IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_06a46a8d-5064-47bf-985d-ccc8f93ff01f.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_06a46a8d-5064-47bf-985d-ccc8f93ff01f.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\03cb2e50-eea9-414d-8a21-5dd1c1337051.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\0d05f043-c838-44dc-996c-564852ec4aa4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\1d2a3ef5-5567-4cbd-b94b-347ef0702f49.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\20259223-8128-4a66-b97b-0f66ed2a8718.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\317f182c-efd7-4559-9309-8f3a9603d614.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\46c327da-99b7-4608-bc3a-f523ac729e86.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\4fc2682d-ceff-477c-952b-657b8b30badc.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5675a717-4e3a-4a91-8656-3aed15cd469e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5a6f9fbb-5dd6-4697-a0b2-c2db61cac853.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\5c4af635-e92a-4aae-8fa4-6e8afeac9300.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\625da35c-b80b-4d96-850e-156f1ff14d03.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\72397306-d4db-4d03-92fd-50e22fe1d8cc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\7d52a20d-ce11-437a-9768-5bca52e773b2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\db968a8b-80ee-42dd-8447-0dc7f15c4243.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4D281-1C84.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4D282-1DCC.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4D294-648.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-66D4D29C-2558.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics-active.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\27b34af7-1687-4e45-9b2b-23435c1a8753.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\639462a8-8809-412c-b0e0-ff93291d6748.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7c8365a2-ca93-440a-b0e0-c3d886d09871.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\7dbb1a26-a4c8-4009-bf75-a242f65f8eed.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\8f54943a-f268-4605-8e30-bdaeff07d1e1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeHubAppUsage\EdgeHubAppUsageSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\domains_config.json
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\_metadata\computed_hashes.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, 1st free page 10, free pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie 0x1d, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\00f090c2-abe6-481b-b95e-86e39a2a9171.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\1e24ebc4-23cb-4cff-825a-f68a4a5eacc9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\5375ead1-407f-49d4-b88b-1763db4a64e2.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\59cfb704-dfd2-4c2e-8785-c489d91dc673.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\8e1fd090-86b0-4100-9183-f3cef05fa43a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 9, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF2c70f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RF3b17e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2a483.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports~RF2b9ef.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2c70f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF3c44b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\c7a0caf0-a9e6-4e33-bf97-2877ae6701e9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\d1e77ef0-e0ba-4bfc-a832-0e33e458c56c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\dd009265-f789-4515-9f9b-8ea57713b726.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF2e3af.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF317bf.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF350a2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RF39cdd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF2e10f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RF31406.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13369697157603689
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\106cb76d-bbbf-4d8a-b52f-5da3db8ba6ab.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\6d66d017-3a4a-4216-8fdd-93f6e2b90f1d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF2d0f2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Network Persistent State~RF3bce8.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\SCT Auditing Pending Reports~RF2b9ef.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\d032ef3c-af31-4039-91e2-7c6fbaf13f3f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\d3d6d8dc-e604-4e23-b773-889e8baee8ec.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network\de9ea058-5c46-4e17-a657-6e9d1112b143.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages 2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 5, database pages 89, cookie 0x66, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebAssistDatabase
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 10
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\a7064f56-8c2a-4277-9156-313fe577b1c4.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\acc5418e-555c-4086-9eec-c5670fde4d0b.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\arbitration_service_config.json
ASCII text, with very long lines (3951), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\ca24d56b-2202-4ad6-b9f3-b040d9a6d7e1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d65202c7-e5c6-4c25-9b9b-e173dbc36ec5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\d9486291-1149-49da-96e7-9a920828a8a1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.log
data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28870.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2888f.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28e4c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF28ef7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2b368.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2cfaa.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d008.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d037.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2d056.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2efd4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF39b47.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3c267.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF3fba7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\c2d41820-6f3b-4ef9-80da-19ef5d8fd503.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\d0e2a2fc-ea67-4097-afdc-a8347384b619.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\cf7513a936f7effbb38627e56f8d1fce10eb12cc.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\8786ffc6-0dde-477f-9d1e-43d48e9e474e.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\9d0bfe10-b2dc-4894-87c3-b96e2de5fb30.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\9f551a28-4aa3-4e52-b93b-f4f8affc879f.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\b2dd3d58-d92a-4b8a-a1d0-9b7a53b223d6.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\c3de4532-f7f0-433d-967c-c41610cf0a86.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 695787
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log
JSON data
dropped
C:\Users\user\AppData\Local\Temp\dbbdab58-2d03-491b-a810-2917fce8c7b1.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 41902
dropped
C:\Users\user\AppData\Local\Temp\e89d9b20-2f28-48d6-a6bd-1cfe946304bb.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1366x720, components 3
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_734234763\9f551a28-4aa3-4e52-b93b-f4f8affc879f.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_734234763\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_734234763\CRX_INSTALL\content.js
Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_734234763\CRX_INSTALL\content_new.js
Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_734234763\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\9d0bfe10-b2dc-4894-87c3-b96e2de5fb30.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\af\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\am\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ar\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\az\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\be\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\bg\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\bn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ca\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\cs\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\cy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\da\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\de\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\el\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\en\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\en_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\en_GB\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\en_US\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\es\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\es_419\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\et\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\eu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\fa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\fi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\fil\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\fr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\fr_CA\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\gl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\gu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\hi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\hr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\hu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\hy\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\id\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\is\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\it\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\iw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ja\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ka\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\kk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\km\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\kn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ko\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\lo\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\lt\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\lv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ml\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\mn\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\mr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ms\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\my\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ne\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\nl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\no\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\pa\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\pl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\pt_BR\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\pt_PT\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ro\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ru\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\si\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\sk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\sl\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\sr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\sv\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\sw\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ta\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\te\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\th\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\tr\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\uk\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\ur\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\vi\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\zh_CN\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\zh_HK\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\zh_TW\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_locales\zu\messages.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\_metadata\verified_contents.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\dasherSettingSchema.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\offscreendocument.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\offscreendocument_main.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\page_embed_script.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7628_808098504\CRX_INSTALL\service_worker_bin_prod.js
ASCII text, with very long lines (4369)
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5952 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5952 bytes
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 342 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2076,i,1828721353005406552,4286803318795052176,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2564 --field-trial-handle=2360,i,15383655831768038927,11961780736375890449,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6360 --field-trial-handle=2360,i,15383655831768038927,11961780736375890449,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6556 --field-trial-handle=2360,i,15383655831768038927,11961780736375890449,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6816 --field-trial-handle=2360,i,15383655831768038927,11961780736375890449,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6816 --field-trial-handle=2360,i,15383655831768038927,11961780736375890449,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1892,i,12420635758166294745,5105143302083340951,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=1980,i,9697535281678700936,11038712812997427642,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-GB --service-sandbox-type=search_indexer --message-loop-type-ui --mojo-platform-channel-handle=6736 --field-trial-handle=2360,i,15383655831768038927,11961780736375890449,262144 /prefetch:8
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2232 -prefMapHandle 2224 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {acc27241-3c31-435d-99e4-83922da2a76d} 7584 "\\.\pipe\gecko-crash-server-pipe.7584" 21b6bc6ed10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4260 -parentBuildID 20230927232528 -prefsHandle 4620 -prefMapHandle 3896 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7cd84140-ac0b-45b4-9542-7f422c07c9d5} 7584 "\\.\pipe\gecko-crash-server-pipe.7584" 21b78b57710 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5584 -prefMapHandle 5580 -prefsLen 33865 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e192372e-be7d-4bb5-b0f1-d46844c70d01} 7584 "\\.\pipe\gecko-crash-server-pipe.7584" 21b87784910 utility
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://duckduckgo.com/ac/?q=
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://csp.withgoogle.com/csp/report-to/apps-themes
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://docs.google.com/
unknown
https://screenshots.firefox.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://drive-daily-2.corp.google.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://exslt.org/dates-and-times
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://www.google.com/favicon.ico
142.250.65.196
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
http://detectportal.firefox.comX
unknown
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://chrome.google.com/webstore/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx
142.250.185.161
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=default-theme%40mozilla.org%2Caddons-
unknown
https://play.google.com
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://www.openh264.org/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://csp.withgoogle.com/csp/report-to/AccountsSignInUi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
chrome.cloudflare-dns.com
172.64.41.3
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
18.65.39.112
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
sni1gl.wpc.nucdn.net
152.199.21.175
contile.services.mozilla.com
34.117.188.166
s-part-0029.t-0009.t-msedge.net
13.107.246.57
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
googlehosted.l.googleusercontent.com
142.250.185.161
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
spocs.getpocket.com
unknown
detectportal.firefox.com
unknown
clients2.googleusercontent.com
unknown
bzib.nelreports.net
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
shavar.services.mozilla.com
unknown
206.23.85.13.in-addr.arpa
unknown
There are 16 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.80.46
unknown
United States
152.195.19.97
unknown
United States
192.168.2.4
unknown
unknown
162.159.61.3
unknown
United States
34.117.188.166
contile.services.mozilla.com
United States
142.251.32.106
unknown
United States
142.250.185.161
googlehosted.l.googleusercontent.com
United States
172.64.41.3
chrome.cloudflare-dns.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
142.250.65.196
unknown
United States
13.107.246.57
s-part-0029.t-0009.t-msedge.net
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
239.255.255.250
unknown
Reserved
18.65.39.112
services.addons.mozilla.org
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
There are 10 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
lw_13bbe73648289fe96dfa1aa1bf23b3da
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66656
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\Commands\on-logon-autolaunch
Enabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ShortcutName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles\Default
ProfileErrorState
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
EnhancedLinkOpeningDefault
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
fikbjbembnmfhppjfnmfkahdhfohhjmg
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ghbmnnjooekpmoecnnnilnnbdlolhkhi
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
iglcjdemknebjbklcgkfaebgojjphkec
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ihmafllikibpmigkcoadcmckbfhibefp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jdiccldimpdaibmpdkjnbmckianbfold
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
jmjflgjpcpepeafmmgdpfkogkghcpiha
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
ncbjelpjchkpbikbpkcchkhkblodoama
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66656
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66656
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66656
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66656
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\66656
WindowTabManagerFileMappingId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 93 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
299EFF70000
trusted library allocation
page read and write
21B8828A000
trusted library allocation
page read and write
21B7BA2B000
trusted library allocation
page read and write
21B79370000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7B5AD000
trusted library allocation
page read and write
21B87B35000
trusted library allocation
page read and write
2AEA7883000
heap
page read and write
2AEA78A6000
heap
page read and write
21B78BE8000
trusted library allocation
page read and write
1E6DDA00000
heap
page read and write
21B7B9EA000
trusted library allocation
page read and write
21B881EB000
trusted library allocation
page read and write
21B8869B000
trusted library allocation
page read and write
21B77D34000
heap
page read and write
21B77D45000
heap
page read and write
2AEA78A6000
heap
page read and write
21B882AD000
trusted library allocation
page read and write
2AEA7469000
heap
page read and write
21B78B43000
trusted library allocation
page read and write
21B7C0F0000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B78B8C000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B875A4000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B772C0000
trusted library allocation
page read and write
21B87BF2000
trusted library allocation
page read and write
21B7B9D9000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B8A29C000
heap
page read and write
21B7B58F000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B7B881000
heap
page read and write
21B7939C000
trusted library allocation
page read and write
221FA7A4000
heap
page read and write
21B7BF64000
trusted library allocation
page read and write
21B79DB5000
trusted library allocation
page read and write
21B886C8000
trusted library allocation
page read and write
21B7BC69000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B8759E000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B7B66C000
trusted library allocation
page read and write
21B876EB000
trusted library allocation
page read and write
2AC7D240000
heap
page read and write
21B7BC85000
trusted library allocation
page read and write
21B77ACA000
trusted library allocation
page read and write
21B7B597000
trusted library allocation
page read and write
221F8C70000
heap
page read and write
21B7ECBA000
trusted library allocation
page read and write
2AC7D107000
trusted library allocation
page read and write
1E6DD90C000
trusted library allocation
page read and write
21B790F0000
trusted library allocation
page read and write
1E6DD600000
trusted library allocation
page read and write
21B7C07B000
trusted library allocation
page read and write
221FA7A2000
heap
page read and write
21B77D58000
heap
page read and write
21B77CE3000
trusted library allocation
page read and write
21B7CEA8000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B7B58F000
trusted library allocation
page read and write
21B875F8000
trusted library allocation
page read and write
21B876FD000
trusted library allocation
page read and write
221FA7AF000
heap
page read and write
21B79D39000
trusted library allocation
page read and write
2AEA7400000
heap
page read and write
21B7BA42000
trusted library allocation
page read and write
21B78AEA000
trusted library allocation
page read and write
21B7C1B9000
trusted library allocation
page read and write
2AEA7897000
heap
page read and write
21B7B575000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B77C6C000
trusted library allocation
page read and write
21B7C3D3000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B77CB9000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B87634000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7B877000
heap
page read and write
B53623E000
unkown
page readonly
2AEA744D000
heap
page read and write
21B87B79000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B7B897000
heap
page read and write
21B7C013000
trusted library allocation
page read and write
21B881E7000
trusted library allocation
page read and write
21B7C5EE000
trusted library allocation
page read and write
21B7B879000
heap
page read and write
21B77D2F000
heap
page read and write
21B7B9A3000
trusted library allocation
page read and write
2AEA78A6000
heap
page read and write
21B77C8F000
trusted library allocation
page read and write
21B7ECA7000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
2AEA7463000
heap
page read and write
21B77D2A000
heap
page read and write
21B77D54000
heap
page read and write
21B88258000
trusted library allocation
page read and write
21B7CE71000
trusted library allocation
page read and write
21B8A2BE000
heap
page read and write
21B882FB000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7B5C9000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B790FB000
trusted library allocation
page read and write
21B77D71000
heap
page read and write
21B77D41000
heap
page read and write
1E6DD912000
trusted library allocation
page read and write
17A0000
heap
page read and write
21B7BD6F000
trusted library allocation
page read and write
221F8EE0000
heap
page read and write
21B88286000
trusted library allocation
page read and write
21B7ECBA000
trusted library allocation
page read and write
21B7C1C7000
trusted library allocation
page read and write
21B7C3E7000
trusted library allocation
page read and write
2AEA74F1000
heap
page read and write
21B79D98000
trusted library allocation
page read and write
21B79DEE000
trusted library allocation
page read and write
21B7C8CE000
trusted library allocation
page read and write
21B87BF6000
trusted library allocation
page read and write
21B7B53D000
trusted library allocation
page read and write
21B7C1E9000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B7C9C8000
trusted library allocation
page read and write
6EC000
unkown
page readonly
21B77D93000
heap
page read and write
21B77D46000
heap
page read and write
21B7C1AF000
trusted library allocation
page read and write
21B7ECBA000
trusted library allocation
page read and write
21B7B5C9000
trusted library allocation
page read and write
21B7C798000
trusted library allocation
page read and write
21B8819E000
trusted library allocation
page read and write
21B886D2000
trusted library allocation
page read and write
21B7D3C4000
trusted library allocation
page read and write
21B790F1000
trusted library allocation
page read and write
21B7B8A3000
heap
page read and write
21B7B877000
heap
page read and write
21B77D54000
heap
page read and write
21B883B3000
trusted library allocation
page read and write
21B79D94000
trusted library allocation
page read and write
21B88275000
trusted library allocation
page read and write
4131000
heap
page read and write
21B78BFD000
trusted library allocation
page read and write
21B79291000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7D3AD000
trusted library allocation
page read and write
21B881ED000
trusted library allocation
page read and write
21B7CE3A000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B77D5F000
heap
page read and write
21B7C8F3000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7B8A4000
heap
page read and write
21E0003F000
trusted library allocation
page read and write
21B7B657000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B77D62000
heap
page read and write
21B79057000
trusted library allocation
page read and write
21B7E232000
trusted library allocation
page read and write
21B7CE62000
trusted library allocation
page read and write
21B78B94000
trusted library allocation
page read and write
21B78BC4000
trusted library allocation
page read and write
21B7B9FC000
trusted library allocation
page read and write
21B882A3000
trusted library allocation
page read and write
21B7ECBA000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B78BA0000
trusted library allocation
page read and write
21B7B895000
heap
page read and write
21B792A9000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B882F2000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B77D63000
heap
page read and write
21B77AF1000
trusted library allocation
page read and write
21B7937A000
trusted library allocation
page read and write
21B876C2000
trusted library allocation
page read and write
21B7B9BE000
trusted library allocation
page read and write
2AEA746C000
heap
page read and write
21B77D35000
heap
page read and write
21B7738A000
trusted library allocation
page read and write
21B7936C000
trusted library allocation
page read and write
21B78995000
trusted library allocation
page read and write
21B7ECC4000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B77C8F000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B87513000
trusted library allocation
page read and write
21B882EF000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B89617000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B7B9B2000
trusted library allocation
page read and write
21B7B8AA000
heap
page read and write
21B7B89A000
heap
page read and write
21B77D3A000
heap
page read and write
21B77D4F000
heap
page read and write
B6A197E000
stack
page read and write
21B79D6A000
trusted library allocation
page read and write
21B7B643000
trusted library allocation
page read and write
21B792BB000
trusted library allocation
page read and write
21B7C670000
trusted library allocation
page read and write
21B7CE82000
trusted library allocation
page read and write
21B7BD8E000
trusted library allocation
page read and write
21B7B87A000
heap
page read and write
21B77CCB000
trusted library allocation
page read and write
21B79DC6000
trusted library allocation
page read and write
21B7C0A8000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
90825FA000
stack
page read and write
21B77D40000
heap
page read and write
2AEA6B83000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B78C92000
trusted library allocation
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B87B71000
trusted library allocation
page read and write
21B8753A000
trusted library allocation
page read and write
21B87B7D000
trusted library allocation
page read and write
21B7B55F000
trusted library allocation
page read and write
21B7C3D9000
trusted library allocation
page read and write
21B7C8D3000
trusted library allocation
page read and write
21B78B37000
trusted library allocation
page read and write
21B7B5E4000
trusted library allocation
page read and write
21B8825A000
trusted library allocation
page read and write
21B7B885000
heap
page read and write
2AEA74F1000
heap
page read and write
21B7B879000
heap
page read and write
21B78AEA000
trusted library allocation
page read and write
1E6DD920000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B886C0000
trusted library allocation
page read and write
21B7C2B8000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B77D32000
heap
page read and write
21B793FD000
trusted library allocation
page read and write
21B77D58000
heap
page read and write
163D000
stack
page read and write
21B886B1000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B87595000
trusted library allocation
page read and write
21B774B5000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B79251000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7ECA5000
trusted library allocation
page read and write
21B7BF70000
trusted library allocation
page read and write
21B7EC91000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7C95E000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7735B000
trusted library allocation
page read and write
21B87B58000
trusted library allocation
page read and write
21B7ED1C000
trusted library allocation
page read and write
2AEA7840000
heap
page read and write
21B7C2C6000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
221F8B20000
heap
page read and write
21B7C86D000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B774E7000
trusted library allocation
page read and write
21B7ECF7000
trusted library allocation
page read and write
21B886C8000
trusted library allocation
page read and write
21B7738A000
trusted library allocation
page read and write
21B88547000
trusted library allocation
page read and write
21B79DC6000
trusted library allocation
page read and write
21B8829F000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D32000
heap
page read and write
21B77D59000
heap
page read and write
21B87B62000
trusted library allocation
page read and write
21B88211000
trusted library allocation
page read and write
21B77D58000
heap
page read and write
21B772DF000
trusted library allocation
page read and write
161B000
stack
page read and write
21B778FB000
trusted library allocation
page read and write
21B7EC58000
trusted library allocation
page read and write
299EFFB0000
trusted library allocation
page read and write
21B882F2000
trusted library allocation
page read and write
21B7C8C7000
trusted library allocation
page read and write
21B77D4D000
heap
page read and write
21B7CEC2000
trusted library allocation
page read and write
21B7B8A4000
heap
page read and write
712000
unkown
page readonly
21B77D69000
heap
page read and write
21B886CB000
trusted library allocation
page read and write
4630000
heap
page read and write
21B7C732000
trusted library allocation
page read and write
21B7CEE9000
trusted library allocation
page read and write
21B78C7A000
trusted library allocation
page read and write
21B87B66000
trusted library allocation
page read and write
21B7B533000
trusted library allocation
page read and write
2AEA6B10000
trusted library allocation
page read and write
299EFF30000
trusted library allocation
page read and write
21B78B8C000
trusted library allocation
page read and write
21B7CE1E000
trusted library allocation
page read and write
21B87B23000
trusted library allocation
page read and write
21B7B9C2000
trusted library allocation
page read and write
21B78AA3000
trusted library allocation
page read and write
F4C99FE000
stack
page read and write
21B77D55000
heap
page read and write
1E6DD7A6000
trusted library allocation
page read and write
21B79048000
trusted library allocation
page read and write
21B8756F000
trusted library allocation
page read and write
21B7B9D9000
trusted library allocation
page read and write
21B875EF000
trusted library allocation
page read and write
21B77D4D000
heap
page read and write
13761B304000
trusted library allocation
page read and write
24EE000
stack
page read and write
21B7B681000
trusted library allocation
page read and write
21B77ADB000
trusted library allocation
page read and write
4131000
heap
page read and write
21B793D9000
trusted library allocation
page read and write
21B78C23000
trusted library allocation
page read and write
21B7C6AB000
trusted library allocation
page read and write
21B7B5D0000
trusted library allocation
page read and write
21B7C8D9000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B77D53000
heap
page read and write
1E6DD8C6000
heap
page read and write
21B77290000
trusted library allocation
page read and write
21B7B648000
trusted library allocation
page read and write
21B7C0B0000
trusted library allocation
page read and write
2AEA7897000
heap
page read and write
B6A223E000
stack
page read and write
21B7D902000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7CED7000
trusted library allocation
page read and write
21B881EA000
trusted library allocation
page read and write
21B7CFDD000
trusted library allocation
page read and write
21B793D3000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
1E6DD470000
heap
page read and write
21B7CE71000
trusted library allocation
page read and write
2AEA6974000
heap
page read and write
21B7BA3A000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
21B881CD000
trusted library allocation
page read and write
21B78A80000
trusted library allocation
page read and write
71C000
unkown
page write copy
21B7B9C2000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7CED3000
trusted library allocation
page read and write
2AEA70F0000
trusted library allocation
page read and write
21B79096000
trusted library allocation
page read and write
21B789FC000
trusted library allocation
page read and write
2AEA74A8000
heap
page read and write
21B77D54000
heap
page read and write
194F000
heap
page read and write
1E6DD460000
unclassified section
page readonly
21B7C5CF000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
2AEA74A1000
heap
page read and write
21B7C0B0000
trusted library allocation
page read and write
21B7898B000
trusted library allocation
page read and write
21B78BF1000
trusted library allocation
page read and write
21B8759C000
trusted library allocation
page read and write
21B77368000
trusted library allocation
page read and write
21B7C1C7000
trusted library allocation
page read and write
21B7BFEF000
trusted library allocation
page read and write
21B778FE000
trusted library allocation
page read and write
21B78BE1000
trusted library allocation
page read and write
21B7B9CA000
trusted library allocation
page read and write
21B7C1F9000
trusted library allocation
page read and write
21B77D5C000
heap
page read and write
21B79DD8000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
1E6DD4D0000
heap
page read and write
21B7B9AC000
trusted library allocation
page read and write
21B7BCA0000
trusted library allocation
page read and write
21B792B2000
trusted library allocation
page read and write
21B882E3000
trusted library allocation
page read and write
21B77383000
trusted library allocation
page read and write
21B7BC34000
trusted library allocation
page read and write
21B7B680000
trusted library allocation
page read and write
2AC7D10A000
trusted library allocation
page read and write
21B7C04E000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B77D2A000
heap
page read and write
21B7927E000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B560000
trusted library allocation
page read and write
2AEA6B65000
trusted library allocation
page read and write
21B87B84000
trusted library allocation
page read and write
21B87BE9000
trusted library allocation
page read and write
21B7C1C7000
trusted library allocation
page read and write
21B78BB8000
trusted library allocation
page read and write
21B886F4000
trusted library allocation
page read and write
21B7D3A9000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
4131000
heap
page read and write
21B87B4C000
trusted library allocation
page read and write
4131000
heap
page read and write
4131000
heap
page read and write
21B7CE08000
trusted library allocation
page read and write
21B7904C000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B882EC000
trusted library allocation
page read and write
21B88221000
trusted library allocation
page read and write
21B88181000
trusted library allocation
page read and write
21B7B9B7000
trusted library allocation
page read and write
21B7B877000
heap
page read and write
21B79210000
trusted library allocation
page read and write
21B876FA000
trusted library allocation
page read and write
4131000
heap
page read and write
21B883E9000
trusted library allocation
page read and write
21B7C6DF000
trusted library allocation
page read and write
21B88215000
trusted library allocation
page read and write
21B876ED000
trusted library allocation
page read and write
21B7B97F000
trusted library allocation
page read and write
21B78BDC000
trusted library allocation
page read and write
21B89D32000
trusted library allocation
page read and write
2AEA7469000
heap
page read and write
21B7C907000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B7926B000
trusted library allocation
page read and write
1E6DD4FA000
heap
page read and write
21B77D4A000
heap
page read and write
21B87B56000
trusted library allocation
page read and write
1E6DD842000
unclassified section
page read and write
21B881BC000
trusted library allocation
page read and write
21B7CE3F000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7C05C000
trusted library allocation
page read and write
21B7BFA2000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
1E6DD473000
heap
page read and write
21B7B66C000
trusted library allocation
page read and write
21B7C92C000
trusted library allocation
page read and write
21B7B895000
heap
page read and write
21B77D53000
heap
page read and write
21B7B8A3000
heap
page read and write
21B883F6000
trusted library allocation
page read and write
21B7B8A8000
heap
page read and write
21B7B9EC000
trusted library allocation
page read and write
21B881A7000
trusted library allocation
page read and write
21B77D42000
heap
page read and write
21B77D3A000
heap
page read and write
299EFBF0000
heap
page read and write
21B8A28E000
heap
page read and write
21B7BC32000
trusted library allocation
page read and write
21B7EC9B000
trusted library allocation
page read and write
21B77D4E000
heap
page read and write
21B7BA42000
trusted library allocation
page read and write
21B7BC6A000
trusted library allocation
page read and write
21B7C2E0000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B876F0000
trusted library allocation
page read and write
221F8C31000
heap
page read and write
21B7D5CB000
trusted library allocation
page read and write
21B88296000
trusted library allocation
page read and write
21B79D7B000
trusted library allocation
page read and write
21B876F2000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
21B7926F000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B8A241000
heap
page read and write
21B793A9000
trusted library allocation
page read and write
21B7938E000
trusted library allocation
page read and write
299EFF5D000
trusted library allocation
page read and write
21B7C07E000
trusted library allocation
page read and write
21B7935A000
trusted library allocation
page read and write
21B88174000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B77D69000
heap
page read and write
21B77D6F000
heap
page read and write
21B7ECAC000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B77D6C000
heap
page read and write
21B77D4B000
heap
page read and write
21B77D2B000
heap
page read and write
21B7B511000
trusted library allocation
page read and write
1E6DD932000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B7C623000
trusted library allocation
page read and write
21B7B885000
heap
page read and write
21B77D63000
heap
page read and write
299EFC33000
heap
page read and write
21B7EC98000
trusted library allocation
page read and write
21B87BE8000
trusted library allocation
page read and write
21B77D4E000
heap
page read and write
21B78C4E000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B7C5C0000
trusted library allocation
page read and write
2AEA7100000
heap
page read and write
21B7B95E000
trusted library allocation
page read and write
21B87BF2000
trusted library allocation
page read and write
21B77D4E000
heap
page read and write
21B875E4000
trusted library allocation
page read and write
2AEA74E1000
heap
page read and write
504E000
stack
page read and write
21B77D40000
heap
page read and write
2AEA6980000
heap
page read and write
21B77252000
trusted library allocation
page read and write
21B7898F000
trusted library allocation
page read and write
21B7C9A8000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B876DC000
trusted library allocation
page read and write
21B78C92000
trusted library allocation
page read and write
21B7BCAD000
trusted library allocation
page read and write
21B7C96D000
trusted library allocation
page read and write
21B7B9EC000
trusted library allocation
page read and write
299EFFC3000
trusted library allocation
page read and write
21B7CE6B000
trusted library allocation
page read and write
2AEA74E0000
heap
page read and write
21B7D3D1000
trusted library allocation
page read and write
21B789D2000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
1E6DD77F000
trusted library allocation
page read and write
21B7C9CD000
trusted library allocation
page read and write
21B7C8C0000
trusted library allocation
page read and write
21B77966000
trusted library allocation
page read and write
2AEA74F1000
heap
page read and write
21B7EC69000
trusted library allocation
page read and write
21B772B3000
trusted library allocation
page read and write
21B7B5AD000
trusted library allocation
page read and write
21B790BC000
trusted library allocation
page read and write
21B883CF000
trusted library allocation
page read and write
21B7C089000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B78BC4000
trusted library allocation
page read and write
21B7B9AF000
trusted library allocation
page read and write
21B78BC4000
trusted library allocation
page read and write
21B7EC63000
trusted library allocation
page read and write
21B7BA24000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B7C907000
trusted library allocation
page read and write
2AEA7883000
heap
page read and write
21B7B698000
trusted library allocation
page read and write
21B7CE2B000
trusted library allocation
page read and write
2AC7CEA0000
heap
page read and write
21B77D3A000
heap
page read and write
21B7B9FC000
trusted library allocation
page read and write
21B87B26000
trusted library allocation
page read and write
21B79291000
trusted library allocation
page read and write
21B7C619000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B7B5BD000
trusted library allocation
page read and write
2AEA74E8000
heap
page read and write
21B793CD000
trusted library allocation
page read and write
21B7B888000
heap
page read and write
21B77D30000
heap
page read and write
1E6DD84F000
unclassified section
page read and write
21B77D2F000
heap
page read and write
21B7906A000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7ECBF000
trusted library allocation
page read and write
21B7C919000
trusted library allocation
page read and write
21B8961B000
trusted library allocation
page read and write
21B7C0C5000
trusted library allocation
page read and write
F4CBC7E000
stack
page read and write
21B7C1FA000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B77D3A000
heap
page read and write
21B77D3B000
heap
page read and write
2AEA6B00000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B77D75000
heap
page read and write
21B7C197000
trusted library allocation
page read and write
2AEA6BC8000
trusted library allocation
page read and write
21B88215000
trusted library allocation
page read and write
21B8827C000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B7BF70000
trusted library allocation
page read and write
21B773B5000
trusted library allocation
page read and write
21B7937A000
trusted library allocation
page read and write
21B77D4D000
heap
page read and write
5D0C000
stack
page read and write
21B7C612000
trusted library allocation
page read and write
21B77D56000
heap
page read and write
21B77D4F000
heap
page read and write
21B7ECBC000
trusted library allocation
page read and write
21B7C9D3000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B7B9F0000
trusted library allocation
page read and write
F4CBC3E000
unkown
page readonly
1E6DD7C8000
trusted library allocation
page read and write
299EFF5F000
trusted library allocation
page read and write
2AEA7300000
trusted library allocation
page read and write
21B7D3D1000
trusted library allocation
page read and write
21B8A2C9000
heap
page read and write
21B77D41000
heap
page read and write
21B77D50000
heap
page read and write
21B7BA67000
trusted library allocation
page read and write
21B876E2000
trusted library allocation
page read and write
21B7BC6D000
trusted library allocation
page read and write
21B7C993000
trusted library allocation
page read and write
21B77D58000
heap
page read and write
21B7EDC5000
trusted library allocation
page read and write
B6A19FE000
stack
page read and write
21B77D71000
heap
page read and write
21B78AE4000
trusted library allocation
page read and write
21B7C6DD000
trusted library allocation
page read and write
21B8821E000
trusted library allocation
page read and write
21B87B97000
trusted library allocation
page read and write
21B7BC54000
trusted library allocation
page read and write
299EFD70000
unclassified section
page readonly
21B77D35000
heap
page read and write
21B7CE34000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7CE97000
trusted library allocation
page read and write
21B7B9B2000
trusted library allocation
page read and write
21B7B9A0000
trusted library allocation
page read and write
21B78BC7000
trusted library allocation
page read and write
21B875DF000
trusted library allocation
page read and write
21B77363000
trusted library allocation
page read and write
B6A193E000
unkown
page readonly
21B875DC000
trusted library allocation
page read and write
21B7C6BB000
trusted library allocation
page read and write
2AEA7869000
heap
page read and write
21B77D30000
heap
page read and write
21B87B71000
trusted library allocation
page read and write
21B875D8000
trusted library allocation
page read and write
21B881E7000
trusted library allocation
page read and write
21B87577000
trusted library allocation
page read and write
21B7D3D3000
trusted library allocation
page read and write
21B876ED000
trusted library allocation
page read and write
21B882F2000
trusted library allocation
page read and write
21B87693000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7D41F000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B78BB8000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B77D75000
heap
page read and write
21B78BFA000
trusted library allocation
page read and write
21B7BA72000
trusted library allocation
page read and write
21B885D6000
trusted library allocation
page read and write
21B882C3000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7CFF6000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B77D29000
heap
page read and write
21B77D57000
heap
page read and write
299EFB5A000
heap
page read and write
21B882C8000
trusted library allocation
page read and write
21B7ECC4000
trusted library allocation
page read and write
21B7ED40000
trusted library allocation
page read and write
21B7929B000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
21B78BF1000
trusted library allocation
page read and write
21B7C9BF000
trusted library allocation
page read and write
21B7B879000
heap
page read and write
21B7C619000
trusted library allocation
page read and write
21B876DC000
trusted library allocation
page read and write
21B882D1000
trusted library allocation
page read and write
21B7CE25000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
2AEA6B23000
trusted library allocation
page read and write
2AEA6B6F000
trusted library allocation
page read and write
21B876FD000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7D4BB000
trusted library allocation
page read and write
21B793F3000
trusted library allocation
page read and write
21B7B8BE000
heap
page read and write
21B77D4B000
heap
page read and write
21B77D2F000
heap
page read and write
19486B089000
trusted library allocation
page read and write
21B876DA000
trusted library allocation
page read and write
21B77D71000
heap
page read and write
21B7C7FB000
trusted library allocation
page read and write
21B792A9000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B7C1C7000
trusted library allocation
page read and write
21B7C084000
trusted library allocation
page read and write
21B7BF39000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7C005000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B7C1CC000
trusted library allocation
page read and write
21B78BEB000
trusted library allocation
page read and write
21B7B9EC000
trusted library allocation
page read and write
21B79DF6000
trusted library allocation
page read and write
21B7B66C000
trusted library allocation
page read and write
21B8855B000
trusted library allocation
page read and write
2AEA78A6000
heap
page read and write
21B7D547000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B779B0000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B7C0B0000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
B69EFD8000
stack
page read and write
21B78A80000
trusted library allocation
page read and write
21B793FD000
trusted library allocation
page read and write
17B0000
heap
page read and write
21B875E9000
trusted library allocation
page read and write
299EFE00000
trusted library allocation
page read and write
21B774FE000
trusted library allocation
page read and write
299F0200000
trusted library allocation
page read and write
2AEA6BEE000
trusted library allocation
page read and write
21B7B5E4000
trusted library allocation
page read and write
21B881BF000
trusted library allocation
page read and write
21B7C56F000
trusted library allocation
page read and write
21B7CF5C000
trusted library allocation
page read and write
21B876B6000
trusted library allocation
page read and write
21B7B50B000
trusted library allocation
page read and write
21B876ED000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B7BA3C000
trusted library allocation
page read and write
21B883C3000
trusted library allocation
page read and write
21B7B5B3000
trusted library allocation
page read and write
21B792BB000
trusted library allocation
page read and write
21B7B9A2000
trusted library allocation
page read and write
21B7D600000
trusted library allocation
page read and write
21B7B5CD000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
17C4000
heap
page read and write
21B78B8F000
trusted library allocation
page read and write
21B77D53000
heap
page read and write
21B7B617000
trusted library allocation
page read and write
21B87B38000
trusted library allocation
page read and write
21B87B54000
trusted library allocation
page read and write
21B87B5A000
trusted library allocation
page read and write
21B7C1E9000
trusted library allocation
page read and write
21B87BBC000
trusted library allocation
page read and write
21B793EA000
trusted library allocation
page read and write
21B77D6D000
heap
page read and write
21B77D53000
heap
page read and write
21B77D4F000
heap
page read and write
21B7CEDF000
trusted library allocation
page read and write
21B8815A000
trusted library allocation
page read and write
21B7CFE8000
trusted library allocation
page read and write
21B87B47000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B77D3D000
heap
page read and write
21B7C778000
trusted library allocation
page read and write
21B79D52000
trusted library allocation
page read and write
1E6DD796000
trusted library allocation
page read and write
21B7C089000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B77D3A000
heap
page read and write
373E9DA1000
trusted library allocation
page execute read
21B7D437000
trusted library allocation
page read and write
21B77281000
trusted library allocation
page read and write
21B78BF1000
trusted library allocation
page read and write
21B88263000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7B9D7000
trusted library allocation
page read and write
21B7921B000
trusted library allocation
page read and write
21B7EC58000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
4131000
heap
page read and write
21B77CED000
trusted library allocation
page read and write
21B7BC46000
trusted library allocation
page read and write
2AEA6BF8000
trusted library allocation
page read and write
21B7C7FB000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7B9EA000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7C5FC000
trusted library allocation
page read and write
21B7D435000
trusted library allocation
page read and write
21B793CD000
trusted library allocation
page read and write
21B7C614000
trusted library allocation
page read and write
21B7782F000
trusted library allocation
page read and write
4131000
heap
page read and write
21B78C75000
trusted library allocation
page read and write
21B7D5A4000
trusted library allocation
page read and write
21B7B8A4000
heap
page read and write
21B79363000
trusted library allocation
page read and write
2AC7CDB0000
heap
page read and write
21B77823000
trusted library allocation
page read and write
299F020C000
trusted library allocation
page read and write
21B79210000
trusted library allocation
page read and write
2AEA745F000
heap
page read and write
21B7BC4B000
trusted library allocation
page read and write
21B882A6000
trusted library allocation
page read and write
21B88272000
trusted library allocation
page read and write
21B79D89000
trusted library allocation
page read and write
21B7BCBB000
trusted library allocation
page read and write
21B7C085000
trusted library allocation
page read and write
4131000
heap
page read and write
21B792A3000
trusted library allocation
page read and write
2AEA7408000
heap
page read and write
21B7CED7000
trusted library allocation
page read and write
21B77D4E000
heap
page read and write
21B7BC42000
trusted library allocation
page read and write
21B7B9B7000
trusted library allocation
page read and write
21B882A3000
trusted library allocation
page read and write
21B7CEFC000
trusted library allocation
page read and write
21B773AD000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B78BA0000
trusted library allocation
page read and write
221F8EE5000
heap
page read and write
21B7924C000
trusted library allocation
page read and write
21B886A3000
trusted library allocation
page read and write
21B789AB000
trusted library allocation
page read and write
3D80000
heap
page read and write
21B7CEB0000
trusted library allocation
page read and write
221FA7B6000
heap
page read and write
21B77D75000
heap
page read and write
21B77D41000
heap
page read and write
21B79386000
trusted library allocation
page read and write
21B7CEC6000
trusted library allocation
page read and write
21B79210000
trusted library allocation
page read and write
21B7B98F000
trusted library allocation
page read and write
21B7BF2D000
trusted library allocation
page read and write
21B87E63000
trusted library allocation
page read and write
21B79389000
trusted library allocation
page read and write
21B7C05C000
trusted library allocation
page read and write
21B7D4BB000
trusted library allocation
page read and write
21B7C0ED000
trusted library allocation
page read and write
21B7970A000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7938E000
trusted library allocation
page read and write
21B7C8C7000
trusted library allocation
page read and write
21B7B597000
trusted library allocation
page read and write
21B7C04E000
trusted library allocation
page read and write
21B78944000
trusted library allocation
page read and write
1E6DD798000
trusted library allocation
page read and write
21B7CFDB000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7B667000
trusted library allocation
page read and write
21B7C99B000
trusted library allocation
page read and write
21B8A2B1000
heap
page read and write
21B77A63000
trusted library allocation
page read and write
21B7B67A000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B7CED7000
trusted library allocation
page read and write
21B883BC000
trusted library allocation
page read and write
21B89DFC000
trusted library allocation
page read and write
221FA7BD000
heap
page read and write
21B7CE5C000
trusted library allocation
page read and write
21B8961B000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
2AEA693A000
heap
page read and write
21B8828A000
trusted library allocation
page read and write
21B77D50000
heap
page read and write
21B7D287000
trusted library allocation
page read and write
21B882AF000
trusted library allocation
page read and write
21B88280000
trusted library allocation
page read and write
21B886A8000
trusted library allocation
page read and write
21B77D4C000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7B877000
heap
page read and write
17C4000
heap
page read and write
21B881F5000
trusted library allocation
page read and write
21B7B897000
heap
page read and write
21B7ED3C000
trusted library allocation
page read and write
21B79D6A000
trusted library allocation
page read and write
21B7BA30000
trusted library allocation
page read and write
1E6DD3D0000
unclassified section
page readonly
21B77D69000
heap
page read and write
21B7C9CF000
trusted library allocation
page read and write
21B89DFC000
trusted library allocation
page read and write
21B78BC4000
trusted library allocation
page read and write
21B7C650000
trusted library allocation
page read and write
21B7B94C000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
299EFC30000
heap
page read and write
21B882D1000
trusted library allocation
page read and write
21B77AF0000
trusted library allocation
page read and write
21B7C3ED000
trusted library allocation
page read and write
21B882EF000
trusted library allocation
page read and write
21B77D42000
heap
page read and write
4131000
heap
page read and write
2AEA7110000
heap
page read and write
221F8C0A000
heap
page read and write
21B77D69000
heap
page read and write
21B77D69000
heap
page read and write
21B881E7000
trusted library allocation
page read and write
21B774DD000
trusted library allocation
page read and write
21B790BA000
trusted library allocation
page read and write
4131000
heap
page read and write
21B773A6000
trusted library allocation
page read and write
21B7B66A000
trusted library allocation
page read and write
21B79284000
trusted library allocation
page read and write
180E000
stack
page read and write
21B7ED22000
trusted library allocation
page read and write
21B7BC32000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B88243000
trusted library allocation
page read and write
2AEA6B73000
trusted library allocation
page read and write
B6A19BE000
unkown
page readonly
21B7C06B000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B7B9B7000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B79D6F000
trusted library allocation
page read and write
21B77D4F000
heap
page read and write
21B77D31000
heap
page read and write
21B7B67A000
trusted library allocation
page read and write
21B7EDC5000
trusted library allocation
page read and write
21B7C2DD000
trusted library allocation
page read and write
21B7ED70000
trusted library allocation
page read and write
21B7B9E7000
trusted library allocation
page read and write
21B88293000
trusted library allocation
page read and write
21B793F5000
trusted library allocation
page read and write
21B79D94000
trusted library allocation
page read and write
21B7F73A000
trusted library allocation
page read and write
21B882D7000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B8868A000
trusted library allocation
page read and write
21B7C8C7000
trusted library allocation
page read and write
21B7C623000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B7EC3E000
trusted library allocation
page read and write
21B87B5A000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B77D2F000
heap
page read and write
2AEA7469000
heap
page read and write
21B89D2C000
trusted library allocation
page read and write
21B87B11000
trusted library allocation
page read and write
21B7C1AF000
trusted library allocation
page read and write
21B883D3000
trusted library allocation
page read and write
21B793EA000
trusted library allocation
page read and write
21B7C083000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B7B595000
trusted library allocation
page read and write
21B79D60000
trusted library allocation
page read and write
21B882C0000
trusted library allocation
page read and write
21B87B64000
trusted library allocation
page read and write
21B7D343000
trusted library allocation
page read and write
21B7CF77000
trusted library allocation
page read and write
299EFC20000
heap
page read and write
21B7C919000
trusted library allocation
page read and write
2AEA6B5C000
trusted library allocation
page read and write
21B87581000
trusted library allocation
page read and write
21B7C86F000
trusted library allocation
page read and write
2AEA74FC000
heap
page read and write
21B7B58F000
trusted library allocation
page read and write
21B79DD6000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B77D2F000
heap
page read and write
21B793D3000
trusted library allocation
page read and write
21B79DF6000
trusted library allocation
page read and write
21B7CEFC000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7ECB1000
trusted library allocation
page read and write
21B7C5FC000
trusted library allocation
page read and write
21B79350000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B77D71000
heap
page read and write
21B77D41000
heap
page read and write
21B7B9AC000
trusted library allocation
page read and write
21B7D38A000
trusted library allocation
page read and write
21B882A6000
trusted library allocation
page read and write
21B7D34F000
trusted library allocation
page read and write
299EFF11000
trusted library allocation
page read and write
21B793A9000
trusted library allocation
page read and write
21B7B879000
heap
page read and write
21B7C6BE000
trusted library allocation
page read and write
2AEA6B86000
trusted library allocation
page read and write
21B79365000
trusted library allocation
page read and write
21B7D5E8000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B87BBC000
trusted library allocation
page read and write
21B790FB000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B79D60000
trusted library allocation
page read and write
4141000
heap
page read and write
4131000
heap
page read and write
21B7C68B000
trusted library allocation
page read and write
21B87B75000
trusted library allocation
page read and write
21B79DF6000
trusted library allocation
page read and write
21B7C931000
trusted library allocation
page read and write
21B7D343000
trusted library allocation
page read and write
21B7D343000
trusted library allocation
page read and write
2AEA6800000
unclassified section
page readonly
21B77D40000
heap
page read and write
21B79395000
trusted library allocation
page read and write
21B790FB000
trusted library allocation
page read and write
21B793A9000
trusted library allocation
page read and write
5D7B000
stack
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B790FB000
trusted library allocation
page read and write
21B77CB5000
trusted library allocation
page read and write
21B883F4000
trusted library allocation
page read and write
21B7C095000
trusted library allocation
page read and write
21B87697000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
9082DFF000
stack
page read and write
21B7C95E000
trusted library allocation
page read and write
21B87B7D000
trusted library allocation
page read and write
21B77CB5000
trusted library allocation
page read and write
21B7BC78000
trusted library allocation
page read and write
21B7C1F9000
trusted library allocation
page read and write
21B7CE4F000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B77D45000
heap
page read and write
21B882A3000
trusted library allocation
page read and write
21B7B8A4000
heap
page read and write
299F0000000
heap
page read and write
2AEA74E0000
heap
page read and write
21B876F0000
trusted library allocation
page read and write
21B7C9B3000
trusted library allocation
page read and write
21B79DD8000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
21B79245000
trusted library allocation
page read and write
B6A08BB000
stack
page read and write
21B882C3000
trusted library allocation
page read and write
21B77D62000
heap
page read and write
21B7C0E2000
trusted library allocation
page read and write
2AEA6B8B000
trusted library allocation
page read and write
21B78A93000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B78CEC000
trusted library allocation
page read and write
4131000
heap
page read and write
21B78A35000
trusted library allocation
page read and write
21B7C8ED000
trusted library allocation
page read and write
21B7EC6C000
trusted library allocation
page read and write
21B78BC7000
trusted library allocation
page read and write
2AEA74E6000
heap
page read and write
21B789B7000
trusted library allocation
page read and write
21B7D35F000
trusted library allocation
page read and write
21B875EF000
trusted library allocation
page read and write
21B7BC59000
trusted library allocation
page read and write
21B7D58D000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B8750C000
trusted library allocation
page read and write
21B7C1CC000
trusted library allocation
page read and write
21B7C8E2000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B77D75000
heap
page read and write
21B8A241000
heap
page read and write
21B77D3B000
heap
page read and write
21B79609000
trusted library allocation
page read and write
21B7B9C2000
trusted library allocation
page read and write
2AEA7460000
heap
page read and write
21B78C7D000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B77D93000
heap
page read and write
21B7B58A000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
4131000
heap
page read and write
21B7D547000
trusted library allocation
page read and write
21B882FB000
trusted library allocation
page read and write
21B7C55C000
trusted library allocation
page read and write
21B793A9000
trusted library allocation
page read and write
21B7B9AF000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B77D58000
heap
page read and write
2AEA6930000
heap
page read and write
21B77D2A000
heap
page read and write
21B7C6DF000
trusted library allocation
page read and write
21B87B17000
trusted library allocation
page read and write
1E6DD7B7000
trusted library allocation
page read and write
299EFF0C000
trusted library allocation
page read and write
21B7C8D9000
trusted library allocation
page read and write
21B87695000
trusted library allocation
page read and write
21B88151000
trusted library allocation
page read and write
21B7BC9C000
trusted library allocation
page read and write
21B7B55F000
trusted library allocation
page read and write
21B77D59000
heap
page read and write
21B7C912000
trusted library allocation
page read and write
21B7C6DD000
trusted library allocation
page read and write
21B77D4C000
heap
page read and write
299EFF00000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
B531E5B000
stack
page read and write
21B79D89000
trusted library allocation
page read and write
21B77926000
trusted library allocation
page read and write
21B7CE69000
trusted library allocation
page read and write
21B87B64000
trusted library allocation
page read and write
21B78C79000
trusted library allocation
page read and write
21B77D42000
heap
page read and write
21B882C8000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B8F5000
heap
page read and write
21B7B8B8000
heap
page read and write
21B7D38A000
trusted library allocation
page read and write
221F8D00000
trusted library allocation
page read and write
21B7EDF1000
trusted library allocation
page read and write
21B77D64000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7B50E000
trusted library allocation
page read and write
21B7BFA2000
trusted library allocation
page read and write
B531E9E000
unkown
page readonly
21B7ED46000
trusted library allocation
page read and write
21B79D39000
trusted library allocation
page read and write
1E6DD77A000
trusted library allocation
page read and write
21B88258000
trusted library allocation
page read and write
1E6DD8C0000
heap
page read and write
4131000
heap
page read and write
17C4000
heap
page read and write
21B77D2D000
heap
page read and write
21B883EE000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B7BA35000
trusted library allocation
page read and write
21B7B95A000
trusted library allocation
page read and write
21B7CE5C000
trusted library allocation
page read and write
21B77CED000
trusted library allocation
page read and write
21B78AEA000
trusted library allocation
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B875DF000
trusted library allocation
page read and write
21B7C8ED000
trusted library allocation
page read and write
21B88153000
trusted library allocation
page read and write
21B7B671000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B87575000
trusted library allocation
page read and write
21B77D5F000
heap
page read and write
21B7D345000
trusted library allocation
page read and write
21B7D378000
trusted library allocation
page read and write
21B7B679000
trusted library allocation
page read and write
21B876FD000
trusted library allocation
page read and write
21B7ECC4000
trusted library allocation
page read and write
299EFC24000
heap
page read and write
21B77D69000
heap
page read and write
21B7C0ED000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7B960000
trusted library allocation
page read and write
21B774E7000
trusted library allocation
page read and write
21B77D52000
heap
page read and write
21B87BF2000
trusted library allocation
page read and write
21B7C68B000
trusted library allocation
page read and write
21B7B879000
heap
page read and write
21B78BE1000
trusted library allocation
page read and write
21B7D4BB000
trusted library allocation
page read and write
21B7B881000
heap
page read and write
21B7C8D9000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D93000
heap
page read and write
2AEA6B68000
trusted library allocation
page read and write
21B7B95E000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
221FA7B7000
heap
page read and write
21B87B56000
trusted library allocation
page read and write
21B7CFC3000
trusted library allocation
page read and write
21B77D34000
heap
page read and write
21B883E9000
trusted library allocation
page read and write
21B7C8E8000
trusted library allocation
page read and write
21B79DEE000
trusted library allocation
page read and write
21B87E1D000
trusted library allocation
page read and write
21B7B5FE000
trusted library allocation
page read and write
21B78BDC000
trusted library allocation
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B7C0C6000
trusted library allocation
page read and write
21B886CB000
trusted library allocation
page read and write
21B883F1000
trusted library allocation
page read and write
B534A3E000
stack
page read and write
21B87598000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B78A99000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B7C993000
trusted library allocation
page read and write
21B8A2F8000
heap
page read and write
21B78998000
trusted library allocation
page read and write
21B7C065000
trusted library allocation
page read and write
21B7B533000
trusted library allocation
page read and write
21B79284000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B79373000
trusted library allocation
page read and write
21B79D52000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
4131000
heap
page read and write
21B77D3A000
heap
page read and write
21B77371000
trusted library allocation
page read and write
21B886A7000
trusted library allocation
page read and write
21B78B37000
trusted library allocation
page read and write
21B7C670000
trusted library allocation
page read and write
2AEA787B000
heap
page read and write
21B7B8A4000
heap
page read and write
21B7ED38000
trusted library allocation
page read and write
21B7D4A3000
trusted library allocation
page read and write
21B77CB5000
trusted library allocation
page read and write
21B7CE8A000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
21B7C2F9000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B77D4A000
heap
page read and write
21B882B6000
trusted library allocation
page read and write
21B7C5EE000
trusted library allocation
page read and write
21B88D00000
trusted library allocation
page read and write
21B77D53000
heap
page read and write
21B792A3000
trusted library allocation
page read and write
21B77D56000
heap
page read and write
21B77D41000
heap
page read and write
4131000
heap
page read and write
21B7BA4C000
trusted library allocation
page read and write
21B77387000
trusted library allocation
page read and write
21B77D71000
heap
page read and write
21B7CEDF000
trusted library allocation
page read and write
21B87B82000
trusted library allocation
page read and write
21B792F1000
trusted library allocation
page read and write
2AEA746C000
heap
page read and write
21B77D79000
heap
page read and write
590C000
stack
page read and write
21B7EDAE000
trusted library allocation
page read and write
21B87533000
trusted library allocation
page read and write
21B78B8C000
trusted library allocation
page read and write
21B7BA72000
trusted library allocation
page read and write
21B7C09F000
trusted library allocation
page read and write
21B875DC000
trusted library allocation
page read and write
21B876EA000
trusted library allocation
page read and write
21B882D1000
trusted library allocation
page read and write
21B77D5C000
heap
page read and write
21B7D35F000
trusted library allocation
page read and write
21B7B5D0000
trusted library allocation
page read and write
21B88194000
trusted library allocation
page read and write
21B89AFB000
trusted library allocation
page read and write
21B882F4000
trusted library allocation
page read and write
21B7B9DF000
trusted library allocation
page read and write
21B7B9DF000
trusted library allocation
page read and write
21B883EC000
trusted library allocation
page read and write
21B7BF67000
trusted library allocation
page read and write
21B7C732000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B7CEE9000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
4131000
heap
page read and write
21B79048000
trusted library allocation
page read and write
21B77D4A000
heap
page read and write
21B7C0CE000
trusted library allocation
page read and write
4131000
heap
page read and write
4131000
heap
page read and write
21B7EDA6000
trusted library allocation
page read and write
21B7D38D000
trusted library allocation
page read and write
F4CDCBE000
unkown
page readonly
4131000
heap
page read and write
21B7B895000
heap
page read and write
21B7B597000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B7B960000
trusted library allocation
page read and write
21B87626000
trusted library allocation
page read and write
21B77D5C000
heap
page read and write
21B77D53000
heap
page read and write
21B7C6C8000
trusted library allocation
page read and write
21B886E7000
trusted library allocation
page read and write
21B7C3E4000
trusted library allocation
page read and write
21B7D34A000
trusted library allocation
page read and write
221FA7BB000
heap
page read and write
21B77D79000
heap
page read and write
21B7C065000
trusted library allocation
page read and write
21B7CED7000
trusted library allocation
page read and write
21B883F1000
trusted library allocation
page read and write
21B7C0CD000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B8769E000
trusted library allocation
page read and write
21B7B50B000
trusted library allocation
page read and write
21B773AD000
trusted library allocation
page read and write
21B7BD83000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B792C1000
trusted library allocation
page read and write
21B78926000
trusted library allocation
page read and write
21B7E263000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
F4CC4BE000
stack
page read and write
21B882CE000
trusted library allocation
page read and write
21B87B99000
trusted library allocation
page read and write
21B885E6000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
299EFAD0000
unclassified section
page readonly
21B77D35000
heap
page read and write
21B7929B000
trusted library allocation
page read and write
21B7B87F000
heap
page read and write
21B77D4D000
heap
page read and write
21B7BA3A000
trusted library allocation
page read and write
1E6DD70D000
trusted library allocation
page read and write
21B7C8D3000
trusted library allocation
page read and write
21B7B9EA000
trusted library allocation
page read and write
21B7C9CF000
trusted library allocation
page read and write
21B7B95A000
trusted library allocation
page read and write
21B7C912000
trusted library allocation
page read and write
21B77D65000
heap
page read and write
21B7C1CC000
trusted library allocation
page read and write
21B87E1F000
trusted library allocation
page read and write
21B876D4000
trusted library allocation
page read and write
2AEA74FC000
heap
page read and write
21B790B2000
trusted library allocation
page read and write
21B7B9AD000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B77D2B000
heap
page read and write
21B78C7D000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B7D364000
trusted library allocation
page read and write
21B7939A000
trusted library allocation
page read and write
21B7C063000
trusted library allocation
page read and write
221FA7A0000
heap
page read and write
21B87632000
trusted library allocation
page read and write
21B885A5000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D93000
heap
page read and write
21B7C2C9000
trusted library allocation
page read and write
21B7B66D000
trusted library allocation
page read and write
21B78B94000
trusted library allocation
page read and write
21B7BCFB000
trusted library allocation
page read and write
21B7924C000
trusted library allocation
page read and write
21B7C3FE000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B77D2B000
heap
page read and write
2AEA78A6000
heap
page read and write
B6A08B7000
stack
page read and write
21B77D4F000
heap
page read and write
21B77D41000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
21B883E5000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B87F000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B88683000
trusted library allocation
page read and write
21B79DDC000
trusted library allocation
page read and write
21B8758F000
trusted library allocation
page read and write
21B78C99000
trusted library allocation
page read and write
21B7C9C8000
trusted library allocation
page read and write
2AEA732B000
trusted library allocation
page read and write
21B882D1000
trusted library allocation
page read and write
21B87B56000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
299EFFDA000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B8763B000
trusted library allocation
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B7D35F000
trusted library allocation
page read and write
21B88219000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B875A7000
trusted library allocation
page read and write
21B7C6DD000
trusted library allocation
page read and write
21B7B9C8000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
21B7791E000
trusted library allocation
page read and write
724000
unkown
page readonly
21B7905F000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
2AEA747D000
heap
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B876F2000
trusted library allocation
page read and write
21B79238000
trusted library allocation
page read and write
21B89617000
trusted library allocation
page read and write
21B7B5B6000
trusted library allocation
page read and write
21B78AC3000
trusted library allocation
page read and write
21B7ECAC000
trusted library allocation
page read and write
21B876F2000
trusted library allocation
page read and write
21B7C922000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B79360000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B77D2A000
heap
page read and write
21B7B8A4000
heap
page read and write
21B8815E000
trusted library allocation
page read and write
21B78C7D000
trusted library allocation
page read and write
21B7EC7E000
trusted library allocation
page read and write
21B886D6000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
21B7D41F000
trusted library allocation
page read and write
21B886A7000
trusted library allocation
page read and write
21B7B881000
heap
page read and write
2AEA7897000
heap
page read and write
21B7EC78000
trusted library allocation
page read and write
21B7B67C000
trusted library allocation
page read and write
21B7D323000
trusted library allocation
page read and write
21B77D58000
heap
page read and write
21B7EC12000
trusted library allocation
page read and write
1E6DD850000
heap
page read and write
21B77D4A000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7C022000
trusted library allocation
page read and write
21B7D364000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7894F000
trusted library allocation
page read and write
21B7927E000
trusted library allocation
page read and write
508E000
stack
page read and write
21B790A4000
trusted library allocation
page read and write
21B7BC2F000
trusted library allocation
page read and write
21B7B5D0000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
21B78AE9000
trusted library allocation
page read and write
21B7B587000
trusted library allocation
page read and write
21B7EDEE000
trusted library allocation
page read and write
21B78BFA000
trusted library allocation
page read and write
21B7C89C000
trusted library allocation
page read and write
21B7B66A000
trusted library allocation
page read and write
21B78BF8000
trusted library allocation
page read and write
21B882C0000
trusted library allocation
page read and write
21B7C3F7000
trusted library allocation
page read and write
2AEA6BCC000
trusted library allocation
page read and write
21B886DB000
trusted library allocation
page read and write
21B7BC69000
trusted library allocation
page read and write
2AEA747D000
heap
page read and write
21B79DDC000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7B894000
heap
page read and write
21B7C6E4000
trusted library allocation
page read and write
21B7ED53000
trusted library allocation
page read and write
2AEA69FF000
unclassified section
page read and write
21B7C73B000
trusted library allocation
page read and write
21B7C3D3000
trusted library allocation
page read and write
21B88293000
trusted library allocation
page read and write
21B7C58E000
trusted library allocation
page read and write
21B883E1000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B790F8000
trusted library allocation
page read and write
21B7B5E0000
trusted library allocation
page read and write
21B87B3F000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7B62C000
trusted library allocation
page read and write
21B77AAE000
trusted library allocation
page read and write
4131000
heap
page read and write
21B882B6000
trusted library allocation
page read and write
21B77D4E000
heap
page read and write
21B883EC000
trusted library allocation
page read and write
21B7D5E8000
trusted library allocation
page read and write
21B77D59000
heap
page read and write
21B79D60000
trusted library allocation
page read and write
21B87B6A000
trusted library allocation
page read and write
21B8823C000
trusted library allocation
page read and write
21B774F8000
trusted library allocation
page read and write
21B7C830000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
1E6DD703000
trusted library allocation
page read and write
21B7D3B5000
trusted library allocation
page read and write
21B883D3000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7CEE7000
trusted library allocation
page read and write
21B882F4000
trusted library allocation
page read and write
21B7C089000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7736E000
trusted library allocation
page read and write
21B87B82000
trusted library allocation
page read and write
21B7C6C8000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B7C0B9000
trusted library allocation
page read and write
21B7937F000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7CF90000
trusted library allocation
page read and write
21B78BF8000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B78BF1000
trusted library allocation
page read and write
21B7B888000
heap
page read and write
21B87B66000
trusted library allocation
page read and write
21B8758F000
trusted library allocation
page read and write
21B78AA9000
trusted library allocation
page read and write
21B7C0EE000
trusted library allocation
page read and write
21B8827B000
trusted library allocation
page read and write
B5341FE000
unkown
page readonly
21B7C86B000
trusted library allocation
page read and write
21B87BD1000
trusted library allocation
page read and write
21B87B4C000
trusted library allocation
page read and write
299EFF65000
trusted library allocation
page read and write
90835FF000
stack
page read and write
2AEA745C000
heap
page read and write
21B79509000
trusted library allocation
page read and write
21B77CD2000
trusted library allocation
page read and write
21B882CE000
trusted library allocation
page read and write
21B896E4000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7B8A3000
heap
page read and write
21B7E22F000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B77D32000
heap
page read and write
21B790A9000
trusted library allocation
page read and write
299EFB90000
unclassified section
page readonly
21B7B9B7000
trusted library allocation
page read and write
21B883EC000
trusted library allocation
page read and write
21B7C5DA000
trusted library allocation
page read and write
21B8828A000
trusted library allocation
page read and write
21B77C6C000
trusted library allocation
page read and write
21B78CF6000
trusted library allocation
page read and write
21B882C0000
trusted library allocation
page read and write
21B78BE8000
trusted library allocation
page read and write
1E6DD700000
trusted library allocation
page read and write
21B7C0A8000
trusted library allocation
page read and write
21B7C05F000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D79000
heap
page read and write
21B77D79000
heap
page read and write
21B77D4D000
heap
page read and write
21B78967000
trusted library allocation
page read and write
21B79047000
trusted library allocation
page read and write
21B88278000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B885D6000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
21B77CD2000
trusted library allocation
page read and write
221F8C1C000
heap
page read and write
21B876B3000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
4131000
heap
page read and write
21B7C01B000
trusted library allocation
page read and write
21B8825A000
trusted library allocation
page read and write
54CE000
stack
page read and write
4131000
heap
page read and write
21B7B87F000
heap
page read and write
21B7BCBC000
trusted library allocation
page read and write
21B77D31000
heap
page read and write
21B88B00000
trusted library allocation
page read and write
21B882F2000
trusted library allocation
page read and write
21B7C95C000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B89DA7000
trusted library allocation
page read and write
21B7CF55000
trusted library allocation
page read and write
299F0100000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B7B67C000
trusted library allocation
page read and write
21B88162000
trusted library allocation
page read and write
21B78998000
trusted library allocation
page read and write
21B8757E000
trusted library allocation
page read and write
21B7B671000
trusted library allocation
page read and write
21B79216000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B7C2E0000
trusted library allocation
page read and write
21B78C8F000
trusted library allocation
page read and write
21B79245000
trusted library allocation
page read and write
21B78BFA000
trusted library allocation
page read and write
21B87591000
trusted library allocation
page read and write
21B8A2AA000
heap
page read and write
21B7BDF9000
trusted library allocation
page read and write
21B78B94000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
1922000
heap
page read and write
21B7CEA8000
trusted library allocation
page read and write
1E6DD490000
heap
page read and write
21B886CB000
trusted library allocation
page read and write
21B89200000
trusted library allocation
page read and write
21B7C388000
trusted library allocation
page read and write
21B7D3B5000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
21B77D5D000
heap
page read and write
651000
unkown
page execute read
21B7C7A6000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D6C000
heap
page read and write
21B7D3A9000
trusted library allocation
page read and write
21B7C05F000
trusted library allocation
page read and write
21B87BE8000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
4131000
heap
page read and write
21B77D79000
heap
page read and write
21B77D2C000
heap
page read and write
21B7CE2F000
trusted library allocation
page read and write
21B7B9EA000
trusted library allocation
page read and write
2AEA6B2F000
trusted library allocation
page read and write
21B886F0000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7B66C000
trusted library allocation
page read and write
21B77C95000
trusted library allocation
page read and write
179D000
stack
page read and write
21B78C8F000
trusted library allocation
page read and write
21B7C95C000
trusted library allocation
page read and write
21B7C5A1000
trusted library allocation
page read and write
4131000
heap
page read and write
2AEA74E8000
heap
page read and write
21B793DD000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B79291000
trusted library allocation
page read and write
21B77D3E000
heap
page read and write
4131000
heap
page read and write
21B7B5E4000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B78BE8000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
299EFD50000
heap
page read and write
21B78CA2000
trusted library allocation
page read and write
21B7EC3E000
trusted library allocation
page read and write
21B77D53000
heap
page read and write
21B77CC8000
trusted library allocation
page read and write
21B7B97B000
trusted library allocation
page read and write
21B77D63000
heap
page read and write
21B77D41000
heap
page read and write
21B77D3B000
heap
page read and write
21B7C6E6000
trusted library allocation
page read and write
21B7C7C3000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B79394000
trusted library allocation
page read and write
21B7C0AD000
trusted library allocation
page read and write
21B79D9E000
trusted library allocation
page read and write
21B7EC4A000
trusted library allocation
page read and write
21B77D55000
heap
page read and write
17C4000
heap
page read and write
21B7B9FC000
trusted library allocation
page read and write
21B7927E000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B88513000
trusted library allocation
page read and write
21B7B9AE000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B8829F000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B7CFE2000
trusted library allocation
page read and write
21B7C9FE000
trusted library allocation
page read and write
21B7C6DF000
trusted library allocation
page read and write
21B885A7000
trusted library allocation
page read and write
4131000
heap
page read and write
21B881EB000
trusted library allocation
page read and write
21B793F5000
trusted library allocation
page read and write
21B77D57000
heap
page read and write
21B7C91D000
trusted library allocation
page read and write
21B7C743000
trusted library allocation
page read and write
21B8822B000
trusted library allocation
page read and write
21B790FB000
trusted library allocation
page read and write
21B7739D000
trusted library allocation
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B883E5000
trusted library allocation
page read and write
21B7B937000
trusted library allocation
page read and write
21B7B9DC000
trusted library allocation
page read and write
21B89D1A000
trusted library allocation
page read and write
21B77D53000
heap
page read and write
21B7939D000
trusted library allocation
page read and write
21B7F74F000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
4131000
heap
page read and write
21B77D30000
heap
page read and write
21B881E2000
trusted library allocation
page read and write
2AEA7885000
heap
page read and write
21B7D2F3000
trusted library allocation
page read and write
21B7BC35000
trusted library allocation
page read and write
21B7B960000
trusted library allocation
page read and write
21B78B37000
trusted library allocation
page read and write
21B87E56000
trusted library allocation
page read and write
21B7B86C000
heap
page read and write
21B7C8D3000
trusted library allocation
page read and write
2AEA745C000
heap
page read and write
21B87B40000
trusted library allocation
page read and write
21B88900000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B883BC000
trusted library allocation
page read and write
21B7B879000
heap
page read and write
21B7B511000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
1E6DD903000
trusted library allocation
page read and write
21B7B9F1000
trusted library allocation
page read and write
21B7EC16000
trusted library allocation
page read and write
21B77D34000
heap
page read and write
21B87B5A000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B7C05E000
trusted library allocation
page read and write
21B793D3000
trusted library allocation
page read and write
21B7C869000
trusted library allocation
page read and write
21B792BB000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B77D3A000
heap
page read and write
21B77D32000
heap
page read and write
720000
unkown
page write copy
21B7D905000
trusted library allocation
page read and write
21B7B595000
trusted library allocation
page read and write
21B7C8F3000
trusted library allocation
page read and write
21B7CEF7000
trusted library allocation
page read and write
299F0103000
trusted library allocation
page read and write
2AEA74F1000
heap
page read and write
21B77D75000
heap
page read and write
21B883E5000
trusted library allocation
page read and write
21B7B66C000
trusted library allocation
page read and write
21B87B51000
trusted library allocation
page read and write
21B793EC000
trusted library allocation
page read and write
21B7C3FB000
trusted library allocation
page read and write
21B7ECB6000
trusted library allocation
page read and write
21B7B5AD000
trusted library allocation
page read and write
21B7C7A0000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7797D000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
2AEA745F000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
17C0000
heap
page read and write
21B7D547000
trusted library allocation
page read and write
21B7D4F0000
trusted library allocation
page read and write
21B79D39000
trusted library allocation
page read and write
21B7D3C4000
trusted library allocation
page read and write
21B7B888000
heap
page read and write
21B78BA0000
trusted library allocation
page read and write
21B779B6000
trusted library allocation
page read and write
21B88172000
trusted library allocation
page read and write
21B7C7B4000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B78BFD000
trusted library allocation
page read and write
21B876B8000
trusted library allocation
page read and write
21B790C7000
trusted library allocation
page read and write
21B8827C000
trusted library allocation
page read and write
1E6DD75D000
trusted library allocation
page read and write
21B7D43B000
trusted library allocation
page read and write
21B78A39000
trusted library allocation
page read and write
21B7D41F000
trusted library allocation
page read and write
21B7ED2A000
trusted library allocation
page read and write
21B7BA3C000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7C8E8000
trusted library allocation
page read and write
21B772C0000
trusted library allocation
page read and write
21B7C931000
trusted library allocation
page read and write
21B792C1000
trusted library allocation
page read and write
21B7ECE8000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
21B77D63000
heap
page read and write
21B77D32000
heap
page read and write
21B79D35000
trusted library allocation
page read and write
21B7B9AE000
trusted library allocation
page read and write
21B87EAA000
trusted library allocation
page read and write
21B77D4D000
heap
page read and write
21B77D62000
heap
page read and write
21B7EC44000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
21B7B67A000
trusted library allocation
page read and write
21B7ECE4000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
299EFF13000
trusted library allocation
page read and write
21B883E5000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
21B885C6000
trusted library allocation
page read and write
21B79363000
trusted library allocation
page read and write
21B79238000
trusted library allocation
page read and write
21B7C8E3000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D69000
heap
page read and write
21B7ECB6000
trusted library allocation
page read and write
21B7D3D3000
trusted library allocation
page read and write
21B78BDC000
trusted library allocation
page read and write
21B7C9F8000
trusted library allocation
page read and write
21B876DA000
trusted library allocation
page read and write
21B88296000
trusted library allocation
page read and write
21B87B62000
trusted library allocation
page read and write
21B79DA2000
trusted library allocation
page read and write
21B77D6E000
heap
page read and write
21B77D93000
heap
page read and write
299EFF8E000
trusted library allocation
page read and write
2AEA7143000
heap
page read and write
2AEA6780000
unclassified section
page readonly
21B77D71000
heap
page read and write
21B77D2C000
heap
page read and write
21B7B8CF000
heap
page read and write
17C4000
heap
page read and write
21B77D2A000
heap
page read and write
21B78A35000
trusted library allocation
page read and write
21B7C9BA000
trusted library allocation
page read and write
21B883F1000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
21B790F8000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D79000
heap
page read and write
21B7B9B0000
trusted library allocation
page read and write
21B7B94F000
trusted library allocation
page read and write
21B78AC3000
trusted library allocation
page read and write
21B7CEEF000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B77D63000
heap
page read and write
21B77D3A000
heap
page read and write
21B881BC000
trusted library allocation
page read and write
21B876C2000
trusted library allocation
page read and write
3DE4000
heap
page read and write
21B87598000
trusted library allocation
page read and write
90825FF000
stack
page read and write
21B87B8B000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B79909000
trusted library allocation
page read and write
1E6DD3E0000
unclassified section
page readonly
21B7B885000
heap
page read and write
1E6DD7E9000
trusted library allocation
page read and write
21B77D53000
heap
page read and write
21B77D4B000
heap
page read and write
21B882AD000
trusted library allocation
page read and write
21B87B64000
trusted library allocation
page read and write
21B7C78F000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B79373000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
21B7BCFB000
trusted library allocation
page read and write
21B87649000
trusted library allocation
page read and write
21B77D40000
heap
page read and write
21B7B506000
trusted library allocation
page read and write
21B7C07E000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B7C3E7000
trusted library allocation
page read and write
21B7BA80000
trusted library allocation
page read and write
2AEA745C000
heap
page read and write
21B7936C000
trusted library allocation
page read and write
21B89DA3000
trusted library allocation
page read and write
21B7CFE2000
trusted library allocation
page read and write
21B7C041000
trusted library allocation
page read and write
2AEA786D000
heap
page read and write
21B7D284000
trusted library allocation
page read and write
9083DFF000
stack
page read and write
21B77982000
trusted library allocation
page read and write
2AEA74FC000
heap
page read and write
6EC000
unkown
page readonly
21B7B9EC000
trusted library allocation
page read and write
21B7921B000
trusted library allocation
page read and write
21B77D40000
heap
page read and write
21B7C8C7000
trusted library allocation
page read and write
21B89DA7000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
1E6DD440000
remote allocation
page read and write
21B7B877000
heap
page read and write
21B7ED5E000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B77D79000
heap
page read and write
21B77D56000
heap
page read and write
21B793C6000
trusted library allocation
page read and write
B6A323E000
stack
page read and write
21B7C91D000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B79386000
trusted library allocation
page read and write
2AEA7869000
heap
page read and write
2AC7D100000
trusted library allocation
page read and write
21B78BE1000
trusted library allocation
page read and write
21B7C9CD000
trusted library allocation
page read and write
21B7B5B1000
trusted library allocation
page read and write
2AC7CF79000
heap
page read and write
21B882A3000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
2AEA74E8000
heap
page read and write
21B78BF8000
trusted library allocation
page read and write
21B882A6000
trusted library allocation
page read and write
299EFF76000
trusted library allocation
page read and write
21B7938E000
trusted library allocation
page read and write
21B87588000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7D58D000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B8758D000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
17C4000
heap
page read and write
17C4000
heap
page read and write
21B7CEC6000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7CEF5000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B7BC6D000
trusted library allocation
page read and write
21B792BB000
trusted library allocation
page read and write
19486B01E000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
17C4000
heap
page read and write
21B78BE1000
trusted library allocation
page read and write
21B88190000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
21B77876000
trusted library allocation
page read and write
21B8758F000
trusted library allocation
page read and write
21B7B8F5000
heap
page read and write
21B882E2000
trusted library allocation
page read and write
21B89DFC000
trusted library allocation
page read and write
21B883C3000
trusted library allocation
page read and write
2AEA7897000
heap
page read and write
21B7CEE9000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B78C95000
trusted library allocation
page read and write
21B7F73F000
trusted library allocation
page read and write
21B7C93F000
trusted library allocation
page read and write
21B7924C000
trusted library allocation
page read and write
21B7C0A8000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B7C56F000
trusted library allocation
page read and write
651000
unkown
page execute read
21B7C6F1000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7D5A4000
trusted library allocation
page read and write
21B7906A000
trusted library allocation
page read and write
21B790F1000
trusted library allocation
page read and write
17B6000
heap
page read and write
21B7C732000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B77357000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B8759E000
trusted library allocation
page read and write
21B882F2000
trusted library allocation
page read and write
1E6DD8C4000
heap
page read and write
21B8825E000
trusted library allocation
page read and write
21B876C2000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B7C687000
trusted library allocation
page read and write
15FE000
stack
page read and write
21B7D378000
trusted library allocation
page read and write
21B881F7000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
1E6DD710000
trusted library allocation
page read and write
21B7B9DF000
trusted library allocation
page read and write
21B7B9C2000
trusted library allocation
page read and write
21B7C743000
trusted library allocation
page read and write
21B7B9A0000
trusted library allocation
page read and write
21B7B952000
trusted library allocation
page read and write
21B87B33000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
2AEA7883000
heap
page read and write
21B7C8FD000
trusted library allocation
page read and write
299EFF78000
trusted library allocation
page read and write
21B7B581000
trusted library allocation
page read and write
21B883CB000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7905B000
trusted library allocation
page read and write
21B876E2000
trusted library allocation
page read and write
3DE0000
heap
page read and write
21B88280000
trusted library allocation
page read and write
21B7C893000
trusted library allocation
page read and write
21B882C3000
trusted library allocation
page read and write
21B87BF8000
trusted library allocation
page read and write
21B881F9000
trusted library allocation
page read and write
21B790A4000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B77D32000
heap
page read and write
21B7CEDF000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B78B43000
trusted library allocation
page read and write
21B7C0B0000
trusted library allocation
page read and write
21B7C7E3000
trusted library allocation
page read and write
21B7C9AD000
trusted library allocation
page read and write
21B7C5DA000
trusted library allocation
page read and write
21B7D3B5000
trusted library allocation
page read and write
21B7B583000
trusted library allocation
page read and write
21B7B5E4000
trusted library allocation
page read and write
21B7D34F000
trusted library allocation
page read and write
F4CA3D8000
stack
page read and write
21B77D79000
heap
page read and write
21B77D69000
heap
page read and write
21B7C0C6000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B886D8000
trusted library allocation
page read and write
21B7CE3F000
trusted library allocation
page read and write
21B7BC9F000
trusted library allocation
page read and write
21B7ED10000
trusted library allocation
page read and write
21B7B939000
trusted library allocation
page read and write
21B7C670000
trusted library allocation
page read and write
2AEA7306000
trusted library allocation
page read and write
21B7EC06000
trusted library allocation
page read and write
1E6DD723000
trusted library allocation
page read and write
21B88275000
trusted library allocation
page read and write
21B881C8000
trusted library allocation
page read and write
21B7CFED000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
4131000
heap
page read and write
21B7C782000
trusted library allocation
page read and write
21B7B8F5000
heap
page read and write
21B7B682000
trusted library allocation
page read and write
21B7C09E000
trusted library allocation
page read and write
2AEA7885000
heap
page read and write
21B7B9FC000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
4131000
heap
page read and write
21B87553000
trusted library allocation
page read and write
21B77D71000
heap
page read and write
21B876E2000
trusted library allocation
page read and write
21B882E3000
trusted library allocation
page read and write
21B7C8C7000
trusted library allocation
page read and write
21B7C2E0000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B882D1000
trusted library allocation
page read and write
21B87B51000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B7EC8F000
trusted library allocation
page read and write
21B79043000
trusted library allocation
page read and write
2AEA78A6000
heap
page read and write
299EFF63000
trusted library allocation
page read and write
B6A2A3E000
unkown
page readonly
21B790F0000
trusted library allocation
page read and write
21B7B9D6000
trusted library allocation
page read and write
21B88543000
trusted library allocation
page read and write
21B789F3000
trusted library allocation
page read and write
21B7CED7000
trusted library allocation
page read and write
21B7B659000
trusted library allocation
page read and write
21B87B62000
trusted library allocation
page read and write
2AEA787B000
heap
page read and write
21B883EE000
trusted library allocation
page read and write
21B7C055000
trusted library allocation
page read and write
2AEA6BB1000
trusted library allocation
page read and write
21B7BDA6000
trusted library allocation
page read and write
21B89D9B000
trusted library allocation
page read and write
21B7B8B8000
heap
page read and write
21B77919000
trusted library allocation
page read and write
21B7CF89000
trusted library allocation
page read and write
548F000
stack
page read and write
21B77D40000
heap
page read and write
F4CBBFE000
unkown
page readonly
21B7D4FA000
trusted library allocation
page read and write
21B7B97B000
trusted library allocation
page read and write
21B79365000
trusted library allocation
page read and write
21B77D57000
heap
page read and write
21B792FB000
trusted library allocation
page read and write
21B7C8C0000
trusted library allocation
page read and write
21B882F2000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B7ECAC000
trusted library allocation
page read and write
21B7C8FD000
trusted library allocation
page read and write
21B881B5000
trusted library allocation
page read and write
21B7739D000
trusted library allocation
page read and write
21B7B671000
trusted library allocation
page read and write
221F8F00000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7D90A000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B882B6000
trusted library allocation
page read and write
21B7C2C6000
trusted library allocation
page read and write
21B7C089000
trusted library allocation
page read and write
299EFF24000
trusted library allocation
page read and write
21B886A4000
trusted library allocation
page read and write
21B7BC5D000
trusted library allocation
page read and write
21B7D3D1000
trusted library allocation
page read and write
21B7BCF7000
trusted library allocation
page read and write
21B789B7000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7C762000
trusted library allocation
page read and write
21B875BA000
trusted library allocation
page read and write
2AEA78A9000
heap
page read and write
21B882C8000
trusted library allocation
page read and write
21B7B990000
trusted library allocation
page read and write
21B88286000
trusted library allocation
page read and write
21B87597000
trusted library allocation
page read and write
21B8A275000
heap
page read and write
21B77D4D000
heap
page read and write
21B77D5D000
heap
page read and write
4131000
heap
page read and write
21B7BA72000
trusted library allocation
page read and write
DA0DBFF000
stack
page read and write
21B77D2F000
heap
page read and write
650000
unkown
page readonly
21B7BD9D000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B7929B000
trusted library allocation
page read and write
1E6DD4F0000
heap
page read and write
21B77D57000
heap
page read and write
21B77D43000
heap
page read and write
21B7EC3E000
trusted library allocation
page read and write
21B79216000
trusted library allocation
page read and write
21B7B587000
trusted library allocation
page read and write
21B7B958000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7B55F000
trusted library allocation
page read and write
21B882B6000
trusted library allocation
page read and write
21B7CE93000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B7C6E4000
trusted library allocation
page read and write
21B8869B000
trusted library allocation
page read and write
21B773DB000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B7C7A0000
trusted library allocation
page read and write
21B7CFE6000
trusted library allocation
page read and write
4131000
heap
page read and write
4131000
heap
page read and write
21B7B597000
trusted library allocation
page read and write
21B7C1E9000
trusted library allocation
page read and write
21B885C6000
trusted library allocation
page read and write
21B7ECC1000
trusted library allocation
page read and write
DA0DBFC000
stack
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7CEE7000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B78998000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
299EFF49000
trusted library allocation
page read and write
21B87B87000
trusted library allocation
page read and write
21B7B894000
heap
page read and write
21B79D94000
trusted library allocation
page read and write
21B882A3000
trusted library allocation
page read and write
21B7C6F1000
trusted library allocation
page read and write
21B7937A000
trusted library allocation
page read and write
21B7727F000
trusted library allocation
page read and write
21B7D5A4000
trusted library allocation
page read and write
21B8A2AA000
heap
page read and write
21B77298000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B79365000
trusted library allocation
page read and write
21B7B9DF000
trusted library allocation
page read and write
21B77D47000
heap
page read and write
2AEA6A00000
trusted library allocation
page read and write
21B7CFEC000
trusted library allocation
page read and write
21B7B95A000
trusted library allocation
page read and write
21B793C6000
trusted library allocation
page read and write
21B7D3B7000
trusted library allocation
page read and write
21B7B675000
trusted library allocation
page read and write
21B881E2000
trusted library allocation
page read and write
21B7905F000
trusted library allocation
page read and write
2AEA6790000
unclassified section
page readonly
21B7CED3000
trusted library allocation
page read and write
21B87B74000
trusted library allocation
page read and write
21B7C9DE000
trusted library allocation
page read and write
21B7B5DD000
trusted library allocation
page read and write
21B7BC54000
trusted library allocation
page read and write
299EFB48000
remote allocation
page execute read
21B7C8E2000
trusted library allocation
page read and write
21B7B881000
heap
page read and write
21B773DB000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B8817E000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B774F5000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B882A3000
trusted library allocation
page read and write
21B7B97B000
trusted library allocation
page read and write
21B882C8000
trusted library allocation
page read and write
21B77D4A000
heap
page read and write
21B7CE5C000
trusted library allocation
page read and write
B69FFFE000
stack
page read and write
21B876FA000
trusted library allocation
page read and write
2AEA74E9000
heap
page read and write
21B875E4000
trusted library allocation
page read and write
21B7C8C7000
trusted library allocation
page read and write
21B793CE000
trusted library allocation
page read and write
21B7B55F000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B7C2F9000
trusted library allocation
page read and write
21B7C68B000
trusted library allocation
page read and write
21B7B9A3000
trusted library allocation
page read and write
21B881E2000
trusted library allocation
page read and write
F4C99BE000
unkown
page readonly
21B77D32000
heap
page read and write
21B7B958000
trusted library allocation
page read and write
21B78BEB000
trusted library allocation
page read and write
21B7BC5D000
trusted library allocation
page read and write
21B88700000
trusted library allocation
page read and write
2AEA74B9000
heap
page read and write
21B883F1000
trusted library allocation
page read and write
21B78BFA000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B8819A000
trusted library allocation
page read and write
21B7980A000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B77D53000
heap
page read and write
21B77D30000
heap
page read and write
21B7C92C000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B77D79000
heap
page read and write
21B7B5C7000
trusted library allocation
page read and write
21B8A2B1000
heap
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
21B77D5C000
heap
page read and write
21B79033000
trusted library allocation
page read and write
21B885D6000
trusted library allocation
page read and write
21B7C963000
trusted library allocation
page read and write
21B7ECB4000
trusted library allocation
page read and write
21B881EB000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B78A80000
trusted library allocation
page read and write
21B87B5D000
trusted library allocation
page read and write
2AEA6BB7000
trusted library allocation
page read and write
21B87B94000
trusted library allocation
page read and write
21B7C920000
trusted library allocation
page read and write
21B876EB000
trusted library allocation
page read and write
21B8817E000
trusted library allocation
page read and write
21B881F9000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B7C8D9000
trusted library allocation
page read and write
21B7B671000
trusted library allocation
page read and write
21B77D50000
heap
page read and write
21B79D7B000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B7B94E000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7CE25000
trusted library allocation
page read and write
21B7B9A2000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
21B7C961000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B77D41000
heap
page read and write
4131000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B79054000
trusted library allocation
page read and write
21B7C5C0000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7C8E8000
trusted library allocation
page read and write
21B883E9000
trusted library allocation
page read and write
21B7C2B8000
trusted library allocation
page read and write
21B7B67A000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7CEF5000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B882EF000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7ECAF000
trusted library allocation
page read and write
21B77D4C000
heap
page read and write
21B7B94B000
trusted library allocation
page read and write
1E6DD781000
trusted library allocation
page read and write
221F8C2F000
heap
page read and write
2AEA74E6000
heap
page read and write
21B77D93000
heap
page read and write
21B78BEB000
trusted library allocation
page read and write
21B77276000
trusted library allocation
page read and write
21B78A33000
trusted library allocation
page read and write
21B8818C000
trusted library allocation
page read and write
21B7B684000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
21B7C089000
trusted library allocation
page read and write
12CA0D824000
trusted library allocation
page read and write
21B77D33000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7B597000
trusted library allocation
page read and write
21B87640000
trusted library allocation
page read and write
21B875A7000
trusted library allocation
page read and write
21B7B897000
heap
page read and write
2AEA746C000
heap
page read and write
21B7CEDF000
trusted library allocation
page read and write
299EFF0E000
trusted library allocation
page read and write
21B7CE4F000
trusted library allocation
page read and write
21B78BF8000
trusted library allocation
page read and write
21B881B5000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
21B77D40000
heap
page read and write
21B77D41000
heap
page read and write
21B78B5C000
trusted library allocation
page read and write
21B793F7000
trusted library allocation
page read and write
21B7B595000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B883F1000
trusted library allocation
page read and write
21B8869F000
trusted library allocation
page read and write
21B7B5E0000
trusted library allocation
page read and write
21B7B885000
heap
page read and write
21B77D69000
heap
page read and write
21B7BC87000
trusted library allocation
page read and write
21B7ECC1000
trusted library allocation
page read and write
21B7926B000
trusted library allocation
page read and write
21B7C735000
trusted library allocation
page read and write
21B77D4B000
heap
page read and write
21B7C922000
trusted library allocation
page read and write
4131000
heap
page read and write
21B78CA2000
trusted library allocation
page read and write
21B7C8E8000
trusted library allocation
page read and write
21B896DF000
trusted library allocation
page read and write
21B78BEB000
trusted library allocation
page read and write
21B7C01B000
trusted library allocation
page read and write
21B7C1EB000
trusted library allocation
page read and write
21B7ECA2000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7C07B000
trusted library allocation
page read and write
21B77D65000
heap
page read and write
21B7B5BD000
trusted library allocation
page read and write
21B77CED000
trusted library allocation
page read and write
21B7937A000
trusted library allocation
page read and write
21B793C6000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B790F1000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B78BCC000
trusted library allocation
page read and write
21B78A99000
trusted library allocation
page read and write
21B789AB000
trusted library allocation
page read and write
21B7EDE4000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D93000
heap
page read and write
21B7BC46000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B7CEAC000
trusted library allocation
page read and write
2AC7D000000
trusted library allocation
page read and write
21B7B508000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7C735000
trusted library allocation
page read and write
21B7B87F000
heap
page read and write
21B77D93000
heap
page read and write
21B77D50000
heap
page read and write
21B7C6BF000
trusted library allocation
page read and write
21B7C8FD000
trusted library allocation
page read and write
21B7898B000
trusted library allocation
page read and write
21B7B5E4000
trusted library allocation
page read and write
21B7C0CE000
trusted library allocation
page read and write
21B87697000
trusted library allocation
page read and write
21B7C065000
trusted library allocation
page read and write
21B87EC2000
trusted library allocation
page read and write
21B7BFEF000
trusted library allocation
page read and write
2AEA70E3000
unkown
page execute read
21B89D9E000
trusted library allocation
page read and write
21B77D5C000
heap
page read and write
21B7B67A000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B79DD8000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B77D3B000
heap
page read and write
21B89AE1000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B88246000
trusted library allocation
page read and write
21B7BA61000
trusted library allocation
page read and write
21B77CE3000
trusted library allocation
page read and write
21B7C2C9000
trusted library allocation
page read and write
2AEA74E3000
heap
page read and write
21B77D4B000
heap
page read and write
21B7B9AD000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
21B7CE93000
trusted library allocation
page read and write
21B7D3B7000
trusted library allocation
page read and write
2AEA74ED000
heap
page read and write
21B87B2C000
trusted library allocation
page read and write
21B77A00000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7BCAD000
trusted library allocation
page read and write
21B7B59B000
trusted library allocation
page read and write
21B7BFC3000
trusted library allocation
page read and write
21B7C5A1000
trusted library allocation
page read and write
21B7B9EC000
trusted library allocation
page read and write
21B7B885000
heap
page read and write
21B7BA4C000
trusted library allocation
page read and write
4131000
heap
page read and write
21B89D54000
trusted library allocation
page read and write
21B7CEDF000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
2AEA7898000
heap
page read and write
21B790F4000
trusted library allocation
page read and write
21B7BCF5000
trusted library allocation
page read and write
21B7B506000
trusted library allocation
page read and write
21B7BC46000
trusted library allocation
page read and write
21B883C3000
trusted library allocation
page read and write
21B882AD000
trusted library allocation
page read and write
21B77975000
trusted library allocation
page read and write
21B7C77A000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77CCB000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B7C8D3000
trusted library allocation
page read and write
21B78A99000
trusted library allocation
page read and write
21B87630000
trusted library allocation
page read and write
21B793C6000
trusted library allocation
page read and write
1E6DD4B0000
heap
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B8829F000
trusted library allocation
page read and write
21B7C8E8000
trusted library allocation
page read and write
21B79373000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B9DF000
trusted library allocation
page read and write
21B77D5C000
heap
page read and write
21B77871000
trusted library allocation
page read and write
21B7D435000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B77D71000
heap
page read and write
21B77CC1000
trusted library allocation
page read and write
21B7939C000
trusted library allocation
page read and write
21B79A0B000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7CE3F000
trusted library allocation
page read and write
2AEA74AA000
heap
page read and write
21B88278000
trusted library allocation
page read and write
21B7926F000
trusted library allocation
page read and write
21B7B9A3000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B77D75000
heap
page read and write
21B882B6000
trusted library allocation
page read and write
4131000
heap
page read and write
21B885A5000
trusted library allocation
page read and write
21B77CE6000
trusted library allocation
page read and write
B5329D8000
stack
page read and write
21B87B2C000
trusted library allocation
page read and write
21B7C0A8000
trusted library allocation
page read and write
21B790FE000
trusted library allocation
page read and write
21B883B3000
trusted library allocation
page read and write
221F8C00000
heap
page read and write
21B77D35000
heap
page read and write
21B8A285000
heap
page read and write
21B88587000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B78AE8000
trusted library allocation
page read and write
21B78BDC000
trusted library allocation
page read and write
21B793D3000
trusted library allocation
page read and write
21B7CFEC000
trusted library allocation
page read and write
21B7D907000
trusted library allocation
page read and write
58CF000
stack
page read and write
21B77D70000
heap
page read and write
21B7CEF5000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7BF64000
trusted library allocation
page read and write
21B790F0000
trusted library allocation
page read and write
21B7CEF5000
trusted library allocation
page read and write
21B7C9BF000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
2AEA74E8000
heap
page read and write
21B790FB000
trusted library allocation
page read and write
21B7D528000
trusted library allocation
page read and write
299EFF81000
trusted library allocation
page read and write
21B7C6E6000
trusted library allocation
page read and write
4131000
heap
page read and write
712000
unkown
page readonly
21B77D24000
heap
page read and write
21B77D3A000
heap
page read and write
21B886A7000
trusted library allocation
page read and write
21B88207000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B87595000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B77D3A000
heap
page read and write
21B7B533000
trusted library allocation
page read and write
21B882CE000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B7B5B5000
trusted library allocation
page read and write
21B7937F000
trusted library allocation
page read and write
21B7C917000
trusted library allocation
page read and write
21B792C1000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
21B779CA000
trusted library allocation
page read and write
21B79D98000
trusted library allocation
page read and write
21B79B09000
trusted library allocation
page read and write
21B7B671000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
2AEA7897000
heap
page read and write
21B882E3000
trusted library allocation
page read and write
21B7B50E000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B883DF000
trusted library allocation
page read and write
2AEA7060000
trusted library section
page readonly
21B87EDD000
trusted library allocation
page read and write
21B7B87D000
heap
page read and write
2AEA748A000
heap
page read and write
21B882CE000
trusted library allocation
page read and write
21B87559000
trusted library allocation
page read and write
21B7C863000
trusted library allocation
page read and write
21B876EB000
trusted library allocation
page read and write
21B7C7FB000
trusted library allocation
page read and write
21B7C9AD000
trusted library allocation
page read and write
21B7C920000
trusted library allocation
page read and write
21B7C07E000
trusted library allocation
page read and write
F4CBCBE000
unkown
page readonly
21B87BF9000
trusted library allocation
page read and write
21B7C822000
trusted library allocation
page read and write
21B7D364000
trusted library allocation
page read and write
21B7B8C7000
heap
page read and write
21B7B5AD000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B793A9000
trusted library allocation
page read and write
21B79D6A000
trusted library allocation
page read and write
21B88699000
trusted library allocation
page read and write
21B883EE000
trusted library allocation
page read and write
21B7EC35000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
B69E5DD000
stack
page read and write
21B79216000
trusted library allocation
page read and write
21B7B9FC000
trusted library allocation
page read and write
2AEA6BC1000
trusted library allocation
page read and write
21B7B648000
trusted library allocation
page read and write
21B79300000
trusted library allocation
page read and write
21B7C054000
trusted library allocation
page read and write
21B77D4D000
heap
page read and write
1E6DD76E000
trusted library allocation
page read and write
21B7B5B0000
trusted library allocation
page read and write
21B7C6C8000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B890A8000
trusted library allocation
page read and write
21B8814E000
trusted library allocation
page read and write
21B7B8B8000
heap
page read and write
21B77D32000
heap
page read and write
21B7B5C9000
trusted library allocation
page read and write
4C4E000
stack
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B7B9C2000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B882A3000
trusted library allocation
page read and write
21B87B56000
trusted library allocation
page read and write
299EFBD0000
heap
page read and write
21B876FD000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B77D41000
heap
page read and write
21B77D55000
heap
page read and write
21B87B38000
trusted library allocation
page read and write
21B7BD6D000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B881E8000
trusted library allocation
page read and write
21B79350000
trusted library allocation
page read and write
2AEA7883000
heap
page read and write
21B7C6EB000
trusted library allocation
page read and write
21B88263000
trusted library allocation
page read and write
21B7D5E8000
trusted library allocation
page read and write
21B896DF000
trusted library allocation
page read and write
21B87B9E000
trusted library allocation
page read and write
21B7C93F000
trusted library allocation
page read and write
21B7D370000
trusted library allocation
page read and write
21B7B8F5000
heap
page read and write
21B77D3B000
heap
page read and write
21B885FE000
trusted library allocation
page read and write
21B78CE8000
trusted library allocation
page read and write
21B77CCB000
trusted library allocation
page read and write
21B7CEB4000
trusted library allocation
page read and write
21B7B87F000
heap
page read and write
21B7B895000
heap
page read and write
21B7BF67000
trusted library allocation
page read and write
21B79365000
trusted library allocation
page read and write
21B7D58D000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B7B9D9000
trusted library allocation
page read and write
21B79D7B000
trusted library allocation
page read and write
5D30000
heap
page read and write
21B876DC000
trusted library allocation
page read and write
21B7C8C0000
trusted library allocation
page read and write
21B77CC1000
trusted library allocation
page read and write
B531F9E000
unkown
page readonly
21B7D35F000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
4131000
heap
page read and write
1930000
heap
page read and write
21B790CD000
trusted library allocation
page read and write
21B7B64D000
trusted library allocation
page read and write
21B7C8C7000
trusted library allocation
page read and write
299EFD4F000
unclassified section
page read and write
21B882AD000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
299EFD40000
unclassified section
page read and write
B531EDD000
stack
page read and write
21B7F73A000
trusted library allocation
page read and write
21B7D38D000
trusted library allocation
page read and write
21B77D43000
heap
page read and write
2AEA70ED000
unkown
page execute read
21B7C961000
trusted library allocation
page read and write
F4C997E000
stack
page read and write
21B885C6000
trusted library allocation
page read and write
21B7C8E3000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B77D69000
heap
page read and write
21B78B8F000
trusted library allocation
page read and write
21B876DC000
trusted library allocation
page read and write
2AEA74ED000
heap
page read and write
21B7BA2B000
trusted library allocation
page read and write
21B89DA3000
trusted library allocation
page read and write
21B77CE6000
trusted library allocation
page read and write
21B882B6000
trusted library allocation
page read and write
21B77D53000
heap
page read and write
21B875D1000
trusted library allocation
page read and write
21B883DF000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7EDEB000
trusted library allocation
page read and write
21B7BDFE000
trusted library allocation
page read and write
21B7CE2B000
trusted library allocation
page read and write
21B876B3000
trusted library allocation
page read and write
21B7D3AD000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B77D35000
heap
page read and write
4131000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B7C9B3000
trusted library allocation
page read and write
21B779AB000
trusted library allocation
page read and write
21B87B15000
trusted library allocation
page read and write
21B7B9C2000
trusted library allocation
page read and write
21B7B9D9000
trusted library allocation
page read and write
21B7BA61000
trusted library allocation
page read and write
299EFD30000
heap
page readonly
21B7B897000
heap
page read and write
21B7C044000
trusted library allocation
page read and write
2AEA74E3000
heap
page read and write
2AEA6820000
heap
page read and write
21B77D4B000
heap
page read and write
B6A1A3E000
unkown
page readonly
21B8828A000
trusted library allocation
page read and write
21B778F6000
trusted library allocation
page read and write
21B7CECA000
trusted library allocation
page read and write
21B89AEA000
trusted library allocation
page read and write
21B7B67A000
trusted library allocation
page read and write
21B7C861000
trusted library allocation
page read and write
21B876F0000
trusted library allocation
page read and write
21B7EC9F000
trusted library allocation
page read and write
21B883CF000
trusted library allocation
page read and write
21B8A276000
heap
page read and write
21B7BDE0000
trusted library allocation
page read and write
299EFAC0000
unclassified section
page readonly
21B7ED30000
trusted library allocation
page read and write
21B7D4C7000
trusted library allocation
page read and write
21B77D40000
heap
page read and write
21B792ED000
trusted library allocation
page read and write
21B77CE3000
trusted library allocation
page read and write
21B7BC4B000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B77D5D000
heap
page read and write
21B77D63000
heap
page read and write
299EFD42000
unclassified section
page read and write
21B77D69000
heap
page read and write
21B77D75000
heap
page read and write
21B77D93000
heap
page read and write
2AEA7885000
heap
page read and write
21B77D46000
heap
page read and write
21B7B9F4000
trusted library allocation
page read and write
2AEA6B5F000
trusted library allocation
page read and write
21B7B8A3000
heap
page read and write
21B7BDE7000
trusted library allocation
page read and write
2AEA7885000
heap
page read and write
21B77D75000
heap
page read and write
21B7BF26000
trusted library allocation
page read and write
21B79051000
trusted library allocation
page read and write
1E6DD939000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7D5CB000
trusted library allocation
page read and write
21B7D3AD000
trusted library allocation
page read and write
21B7BF39000
trusted library allocation
page read and write
21B7D624000
trusted library allocation
page read and write
21B792B2000
trusted library allocation
page read and write
21B792FB000
trusted library allocation
page read and write
21B881F3000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B87B54000
trusted library allocation
page read and write
21B7CE4F000
trusted library allocation
page read and write
2AEA787B000
heap
page read and write
21B77C95000
trusted library allocation
page read and write
21B7B576000
trusted library allocation
page read and write
21B7B506000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B7CEE9000
trusted library allocation
page read and write
21B88513000
trusted library allocation
page read and write
21B886DB000
trusted library allocation
page read and write
21B896FC000
trusted library allocation
page read and write
480D000
stack
page read and write
21B77D4A000
heap
page read and write
21B78B8F000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
724000
unkown
page readonly
21B78B8F000
trusted library allocation
page read and write
21B87B0B000
trusted library allocation
page read and write
18F0000
heap
page read and write
21B77D3F000
heap
page read and write
21B79DC9000
trusted library allocation
page read and write
21B8825E000
trusted library allocation
page read and write
21B87BA8000
trusted library allocation
page read and write
21B7BF37000
trusted library allocation
page read and write
21B77D44000
heap
page read and write
21B7C0CD000
trusted library allocation
page read and write
21B793FD000
trusted library allocation
page read and write
2AC7CF70000
heap
page read and write
21B87B7D000
trusted library allocation
page read and write
2AEA6B03000
trusted library allocation
page read and write
21B7EDF3000
trusted library allocation
page read and write
21B77AF0000
trusted library allocation
page read and write
21B7D3B5000
trusted library allocation
page read and write
21B7D34A000
trusted library allocation
page read and write
21B7C1B8000
trusted library allocation
page read and write
21B7C933000
trusted library allocation
page read and write
2AEA7120000
heap
page read and write
21B7B8B8000
heap
page read and write
4131000
heap
page read and write
21B78C5E000
trusted library allocation
page read and write
21B87B66000
trusted library allocation
page read and write
21B7B55F000
trusted library allocation
page read and write
21B7C8D3000
trusted library allocation
page read and write
21B7CEE7000
trusted library allocation
page read and write
2AEA69D0000
heap
page readonly
21B7ECAF000
trusted library allocation
page read and write
F4CCCBE000
unkown
page readonly
21B7C2F9000
trusted library allocation
page read and write
21B7D3B7000
trusted library allocation
page read and write
21B774F5000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B7B9AC000
trusted library allocation
page read and write
2AEA74B9000
heap
page read and write
21B77D75000
heap
page read and write
B6A113E000
stack
page read and write
21B87546000
trusted library allocation
page read and write
21B7B8F5000
heap
page read and write
2AEA6B77000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
B531F5E000
stack
page read and write
21B7E2C5000
trusted library allocation
page read and write
21B793DC000
trusted library allocation
page read and write
21B886A4000
trusted library allocation
page read and write
21B77D56000
heap
page read and write
21B7CE1E000
trusted library allocation
page read and write
21B79284000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B77CC8000
trusted library allocation
page read and write
21B886DA000
trusted library allocation
page read and write
21B7ED42000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B7B69F000
trusted library allocation
page read and write
21B7C095000
trusted library allocation
page read and write
21B7C095000
trusted library allocation
page read and write
9084DFE000
stack
page read and write
21B87B79000
trusted library allocation
page read and write
21B789D8000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B87537000
trusted library allocation
page read and write
21B885D6000
trusted library allocation
page read and write
DA0EBFF000
stack
page read and write
21B78CE4000
trusted library allocation
page read and write
21B7C9D3000
trusted library allocation
page read and write
21B79C0A000
trusted library allocation
page read and write
21B876BE000
trusted library allocation
page read and write
2AEA74F2000
heap
page read and write
21B77D5C000
heap
page read and write
21B7C96D000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B78B89000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
1680000
heap
page read and write
21B77D48000
heap
page read and write
21B7B9BE000
trusted library allocation
page read and write
21B78B88000
trusted library allocation
page read and write
1E6DD919000
trusted library allocation
page read and write
21B7D34A000
trusted library allocation
page read and write
21B8A27F000
heap
page read and write
21B78CE4000
trusted library allocation
page read and write
21B7C1CC000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
4130000
heap
page read and write
21B78CF6000
trusted library allocation
page read and write
17C4000
heap
page read and write
21B77D35000
heap
page read and write
21B790F8000
trusted library allocation
page read and write
21B7B58F000
trusted library allocation
page read and write
21B793F3000
trusted library allocation
page read and write
21B886CB000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B87BAB000
trusted library allocation
page read and write
21B7B597000
trusted library allocation
page read and write
21B79238000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
21B77CD2000
trusted library allocation
page read and write
21B886C4000
trusted library allocation
page read and write
299EFF7B000
trusted library allocation
page read and write
21B89AFB000
trusted library allocation
page read and write
21B7BFC3000
trusted library allocation
page read and write
21B8A321000
heap
page read and write
21B7CE10000
trusted library allocation
page read and write
DA0E3FF000
stack
page read and write
21B876D4000
trusted library allocation
page read and write
21B7CE3A000
trusted library allocation
page read and write
21B77AA3000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B7921B000
trusted library allocation
page read and write
21B7CFA7000
trusted library allocation
page read and write
21B78AD9000
trusted library allocation
page read and write
21B78AE8000
trusted library allocation
page read and write
21B7C1EB000
trusted library allocation
page read and write
21B7CEEF000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7CED3000
trusted library allocation
page read and write
21B792A8000
trusted library allocation
page read and write
1E6DD7B5000
trusted library allocation
page read and write
21B7920D000
trusted library allocation
page read and write
299F0107000
trusted library allocation
page read and write
21B7B5AE000
trusted library allocation
page read and write
21B7ECCC000
trusted library allocation
page read and write
21B7B9CB000
trusted library allocation
page read and write
21B7BFC3000
trusted library allocation
page read and write
21B7B9C2000
trusted library allocation
page read and write
21B79DEE000
trusted library allocation
page read and write
21B7B66C000
trusted library allocation
page read and write
2AEA70D0000
trusted library allocation
page read and write
4131000
heap
page read and write
21B8758B000
trusted library allocation
page read and write
21B7C6AB000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B7B58A000
trusted library allocation
page read and write
21B876C5000
trusted library allocation
page read and write
21B7B66C000
trusted library allocation
page read and write
21B7B877000
heap
page read and write
21B77D3A000
heap
page read and write
18F8000
heap
page read and write
21B7BD14000
trusted library allocation
page read and write
1E6DD712000
trusted library allocation
page read and write
21B7B9DF000
trusted library allocation
page read and write
21B7CEFC000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
21B79269000
trusted library allocation
page read and write
21B7B895000
heap
page read and write
21B790FB000
trusted library allocation
page read and write
21B886C7000
trusted library allocation
page read and write
21B883EE000
trusted library allocation
page read and write
21B7C762000
trusted library allocation
page read and write
90845FE000
stack
page read and write
21B79DF9000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B883EC000
trusted library allocation
page read and write
299EFF03000
trusted library allocation
page read and write
21B7B87D000
heap
page read and write
21B7B662000
trusted library allocation
page read and write
21B7B9D7000
trusted library allocation
page read and write
21B7B5D4000
trusted library allocation
page read and write
21B7B9EA000
trusted library allocation
page read and write
21B88250000
trusted library allocation
page read and write
2AEA7860000
heap
page read and write
21B77EBA000
trusted library allocation
page read and write
21B882E3000
trusted library allocation
page read and write
21B87B74000
trusted library allocation
page read and write
21B7D4CC000
trusted library allocation
page read and write
21B77CE9000
trusted library allocation
page read and write
21B77C95000
trusted library allocation
page read and write
2AEA7460000
heap
page read and write
21B79DD6000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B77D69000
heap
page read and write
4131000
heap
page read and write
21B77D93000
heap
page read and write
2AEA748A000
heap
page read and write
21B7C3D7000
trusted library allocation
page read and write
21B7B50E000
trusted library allocation
page read and write
21B7B9CA000
trusted library allocation
page read and write
21B87541000
trusted library allocation
page read and write
21B793A9000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B7CEB0000
trusted library allocation
page read and write
21B8828A000
trusted library allocation
page read and write
21B78A34000
trusted library allocation
page read and write
2AEA7897000
heap
page read and write
21B77D5D000
heap
page read and write
21B77D32000
heap
page read and write
21B77D32000
heap
page read and write
21B87B66000
trusted library allocation
page read and write
21B7B9EA000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D46000
heap
page read and write
21B7C6EB000
trusted library allocation
page read and write
21B78C71000
trusted library allocation
page read and write
21B7F73F000
trusted library allocation
page read and write
1922000
heap
page read and write
221F8F07000
trusted library allocation
page read and write
21B7ECF5000
trusted library allocation
page read and write
162F000
stack
page read and write
21B7B9D7000
trusted library allocation
page read and write
21B7B5B3000
trusted library allocation
page read and write
21B7CE88000
trusted library allocation
page read and write
21B78970000
trusted library allocation
page read and write
21B772EF000
trusted library allocation
page read and write
21B876B6000
trusted library allocation
page read and write
21B7EC93000
trusted library allocation
page read and write
21B8826A000
trusted library allocation
page read and write
21B881ED000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B77D69000
heap
page read and write
2AEA7881000
heap
page read and write
21B7B9F0000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B9C2000
trusted library allocation
page read and write
21B7BC6A000
trusted library allocation
page read and write
4131000
heap
page read and write
21B886C9000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B7C062000
trusted library allocation
page read and write
21B77CC4000
trusted library allocation
page read and write
21B7B895000
heap
page read and write
21B78C62000
trusted library allocation
page read and write
21B7C3D1000
trusted library allocation
page read and write
21B77D30000
heap
page read and write
2AEA74ED000
heap
page read and write
21B793A9000
trusted library allocation
page read and write
21B7D35F000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B7BF67000
trusted library allocation
page read and write
299EFBB0000
heap
page read and write
21B790F5000
trusted library allocation
page read and write
21B78C5F000
trusted library allocation
page read and write
21B88250000
trusted library allocation
page read and write
21B7C3F7000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B88173000
trusted library allocation
page read and write
21B7B67A000
trusted library allocation
page read and write
21B7C089000
trusted library allocation
page read and write
21B7C083000
trusted library allocation
page read and write
21B792D7000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
2AEA6B48000
trusted library allocation
page read and write
21B7B59B000
trusted library allocation
page read and write
21B7BF37000
trusted library allocation
page read and write
2AEA7464000
heap
page read and write
21B7D364000
trusted library allocation
page read and write
21B7CEB4000
trusted library allocation
page read and write
21B79373000
trusted library allocation
page read and write
21B7C58E000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
F4CD4BE000
stack
page read and write
21B77D58000
heap
page read and write
21B7B9EC000
trusted library allocation
page read and write
2AEA7460000
heap
page read and write
21B77D2F000
heap
page read and write
21B77D59000
heap
page read and write
21B7B958000
trusted library allocation
page read and write
21B7ED3A000
trusted library allocation
page read and write
21B876F2000
trusted library allocation
page read and write
21B7B67C000
trusted library allocation
page read and write
21B792F1000
trusted library allocation
page read and write
2AEA74F1000
heap
page read and write
2AEA7899000
heap
page read and write
4131000
heap
page read and write
4131000
heap
page read and write
21B78B89000
trusted library allocation
page read and write
21B7EC16000
trusted library allocation
page read and write
21B77D4E000
heap
page read and write
21B7C059000
trusted library allocation
page read and write
21B883E9000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B89D27000
trusted library allocation
page read and write
21B882C0000
trusted library allocation
page read and write
2AEA69F0000
unclassified section
page read and write
21B881ED000
trusted library allocation
page read and write
21B772EF000
trusted library allocation
page read and write
21B7C09E000
trusted library allocation
page read and write
21B792B2000
trusted library allocation
page read and write
21B7BC55000
trusted library allocation
page read and write
21B7C0ED000
trusted library allocation
page read and write
299EFFE2000
trusted library allocation
page read and write
21B87BF2000
trusted library allocation
page read and write
21B7BCA2000
trusted library allocation
page read and write
21B7B87B000
heap
page read and write
21B7B8F5000
heap
page read and write
1E6DD900000
trusted library allocation
page read and write
21B7CEE7000
trusted library allocation
page read and write
21B78B89000
trusted library allocation
page read and write
21B7EDC5000
trusted library allocation
page read and write
21B7D34A000
trusted library allocation
page read and write
21B77D56000
heap
page read and write
21B773A6000
trusted library allocation
page read and write
21B7C650000
trusted library allocation
page read and write
21B78AE4000
trusted library allocation
page read and write
21B881A7000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7EC1F000
trusted library allocation
page read and write
21B7C9A8000
trusted library allocation
page read and write
1930000
heap
page read and write
21B7C0AD000
trusted library allocation
page read and write
21B7CED3000
trusted library allocation
page read and write
21B8828C000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B87B74000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B883DB000
trusted library allocation
page read and write
21B7C99B000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B77D69000
heap
page read and write
4131000
heap
page read and write
21B7CFA4000
trusted library allocation
page read and write
21B7936C000
trusted library allocation
page read and write
21B77D2B000
heap
page read and write
21B77AE9000
trusted library allocation
page read and write
21B77D6F000
heap
page read and write
21B772F8000
trusted library allocation
page read and write
21B87B64000
trusted library allocation
page read and write
21B883DF000
trusted library allocation
page read and write
21B7C915000
trusted library allocation
page read and write
21B87595000
trusted library allocation
page read and write
21B78C99000
trusted library allocation
page read and write
21B882A6000
trusted library allocation
page read and write
21B789B9000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B792F1000
trusted library allocation
page read and write
21B7D2F3000
trusted library allocation
page read and write
21B7C060000
trusted library allocation
page read and write
21B789B9000
trusted library allocation
page read and write
21B7ECF0000
trusted library allocation
page read and write
21B7B677000
trusted library allocation
page read and write
2AEA747F000
heap
page read and write
21B7CECA000
trusted library allocation
page read and write
2AEA74E9000
heap
page read and write
21B7EC7A000
trusted library allocation
page read and write
21B7B895000
heap
page read and write
21B77D2F000
heap
page read and write
4131000
heap
page read and write
21B7926F000
trusted library allocation
page read and write
21B7B95E000
trusted library allocation
page read and write
21B883EE000
trusted library allocation
page read and write
299EFF73000
trusted library allocation
page read and write
4131000
heap
page read and write
B6A3A3E000
unkown
page readonly
21B7C963000
trusted library allocation
page read and write
21B78A90000
trusted library allocation
page read and write
21B7B8F5000
heap
page read and write
21B79DEE000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B77298000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7ECC4000
trusted library allocation
page read and write
21B881CA000
trusted library allocation
page read and write
2AEA74E0000
heap
page read and write
21B8A2AA000
heap
page read and write
21B77D41000
heap
page read and write
21B7C7B9000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7CE1A000
trusted library allocation
page read and write
21B87BAB000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B7C917000
trusted library allocation
page read and write
21B88246000
trusted library allocation
page read and write
21B876BE000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
4131000
heap
page read and write
21B7BA09000
trusted library allocation
page read and write
21B7B9C4000
trusted library allocation
page read and write
21B7C933000
trusted library allocation
page read and write
21B78B43000
trusted library allocation
page read and write
1924000
heap
page read and write
21B7ED44000
trusted library allocation
page read and write
21B7899C000
trusted library allocation
page read and write
21B7C6F1000
trusted library allocation
page read and write
2AEA7864000
heap
page read and write
21B882FB000
trusted library allocation
page read and write
21B881BF000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B79D52000
trusted library allocation
page read and write
21B7CE97000
trusted library allocation
page read and write
21B87695000
trusted library allocation
page read and write
21B7B888000
heap
page read and write
21B77D32000
heap
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B79DC6000
trusted library allocation
page read and write
21B79269000
trusted library allocation
page read and write
21B7B5F4000
trusted library allocation
page read and write
21B790F0000
trusted library allocation
page read and write
21B7D437000
trusted library allocation
page read and write
21B87693000
trusted library allocation
page read and write
21B78920000
trusted library allocation
page read and write
21B87B62000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B779A3000
trusted library allocation
page read and write
21B7B5C7000
trusted library allocation
page read and write
21B7B69F000
trusted library allocation
page read and write
21B790F8000
trusted library allocation
page read and write
21B8A321000
heap
page read and write
21B78BCD000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
71C000
unkown
page read and write
21B77D2B000
heap
page read and write
21B7CE8A000
trusted library allocation
page read and write
21B7D3D3000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B7D3A9000
trusted library allocation
page read and write
21B88296000
trusted library allocation
page read and write
21B7C8FA000
trusted library allocation
page read and write
21B77D2A000
heap
page read and write
21B7B66C000
trusted library allocation
page read and write
21B7C095000
trusted library allocation
page read and write
21B77D59000
heap
page read and write
21B7CEE7000
trusted library allocation
page read and write
21B7B5B0000
trusted library allocation
page read and write
21B78BFD000
trusted library allocation
page read and write
21B8757B000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B77D79000
heap
page read and write
21B77D4B000
heap
page read and write
21B7B65B000
trusted library allocation
page read and write
21B8759A000
trusted library allocation
page read and write
160E000
stack
page read and write
21B7CEFC000
trusted library allocation
page read and write
21B77913000
trusted library allocation
page read and write
1E6DD75B000
trusted library allocation
page read and write
21B8829F000
trusted library allocation
page read and write
299EFB50000
heap
page read and write
4C0E000
stack
page read and write
21B77D29000
heap
page read and write
21B7937F000
trusted library allocation
page read and write
21B7B954000
trusted library allocation
page read and write
21B7C81B000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
4131000
heap
page read and write
21B77D62000
heap
page read and write
21B882A6000
trusted library allocation
page read and write
21B7CEF5000
trusted library allocation
page read and write
21B882A3000
trusted library allocation
page read and write
21B7C865000
trusted library allocation
page read and write
21B882C0000
trusted library allocation
page read and write
21B78920000
trusted library allocation
page read and write
1E6DD830000
heap
page readonly
21B77D79000
heap
page read and write
21B7C3EE000
trusted library allocation
page read and write
21B7BC60000
trusted library allocation
page read and write
21B792B2000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B8868B000
trusted library allocation
page read and write
21B7C8D9000
trusted library allocation
page read and write
299EFC26000
heap
page read and write
2AEA7469000
heap
page read and write
21B774F3000
trusted library allocation
page read and write
21B78C99000
trusted library allocation
page read and write
21B793CD000
trusted library allocation
page read and write
B6A093E000
unkown
page readonly
21B77CC4000
trusted library allocation
page read and write
21B7B9DC000
trusted library allocation
page read and write
21B77926000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B875F8000
trusted library allocation
page read and write
21B8753D000
trusted library allocation
page read and write
21B8851B000
trusted library allocation
page read and write
21B793DD000
trusted library allocation
page read and write
19486B04F000
trusted library allocation
page read and write
21B7CEF5000
trusted library allocation
page read and write
21B7BC6D000
trusted library allocation
page read and write
21B875A7000
trusted library allocation
page read and write
21B7C8C0000
trusted library allocation
page read and write
21B7C9DE000
trusted library allocation
page read and write
4131000
heap
page read and write
B6A07FE000
unkown
page readonly
21B7D2C3000
trusted library allocation
page read and write
21B7E2F4000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7C0C6000
trusted library allocation
page read and write
1922000
heap
page read and write
21B8759E000
trusted library allocation
page read and write
21B87B71000
trusted library allocation
page read and write
21B7C3C3000
trusted library allocation
page read and write
21B793F7000
trusted library allocation
page read and write
21B8759A000
trusted library allocation
page read and write
21B7C9F0000
trusted library allocation
page read and write
2AEA7299000
unkown
page execute read
21B7BC5D000
trusted library allocation
page read and write
21B7B9EC000
trusted library allocation
page read and write
21B882C3000
trusted library allocation
page read and write
21B78C6B000
trusted library allocation
page read and write
21B88290000
trusted library allocation
page read and write
21B77D40000
heap
page read and write
21B7C09B000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B77D58000
heap
page read and write
21B77D32000
heap
page read and write
21B8762D000
trusted library allocation
page read and write
21B79063000
trusted library allocation
page read and write
21B883E1000
trusted library allocation
page read and write
21B772BF000
trusted library allocation
page read and write
21B7C3F0000
trusted library allocation
page read and write
21B7CFAB000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7C991000
trusted library allocation
page read and write
21B77D44000
heap
page read and write
21B7B9FE000
trusted library allocation
page read and write
21B7B8B8000
heap
page read and write
21B7D370000
trusted library allocation
page read and write
21B77257000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B7905B000
trusted library allocation
page read and write
21B7736C000
trusted library allocation
page read and write
21B7CFD6000
trusted library allocation
page read and write
21B7C8D1000
trusted library allocation
page read and write
21B78BC7000
trusted library allocation
page read and write
12CA0D81E000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7BA3A000
trusted library allocation
page read and write
21B78BA0000
trusted library allocation
page read and write
21B7C7A0000
trusted library allocation
page read and write
21B7B58F000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B78C7A000
trusted library allocation
page read and write
21B7B897000
heap
page read and write
21B7B67A000
trusted library allocation
page read and write
21B876ED000
trusted library allocation
page read and write
21B7C2B3000
trusted library allocation
page read and write
21B7B888000
heap
page read and write
21B7CE1A000
trusted library allocation
page read and write
21B7B9FC000
trusted library allocation
page read and write
2AEA69F2000
unclassified section
page read and write
21B7BC6D000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7C3C3000
trusted library allocation
page read and write
21B78BB8000
trusted library allocation
page read and write
B6A083E000
unkown
page readonly
21B7C623000
trusted library allocation
page read and write
21B79D6F000
trusted library allocation
page read and write
21B77D34000
heap
page read and write
21B77AFE000
trusted library allocation
page read and write
21B883F1000
trusted library allocation
page read and write
21B79269000
trusted library allocation
page read and write
21B7CF5E000
trusted library allocation
page read and write
21B8759C000
trusted library allocation
page read and write
21B8769E000
trusted library allocation
page read and write
21B77D59000
heap
page read and write
21B77D69000
heap
page read and write
21B7B97D000
trusted library allocation
page read and write
21B793C6000
trusted library allocation
page read and write
21B7C8D3000
trusted library allocation
page read and write
21B78AE8000
trusted library allocation
page read and write
1E6DD767000
trusted library allocation
page read and write
21B875A7000
trusted library allocation
page read and write
21B875CA000
trusted library allocation
page read and write
1E6DD870000
unclassified section
page readonly
21B7C8D9000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B774F8000
trusted library allocation
page read and write
21B876E2000
trusted library allocation
page read and write
21B7B9F4000
trusted library allocation
page read and write
21B87B5D000
trusted library allocation
page read and write
21B7B595000
trusted library allocation
page read and write
21B77D63000
heap
page read and write
21B77D41000
heap
page read and write
21B876DA000
trusted library allocation
page read and write
21B7C2BA000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B772A1000
trusted library allocation
page read and write
21B876F0000
trusted library allocation
page read and write
21B77D42000
heap
page read and write
21B882AD000
trusted library allocation
page read and write
21B8853B000
trusted library allocation
page read and write
21B7CE34000
trusted library allocation
page read and write
299EFFF4000
trusted library allocation
page read and write
4131000
heap
page read and write
21B89002000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7B897000
heap
page read and write
21B792C1000
trusted library allocation
page read and write
4131000
heap
page read and write
21B87BE8000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B7C91D000
trusted library allocation
page read and write
21B876FA000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7D3C4000
trusted library allocation
page read and write
1E6DD760000
trusted library allocation
page read and write
21B77CD2000
trusted library allocation
page read and write
21B7B641000
trusted library allocation
page read and write
21B89AF3000
trusted library allocation
page read and write
21B77CE9000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7CF99000
trusted library allocation
page read and write
4131000
heap
page read and write
21B79DDC000
trusted library allocation
page read and write
21B7F7B4000
trusted library allocation
page read and write
21B883C3000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7C084000
trusted library allocation
page read and write
21B78AE4000
trusted library allocation
page read and write
2AEA74ED000
heap
page read and write
21B87640000
trusted library allocation
page read and write
21B7BC5D000
trusted library allocation
page read and write
21B7CE82000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B87637000
trusted library allocation
page read and write
21B79D6F000
trusted library allocation
page read and write
4131000
heap
page read and write
21B7C8E2000
trusted library allocation
page read and write
21B7B8A4000
heap
page read and write
221F8EB0000
heap
page read and write
21B7CE2F000
trusted library allocation
page read and write
21B883E1000
trusted library allocation
page read and write
194F000
heap
page read and write
4131000
heap
page read and write
299EFF6B000
trusted library allocation
page read and write
21B87B71000
trusted library allocation
page read and write
21B7B5B6000
trusted library allocation
page read and write
21B8816E000
trusted library allocation
page read and write
21B7B9AF000
trusted library allocation
page read and write
21B7C6BB000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B79DF9000
trusted library allocation
page read and write
21B79DF6000
trusted library allocation
page read and write
21B883EE000
trusted library allocation
page read and write
21B7CF35000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B7B5A3000
trusted library allocation
page read and write
221FA7AA000
heap
page read and write
21B7E2C7000
trusted library allocation
page read and write
23AB55203000
trusted library allocation
page read and write
21B77D43000
heap
page read and write
21B7EC93000
trusted library allocation
page read and write
21B7D3A9000
trusted library allocation
page read and write
21B7BC5E000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
4131000
heap
page read and write
21B7D427000
trusted library allocation
page read and write
21B883CF000
trusted library allocation
page read and write
21B7CF85000
trusted library allocation
page read and write
21B77D4A000
heap
page read and write
2AEA6B12000
trusted library allocation
page read and write
21B7C867000
trusted library allocation
page read and write
21B886C4000
trusted library allocation
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
21B793C6000
trusted library allocation
page read and write
21B882CE000
trusted library allocation
page read and write
21B78BFD000
trusted library allocation
page read and write
21B8753F000
trusted library allocation
page read and write
21B7CEF7000
trusted library allocation
page read and write
21B77D3A000
heap
page read and write
21B77CAD000
trusted library allocation
page read and write
21B7B508000
trusted library allocation
page read and write
21B77D45000
heap
page read and write
21B7B97B000
trusted library allocation
page read and write
2AEA67F8000
remote allocation
page execute read
21B7DF00000
trusted library allocation
page read and write
21B78AB4000
trusted library allocation
page read and write
21B77D79000
heap
page read and write
21B7C2BA000
trusted library allocation
page read and write
21B79D98000
trusted library allocation
page read and write
F4CB3FE000
stack
page read and write
21B881D4000
trusted library allocation
page read and write
21B882E2000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7C73B000
trusted library allocation
page read and write
21B79D89000
trusted library allocation
page read and write
21B7926B000
trusted library allocation
page read and write
21B7D345000
trusted library allocation
page read and write
21B7B9EA000
trusted library allocation
page read and write
21B7B5C6000
trusted library allocation
page read and write
1E6DD747000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D2D000
heap
page read and write
21B883A3000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B77D2B000
heap
page read and write
21B886C0000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B88543000
trusted library allocation
page read and write
21B78B94000
trusted library allocation
page read and write
21B7B89A000
heap
page read and write
21B79089000
trusted library allocation
page read and write
21B7EC55000
trusted library allocation
page read and write
21B7B5F9000
trusted library allocation
page read and write
21B7C8E8000
trusted library allocation
page read and write
21B7C614000
trusted library allocation
page read and write
21B77D32000
heap
page read and write
21B7BFC3000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B8828A000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B7CEAC000
trusted library allocation
page read and write
21B875D1000
trusted library allocation
page read and write
21B7B985000
trusted library allocation
page read and write
21B7ECB4000
trusted library allocation
page read and write
21B77D59000
heap
page read and write
21B77D5C000
heap
page read and write
21B7D427000
trusted library allocation
page read and write
21B885A7000
trusted library allocation
page read and write
4131000
heap
page read and write
4131000
heap
page read and write
1922000
heap
page read and write
21B77D2D000
heap
page read and write
21B77C8F000
trusted library allocation
page read and write
2AEA74B2000
heap
page read and write
21B881A7000
trusted library allocation
page read and write
2AEA7869000
heap
page read and write
21B77D3A000
heap
page read and write
21B77D32000
heap
page read and write
21B7C9BA000
trusted library allocation
page read and write
21B77D39000
heap
page read and write
21B875E9000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B77D69000
heap
page read and write
21B88296000
trusted library allocation
page read and write
21B882EF000
trusted library allocation
page read and write
4131000
heap
page read and write
21B8758B000
trusted library allocation
page read and write
21B886DA000
trusted library allocation
page read and write
21B7C8C0000
trusted library allocation
page read and write
21B7B680000
trusted library allocation
page read and write
21B774B5000
trusted library allocation
page read and write
21B886FA000
trusted library allocation
page read and write
21B7C2FB000
trusted library allocation
page read and write
617D000
stack
page read and write
21B7C78F000
trusted library allocation
page read and write
2AEA745F000
heap
page read and write
17C4000
heap
page read and write
21B7CF7F000
trusted library allocation
page read and write
2AEA7860000
heap
page read and write
21B77D5D000
heap
page read and write
1E6DD765000
trusted library allocation
page read and write
B531F1E000
unkown
page readonly
21B7B9BC000
trusted library allocation
page read and write
21B8A241000
heap
page read and write
21B77D69000
heap
page read and write
21B882E2000
trusted library allocation
page read and write
B535A3E000
stack
page read and write
21B7B9F0000
trusted library allocation
page read and write
21B7C8C0000
trusted library allocation
page read and write
21B7B895000
heap
page read and write
21B77D35000
heap
page read and write
21B7CE88000
trusted library allocation
page read and write
21B7D58D000
trusted library allocation
page read and write
21B793EC000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B79386000
trusted library allocation
page read and write
21B7C8D3000
trusted library allocation
page read and write
21B7B897000
heap
page read and write
21B793C6000
trusted library allocation
page read and write
21B792A3000
trusted library allocation
page read and write
2AEA6910000
heap
page read and write
21B7B508000
trusted library allocation
page read and write
21B87B6A000
trusted library allocation
page read and write
21B7CEC2000
trusted library allocation
page read and write
21B7C687000
trusted library allocation
page read and write
21B7BF26000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B77D35000
heap
page read and write
21B87B1A000
trusted library allocation
page read and write
21B87563000
trusted library allocation
page read and write
4131000
heap
page read and write
21B77D45000
heap
page read and write
21B7C3F4000
trusted library allocation
page read and write
21B77D2D000
heap
page read and write
21B8758F000
trusted library allocation
page read and write
21B87E2A000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B77D79000
heap
page read and write
21B7BA4C000
trusted library allocation
page read and write
21B7C089000
trusted library allocation
page read and write
21B78AA1000
trusted library allocation
page read and write
21B7C095000
trusted library allocation
page read and write
2AEA70A0000
trusted library allocation
page read and write
21B7BDDC000
trusted library allocation
page read and write
21B7E27E000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
1E6DD772000
trusted library allocation
page read and write
1E6DD840000
unclassified section
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
4131000
heap
page read and write
20EE000
stack
page read and write
21B793A9000
trusted library allocation
page read and write
21B882C3000
trusted library allocation
page read and write
21B7B9BE000
trusted library allocation
page read and write
21B7B95D000
trusted library allocation
page read and write
21B876DA000
trusted library allocation
page read and write
21B792E1000
trusted library allocation
page read and write
21B77CE6000
trusted library allocation
page read and write
21B7CF57000
trusted library allocation
page read and write
21B7C0AA000
trusted library allocation
page read and write
21B7ED26000
trusted library allocation
page read and write
21B77CC4000
trusted library allocation
page read and write
21B793C6000
trusted library allocation
page read and write
21B7C8E2000
trusted library allocation
page read and write
21B7BC4B000
trusted library allocation
page read and write
21B7D5A4000
trusted library allocation
page read and write
21B77D5D000
heap
page read and write
21B882C0000
trusted library allocation
page read and write
21B7D364000
trusted library allocation
page read and write
21B77D93000
heap
page read and write
21B7B63E000
trusted library allocation
page read and write
21B876FA000
trusted library allocation
page read and write
21B7C062000
trusted library allocation
page read and write
21B8829F000
trusted library allocation
page read and write
4131000
heap
page read and write
650000
unkown
page readonly
21B882EF000
trusted library allocation
page read and write
21B7EC93000
trusted library allocation
page read and write
2AC7CEC0000
heap
page read and write
21B77D93000
heap
page read and write
21B882E5000
trusted library allocation
page read and write
21B87597000
trusted library allocation
page read and write
221F8C50000
heap
page read and write
21B79395000
trusted library allocation
page read and write
21B885D6000
trusted library allocation
page read and write
21B7939C000
trusted library allocation
page read and write
21B7BD86000
trusted library allocation
page read and write
2AEA74F1000
heap
page read and write
21B792A8000
trusted library allocation
page read and write
21B7B58A000
trusted library allocation
page read and write
21B7B570000
trusted library allocation
page read and write
21B79DB5000
trusted library allocation
page read and write
21B7BC4B000
trusted library allocation
page read and write
21B8858F000
trusted library allocation
page read and write
21B7BC4B000
trusted library allocation
page read and write
21B77D51000
heap
page read and write
2AEA6B62000
trusted library allocation
page read and write
123A000
stack
page read and write
21B7ED48000
trusted library allocation
page read and write
21B77D69000
heap
page read and write
21B77D93000
heap
page read and write
21B87BB9000
trusted library allocation
page read and write
21B7B885000
heap
page read and write
21B79245000
trusted library allocation
page read and write
21B7EC78000
trusted library allocation
page read and write
21B87B54000
trusted library allocation
page read and write
21B79DB5000
trusted library allocation
page read and write
21B792FB000
trusted library allocation
page read and write
21B7B682000
trusted library allocation
page read and write
21B77D34000
heap
page read and write
21B7F300000
trusted library allocation
page read and write
21B7C8FA000
trusted library allocation
page read and write
21B7D4C7000
trusted library allocation
page read and write
299EFB30000
remote allocation
page read and write
21B7CEE9000
trusted library allocation
page read and write
21B78BC7000
trusted library allocation
page read and write
21B876BE000
trusted library allocation
page read and write
21B77CE9000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
21B77CC1000
trusted library allocation
page read and write
21B876D4000
trusted library allocation
page read and write
2AEA74ED000
heap
page read and write
21B7C8D9000
trusted library allocation
page read and write
21B7CF8C000
trusted library allocation
page read and write
21B77D59000
heap
page read and write
21B77D2F000
heap
page read and write
21B78BB8000
trusted library allocation
page read and write
21B77D34000
heap
page read and write
21B77D69000
heap
page read and write
21B7729E000
trusted library allocation
page read and write
B5339FE000
stack
page read and write
4131000
heap
page read and write
21B883D3000
trusted library allocation
page read and write
21B7EC3E000
trusted library allocation
page read and write
21B882D1000
trusted library allocation
page read and write
21B7B985000
trusted library allocation
page read and write
21B7ED3E000
trusted library allocation
page read and write
21B7D34F000
trusted library allocation
page read and write
2AEA74ED000
heap
page read and write
21B77D2B000
heap
page read and write
21B7B50B000
trusted library allocation
page read and write
21B77D75000
heap
page read and write
221F8C21000
heap
page read and write
21B773B5000
trusted library allocation
page read and write
21B7B533000
trusted library allocation
page read and write
21B77D35000
heap
page read and write
2AEA6970000
heap
page read and write
21B7B97F000
trusted library allocation
page read and write
21B7CED3000
trusted library allocation
page read and write
21B7B6C8000
trusted library allocation
page read and write
21B7C1B9000
trusted library allocation
page read and write
21B7B954000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B7B660000
trusted library allocation
page read and write
21B77D6C000
heap
page read and write
21B7D34A000
trusted library allocation
page read and write
21B7BA0A000
trusted library allocation
page read and write
21B7C6E6000
trusted library allocation
page read and write
21B7B8F5000
heap
page read and write
21B87BB9000
trusted library allocation
page read and write
21B87B54000
trusted library allocation
page read and write
21B78BE8000
trusted library allocation
page read and write
21B7C095000
trusted library allocation
page read and write
21B793E4000
trusted library allocation
page read and write
21B7ECA7000
trusted library allocation
page read and write
1E6DD456000
remote allocation
page execute read
21B7B580000
trusted library allocation
page read and write
21B7D378000
trusted library allocation
page read and write
21B7B5BD000
trusted library allocation
page read and write
21B77D46000
heap
page read and write
21B77D58000
heap
page read and write
21B77D3A000
heap
page read and write
21B7C095000
trusted library allocation
page read and write
21B790FB000
trusted library allocation
page read and write
21B774FE000
trusted library allocation
page read and write
21B87B5A000
trusted library allocation
page read and write
21B78946000
trusted library allocation
page read and write
21B87B5D000
trusted library allocation
page read and write
21B7C5CF000
trusted library allocation
page read and write
21B7937F000
trusted library allocation
page read and write
21B7D34A000
trusted library allocation
page read and write
21B7B5EB000
trusted library allocation
page read and write
21B7D4C7000
trusted library allocation
page read and write
2AEA745F000
heap
page read and write
21B7BC5E000
trusted library allocation
page read and write
B53523E000
unkown
page readonly
21B7C3FE000
trusted library allocation
page read and write
21B7936C000
trusted library allocation
page read and write
21B7B5BD000
trusted library allocation
page read and write
21B7C55C000
trusted library allocation
page read and write
1E6DD72E000
trusted library allocation
page read and write
21B7B9D7000
trusted library allocation
page read and write
21B77387000
trusted library allocation
page read and write
21B79059000
trusted library allocation
page read and write
21B77D41000
heap
page read and write
21B7BC5D000
trusted library allocation
page read and write
21B7D38D000
trusted library allocation
page read and write
21B790F8000
trusted library allocation
page read and write
21B876D4000
trusted library allocation
page read and write
21B7C915000
trusted library allocation
page read and write
21B7BA31000
trusted library allocation
page read and write
21B77CC8000
trusted library allocation
page read and write
21B883BC000
trusted library allocation
page read and write
21B7B86C000
heap
page read and write
21B7BC78000
trusted library allocation
page read and write
21B77D2F000
heap
page read and write
21B7939D000
trusted library allocation
page read and write
21B7C6BF000
trusted library allocation
page read and write
21B77D50000
heap
page read and write
21B7D4FA000
trusted library allocation
page read and write
4131000
heap
page read and write
21B883EE000
trusted library allocation
page read and write
21B87BE9000
trusted library allocation
page read and write
21B7BC5D000
trusted library allocation
page read and write
21B7C063000
trusted library allocation
page read and write
21B77CF0000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B77CCB000
trusted library allocation
page read and write
21B7D3B7000
trusted library allocation
page read and write
21B77D3B000
heap
page read and write
21B7B8A4000
heap
page read and write
4131000
heap
page read and write
21B77D3B000
heap
page read and write
21B7BA3A000
trusted library allocation
page read and write
21B87649000
trusted library allocation
page read and write
21B77D54000
heap
page read and write
21B7939C000
trusted library allocation
page read and write
21B7B67A000
trusted library allocation
page read and write
21B7D370000
trusted library allocation
page read and write
21B77A00000
trusted library allocation
page read and write
21B7B698000
trusted library allocation
page read and write
21B77D70000
heap
page read and write
There are 3543 hidden memdumps, click here to show them.