write
|
||
214BC4B6000
|
trusted library allocation
|
page read and write
|
||
214C28CA000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C23A9000
|
trusted library allocation
|
page read and write
|
||
214BFA72000
|
trusted library allocation
|
page read and write
|
||
214B7444000
|
heap
|
page read and write
|
||
214C00C1000
|
trusted library allocation
|
page read and write
|
||
214B746F000
|
heap
|
page read and write
|
||
214BD48A000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C05DB000
|
trusted library allocation
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214BD6DF000
|
trusted library allocation
|
page read and write
|
||
214BFAFE000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C12C9000
|
trusted library allocation
|
page read and write
|
||
214C018A000
|
trusted library allocation
|
page read and write
|
||
214C10E7000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7400000
|
heap
|
page read and write
|
||
214B7453000
|
heap
|
page read and write
|
||
1AA69EBC000
|
heap
|
page read and write
|
||
214C1848000
|
trusted library allocation
|
page read and write
|
||
214C12EF000
|
trusted library allocation
|
page read and write
|
||
214BC7EA000
|
trusted library allocation
|
page read and write
|
||
214B7418000
|
heap
|
page read and write
|
||
214BD4F8000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
8743D3B000
|
stack
|
page read and write
|
||
214BD4CB000
|
trusted library allocation
|
page read and write
|
||
214C0337000
|
trusted library allocation
|
page read and write
|
||
214C1300000
|
trusted library allocation
|
page read and write
|
||
214C2EF6000
|
trusted library allocation
|
page read and write
|
||
214C3862000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214C2CFA000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C28C2000
|
trusted library allocation
|
page read and write
|
||
214BD6DD000
|
trusted library allocation
|
page read and write
|
||
214BFAE7000
|
trusted library allocation
|
page read and write
|
||
214BD6A1000
|
trusted library allocation
|
page read and write
|
||
214C28C4000
|
trusted library allocation
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214BE160000
|
trusted library allocation
|
page read and write
|
||
214BFB50000
|
trusted library allocation
|
page read and write
|
||
310D9FF000
|
stack
|
page read and write
|
||
250B9560000
|
heap
|
page read and write
|
||
214C0278000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
214BDB0A000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214C1193000
|
trusted library allocation
|
page read and write
|
||
214B744E000
|
heap
|
page read and write
|
||
214C1093000
|
trusted library allocation
|
page read and write
|
||
214C12EE000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C28D4000
|
trusted library allocation
|
page read and write
|
||
214BBDCA000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C2732000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214C12F7000
|
trusted library allocation
|
page read and write
|
||
214B73C3000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C1182000
|
trusted library allocation
|
page read and write
|
||
214C24BC000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214C2EE1000
|
trusted library allocation
|
page read and write
|
||
214BD69A000
|
trusted library allocation
|
page read and write
|
||
214C2660000
|
trusted library allocation
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214BC5FD000
|
trusted library allocation
|
page read and write
|
||
214B73D0000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214C3810000
|
trusted library allocation
|
page read and write
|
||
214C10F4000
|
trusted library allocation
|
page read and write
|
||
214C2C5B000
|
trusted library allocation
|
page read and write
|
||
214C027C000
|
trusted library allocation
|
page read and write
|
||
214B73DA000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BC72A000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C38D5000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C27A9000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C1A42000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
259FFE00000
|
trusted library allocation
|
page read and write
|
||
214C10F9000
|
trusted library allocation
|
page read and write
|
||
214C44D9000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C23A9000
|
trusted library allocation
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214BD47D000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214B73F4000
|
heap
|
page read and write
|
||
250BA140000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
1EDDF9E0000
|
unclassified section
|
page read and write
|
||
214C0389000
|
trusted library allocation
|
page read and write
|
||
214C0F83000
|
trusted library allocation
|
page read and write
|
||
250B9D5C000
|
heap
|
page read and write
|
||
2170003F000
|
trusted library allocation
|
page read and write
|
||
1EDDFCA7000
|
trusted library allocation
|
page read and write
|
||
250B9070000
|
unclassified section
|
page readonly
|
||
AAA5BFE000
|
unkown
|
page readonly
|
||
214C2718000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2D17000
|
trusted library allocation
|
page read and write
|
||
214BDC0A000
|
trusted library allocation
|
page read and write
|
||
214BD62C000
|
trusted library allocation
|
page read and write
|
||
250B9465000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C1093000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C10F4000
|
trusted library allocation
|
page read and write
|
||
214C44E0000
|
trusted library allocation
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214BFBCA000
|
trusted library allocation
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C26A7000
|
trusted library allocation
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C386A000
|
trusted library allocation
|
page read and write
|
||
214B7462000
|
heap
|
page read and write
|
||
250B9D5F000
|
heap
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214C38A1000
|
trusted library allocation
|
page read and write
|
||
214B743E000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B7462000
|
heap
|
page read and write
|
||
250B9D7D000
|
heap
|
page read and write
|
||
214C0E9E000
|
trusted library allocation
|
page read and write
|
||
214C23C7000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C1039000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
250B9C10000
|
trusted library allocation
|
page read and write
|
||
214B7461000
|
heap
|
page read and write
|
||
214BD618000
|
trusted library allocation
|
page read and write
|
||
214C28C6000
|
trusted library allocation
|
page read and write
|
||
1EDDFC13000
|
trusted library allocation
|
page read and write
|
||
214C0260000
|
trusted library allocation
|
page read and write
|
||
214BD69D000
|
trusted library allocation
|
page read and write
|
||
214B743B000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214BD4E5000
|
trusted library allocation
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
250B9411000
|
trusted library allocation
|
page read and write
|
||
214C288F000
|
trusted library allocation
|
page read and write
|
||
214C26B1000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214C2666000
|
trusted library allocation
|
page read and write
|
||
214B73CE000
|
heap
|
page read and write
|
||
250B9403000
|
trusted library allocation
|
page read and write
|
||
214C0C1E000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B7465000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C0527000
|
trusted library allocation
|
page read and write
|
||
214BC426000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2EF6000
|
trusted library allocation
|
page read and write
|
||
214BBD88000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C00BF000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BFCF1000
|
trusted library allocation
|
page read and write
|
||
214C12E2000
|
trusted library allocation
|
page read and write
|
||
214C18F4000
|
trusted library allocation
|
page read and write
|
||
214C1A0E000
|
trusted library allocation
|
page read and write
|
||
214C0281000
|
trusted library allocation
|
page read and write
|
||
250B9556000
|
unkown
|
page execute read
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BFCF0000
|
trusted library allocation
|
page read and write
|
||
214C26EA000
|
trusted library allocation
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
250B9DFC000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
250BA1B6000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C2CF2000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BD4DC000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214BD35E000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C2C3F000
|
trusted library allocation
|
page read and write
|
||
214C24D6000
|
trusted library allocation
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214C1F80000
|
trusted library allocation
|
page read and write
|
||
214C109C000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BC475000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BFB25000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
1EDDFD38000
|
trusted library allocation
|
page read and write
|
||
214C03CE000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
250BA1B6000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214BFCF0000
|
trusted library allocation
|
page read and write
|
||
214C20E0000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
250B9AD0000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
1AA6834A000
|
heap
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214C1174000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C2CFA000
|
trusted library allocation
|
page read and write
|
||
214BBDC1000
|
trusted library allocation
|
page read and write
|
||
214C03D6000
|
trusted library allocation
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C28EF000
|
trusted library allocation
|
page read and write
|
||
AAA3948000
|
stack
|
page read and write
|
||
214C0F6B000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C28CA000
|
trusted library allocation
|
page read and write
|
||
214C0550000
|
trusted library allocation
|
page read and write
|
||
214C04EA000
|
trusted library allocation
|
page read and write
|
||
214BFB50000
|
trusted library allocation
|
page read and write
|
||
214C2C1D000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C38D1000
|
trusted library allocation
|
page read and write
|
||
214B7444000
|
heap
|
page read and write
|
||
214C2C47000
|
trusted library allocation
|
page read and write
|
||
214C28C0000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
250B9DF2000
|
heap
|
page read and write
|
||
214C01E7000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214BD6A8000
|
trusted library allocation
|
page read and write
|
||
214BD6EB000
|
trusted library allocation
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214BE209000
|
trusted library allocation
|
page read and write
|
||
214BBFBB000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C1B4C000
|
trusted library allocation
|
page read and write
|
||
250B9492000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2CFA000
|
trusted library allocation
|
page read and write
|
||
214B7460000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7426000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214BC7AD000
|
trusted library allocation
|
page read and write
|
||
214C2D7C000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214BD451000
|
trusted library allocation
|
page read and write
|
||
214C2CFA000
|
trusted library allocation
|
page read and write
|
||
214C2CC4000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
1EDDF800000
|
unclassified section
|
page readonly
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BFAE9000
|
trusted library allocation
|
page read and write
|
||
214C1863000
|
trusted library allocation
|
page read and write
|
||
214BD62C000
|
trusted library allocation
|
page read and write
|
||
214C28D4000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C10B4000
|
trusted library allocation
|
page read and write
|
||
214C277B000
|
trusted library allocation
|
page read and write
|
||
214BD353000
|
trusted library allocation
|
page read and write
|
||
214C00E8000
|
trusted library allocation
|
page read and write
|
||
214BD4C5000
|
trusted library allocation
|
page read and write
|
||
214C00C1000
|
trusted library allocation
|
page read and write
|
||
250B9DE0000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
214C2DAC000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C272E000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73E7000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2653000
|
trusted library allocation
|
page read and write
|
||
214B73F4000
|
heap
|
page read and write
|
||
214BBEB5000
|
trusted library allocation
|
page read and write
|
||
214C0F05000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73D3000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C1840000
|
trusted library allocation
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
A83000
|
heap
|
page read and write
|
||
214C28BC000
|
trusted library allocation
|
page read and write
|
||
8743DFE000
|
unkown
|
page readonly
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C38A1000
|
trusted library allocation
|
page read and write
|
||
214C07A5000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B7463000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C03C5000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BFC54000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C38B7000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C20F8000
|
trusted library allocation
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214C0265000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C0B25000
|
trusted library allocation
|
page read and write
|
||
214BD4E0000
|
trusted library allocation
|
page read and write
|
||
214BFCF8000
|
trusted library allocation
|
page read and write
|
||
214BD449000
|
trusted library allocation
|
page read and write
|
||
214BD47F000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C2E50000
|
trusted library allocation
|
page read and write
|
||
214BFCCD000
|
trusted library allocation
|
page read and write
|
||
214C2EF8000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214BC73C000
|
trusted library allocation
|
page read and write
|
||
214C44D9000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214BE1DF000
|
trusted library allocation
|
page read and write
|
||
214C2E42000
|
trusted library allocation
|
page read and write
|
||
474C000
|
stack
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C28C6000
|
trusted library allocation
|
page read and write
|
||
214C28BE000
|
trusted library allocation
|
page read and write
|
||
214C3899000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
250B9500000
|
trusted library section
|
page readonly
|
||
214C26B1000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BFAD1000
|
trusted library allocation
|
page read and write
|
||
214BC323000
|
trusted library allocation
|
page read and write
|
||
214B7426000
|
heap
|
page read and write
|
||
214B742B000
|
heap
|
page read and write
|
||
214C44A4000
|
trusted library allocation
|
page read and write
|
||
214C0072000
|
trusted library allocation
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214BC4E4000
|
trusted library allocation
|
page read and write
|
||
1EDDFC0E000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C2CE8000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
1AA69FA0000
|
heap
|
page read and write
|
||
214C2C47000
|
trusted library allocation
|
page read and write
|
||
214C3885000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
1AA684D5000
|
heap
|
page read and write
|
||
214BFB1D000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2D3B000
|
trusted library allocation
|
page read and write
|
||
214C22CE000
|
trusted library allocation
|
page read and write
|
||
214C1F5B000
|
trusted library allocation
|
page read and write
|
||
214C1040000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2D89000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C2E90000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214C1040000
|
trusted library allocation
|
page read and write
|
||
214BC7EA000
|
trusted library allocation
|
page read and write
|
||
214C26A7000
|
trusted library allocation
|
page read and write
|
||
250BA160000
|
heap
|
page read and write
|
||
214C0154000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C0E39000
|
trusted library allocation
|
page read and write
|
||
1EDDF9E2000
|
unclassified section
|
page read and write
|
||
214C05CF000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BD6C1000
|
trusted library allocation
|
page read and write
|
||
214C117E000
|
trusted library allocation
|
page read and write
|
||
87478FE000
|
stack
|
page read and write
|
||
214BD6E0000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BC46A000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C0E11000
|
trusted library allocation
|
page read and write
|
||
1EDDF840000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C1602000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214C03BF000
|
trusted library allocation
|
page read and write
|
||
214BD4F1000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C10B3000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214C27C5000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C10FB000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C38C9000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C19A0000
|
trusted library allocation
|
page read and write
|
||
214C26E4000
|
trusted library allocation
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C1081000
|
trusted library allocation
|
page read and write
|
||
214C0260000
|
trusted library allocation
|
page read and write
|
||
259FFB00000
|
heap
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214C0EBF000
|
trusted library allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214C2EF0000
|
trusted library allocation
|
page read and write
|
||
214C3893000
|
trusted library allocation
|
page read and write
|
||
214C2DB3000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2E79000
|
trusted library allocation
|
page read and write
|
||
214C3E30000
|
trusted library allocation
|
page read and write
|
||
214C2684000
|
trusted library allocation
|
page read and write
|
||
214C13E4000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD6F6000
|
trusted library allocation
|
page read and write
|
||
250B9DE8000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C0553000
|
trusted library allocation
|
page read and write
|
||
214BFA79000
|
trusted library allocation
|
page read and write
|
||
214C20F2000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214C12CD000
|
trusted library allocation
|
page read and write
|
||
214BD437000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
250BA1B6000
|
heap
|
page read and write
|
||
214C04F5000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214B747F000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214C2CBF000
|
trusted library allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
214C0F48000
|
trusted library allocation
|
page read and write
|
||
214BFC49000
|
trusted library allocation
|
page read and write
|
||
214BD66E000
|
trusted library allocation
|
page read and write
|
||
214BC7B2000
|
trusted library allocation
|
page read and write
|
||
214C38CD000
|
trusted library allocation
|
page read and write
|
||
214C2D76000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214C1980000
|
trusted library allocation
|
page read and write
|
||
214C2D9D000
|
trusted library allocation
|
page read and write
|
||
214BBE25000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
2FBCA9C89000
|
trusted library allocation
|
page read and write
|
||
214B73D2000
|
heap
|
page read and write
|
||
214BD6F1000
|
trusted library allocation
|
page read and write
|
||
250BA185000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C272D000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214BFC8E000
|
trusted library allocation
|
page read and write
|
||
214B742D000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214BE151000
|
trusted library allocation
|
page read and write
|
||
214C0392000
|
trusted library allocation
|
page read and write
|
||
214C1071000
|
trusted library allocation
|
page read and write
|
||
214C10B3000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C2C1B000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C24EB000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C2D8C000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C1300000
|
trusted library allocation
|
page read and write
|
||
874603E000
|
stack
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214C0E39000
|
trusted library allocation
|
page read and write
|
||
214C2CC4000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C0FD5000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2D83000
|
trusted library allocation
|
page read and write
|
||
214BD6A6000
|
trusted library allocation
|
page read and write
|
||
214C1040000
|
trusted library allocation
|
page read and write
|
||
214C0217000
|
trusted library allocation
|
page read and write
|
||
1EDDFC72000
|
trusted library allocation
|
page read and write
|
||
214C28C8000
|
trusted library allocation
|
page read and write
|
||
214C3875000
|
trusted library allocation
|
page read and write
|
||
214C3E15000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C01BF000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C21FD000
|
trusted library allocation
|
page read and write
|
||
214B747B000
|
heap
|
page read and write
|
||
214B7440000
|
heap
|
page read and write
|
||
214C278B000
|
trusted library allocation
|
page read and write
|
||
214C0FDF000
|
trusted library allocation
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
1EDDFC47000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
AAA38CE000
|
unkown
|
page readonly
|
||
214B7407000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C1182000
|
trusted library allocation
|
page read and write
|
||
214B73CD000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C27D5000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214C186A000
|
trusted library allocation
|
page read and write
|
||
214C23E8000
|
trusted library allocation
|
page read and write
|
||
214C44E2000
|
trusted library allocation
|
page read and write
|
||
214C24CE000
|
trusted library allocation
|
page read and write
|
||
214C01E1000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C2EF0000
|
trusted library allocation
|
page read and write
|
||
214C03BF000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214BD6BC000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C28C0000
|
trusted library allocation
|
page read and write
|
||
214C07B9000
|
trusted library allocation
|
page read and write
|
||
214C2D25000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
250BA197000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C1071000
|
trusted library allocation
|
page read and write
|
||
214C38CD000
|
trusted library allocation
|
page read and write
|
||
214C26B4000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C026C000
|
trusted library allocation
|
page read and write
|
||
250B9DB9000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214C105F000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214C2C30000
|
trusted library allocation
|
page read and write
|
||
214C07C4000
|
trusted library allocation
|
page read and write
|
||
214C10B3000
|
trusted library allocation
|
page read and write
|
||
214C1071000
|
trusted library allocation
|
page read and write
|
||
214BC70E000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C00F9000
|
trusted library allocation
|
page read and write
|
||
214BD4FA000
|
trusted library allocation
|
page read and write
|
||
214C2D95000
|
trusted library allocation
|
page read and write
|
||
214C0156000
|
trusted library allocation
|
page read and write
|
||
214BC7B8000
|
trusted library allocation
|
page read and write
|
||
214C389D000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
214C11B5000
|
trusted library allocation
|
page read and write
|
||
250B9DEC000
|
heap
|
page read and write
|
||
214BC7CC000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2C29000
|
trusted library allocation
|
page read and write
|
||
214C2859000
|
trusted library allocation
|
page read and write
|
||
214C10A0000
|
trusted library allocation
|
page read and write
|
||
214C24BC000
|
trusted library allocation
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
214BE1B4000
|
trusted library allocation
|
page read and write
|
||
250BA185000
|
heap
|
page read and write
|
||
214C2CBA000
|
trusted library allocation
|
page read and write
|
||
214C04F5000
|
trusted library allocation
|
page read and write
|
||
214C1802000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C38D1000
|
trusted library allocation
|
page read and write
|
||
214C3899000
|
trusted library allocation
|
page read and write
|
||
1AA000
|
stack
|
page read and write
|
||
214BD4B9000
|
trusted library allocation
|
page read and write
|
||
214C44E4000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214BD62F000
|
trusted library allocation
|
page read and write
|
||
214B747B000
|
heap
|
page read and write
|
||
214BBE81000
|
trusted library allocation
|
page read and write
|
||
214BD35E000
|
trusted library allocation
|
page read and write
|
||
214BC3F6000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C1087000
|
trusted library allocation
|
page read and write
|
||
214BBE83000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
1EDDFE00000
|
heap
|
page read and write
|
||
214C2143000
|
trusted library allocation
|
page read and write
|
||
250B9D69000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
250B9DA8000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C00F1000
|
trusted library allocation
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
250B9DF1000
|
heap
|
page read and write
|
||
214C3862000
|
trusted library allocation
|
page read and write
|
||
214BBEEF000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B73FD000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
250B94BF000
|
trusted library allocation
|
page read and write
|
||
214C2C5D000
|
trusted library allocation
|
page read and write
|
||
214C3E1C000
|
trusted library allocation
|
page read and write
|
||
214BFA31000
|
trusted library allocation
|
page read and write
|
||
214C44DE000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BFC4B000
|
trusted library allocation
|
page read and write
|
||
214C1B0F000
|
trusted library allocation
|
page read and write
|
||
214BFC0B000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C3864000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C1924000
|
trusted library allocation
|
page read and write
|
||
214B743E000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C38D1000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214BD444000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B743A000
|
heap
|
page read and write
|
||
A83000
|
heap
|
page read and write
|
||
214C1060000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
1AA68320000
|
heap
|
page read and write
|
||
214BD679000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C1033000
|
trusted library allocation
|
page read and write
|
||
214BD698000
|
trusted library allocation
|
page read and write
|
||
1AA69EB8000
|
heap
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1AA68372000
|
heap
|
page read and write
|
||
214B742B000
|
heap
|
page read and write
|
||
104C000
|
unkown
|
page readonly
|
||
AAA74FE000
|
stack
|
page read and write
|
||
214C03ED000
|
trusted library allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C272E000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C0FFE000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C1071000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
1EDDF99A000
|
heap
|
page read and write
|
||
214C23B9000
|
trusted library allocation
|
page read and write
|
||
214C18A5000
|
trusted library allocation
|
page read and write
|
||
214B7418000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
AAA6C7E000
|
unkown
|
page readonly
|
||
214B741D000
|
heap
|
page read and write
|
||
214C3847000
|
trusted library allocation
|
page read and write
|
||
214B7460000
|
heap
|
page read and write
|
||
1AA68370000
|
heap
|
page read and write
|
||
214BD499000
|
trusted library allocation
|
page read and write
|
||
1A36000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C2C1F000
|
trusted library allocation
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214C28C8000
|
trusted library allocation
|
page read and write
|
||
214C04EF000
|
trusted library allocation
|
page read and write
|
||
214C01FC000
|
trusted library allocation
|
page read and write
|
||
214BD5F1000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BE164000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C03BA000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214C1C00000
|
trusted library allocation
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
2109C04000
|
trusted library allocation
|
page read and write
|
||
250B9060000
|
unclassified section
|
page readonly
|
||
944000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C11C4000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214C2674000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214C23B9000
|
trusted library allocation
|
page read and write
|
||
214BBFEC000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C2D94000
|
trusted library allocation
|
page read and write
|
||
214C2CDF000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
AAA7CFE000
|
unkown
|
page readonly
|
||
214C38A1000
|
trusted library allocation
|
page read and write
|
||
214B73D0000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214C2D5B000
|
trusted library allocation
|
page read and write
|
||
214BC718000
|
trusted library allocation
|
page read and write
|
||
214BD679000
|
trusted library allocation
|
page read and write
|
||
214B7429000
|
heap
|
page read and write
|
||
214C2D8D000
|
trusted library allocation
|
page read and write
|
||
214C2E6A000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E7000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BFB50000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD4E5000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BC482000
|
trusted library allocation
|
page read and write
|
||
214C2CC4000
|
trusted library allocation
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214BBFC9000
|
trusted library allocation
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
250B9DF1000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214BC7B8000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
1072000
|
unkown
|
page readonly
|
||
214BD66C000
|
trusted library allocation
|
page read and write
|
||
214C2D6B000
|
trusted library allocation
|
page read and write
|
||
214C27F5000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C2653000
|
trusted library allocation
|
page read and write
|
||
214B7448000
|
heap
|
page read and write
|
||
214C2C09000
|
trusted library allocation
|
page read and write
|
||
214C0527000
|
trusted library allocation
|
page read and write
|
||
214C2EE1000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C2C10000
|
trusted library allocation
|
page read and write
|
||
214BC7F4000
|
trusted library allocation
|
page read and write
|
||
1EDDF770000
|
unclassified section
|
page readonly
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
189F000
|
stack
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C0E39000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214C26F9000
|
trusted library allocation
|
page read and write
|
||
214C26A3000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BFC44000
|
trusted library allocation
|
page read and write
|
||
214BC7D7000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7424000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C386F000
|
trusted library allocation
|
page read and write
|
||
214C2D84000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BE1BD000
|
trusted library allocation
|
page read and write
|
||
214B7476000
|
heap
|
page read and write
|
||
214C1195000
|
trusted library allocation
|
page read and write
|
||
214C2859000
|
trusted library allocation
|
page read and write
|
||
1EDDFC9D000
|
trusted library allocation
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BBE54000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214C2C34000
|
trusted library allocation
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214BFC4B000
|
trusted library allocation
|
page read and write
|
||
1EDDF780000
|
unclassified section
|
page readonly
|
||
214BD675000
|
trusted library allocation
|
page read and write
|
||
214BFC63000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214BBFD7000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C2DB0000
|
trusted library allocation
|
page read and write
|
||
214BD6F4000
|
trusted library allocation
|
page read and write
|
||
214BD5F1000
|
trusted library allocation
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214BDE0A000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BC7DE000
|
trusted library allocation
|
page read and write
|
||
214C0286000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C28BE000
|
trusted library allocation
|
page read and write
|
||
214BD4DC000
|
trusted library allocation
|
page read and write
|
||
214C28C6000
|
trusted library allocation
|
page read and write
|
||
214B743B000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C12C3000
|
trusted library allocation
|
page read and write
|
||
214BD679000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
250B942F000
|
trusted library allocation
|
page read and write
|
||
214BFACE000
|
trusted library allocation
|
page read and write
|
||
214BD4D0000
|
trusted library allocation
|
page read and write
|
||
214BFC0E000
|
trusted library allocation
|
page read and write
|
||
214C27C5000
|
trusted library allocation
|
page read and write
|
||
214C2C32000
|
trusted library allocation
|
page read and write
|
||
214C2C32000
|
trusted library allocation
|
page read and write
|
||
214C05DB000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C1071000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD66E000
|
trusted library allocation
|
page read and write
|
||
214BE1BD000
|
trusted library allocation
|
page read and write
|
||
214C2160000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2C23000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
250B9D60000
|
heap
|
page read and write
|
||
250B9477000
|
trusted library allocation
|
page read and write
|
||
214C2C54000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C00AE000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B743D000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BBEDB000
|
trusted library allocation
|
page read and write
|
||
214C11BC000
|
trusted library allocation
|
page read and write
|
||
214C2D56000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214C1324000
|
trusted library allocation
|
page read and write
|
||
214BFCBA000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BFAD5000
|
trusted library allocation
|
page read and write
|
||
214C2E71000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C1195000
|
trusted library allocation
|
page read and write
|
||
214C05FA000
|
trusted library allocation
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214C213C000
|
trusted library allocation
|
page read and write
|
||
214BD6C1000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C44D5000
|
trusted library allocation
|
page read and write
|
||
214BFB58000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C0266000
|
trusted library allocation
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214BD4FA000
|
trusted library allocation
|
page read and write
|
||
1EDDFC0B000
|
trusted library allocation
|
page read and write
|
||
214C03C5000
|
trusted library allocation
|
page read and write
|
||
214BD4CB000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214C0263000
|
trusted library allocation
|
page read and write
|
||
214C0553000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2DC2000
|
trusted library allocation
|
page read and write
|
||
214C2C7E000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
214C024D000
|
trusted library allocation
|
page read and write
|
||
214C3836000
|
trusted library allocation
|
page read and write
|
||
214C2C64000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C2C4B000
|
trusted library allocation
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
259FFBF0000
|
heap
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214C2D8D000
|
trusted library allocation
|
page read and write
|
||
214BFAD4000
|
trusted library allocation
|
page read and write
|
||
214C2C34000
|
trusted library allocation
|
page read and write
|
||
214C266B000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
310B9FE000
|
stack
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214C2EE1000
|
trusted library allocation
|
page read and write
|
||
214C2EDB000
|
trusted library allocation
|
page read and write
|
||
214C0F48000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BFC34000
|
trusted library allocation
|
page read and write
|
||
214C20A6000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BBEAD000
|
trusted library allocation
|
page read and write
|
||
214BC7A4000
|
trusted library allocation
|
page read and write
|
||
214C10B3000
|
trusted library allocation
|
page read and write
|
||
214C0F74000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214BD48A000
|
trusted library allocation
|
page read and write
|
||
214C2656000
|
trusted library allocation
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C12EF000
|
trusted library allocation
|
page read and write
|
||
214C100E000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2CDD000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C38D7000
|
trusted library allocation
|
page read and write
|
||
214C3885000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BC7AF000
|
trusted library allocation
|
page read and write
|
||
214C0172000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C11BA000
|
trusted library allocation
|
page read and write
|
||
214B7426000
|
heap
|
page read and write
|
||
214BFCFB000
|
trusted library allocation
|
page read and write
|
||
214C2C1B000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C2160000
|
trusted library allocation
|
page read and write
|
||
214BFC44000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C2C3D000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BBE4C000
|
trusted library allocation
|
page read and write
|
||
214C38D5000
|
trusted library allocation
|
page read and write
|
||
250B9D9C000
|
heap
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
214BC7BF000
|
trusted library allocation
|
page read and write
|
||
214C28CA000
|
trusted library allocation
|
page read and write
|
||
214C23B9000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BFA0E000
|
trusted library allocation
|
page read and write
|
||
214C2681000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214C1054000
|
trusted library allocation
|
page read and write
|
||
250B9DE3000
|
heap
|
page read and write
|
||
1EDDF873000
|
heap
|
page read and write
|
||
214C03C9000
|
trusted library allocation
|
page read and write
|
||
214B7418000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
1EDDF9D0000
|
heap
|
page readonly
|
||
214C07C4000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2C5B000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
1EDDFB00000
|
heap
|
page read and write
|
||
214BC7A4000
|
trusted library allocation
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214BD4FD000
|
trusted library allocation
|
page read and write
|
||
214C00DC000
|
trusted library allocation
|
page read and write
|
||
214C039A000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C28C8000
|
trusted library allocation
|
page read and write
|
||
1EDDFC67000
|
trusted library allocation
|
page read and write
|
||
214B73C2000
|
heap
|
page read and write
|
||
214BD6E0000
|
trusted library allocation
|
page read and write
|
||
214C4499000
|
trusted library allocation
|
page read and write
|
||
214C1093000
|
trusted library allocation
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
FB1000
|
unkown
|
page execute read
|
||
214C10DF000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C0527000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214BFA9B000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2697000
|
trusted library allocation
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
250B99D0000
|
heap
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C44E2000
|
trusted library allocation
|
page read and write
|
||
214B73D0000
|
heap
|
page read and write
|
||
214C2C30000
|
trusted library allocation
|
page read and write
|
||
1084000
|
unkown
|
page readonly
|
||
2FBCA9C1E000
|
trusted library allocation
|
page read and write
|
||
214BFAA7000
|
trusted library allocation
|
page read and write
|
||
214C27F5000
|
trusted library allocation
|
page read and write
|
||
214C2C3D000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214C28BE000
|
trusted library allocation
|
page read and write
|
||
214C2665000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B745C000
|
heap
|
page read and write
|
||
214C015A000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214BC7D6000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214BD45D000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C38D1000
|
trusted library allocation
|
page read and write
|
||
214C28F6000
|
trusted library allocation
|
page read and write
|
||
214BFC34000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C10E2000
|
trusted library allocation
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
214C1057000
|
trusted library allocation
|
page read and write
|
||
214BFC04000
|
trusted library allocation
|
page read and write
|
||
214C27ED000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C2C54000
|
trusted library allocation
|
page read and write
|
||
214C2D56000
|
trusted library allocation
|
page read and write
|
||
214BD4E8000
|
trusted library allocation
|
page read and write
|
||
214C38D7000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214BD4E0000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
250B9250000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
214C2DAE000
|
trusted library allocation
|
page read and write
|
||
214BBE67000
|
trusted library allocation
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C00BF000
|
trusted library allocation
|
page read and write
|
||
214C1018000
|
trusted library allocation
|
page read and write
|
||
214C07B9000
|
trusted library allocation
|
page read and write
|
||
214C22F2000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B7426000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C1046000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BD4F8000
|
trusted library allocation
|
page read and write
|
||
214C03C9000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C2674000
|
trusted library allocation
|
page read and write
|
||
214C2EC9000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
AAA63FE000
|
stack
|
page read and write
|
||
214C25CC000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C10F2000
|
trusted library allocation
|
page read and write
|
||
214C07B9000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C1039000
|
trusted library allocation
|
page read and write
|
||
250B946A000
|
trusted library allocation
|
page read and write
|
||
214BFCF8000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C2CDD000
|
trusted library allocation
|
page read and write
|
||
214BD476000
|
trusted library allocation
|
page read and write
|
||
214BC7EA000
|
trusted library allocation
|
page read and write
|
||
214BC7F4000
|
trusted library allocation
|
page read and write
|
||
214B7426000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214C2E89000
|
trusted library allocation
|
page read and write
|
||
214C27F5000
|
trusted library allocation
|
page read and write
|
||
214C2DAC000
|
trusted library allocation
|
page read and write
|
||
214C1607000
|
trusted library allocation
|
page read and write
|
||
214C287F000
|
trusted library allocation
|
page read and write
|
||
214C0154000
|
trusted library allocation
|
page read and write
|
||
214BC323000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C20BC000
|
trusted library allocation
|
page read and write
|
||
1EDDF990000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
250B9D5F000
|
heap
|
page read and write
|
||
214C2CDF000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD468000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BDA08000
|
trusted library allocation
|
page read and write
|
||
214C2D59000
|
trusted library allocation
|
page read and write
|
||
214BE137000
|
trusted library allocation
|
page read and write
|
||
214BFB4C000
|
trusted library allocation
|
page read and write
|
||
214C386A000
|
trusted library allocation
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
250B94CF000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
250B9DEC000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214C3875000
|
trusted library allocation
|
page read and write
|
||
214C07C2000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2C34000
|
trusted library allocation
|
page read and write
|
||
214C24BC000
|
trusted library allocation
|
page read and write
|
||
214C383B000
|
trusted library allocation
|
page read and write
|
||
214C10F7000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2C32000
|
trusted library allocation
|
page read and write
|
||
214C286F000
|
trusted library allocation
|
page read and write
|
||
214C2D31000
|
trusted library allocation
|
page read and write
|
||
AAA84FE000
|
stack
|
page read and write
|
||
214B73C3000
|
heap
|
page read and write
|
||
214C119A000
|
trusted library allocation
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214C2C65000
|
trusted library allocation
|
page read and write
|
||
1EDDFD0F000
|
trusted library allocation
|
page read and write
|
||
214C2D8D000
|
trusted library allocation
|
page read and write
|
||
214BBE45000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2656000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C278B000
|
trusted library allocation
|
page read and write
|
||
214C38CD000
|
trusted library allocation
|
page read and write
|
||
214C23B9000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C26C2000
|
trusted library allocation
|
page read and write
|
||
214C12E2000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C26A3000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C1984000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BD4B9000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214C1035000
|
trusted library allocation
|
page read and write
|
||
214C0E39000
|
trusted library allocation
|
page read and write
|
||
AAA43D8000
|
stack
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214BC70A000
|
trusted library allocation
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214BE1CF000
|
trusted library allocation
|
page read and write
|
||
104C000
|
unkown
|
page readonly
|
||
214BD6BC000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C28D4000
|
trusted library allocation
|
page read and write
|
||
214C277E000
|
trusted library allocation
|
page read and write
|
||
214C3872000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214C00BF000
|
trusted library allocation
|
page read and write
|
||
214BFACE000
|
trusted library allocation
|
page read and write
|
||
214C2C8B000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214C26EB000
|
trusted library allocation
|
page read and write
|
||
214C2D5E000
|
trusted library allocation
|
page read and write
|
||
AAA8CFE000
|
unkown
|
page readonly
|
||
214C00B3000
|
trusted library allocation
|
page read and write
|
||
250B9DE8000
|
heap
|
page read and write
|
||
214BD4D0000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C28CA000
|
trusted library allocation
|
page read and write
|
||
214BBD52000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2CBF000
|
trusted library allocation
|
page read and write
|
||
250B9B00000
|
heap
|
page read and write
|
||
214C0EA2000
|
trusted library allocation
|
page read and write
|
||
214BD4D0000
|
trusted library allocation
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
250B9D63000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214BC7EA000
|
trusted library allocation
|
page read and write
|
||
214C24FD000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214C0F05000
|
trusted library allocation
|
page read and write
|
||
214C23C7000
|
trusted library allocation
|
page read and write
|
||
214B7430000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
1AA6860A000
|
trusted library allocation
|
page read and write
|
||
214C2ECE000
|
trusted library allocation
|
page read and write
|
||
214B7423000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2494000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C0045000
|
trusted library allocation
|
page read and write
|
||
214C1161000
|
trusted library allocation
|
page read and write
|
||
214C44A4000
|
trusted library allocation
|
page read and write
|
||
214BE1E9000
|
trusted library allocation
|
page read and write
|
||
214C10B3000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C25DD000
|
trusted library allocation
|
page read and write
|
||
214BBE6C000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C24DC000
|
trusted library allocation
|
page read and write
|
||
214C0EA2000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
250BA183000
|
heap
|
page read and write
|
||
214C286F000
|
trusted library allocation
|
page read and write
|
||
214C2EDB000
|
trusted library allocation
|
page read and write
|
||
250B9D5C000
|
heap
|
page read and write
|
||
214C277E000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C3880000
|
trusted library allocation
|
page read and write
|
||
214C287B000
|
trusted library allocation
|
page read and write
|
||
214B73DA000
|
heap
|
page read and write
|
||
214BD4E5000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C2773000
|
trusted library allocation
|
page read and write
|
||
214C00DC000
|
trusted library allocation
|
page read and write
|
||
214C2EF0000
|
trusted library allocation
|
page read and write
|
||
214C1182000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214BD6DC000
|
trusted library allocation
|
page read and write
|
||
214C2CDF000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B7460000
|
heap
|
page read and write
|
||
214C287F000
|
trusted library allocation
|
page read and write
|
||
214C0286000
|
trusted library allocation
|
page read and write
|
||
214C2DAC000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214C27E3000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
250BA197000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C0F07000
|
trusted library allocation
|
page read and write
|
||
214B73CE000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214C01BC000
|
trusted library allocation
|
page read and write
|
||
214BD5F1000
|
trusted library allocation
|
page read and write
|
||
214C38C9000
|
trusted library allocation
|
page read and write
|
||
214C01F9000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C38CB000
|
trusted library allocation
|
page read and write
|
||
214BD4C8000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C2D70000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214C2CD2000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73EA000
|
heap
|
page read and write
|
||
214BFCAC000
|
trusted library allocation
|
page read and write
|
||
CF7F3FC000
|
stack
|
page read and write
|
||
214C003B000
|
trusted library allocation
|
page read and write
|
||
214C10B4000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
250B910A000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
214C10D6000
|
trusted library allocation
|
page read and write
|
||
250B9DE0000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C10B4000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214C2CB2000
|
trusted library allocation
|
page read and write
|
||
214B7460000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C10DF000
|
trusted library allocation
|
page read and write
|
||
214C01BF000
|
trusted library allocation
|
page read and write
|
||
214C2D8D000
|
trusted library allocation
|
page read and write
|
||
214C0F48000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214C27ED000
|
trusted library allocation
|
page read and write
|
||
214BD4A1000
|
trusted library allocation
|
page read and write
|
||
214C03BA000
|
trusted library allocation
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214C03C9000
|
trusted library allocation
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
214C44D5000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B73F4000
|
heap
|
page read and write
|
||
214C28C4000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214BFB58000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C288B000
|
trusted library allocation
|
page read and write
|
||
214C1920000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214BD4C8000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
250B90D9000
|
remote allocation
|
page execute read
|
||
214BD4F8000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214B73EA000
|
heap
|
page read and write
|
||
214C0285000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
250BA183000
|
heap
|
page read and write
|
||
214B7409000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C248E000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C28CA000
|
trusted library allocation
|
page read and write
|
||
214B73F4000
|
heap
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214BC7BB000
|
trusted library allocation
|
page read and write
|
||
214BBE8A000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73D3000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C12F1000
|
trusted library allocation
|
page read and write
|
||
214C2768000
|
trusted library allocation
|
page read and write
|
||
214C00AE000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
1EDDFC23000
|
trusted library allocation
|
page read and write
|
||
214C0126000
|
trusted library allocation
|
page read and write
|
||
250BA181000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C21FD000
|
trusted library allocation
|
page read and write
|
||
214BC736000
|
trusted library allocation
|
page read and write
|
||
214BFCFB000
|
trusted library allocation
|
page read and write
|
||
214C248E000
|
trusted library allocation
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214C2ED5000
|
trusted library allocation
|
page read and write
|
||
214C38CB000
|
trusted library allocation
|
page read and write
|
||
214BD4DC000
|
trusted library allocation
|
page read and write
|
||
250B9C00000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214BBE43000
|
trusted library allocation
|
page read and write
|
||
214BD605000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
unkown
|
page readonly
|
||
214C26EA000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
250BA1B9000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214C0021000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2DCC000
|
trusted library allocation
|
page read and write
|
||
250B9D00000
|
heap
|
page read and write
|
||
1EDDFC81000
|
trusted library allocation
|
page read and write
|
||
250B955F000
|
unkown
|
page execute read
|
||
214C2863000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C2D89000
|
trusted library allocation
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214C2C4B000
|
trusted library allocation
|
page read and write
|
||
214C2D26000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C389D000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214C273F000
|
trusted library allocation
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214B746F000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
214BBE6E000
|
trusted library allocation
|
page read and write
|
||
214C4491000
|
trusted library allocation
|
page read and write
|
||
214B73CD000
|
heap
|
page read and write
|
||
214C38CB000
|
trusted library allocation
|
page read and write
|
||
214C38D3000
|
trusted library allocation
|
page read and write
|
||
CF7FBFF000
|
stack
|
page read and write
|
||
214C2CAE000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B741C000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214BBD9B000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
250B9474000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1EDDFC5D000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C277B000
|
trusted library allocation
|
page read and write
|
||
214B7448000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214C20BC000
|
trusted library allocation
|
page read and write
|
||
214B743E000
|
heap
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214B747F000
|
heap
|
page read and write
|
||
214BD679000
|
trusted library allocation
|
page read and write
|
||
214C2CDD000
|
trusted library allocation
|
page read and write
|
||
214C034F000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
250B9DEC000
|
heap
|
page read and write
|
||
214B741B000
|
heap
|
page read and write
|
||
214C3899000
|
trusted library allocation
|
page read and write
|
||
214C10F4000
|
trusted library allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
214C213E000
|
trusted library allocation
|
page read and write
|
||
214C10DF000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C2CC8000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214BFAAA000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C2D89000
|
trusted library allocation
|
page read and write
|
||
214C027E000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214BFCFB000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C38C9000
|
trusted library allocation
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214C2D82000
|
trusted library allocation
|
page read and write
|
||
214C28EF000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C19C0000
|
trusted library allocation
|
page read and write
|
||
214C05FA000
|
trusted library allocation
|
page read and write
|
||
214C38CF000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
250B9DEC000
|
heap
|
page read and write
|
||
214BD66E000
|
trusted library allocation
|
page read and write
|
||
214C288B000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
214C1193000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214C05CF000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C0E17000
|
trusted library allocation
|
page read and write
|
||
214BD6F6000
|
trusted library allocation
|
page read and write
|
||
214C1021000
|
trusted library allocation
|
page read and write
|
||
250B99F5000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C1946000
|
trusted library allocation
|
page read and write
|
||
259FFE07000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
250BA1B6000
|
heap
|
page read and write
|
||
214C10AA000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73DA000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C11C4000
|
trusted library allocation
|
page read and write
|
||
214C03CB000
|
trusted library allocation
|
page read and write
|
||
250B9D8D000
|
heap
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
1EDDFD00000
|
trusted library allocation
|
page read and write
|
||
250B9DFC000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C28C2000
|
trusted library allocation
|
page read and write
|
||
250B9DE8000
|
heap
|
page read and write
|
||
AAA388D000
|
stack
|
page read and write
|
||
214C1060000
|
trusted library allocation
|
page read and write
|
||
214C2CBA000
|
trusted library allocation
|
page read and write
|
||
214C0E39000
|
trusted library allocation
|
page read and write
|
||
214BFAA7000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C0E9E000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C264F000
|
trusted library allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
250B9DA1000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C03ED000
|
trusted library allocation
|
page read and write
|
||
214BC7DB000
|
trusted library allocation
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214BD6F3000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C238E000
|
trusted library allocation
|
page read and write
|
||
214C2C5B000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B7409000
|
heap
|
page read and write
|
||
214C2D2C000
|
trusted library allocation
|
page read and write
|
||
214C2723000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214B06EC000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
214BC718000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73EA000
|
heap
|
page read and write
|
||
214BFAA2000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C2CB2000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C265D000
|
trusted library allocation
|
page read and write
|
||
214BC4A4000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214BBFE7000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BC7B8000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
1080000
|
unkown
|
page write copy
|
||
250B9AE0000
|
unkown
|
page execute read
|
||
214C05CF000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214C248E000
|
trusted library allocation
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BFA33000
|
trusted library allocation
|
page read and write
|
||
214C2D1C000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C27D5000
|
trusted library allocation
|
page read and write
|
||
214C28FE000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BE134000
|
trusted library allocation
|
page read and write
|
||
214C2697000
|
trusted library allocation
|
page read and write
|
||
214BC7CA000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BC7AD000
|
trusted library allocation
|
page read and write
|
||
214C28C2000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214BD499000
|
trusted library allocation
|
page read and write
|
||
214BD4E5000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C025C000
|
trusted library allocation
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214C239B000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
250B92A0000
|
heap
|
page readonly
|
||
214B741D000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C1AE2000
|
trusted library allocation
|
page read and write
|
||
214C2737000
|
trusted library allocation
|
page read and write
|
||
214C1A6F000
|
trusted library allocation
|
page read and write
|
||
214BFC0B000
|
trusted library allocation
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214BD4FA000
|
trusted library allocation
|
page read and write
|
||
214BD698000
|
trusted library allocation
|
page read and write
|
||
214BD5D4000
|
trusted library allocation
|
page read and write
|
||
214BD4B9000
|
trusted library allocation
|
page read and write
|
||
214C01B8000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
1EDDFA00000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2D9E000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214BBFF4000
|
trusted library allocation
|
page read and write
|
||
214C10B4000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214BD633000
|
trusted library allocation
|
page read and write
|
||
214BD6C1000
|
trusted library allocation
|
page read and write
|
||
214C2C10000
|
trusted library allocation
|
page read and write
|
||
214C28F6000
|
trusted library allocation
|
page read and write
|
||
250B9D7F000
|
heap
|
page read and write
|
||
214C44DC000
|
trusted library allocation
|
page read and write
|
||
214C0148000
|
trusted library allocation
|
page read and write
|
||
214B747F000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214C0550000
|
trusted library allocation
|
page read and write
|
||
214B73D3000
|
heap
|
page read and write
|
||
214C2768000
|
trusted library allocation
|
page read and write
|
||
214C2CE8000
|
trusted library allocation
|
page read and write
|
||
214C2D1C000
|
trusted library allocation
|
page read and write
|
||
214C1182000
|
trusted library allocation
|
page read and write
|
||
250B92D0000
|
trusted library allocation
|
page read and write
|
||
214B7429000
|
heap
|
page read and write
|
||
214B7453000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C3889000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C38CB000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
1EDDFE02000
|
heap
|
page read and write
|
||
214C44A4000
|
trusted library allocation
|
page read and write
|
||
214C287B000
|
trusted library allocation
|
page read and write
|
||
214BD4F1000
|
trusted library allocation
|
page read and write
|
||
214BD4A1000
|
trusted library allocation
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C27C5000
|
trusted library allocation
|
page read and write
|
||
214BBDDF000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C1099000
|
trusted library allocation
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73DA000
|
heap
|
page read and write
|
||
214BC72A000
|
trusted library allocation
|
page read and write
|
||
214C2CD2000
|
trusted library allocation
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214C07C0000
|
trusted library allocation
|
page read and write
|
||
214BD6F1000
|
trusted library allocation
|
page read and write
|
||
214C3889000
|
trusted library allocation
|
page read and write
|
||
214C0286000
|
trusted library allocation
|
page read and write
|
||
214C24FD000
|
trusted library allocation
|
page read and write
|
||
214C38B7000
|
trusted library allocation
|
page read and write
|
||
214C28C6000
|
trusted library allocation
|
page read and write
|
||
250B94FB000
|
trusted library allocation
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2D59000
|
trusted library allocation
|
page read and write
|
||
214C2D76000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73CD000
|
heap
|
page read and write
|
||
214C01BC000
|
trusted library allocation
|
page read and write
|
||
214C266D000
|
trusted library allocation
|
page read and write
|
||
250BA16D000
|
heap
|
page read and write
|
||
214C2C5D000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C117E000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BC500000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C3E29000
|
trusted library allocation
|
page read and write
|
||
250B9D08000
|
heap
|
page read and write
|
||
214C11C6000
|
trusted library allocation
|
page read and write
|
||
214C1054000
|
trusted library allocation
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214C3E30000
|
trusted library allocation
|
page read and write
|
||
214C03E4000
|
trusted library allocation
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214C28C8000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
250BA199000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C0EA2000
|
trusted library allocation
|
page read and write
|
||
250B92CF000
|
unclassified section
|
page read and write
|
||
214C1AE6000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C01DC000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B742D000
|
heap
|
page read and write
|
||
1EDDF870000
|
heap
|
page read and write
|
||
214C2D94000
|
trusted library allocation
|
page read and write
|
||
214C2CD2000
|
trusted library allocation
|
page read and write
|
||
214BD675000
|
trusted library allocation
|
page read and write
|
||
214BFC31000
|
trusted library allocation
|
page read and write
|
||
214BD4FD000
|
trusted library allocation
|
page read and write
|
||
214B73CE000
|
heap
|
page read and write
|
||
214BBE6C000
|
trusted library allocation
|
page read and write
|
||
214BD69D000
|
trusted library allocation
|
page read and write
|
||
214C1182000
|
trusted library allocation
|
page read and write
|
||
214C287B000
|
trusted library allocation
|
page read and write
|
||
214B7477000
|
heap
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214BE155000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BD386000
|
trusted library allocation
|
page read and write
|
||
214C2732000
|
trusted library allocation
|
page read and write
|
||
214C28C2000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B743E000
|
heap
|
page read and write
|
||
214B7402000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214C26A3000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
250B9DE3000
|
heap
|
page read and write
|
||
214C38D3000
|
trusted library allocation
|
page read and write
|
||
214B73C3000
|
heap
|
page read and write
|
||
214C104E000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
250B9DFC000
|
heap
|
page read and write
|
||
214C2D5B000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BBE4E000
|
trusted library allocation
|
page read and write
|
||
214BD66C000
|
trusted library allocation
|
page read and write
|
||
250BA197000
|
heap
|
page read and write
|
||
214B73C2000
|
heap
|
page read and write
|
||
214C286F000
|
trusted library allocation
|
page read and write
|
||
214B7460000
|
heap
|
page read and write
|
||
214BFB3F000
|
trusted library allocation
|
page read and write
|
||
214C44D7000
|
trusted library allocation
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214C38D5000
|
trusted library allocation
|
page read and write
|
||
214C12C5000
|
trusted library allocation
|
page read and write
|
||
1EDDFD21000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2694000
|
trusted library allocation
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214C27F5000
|
trusted library allocation
|
page read and write
|
||
1EDDFC5B000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD6C7000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C11B3000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214BC32F000
|
trusted library allocation
|
page read and write
|
||
214BBE5E000
|
trusted library allocation
|
page read and write
|
||
214C10E0000
|
trusted library allocation
|
page read and write
|
||
214C27E3000
|
trusted library allocation
|
page read and write
|
||
250B9AE8000
|
unkown
|
page execute read
|
||
214B73F0000
|
heap
|
page read and write
|
||
214B7440000
|
heap
|
page read and write
|
||
214C3815000
|
trusted library allocation
|
page read and write
|
||
214C26D4000
|
trusted library allocation
|
page read and write
|
||
214BD4FA000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
1AA68600000
|
trusted library allocation
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214BBEEF000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C1182000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C20D7000
|
trusted library allocation
|
page read and write
|
||
250B955C000
|
unkown
|
page execute read
|
||
214C2CB2000
|
trusted library allocation
|
page read and write
|
||
214B73D2000
|
heap
|
page read and write
|
||
214C03DB000
|
trusted library allocation
|
page read and write
|
||
250B9D4D000
|
heap
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
250B9D69000
|
heap
|
page read and write
|
||
1AA6835D000
|
heap
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214BFC49000
|
trusted library allocation
|
page read and write
|
||
214C2697000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214C1048000
|
trusted library allocation
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214BFA62000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
250B9DF1000
|
heap
|
page read and write
|
||
214C116C000
|
trusted library allocation
|
page read and write
|
||
214C2671000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C38D7000
|
trusted library allocation
|
page read and write
|
||
214BD4C5000
|
trusted library allocation
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BFCEF000
|
trusted library allocation
|
page read and write
|
||
214B7404000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B73CD000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BBFAD000
|
trusted library allocation
|
page read and write
|
||
214BC7B8000
|
trusted library allocation
|
page read and write
|
||
214C05CF000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214BE1E9000
|
trusted library allocation
|
page read and write
|
||
214BFC5D000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
250B9DE6000
|
heap
|
page read and write
|
||
214C059B000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
1EDDF820000
|
heap
|
page read and write
|
||
214C10D8000
|
trusted library allocation
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
250BA1AD000
|
heap
|
page read and write
|
||
214C3893000
|
trusted library allocation
|
page read and write
|
||
214C2582000
|
trusted library allocation
|
page read and write
|
||
214C1402000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
1EDDFD03000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
1EDDF950000
|
heap
|
page read and write
|
||
250B9D7D000
|
heap
|
page read and write
|
||
214C1A2C000
|
trusted library allocation
|
page read and write
|
||
214C0F07000
|
trusted library allocation
|
page read and write
|
||
250BA185000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73D0000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214BE16D000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214BC7A4000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214BC47E000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C10E4000
|
trusted library allocation
|
page read and write
|
||
214C01B6000
|
trusted library allocation
|
page read and write
|
||
214C2732000
|
trusted library allocation
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C0156000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C38B7000
|
trusted library allocation
|
page read and write
|
||
214BC70A000
|
trusted library allocation
|
page read and write
|
||
214C0278000
|
trusted library allocation
|
page read and write
|
||
214C2CC8000
|
trusted library allocation
|
page read and write
|
||
214C0586000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214BD6A6000
|
trusted library allocation
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214C2DB3000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C10FB000
|
trusted library allocation
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214C22C3000
|
trusted library allocation
|
page read and write
|
||
214BC736000
|
trusted library allocation
|
page read and write
|
||
214BD694000
|
trusted library allocation
|
page read and write
|
||
214B73FD000
|
heap
|
page read and write
|
||
214BC500000
|
trusted library allocation
|
page read and write
|
||
214C0FD5000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2C32000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C2CEA000
|
trusted library allocation
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214C2C34000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2D97000
|
trusted library allocation
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214C2E98000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C38D1000
|
trusted library allocation
|
page read and write
|
||
214BD340000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C2710000
|
trusted library allocation
|
page read and write
|
||
214C026C000
|
trusted library allocation
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214BD4CB000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214BD6A8000
|
trusted library allocation
|
page read and write
|
||
214C2D95000
|
trusted library allocation
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214BBE83000
|
trusted library allocation
|
page read and write
|
||
214BC718000
|
trusted library allocation
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214C2145000
|
trusted library allocation
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214C21BA000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C26E4000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7408000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C18CD000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C00F9000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C238E000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C2CEA000
|
trusted library allocation
|
page read and write
|
||
214C0EBF000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BBDB3000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214BD66C000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
250B955A000
|
unkown
|
page execute read
|
||
214B73F3000
|
heap
|
page read and write
|
||
310B1FF000
|
stack
|
page read and write
|
||
214B73EA000
|
heap
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C025D000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C2768000
|
trusted library allocation
|
page read and write
|
||
214C2732000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214BC7B4000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2DB3000
|
trusted library allocation
|
page read and write
|
||
214C26E7000
|
trusted library allocation
|
page read and write
|
||
214C0136000
|
trusted library allocation
|
page read and write
|
||
250B9554000
|
unkown
|
page execute read
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BBD6F000
|
trusted library allocation
|
page read and write
|
||
214BBF9B000
|
trusted library allocation
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214BD4E0000
|
trusted library allocation
|
page read and write
|
||
214BBE06000
|
trusted library allocation
|
page read and write
|
||
214C2C30000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214B73FD000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C0E9E000
|
trusted library allocation
|
page read and write
|
||
214C248E000
|
trusted library allocation
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C25F2000
|
trusted library allocation
|
page read and write
|
||
214C3E2B000
|
trusted library allocation
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C20CA000
|
trusted library allocation
|
page read and write
|
||
214C2C2C000
|
trusted library allocation
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
214C3E14000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214BBE3D000
|
trusted library allocation
|
page read and write
|
||
214BFC8B000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C104E000
|
trusted library allocation
|
page read and write
|
||
214BFBC8000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214C0FDF000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
250BA169000
|
heap
|
page read and write
|
||
214B73FA000
|
heap
|
page read and write
|
||
214C2C47000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214B73EA000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
1072000
|
unkown
|
page readonly
|
||
214B73E4000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BFB50000
|
trusted library allocation
|
page read and write
|
||
214C213C000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C3E1A000
|
trusted library allocation
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C382B000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F0000
|
heap
|
page read and write
|
||
1EDDFB46000
|
heap
|
page read and write
|
||
250BA183000
|
heap
|
page read and write
|
||
1AA68340000
|
heap
|
page read and write
|
||
214C03D0000
|
trusted library allocation
|
page read and write
|
||
214BD358000
|
trusted library allocation
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214C38CD000
|
trusted library allocation
|
page read and write
|
||
214C3E11000
|
trusted library allocation
|
page read and write
|
||
250BA169000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2CD2000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2EF8000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C388F000
|
trusted library allocation
|
page read and write
|
||
214C0260000
|
trusted library allocation
|
page read and write
|
||
214C2C1D000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C2D73000
|
trusted library allocation
|
page read and write
|
||
214BD675000
|
trusted library allocation
|
page read and write
|
||
214C2D44000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214BFBCA000
|
trusted library allocation
|
page read and write
|
||
214C2CBA000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
214B73C3000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C012C000
|
trusted library allocation
|
page read and write
|
||
214C2900000
|
trusted library allocation
|
page read and write
|
||
214C1174000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214BC7BF000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214B742C000
|
heap
|
page read and write
|
||
214BFA62000
|
trusted library allocation
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BC7D6000
|
trusted library allocation
|
page read and write
|
||
214BBEE0000
|
trusted library allocation
|
page read and write
|
||
214C27ED000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7466000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
A83000
|
heap
|
page read and write
|
||
250BA1AD000
|
heap
|
page read and write
|
||
250B92C0000
|
unclassified section
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
214C38CF000
|
trusted library allocation
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
214C1AB0000
|
trusted library allocation
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BFA0F000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C384E000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214C01E9000
|
trusted library allocation
|
page read and write
|
||
250BA1B8000
|
heap
|
page read and write
|
||
214C28C4000
|
trusted library allocation
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C0553000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BC31B000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73CA000
|
heap
|
page read and write
|
||
214C075B000
|
trusted library allocation
|
page read and write
|
||
214C28C6000
|
trusted library allocation
|
page read and write
|
||
259FFBF9000
|
heap
|
page read and write
|
||
214BC716000
|
trusted library allocation
|
page read and write
|
||
214BC721000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214C2CAE000
|
trusted library allocation
|
page read and write
|
||
214C2ECE000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C0EBF000
|
trusted library allocation
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214BD6F6000
|
trusted library allocation
|
page read and write
|
||
214BD6C1000
|
trusted library allocation
|
page read and write
|
||
214C0079000
|
trusted library allocation
|
page read and write
|
||
214C03BA000
|
trusted library allocation
|
page read and write
|
||
214BC371000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
250BA1B6000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B73F5000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
1AA684D0000
|
heap
|
page read and write
|
||
214BFCF1000
|
trusted library allocation
|
page read and write
|
||
214C0072000
|
trusted library allocation
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C0F83000
|
trusted library allocation
|
page read and write
|
||
250B9494000
|
trusted library allocation
|
page read and write
|
||
214BE00A000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214BC466000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2CDF000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C0378000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73FD000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C2CEA000
|
trusted library allocation
|
page read and write
|
||
214BFB58000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73BF000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214C04EB000
|
trusted library allocation
|
page read and write
|
||
214C0E21000
|
trusted library allocation
|
page read and write
|
||
214C2C1F000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C2644000
|
trusted library allocation
|
page read and write
|
||
250B9400000
|
trusted library allocation
|
page read and write
|
||
214C03BA000
|
trusted library allocation
|
page read and write
|
||
214B7453000
|
heap
|
page read and write
|
||
214BD675000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C0379000
|
trusted library allocation
|
page read and write
|
||
214C0045000
|
trusted library allocation
|
page read and write
|
||
214B7400000
|
heap
|
page read and write
|
||
1AA68450000
|
heap
|
page read and write
|
||
214C0257000
|
trusted library allocation
|
page read and write
|
||
214C2E44000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C10E0000
|
trusted library allocation
|
page read and write
|
||
214B742C000
|
heap
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214BE1FD000
|
trusted library allocation
|
page read and write
|
||
214C27E3000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
250B9DE9000
|
heap
|
page read and write
|
||
214BC41E000
|
trusted library allocation
|
page read and write
|
||
214C28FE000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C44D5000
|
trusted library allocation
|
page read and write
|
||
214C10D6000
|
trusted library allocation
|
page read and write
|
||
214C24FD000
|
trusted library allocation
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
1EDDFC00000
|
trusted library allocation
|
page read and write
|
||
214B7440000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BD451000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214BC41B000
|
trusted library allocation
|
page read and write
|
||
214BBD90000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C10F2000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C10DB000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C27C2000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C0583000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C2145000
|
trusted library allocation
|
page read and write
|
||
214BC7D7000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214C28C8000
|
trusted library allocation
|
page read and write
|
||
214C3893000
|
trusted library allocation
|
page read and write
|
||
214BBD98000
|
trusted library allocation
|
page read and write
|
||
214C026C000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C0723000
|
trusted library allocation
|
page read and write
|
||
214C2C7E000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214C2863000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C2D4B000
|
trusted library allocation
|
page read and write
|
||
214BC3FE000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C2C47000
|
trusted library allocation
|
page read and write
|
||
250B9140000
|
heap
|
page read and write
|
||
214BBEB5000
|
trusted library allocation
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214BFCFB000
|
trusted library allocation
|
page read and write
|
||
214B73E4000
|
heap
|
page read and write
|
||
214C10E0000
|
trusted library allocation
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B746F000
|
heap
|
page read and write
|
||
214C10B3000
|
trusted library allocation
|
page read and write
|
||
250BA197000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C11B5000
|
trusted library allocation
|
page read and write
|
||
214BD482000
|
trusted library allocation
|
page read and write
|
||
214BD449000
|
trusted library allocation
|
page read and write
|
||
250B9300000
|
trusted library allocation
|
page read and write
|
||
214C38D5000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214C21FD000
|
trusted library allocation
|
page read and write
|
||
214BC376000
|
trusted library allocation
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD6BE000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C022C000
|
trusted library allocation
|
page read and write
|
||
214C059B000
|
trusted library allocation
|
page read and write
|
||
1EDDFC79000
|
trusted library allocation
|
page read and write
|
||
214C38D7000
|
trusted library allocation
|
page read and write
|
||
214C239B000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214C10D7000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
250B9461000
|
trusted library allocation
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214B7427000
|
heap
|
page read and write
|
||
214C2658000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C238E000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BBEDB000
|
trusted library allocation
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
259FFE0A000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
250BA198000
|
heap
|
page read and write
|
||
214BBDF8000
|
trusted library allocation
|
page read and write
|
||
3ECD000
|
stack
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214C1039000
|
trusted library allocation
|
page read and write
|
||
214C24DC000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD6DD000
|
trusted library allocation
|
page read and write
|
||
214C26C8000
|
trusted library allocation
|
page read and write
|
||
214C01B5000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
250B9D5F000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C03CC000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C26E4000
|
trusted library allocation
|
page read and write
|
||
214BC32F000
|
trusted library allocation
|
page read and write
|
||
214BC418000
|
trusted library allocation
|
page read and write
|
||
214C0146000
|
trusted library allocation
|
page read and write
|
||
214BBE43000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214BFCCD000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
1AA68607000
|
trusted library allocation
|
page read and write
|
||
214C10E3000
|
trusted library allocation
|
page read and write
|
||
214B06FE000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2D95000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214B7429000
|
heap
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214B73D7000
|
heap
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
1084000
|
unkown
|
page readonly
|
||
214C28BC000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214C24D6000
|
trusted library allocation
|
page read and write
|
||
214C209C000
|
trusted library allocation
|
page read and write
|
||
214C05FA000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B747B000
|
heap
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214C3875000
|
trusted library allocation
|
page read and write
|
||
214C1059000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214BD6C7000
|
trusted library allocation
|
page read and write
|
||
214C26DD000
|
trusted library allocation
|
page read and write
|
||
214C277B000
|
trusted library allocation
|
page read and write
|
||
214C2EC9000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
250B9D01000
|
heap
|
page read and write
|
||
214C2E49000
|
trusted library allocation
|
page read and write
|
||
214C1A97000
|
trusted library allocation
|
page read and write
|
||
214BBE87000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C28BE000
|
trusted library allocation
|
page read and write
|
||
214B73C3000
|
heap
|
page read and write
|
||
214C3875000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214BC7B4000
|
trusted library allocation
|
page read and write
|
||
214C382D000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
250B9D60000
|
heap
|
page read and write
|
||
214C05FA000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BD6BE000
|
trusted library allocation
|
page read and write
|
||
214B741E000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B743B000
|
heap
|
page read and write
|
||
214C3885000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C029F000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C2EF6000
|
trusted library allocation
|
page read and write
|
||
214C28BC000
|
trusted library allocation
|
page read and write
|
||
214BBDA1000
|
trusted library allocation
|
page read and write
|
||
214C0079000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214C01E9000
|
trusted library allocation
|
page read and write
|
||
214BD5F3000
|
trusted library allocation
|
page read and write
|
||
214C2C2C000
|
trusted library allocation
|
page read and write
|
||
214C04EE000
|
trusted library allocation
|
page read and write
|
||
214C2C7C000
|
trusted library allocation
|
page read and write
|
||
214C2779000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214BC7BF000
|
trusted library allocation
|
page read and write
|
||
214C1084000
|
trusted library allocation
|
page read and write
|
||
214C117E000
|
trusted library allocation
|
page read and write
|
||
214BBEB5000
|
trusted library allocation
|
page read and write
|
||
214BC718000
|
trusted library allocation
|
page read and write
|
||
214C389D000
|
trusted library allocation
|
page read and write
|
||
250B9D69000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214C025C000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
1EDDFCEA000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BBE81000
|
trusted library allocation
|
page read and write
|
||
AAA39CE000
|
unkown
|
page readonly
|
||
214B73E4000
|
heap
|
page read and write
|
||
214BFA5A000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73DB000
|
heap
|
page read and write
|
||
214C28C4000
|
trusted library allocation
|
page read and write
|
||
214BC72A000
|
trusted library allocation
|
page read and write
|
||
214BC73C000
|
trusted library allocation
|
page read and write
|
||
214C277B000
|
trusted library allocation
|
page read and write
|
||
250B9DE6000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
87457FE000
|
stack
|
page read and write
|
||
214C38B7000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C0270000
|
trusted library allocation
|
page read and write
|
||
214BE1E5000
|
trusted library allocation
|
page read and write
|
||
214C3880000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214BD6F4000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C3893000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C38CF000
|
trusted library allocation
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C1099000
|
trusted library allocation
|
page read and write
|
||
214C07B9000
|
trusted library allocation
|
page read and write
|
||
214B747F000
|
heap
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
214C059B000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C28C0000
|
trusted library allocation
|
page read and write
|
||
214BC7F4000
|
trusted library allocation
|
page read and write
|
||
214B73C3000
|
heap
|
page read and write
|
||
214BE1CF000
|
trusted library allocation
|
page read and write
|
||
214C3880000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
250B9D5C000
|
heap
|
page read and write
|
||
214C2C3D000
|
trusted library allocation
|
page read and write
|
||
214BE1FD000
|
trusted library allocation
|
page read and write
|
||
214BD621000
|
trusted library allocation
|
page read and write
|
||
250B9D8A000
|
heap
|
page read and write
|
||
214C2D9E000
|
trusted library allocation
|
page read and write
|
||
214C0EBF000
|
trusted library allocation
|
page read and write
|
||
214C11BE000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
214C268D000
|
trusted library allocation
|
page read and write
|
||
214B7471000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
1EDDFD16000
|
trusted library allocation
|
page read and write
|
||
214B7467000
|
heap
|
page read and write
|
||
214C2C54000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2C29000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C2CAE000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214BC7CA000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
214B73CF000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C07B9000
|
trusted library allocation
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214BD3A1000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C10F2000
|
trusted library allocation
|
page read and write
|
||
214B745B000
|
heap
|
page read and write
|
||
214B7401000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C44D7000
|
trusted library allocation
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
310C9FF000
|
stack
|
page read and write
|
||
214C3844000
|
trusted library allocation
|
page read and write
|
||
214BD6C7000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73D2000
|
heap
|
page read and write
|
||
250B945F000
|
trusted library allocation
|
page read and write
|
||
214C0550000
|
trusted library allocation
|
page read and write
|
||
214C2C2B000
|
trusted library allocation
|
page read and write
|
||
1EDDFC11000
|
trusted library allocation
|
page read and write
|
||
214C12D3000
|
trusted library allocation
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214BBD57000
|
trusted library allocation
|
page read and write
|
||
214B7453000
|
heap
|
page read and write
|
||
250B9540000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C10E0000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
214C2696000
|
trusted library allocation
|
page read and write
|
||
214C1161000
|
trusted library allocation
|
page read and write
|
||
214C1049000
|
trusted library allocation
|
page read and write
|
||
214C28BC000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214BBFF0000
|
trusted library allocation
|
page read and write
|
||
214BBE87000
|
trusted library allocation
|
page read and write
|
||
214BFC83000
|
trusted library allocation
|
page read and write
|
||
214BD6F3000
|
trusted library allocation
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214BBE3D000
|
trusted library allocation
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214BD66C000
|
trusted library allocation
|
page read and write
|
||
214C11D7000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214C038D000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214C2C30000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214C2D6B000
|
trusted library allocation
|
page read and write
|
||
214B743C000
|
heap
|
page read and write
|
||
214C44D7000
|
trusted library allocation
|
page read and write
|
||
214C3864000
|
trusted library allocation
|
page read and write
|
||
214C0266000
|
trusted library allocation
|
page read and write
|
||
214BFCFB000
|
trusted library allocation
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
214BD6C7000
|
trusted library allocation
|
page read and write
|
||
214C27ED000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C28C4000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C01DC000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C38A1000
|
trusted library allocation
|
page read and write
|
||
214C27F5000
|
trusted library allocation
|
page read and write
|
||
214B742B000
|
heap
|
page read and write
|
||
214BD6BE000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214BC72A000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C01E1000
|
trusted library allocation
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
1EDDFB50000
|
unclassified section
|
page readonly
|
||
214BFA34000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C3872000
|
trusted library allocation
|
page read and write
|
||
214C23A9000
|
trusted library allocation
|
page read and write
|
||
214C0E21000
|
trusted library allocation
|
page read and write
|
||
214BBE83000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
214B744B000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214C28BE000
|
trusted library allocation
|
page read and write
|
||
250B9DE9000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214C24DC000
|
trusted library allocation
|
page read and write
|
||
214BD4C8000
|
trusted library allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
214C12D7000
|
trusted library allocation
|
page read and write
|
||
214C109E000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214BD642000
|
trusted library allocation
|
page read and write
|
||
250B9D60000
|
heap
|
page read and write
|
||
214C2706000
|
trusted library allocation
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214B740B000
|
heap
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C2D7F000
|
trusted library allocation
|
page read and write
|
||
1EDDF7F4000
|
remote allocation
|
page execute read
|
||
214B7437000
|
heap
|
page read and write
|
||
214B7452000
|
heap
|
page read and write
|
||
214B73F6000
|
heap
|
page read and write
|
||
214BD6F8000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214BD663000
|
trusted library allocation
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214BD4A1000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B73FF000
|
heap
|
page read and write
|
||
214C027E000
|
trusted library allocation
|
page read and write
|
||
214BD6C1000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
214BBD98000
|
trusted library allocation
|
page read and write
|
||
214B73C2000
|
heap
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
1EDDFC96000
|
trusted library allocation
|
page read and write
|
||
107C000
|
unkown
|
page write copy
|
||
214B73DD000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C2D5B000
|
trusted library allocation
|
page read and write
|
||
214C22ED000
|
trusted library allocation
|
page read and write
|
||
214BFACE000
|
trusted library allocation
|
page read and write
|
||
250BA17B000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C3858000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C25D5000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C04F9000
|
trusted library allocation
|
page read and write
|
||
214C01FC000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B7428000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BD6E0000
|
trusted library allocation
|
page read and write
|
||
214BD6C1000
|
trusted library allocation
|
page read and write
|
||
214C213E000
|
trusted library allocation
|
page read and write
|
||
214BFB52000
|
trusted library allocation
|
page read and write
|
||
214C118A000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BD6EB000
|
trusted library allocation
|
page read and write
|
||
214C26DD000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BBEDC000
|
trusted library allocation
|
page read and write
|
||
214C24DC000
|
trusted library allocation
|
page read and write
|
||
214B7444000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C38D3000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C12F4000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214C273F000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C24EB000
|
trusted library allocation
|
page read and write
|
||
214C24BC000
|
trusted library allocation
|
page read and write
|
||
214C1960000
|
trusted library allocation
|
page read and write
|
||
214BD4F1000
|
trusted library allocation
|
page read and write
|
||
214BD6EB000
|
trusted library allocation
|
page read and write
|
||
214C25FD000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BC73C000
|
trusted library allocation
|
page read and write
|
||
214B7436000
|
heap
|
page read and write
|
||
214C38C9000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C0EE2000
|
trusted library allocation
|
page read and write
|
||
214C1A53000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C03ED000
|
trusted library allocation
|
page read and write
|
||
1AA68362000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C28C0000
|
trusted library allocation
|
page read and write
|
||
214C2CF2000
|
trusted library allocation
|
page read and write
|
||
214C10AD000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
250BA183000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214BFA9B000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C015A000
|
trusted library allocation
|
page read and write
|
||
214C2D2F000
|
trusted library allocation
|
page read and write
|
||
214B73E1000
|
heap
|
page read and write
|
||
214C1A88000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214C389D000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214BC72A000
|
trusted library allocation
|
page read and write
|
||
214B73B4000
|
heap
|
page read and write
|
||
214C288F000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B740F000
|
heap
|
page read and write
|
||
214C389D000
|
trusted library allocation
|
page read and write
|
||
214BFAAA000
|
trusted library allocation
|
page read and write
|
||
214B7411000
|
heap
|
page read and write
|
||
214BFADC000
|
trusted library allocation
|
page read and write
|
||
214C2CBA000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C18E0000
|
trusted library allocation
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
214C1055000
|
trusted library allocation
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BD449000
|
trusted library allocation
|
page read and write
|
||
214C2DC2000
|
trusted library allocation
|
page read and write
|
||
214BFC87000
|
trusted library allocation
|
page read and write
|
||
214BC4FE000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
214C380C000
|
trusted library allocation
|
page read and write
|
||
214C2EA8000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C07E8000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C03C9000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
250B9D5F000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1EDDFCB7000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
250B9D6C000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BD6A6000
|
trusted library allocation
|
page read and write
|
||
214C388F000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BE1B4000
|
trusted library allocation
|
page read and write
|
||
214B73E7000
|
heap
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214C03ED000
|
trusted library allocation
|
page read and write
|
||
214B7465000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C03CE000
|
trusted library allocation
|
page read and write
|
||
214C3E15000
|
trusted library allocation
|
page read and write
|
||
214B73EE000
|
heap
|
page read and write
|
||
214C2E79000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73C1000
|
heap
|
page read and write
|
||
214C1892000
|
trusted library allocation
|
page read and write
|
||
214BD6F6000
|
trusted library allocation
|
page read and write
|
||
214C03C5000
|
trusted library allocation
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
214C2D6B000
|
trusted library allocation
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
8745FFE000
|
unkown
|
page readonly
|
||
214B7417000
|
heap
|
page read and write
|
||
214BBDA9000
|
trusted library allocation
|
page read and write
|
||
214BD49E000
|
trusted library allocation
|
page read and write
|
||
214C28C0000
|
trusted library allocation
|
page read and write
|
||
214BD49E000
|
trusted library allocation
|
page read and write
|
||
214C01BC000
|
trusted library allocation
|
page read and write
|
||
874607E000
|
unkown
|
page readonly
|
||
214C01E8000
|
trusted library allocation
|
page read and write
|
||
214C2C5A000
|
trusted library allocation
|
page read and write
|
||
214BD454000
|
trusted library allocation
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
87470FE000
|
unkown
|
page readonly
|
||
214B7403000
|
heap
|
page read and write
|
||
214C2EE1000
|
trusted library allocation
|
page read and write
|
||
214C1093000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C10F4000
|
trusted library allocation
|
page read and write
|
||
214B747C000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B7436000
|
heap
|
page read and write
|
||
1EDDFD32000
|
trusted library allocation
|
page read and write
|
||
250BA169000
|
heap
|
page read and write
|
||
214C0527000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2D84000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2EA8000
|
trusted library allocation
|
page read and write
|
||
214BBD7F000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2C5B000
|
trusted library allocation
|
page read and write
|
||
214C3899000
|
trusted library allocation
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214C2676000
|
trusted library allocation
|
page read and write
|
||
214BD6BE000
|
trusted library allocation
|
page read and write
|
||
214B73FD000
|
heap
|
page read and write
|
||
214B73E3000
|
heap
|
page read and write
|
||
250B9423000
|
trusted library allocation
|
page read and write
|
||
214C026A000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B742A000
|
heap
|
page read and write
|
||
214C2EDF000
|
trusted library allocation
|
page read and write
|
||
214C2CEA000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
250B948D000
|
trusted library allocation
|
page read and write
|
||
214BFA33000
|
trusted library allocation
|
page read and write
|
||
214C10E6000
|
trusted library allocation
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214C3EB4000
|
trusted library allocation
|
page read and write
|
||
214C2C8B000
|
trusted library allocation
|
page read and write
|
||
214C2D76000
|
trusted library allocation
|
page read and write
|
||
214C383F000
|
trusted library allocation
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214BFC5D000
|
trusted library allocation
|
page read and write
|
||
214BBE6E000
|
trusted library allocation
|
page read and write
|
||
214C3831000
|
trusted library allocation
|
page read and write
|
||
214BC426000
|
trusted library allocation
|
page read and write
|
||
214C0763000
|
trusted library allocation
|
page read and write
|
||
214C2494000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214C19A6000
|
trusted library allocation
|
page read and write
|
||
214B73FB000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73BA000
|
heap
|
page read and write
|
||
250B9DE0000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214B7448000
|
heap
|
page read and write
|
||
250B90E0000
|
unclassified section
|
page readonly
|
||
214C2863000
|
trusted library allocation
|
page read and write
|
||
250B9AF0000
|
trusted library allocation
|
page read and write
|
||
214B73CB000
|
heap
|
page read and write
|
||
250BA1AD000
|
heap
|
page read and write
|
||
214C0163000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B73ED000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C160A000
|
trusted library allocation
|
page read and write
|
||
214C2CBF000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BC493000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214BD6AA000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BC7CC000
|
trusted library allocation
|
page read and write
|
||
214C109B000
|
trusted library allocation
|
page read and write
|
||
214B73F1000
|
heap
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
214B73EF000
|
heap
|
page read and write
|
||
250B9564000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C0241000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2DCC000
|
trusted library allocation
|
page read and write
|
||
214BD4E8000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B7405000
|
heap
|
page read and write
|
||
214BC7D7000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214BD486000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214C25B3000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C2662000
|
trusted library allocation
|
page read and write
|
||
214BD4D0000
|
trusted library allocation
|
page read and write
|
||
214C28FE000
|
trusted library allocation
|
page read and write
|
||
214C03DE000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C2C3F000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214B73EB000
|
heap
|
page read and write
|
||
214C0298000
|
trusted library allocation
|
page read and write
|
||
1EDDFB40000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2C29000
|
trusted library allocation
|
page read and write
|
||
214C0339000
|
trusted library allocation
|
page read and write
|
||
214C01E7000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73DA000
|
heap
|
page read and write
|
||
250B9D6C000
|
heap
|
page read and write
|
||
214B742D000
|
heap
|
page read and write
|
||
214B73E5000
|
heap
|
page read and write
|
||
1AA68370000
|
heap
|
page read and write
|
||
214C2643000
|
trusted library allocation
|
page read and write
|
||
214B73D6000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214BC716000
|
trusted library allocation
|
page read and write
|
||
214B743E000
|
heap
|
page read and write
|
||
214B73DF000
|
heap
|
page read and write
|
||
214BBE63000
|
trusted library allocation
|
page read and write
|
||
1EDDFD1B000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214BBEEF000
|
trusted library allocation
|
page read and write
|
||
214BFC5F000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
214C20D7000
|
trusted library allocation
|
page read and write
|
||
214C11D7000
|
trusted library allocation
|
page read and write
|
||
214C0F48000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214BC7AF000
|
trusted library allocation
|
page read and write
|
||
214C018A000
|
trusted library allocation
|
page read and write
|
||
214C11C6000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214BFBF3000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214C01DF000
|
trusted library allocation
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214BD6C7000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C2E71000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C11D0000
|
trusted library allocation
|
page read and write
|
||
214B73EC000
|
heap
|
page read and write
|
||
214C44E0000
|
trusted library allocation
|
page read and write
|
||
214C1A22000
|
trusted library allocation
|
page read and write
|
||
214C44E2000
|
trusted library allocation
|
page read and write
|
||
214C07ED000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C10C1000
|
trusted library allocation
|
page read and write
|
||
214B73F2000
|
heap
|
page read and write
|
||
214C28C2000
|
trusted library allocation
|
page read and write
|
||
214C103D000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B7407000
|
heap
|
page read and write
|
||
214BC7AD000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214C26CA000
|
trusted library allocation
|
page read and write
|
||
214C11D0000
|
trusted library allocation
|
page read and write
|
||
214C273F000
|
trusted library allocation
|
page read and write
|
||
214B747F000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C3880000
|
trusted library allocation
|
page read and write
|
||
214B73B9000
|
heap
|
page read and write
|
||
250B9D64000
|
heap
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BD499000
|
trusted library allocation
|
page read and write
|
||
214C1605000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214C1066000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
250B9C06000
|
trusted library allocation
|
page read and write
|
||
259FFA10000
|
heap
|
page read and write
|
||
214C11BA000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214BFA63000
|
trusted library allocation
|
page read and write
|
||
214C12E3000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C1046000
|
trusted library allocation
|
page read and write
|
||
214BFACC000
|
trusted library allocation
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C0260000
|
trusted library allocation
|
page read and write
|
||
214BDD09000
|
trusted library allocation
|
page read and write
|
||
214BFC44000
|
trusted library allocation
|
page read and write
|
||
214BC32F000
|
trusted library allocation
|
page read and write
|
||
214C0EBF000
|
trusted library allocation
|
page read and write
|
||
214B745E000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73D5000
|
heap
|
page read and write
|
||
214B73C0000
|
heap
|
page read and write
|
||
214B73CC000
|
heap
|
page read and write
|
||
214C2D70000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C2C8F000
|
trusted library allocation
|
page read and write
|
||
214BC7AF000
|
trusted library allocation
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214C2CC8000
|
trusted library allocation
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214BD6F6000
|
trusted library allocation
|
page read and write
|
||
214C3889000
|
trusted library allocation
|
page read and write
|
||
214B73C4000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
214B73C0000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C0592000
|
trusted library allocation
|
page read and write
|
||
214B73D0000
|
heap
|
page read and write
|
||
214C10A7000
|
trusted library allocation
|
page read and write
|
||
214C0583000
|
trusted library allocation
|
page read and write
|
||
214C10FB000
|
trusted library allocation
|
page read and write
|
||
214B7447000
|
heap
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B7403000
|
heap
|
page read and write
|
||
214C0FC3000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214C23A9000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BFCFB000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214B747A000
|
heap
|
page read and write
|
||
214C2D84000
|
trusted library allocation
|
page read and write
|
||
214C2ED5000
|
trusted library allocation
|
page read and write
|
||
214C22D9000
|
trusted library allocation
|
page read and write
|
||
214C025A000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C44DE000
|
trusted library allocation
|
page read and write
|
||
214C10CB000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214BD4B9000
|
trusted library allocation
|
page read and write
|
||
214BD6DC000
|
trusted library allocation
|
page read and write
|
||
259FFD00000
|
trusted library allocation
|
page read and write
|
||
214C2CF2000
|
trusted library allocation
|
page read and write
|
||
214C02C8000
|
trusted library allocation
|
page read and write
|
||
214B7417000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214B746B000
|
heap
|
page read and write
|
||
214BFCF0000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C0268000
|
trusted library allocation
|
page read and write
|
||
1EDDFCCB000
|
trusted library allocation
|
page read and write
|
||
214C2C23000
|
trusted library allocation
|
page read and write
|
||
214C00A7000
|
trusted library allocation
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214C26B1000
|
trusted library allocation
|
page read and write
|
||
214B745C000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C10BB000
|
trusted library allocation
|
page read and write
|
||
214C07C4000
|
trusted library allocation
|
page read and write
|
||
214C038D000
|
trusted library allocation
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B7478000
|
heap
|
page read and write
|
||
214C12E2000
|
trusted library allocation
|
page read and write
|
||
214BFCEF000
|
trusted library allocation
|
page read and write
|
||
214C28EF000
|
trusted library allocation
|
page read and write
|
||
214C3889000
|
trusted library allocation
|
page read and write
|
||
214BD454000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD5D7000
|
trusted library allocation
|
page read and write
|
||
214B7444000
|
heap
|
page read and write
|
||
214C2CAE000
|
trusted library allocation
|
page read and write
|
||
214C12EF000
|
trusted library allocation
|
page read and write
|
||
214C26D4000
|
trusted library allocation
|
page read and write
|
||
214C239B000
|
trusted library allocation
|
page read and write
|
||
214C1A1F000
|
trusted library allocation
|
page read and write
|
||
214B73DD000
|
heap
|
page read and write
|
||
214C2494000
|
trusted library allocation
|
page read and write
|
||
214C3872000
|
trusted library allocation
|
page read and write
|
||
214B73FC000
|
heap
|
page read and write
|
||
214B741D000
|
heap
|
page read and write
|
||
214C10D1000
|
trusted library allocation
|
page read and write
|
||
214B73D1000
|
heap
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C1041000
|
trusted library allocation
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
214BD4C5000
|
trusted library allocation
|
page read and write
|
||
214B73F8000
|
heap
|
page read and write
|
||
214BE1E5000
|
trusted library allocation
|
page read and write
|
||
214C10CD000
|
trusted library allocation
|
page read and write
|
||
1EDDFC6E000
|
trusted library allocation
|
page read and write
|
||
214B742F000
|
heap
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214B7437000
|
heap
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214C10DF000
|
trusted library allocation
|
page read and write
|
||
214B73F7000
|
heap
|
page read and write
|
||
214C10A2000
|
trusted library allocation
|
page read and write
|
||
214C1081000
|
trusted library allocation
|
page read and write
|
||
214C44E0000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214C24D6000
|
trusted library allocation
|
page read and write
|
||
214C27D1000
|
trusted library allocation
|
page read and write
|
||
214B73D9000
|
heap
|
page read and write
|
||
214B73E2000
|
heap
|
page read and write
|
||
214B7406000
|
heap
|
page read and write
|
||
259FFB20000
|
heap
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
214BBEAD000
|
trusted library allocation
|
page read and write
|
||
214C10FB000
|
trusted library allocation
|
page read and write
|
||
214B73F9000
|
heap
|
page read and write
|
||
214C2D88000
|
trusted library allocation
|
page read and write
|
||
214C003B000
|
trusted library allocation
|
page read and write
|
||
214C1093000
|
trusted library allocation
|
page read and write
|
||
214B73F3000
|
heap
|
page read and write
|
||
214B73FE000
|
heap
|
page read and write
|
||
214B73C5000
|
heap
|
page read and write
|
||
214B7448000
|
heap
|
page read and write
|
||
214BC70A000
|
trusted library allocation
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1EDDF9EF000
|
unclassified section
|
page read and write
|
||
214BBE8A000
|
trusted library allocation
|
page read and write
|
||
214BFA9B000
|
trusted library allocation
|
page read and write
|
||
214B73E6000
|
heap
|
page read and write
|
||
214C2CDD000
|
trusted library allocation
|
page read and write
|
||
214C014D000
|
trusted library allocation
|
page read and write
|
||
214B741A000
|
heap
|
page read and write
|
||
214C0E1A000
|
trusted library allocation
|
page read and write
|
||
214B744D000
|
heap
|
page read and write
|
||
214B740B000
|
heap
|
page read and write
|
||
214BBFC5000
|
trusted library allocation
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
214BD6EB000
|
trusted library allocation
|
page read and write
|
There are 4163 hidden memdumps, click here to show them.